JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER ENGINEERING UML MODELING FOR ELECTION MANAGEMENT SYSTEM 1 Pradeep Laxkar, 2Chintan Shah, 3Kashyap Thakar Assistant Professor,ITM Universe,Vadodara,Gujarat 2,3 Student,CSE 2nd Year ITM Universe.Vadodara,Gujarar pradeep.laxkar@gmail.com , chints1193@gmail.com, kashyap.thakar@yahoo.com 1 ABSTRACT—Unified Modeling language (UML) is one of the important modeling languages used for the visual representation of the research problem. UML uses object oriented design concepts and it is independent of specific programming language. Unified Modeling Language is a popular technique for documenting and modeling system. In the present paper, UML model is designed for the Election management system. We did a deep analysis and design UML diagrams for election management system. We designed class, use case, sequence diagram etc using rational software Architect tool. Keywords—UML, EVM, Class Diagram & Sequence Diagram. I.INTRODUCTION A UML tool or UML modeling tool [1] is a software application that supports some or all of the notation and semantics associated with the Unified Modeling Language (UML), which is the industry standard general purpose modeling language for software engineering. UML tool is used broadly here to include application programs which are not exclusively focused on UML, but which support some functions of the Unified Modeling Language, either as an add-on, as a component or as a part of their overall functionality. 1.1Kinds of Functionality UML tools support the following kinds of functionality: a) Diagramming Diagramming in this context means creating and editing UML diagrams; that is diagrams that follow the graphical notation of the Unified Modeling Language. b) Round-trip engineering Round-trip engineering refers to the ability of a UML tool to perform code generation from models, and model generation from code (a.k.a., reverse engineering), while keeping both the model and the code semantically consistent with each other. c) Code generation Code generation in this context means, that the user creates UML diagrams, which have some connoted model data, and the UML tool derives from the diagrams parts or all of the source code for the software system. In some tools, the user can provide a skeleton of the program source code, in the form of a source code template where predefined tokens are then replaced with program source code parts during the code generation process. d) Reverse engineering Reverse engineering in this context means, that the UML tool reads program source code as input and derives model data and corresponding graphical UML diagrams from it. II. PRODUCT FUNCTION User: Operator There is only one Operator for the system which feeds all the details about the Constituencies, Polling Booths and EVM machines. The particular Operator has its own Id and Password by which he can log into the system and feed all the information per requirement. For more accuracy there is a profile provided to the operator so that he can also feed up his own details. Also he can update his profile as required. User: Administrator There is an Administrator who has all access permissions and he is only responsible for creating another user which will be having access to the system. Administrator can also update his/other profiles. Administrator can also delete a user. ISSN: 0975 – 6760| NOV 12 TO OCT 13 | VOLUME – 02, ISSUE – 02 Page 233 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER ENGINEERING User: Assistant Returning Officer Assistant Returning officer is the person who assists the Returning Officer and gives relief to the Returning Officer from his work, just by dividing his work division wise. He is also provided an Id and Password so that he can make use of the system. User: Returning Officer Returning Officer also known as District Election Officer mainly collector is the supervisor of the election at the district level. He is the man who assigns duties to the Polling officer according to their pay scale and designation. He generates first, second training letter for the Polling Officers including Presiding officer, first Polling officer, second Polling officer, third Polling officer. He performs the Randomization of the Polling officer and also for the EVM machines. An lower level officer can also be released from his duty having genuine reason by the Returning officer. For this project a Returning Officer will be provided an Id and password (given by administrator) to fulfill the functional requirement. III. USE-CASE MODEL SURVEY Use-case for Administrator: To create, delete, update and maintenance of users. User: Observer In an election to see how the process of election is going on an observer is appointed. An observer can have more than one polling booth in his observation. The main duty of an observer is to check everything if he finds any mistake than he can inform to higher authorities and then higher authorities can take action. So in short we can say he has the power to dismiss any of the officers at any polling booth. Related to this project an observer has to check the randomization of the polling officer done by Returning officer. Administrator provides an Id and a password to the observer to use the system. User: Chief Election Commissioner Chief Election Commissioner is elected by president of india and along with him two election commissioner are also appointed. Now at state level chief electoral officer is appointed by Chief election commissioner. After that C.E.O of state will appoint R.O, A.R.O. , Observer etc. In this project C.E.C. is provided an Id and a Password by the administrator to use the system. Use-case for Operator ISSN: 0975 – 6760| NOV 12 TO OCT 13 | VOLUME – 02, ISSUE – 02 Page 234 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER ENGINEERING Use-case for Observer: it is appointed by C.E.C to observe election that will randomize polling officers Use-case for CEC: Head at centre Use-case for R.O. and A.R.O.: RO and ARO checks details, Assign post to polling officer according to pay scale, Randomise duties, Randomise E.V.M. The details about the polling officers whom the duties will be given to conduct the efficient voting at the polling booths. The Polling officers will be assigned duties according to their designation and pay scale. The polling officers will be Presiding Officer, 1 st Polling Officer, 2nd Polling Officer and 3rd Polling Officer respectively according to their ranks. ISSN: 0975 – 6760| NOV 12 TO OCT 13 | VOLUME – 02, ISSUE – 02 Page 235 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER ENGINEERING IV. SEQUENCE DIAGRAM ISSN: 0975 – 6760| NOV 12 TO OCT 13 | VOLUME – 02, ISSUE – 02 Page 236 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER ENGINEERING V. CLASS DIAGRAM VI. STATE CHART DIAGRAM Name of use case: Administrator Description: To create, delete, update maintenance of users. Precondition: ? Administrator should know username password. Normal flow of events: and and ? Login ? Home page ? Create user ? Delete user ? Update user ? maintain user ? logout Post Condition: Create/delete/update/maintain user. Name of use case: R.O and A.R.O Description: Check details, Assign post to polling officer according to pay scale, Randomise duties, Randomise E.V.M. Precondition: ? Admin created R.O and A.R.O. Normal flow of events: ? Login ? Home page ? View detail ? Assign duties ? Randomise polling officer ? Randomise E.V.M Post Condition: Randomised duties, Randomised E.V.M. Name of use case: Chief Election Commissioner Description: Head at centre, observe election. Precondition: ? Admin created C.E.C. Normal flow of events: ? Login ? Home page ? Assign R.O.,A.R.O,Observer ? Observe election ? Logout Post Condition: Governs Whole Election. Name of use case: Observer Description: Appointed by C.E.C to observe election Precondition: ? Admin created Observer. ISSN: 0975 – 6760| NOV 12 TO OCT 13 | VOLUME – 02, ISSUE – 02 Page 237 JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER ENGINEERING Normal flow of events: ? Login ? Home page ? View details ? Observe election ? Logout Post Condition:None VII. IMPLEMENTATION ISSUES 1. Taking Requirements seriously: voting systems are like all other systems. In order to implement a successful system it is not only required to understand the requirements correctly; it is also necessary to respect them. In order to have success with voting technology, it has to be tailored to meet the requirements of election organizers and voters rather than those of the vendors. 2. Computer Knowledge: every user must aware about computer that how to operate it. 3. Deployment of a Private Key: Having the voters generate one-time key pairs on their web browsers and having certificates on those keys issued on-line. In practice we work with the model that each voter receives a cryptic user identity and a one-time password, based on which the certificate is issued online. The user identity and the password must be received through two different channels in order to provide a decent level of security. We consider two physical letters with some days in between as the most realistic option 4. Protection against Hackers: We will understand the word hacker in a broader sense so that it includes system administrators, who can completely legitimately 21 observe and control computers of voters remotely, as well as hackers breaking in without permission. If a hacker observes the voting process, he will not gain any information about the candidate chosen, even if he has full control of the computer of the voter. Furthermore, if he tampers with the vote, the outcome will be uniformly distributed on all candidates. VIII. CONCLUSION From the above, it is concluded that the UML Class model is a powerful model used to depict the software development problems. In this paper, we have presented a conceptual approach, based on the UML, for the modeling of election management processes. By UML we represents the system with structural and behavioural language models and those designing modeling include the architectural mechanical and detailed design .Object oriented methodologies have employed in the construction of the real time system. REFERENCES [1] Unified Modeling Language User Guide by Grady Booch, James Rumbaugh, Ivar Jacobson [2] Rumbaugh, J., Jacobson, I. e Booch, G. (1999): “The Unified Modeling Language Reference Manual”. Addison-Wesley [3]http://www.rational.com/uml/documentation.html (Rational doc) [4] http://www.team-hos.net [5] www.fyxm.net/rational-rose-tutorial-55644.html [6] www.sparxsystems.com/uml-tutorial.html [7]http://www.exforsys.com/tutorials/uml/umlintroduction.html [8] “A Novel Methodology for World-best Teamwork in Hospitals”, J Artur Vale Serrano, Uwe Kirchhoff. Published in the book E-business, Key Issues, Applications and Technologies, edited by Brian Standford-Smith and Paul T. Kidd, IOS Press, ISBN 1 58603 089 2, 2000. 5. Long Term Privacy: The universal variability means that anybody can connect each voter to the cipher text. Security is based on the assumption that it is infeasible to decrypt the cipher text and see what the voter has voted. In order to protect the privacy of the voter, not just at the time of the election but also several years into the future, the keys used for the cryptosystem must be large. ISSN: 0975 – 6760| NOV 12 TO OCT 13 | VOLUME – 02, ISSUE – 02 Page 238