Kembabazi Jackline & Alfred Ajakol PDF
Kembabazi Jackline & Alfred Ajakol PDF
OF UGANDA
BY
KEMBABAZI JACKLINE
BITI2001 71821DU
And
ALFRED OJAKOL
BIT/20039/82/rjU
UNIVERSITY.
AUGUST, 2012
Declaration
We , KEMBABAZI Jackline and Alfred OJAKOL, do hereby declare that this project
proposal is our original and has not been published and/or submitted for any other Degree
award to any other institution before.
KEMBABAZI JACKLINE
BIT/2001 7/82/DU
Date
ALFRED OJAKOL
BIT/20039/82/DU
Date
Approval
This project proposal has been submitted for Examination with my approval as the
University Supervisor.
....z~
Date
Acknowledgements
We wish to acknowledge our indebtednes to our Supervisor Mr. Ssegawa James K. for his
patience, encouragement and continous guidance which have enabled us to produce this report.
Our thanks also go the staff of Kampala International University who created an enabling
environment that made it possible for us to complete this work.
Iv
LIST OF ACRONYMS
V
LIST OF FIGURES
VI
Abstract
Potential voters face difficulty when registering to be legitimate voters, some of these difficulties
includes: the long distances to be traveled for registration process, the long queues at the
registration sites, the short time duration provided for registration, updating and viewing the
voter register. In an effort to make the voter registration and voting process easier, this project
report outlines the designing and implementation of the online voting system based on current
literature on voter registration and voting process, web security and latest software application.
The online voting system allows the voter to register online and ensure the existence of his/her
name on the voter register. Furthermore, it allows the voter to cast his/her vote and check for
election results updates.
Although the online voting system focused on the Uganda Electoral Commission (UEC), it is
important to note that it can be implemented for other electoral commissions in other democratic
countries worldwide. The online voting system was evaluated and validated in terms of usability
and feasibility. The online voting system is both usable and feasible, though fixes are
recommended to meet the limitations. Trends in the quantitative data and logical inference based
on the context of the evaluation suggest that the online voting system might help the UEC to
produce more accurate voting process.
VII
TABLE OF CONTENTS
Declaration .11
Approval
Acknowledgements TV
LIST OF ACRONYMS v
LIST OF FIGURES
Abstract
vHI
CHAPTER ONE
INTRODUCTION 4
1.0 INTRODUCTION 4
1.1 BACKGROIJ1~~D OF THE STUDY 4
1.2 STATEMENT OF THE PROBLEM 5
1.3 PURPOSE OF THE STUDY 6
1.4 MAIN OBJECTIVE 6
1.5 SPECIFIC OBJECTIVES 6
1.6 RESEARCH QUESTIONS 7
1.7 SCOPE 7
1.7.1 Geographicalscope 7
1.7.2 ContentScope 7
1.7.3 Time scope 7
1.7.4 Significance of the study 7
CHAPTER TWO 9
LITERATURE REVIEW 9
2.0 INTRoDUCTION 9
2.1 INFORMATION COMMIJ1~nCATION TECI~OLOGY (ICT) 9
2.].] Website 11
2.1.2 Database 1]
2.1.3 Network 11
2.1.4 Internet 12
2.1.5 Voting process management 12
2.1.6 Voters’ registration 12
2.1.7 Communication 12
2.1.7.] Communication via LAN 12
2.1. 7.2 Communication via Internet 13
2.1.8 Votes casting, recording and counting 13
2.2. VoTES REPORT 13
2.2.1 ICT and Voting Process Management 13
2.2.2 Theoretical perspective 15
2.2.3 Related studies 16
CHAPTER THREE 18
METHODOLOGY 18
3.0 INTRODUCTION 18
3.1 RESEARCH DESIGN 18
3.2 RESEARCH POPULATION 18
3.3 SAMPLE SIZE .18
3.4 SAMPLING PRoCEDuREs 19
3.5 RESEARCH INSTRUMENTS 19
3.5.1 Questionnaires 19
3.5.2 Observation 19
3.6 DATA GATHERING PROCEDURES 20
3.6.1 Before the administration ofthe questionnaires 20
3.6.2 During the administration ofthe questionnaires 20
3.6.3 Ethical Considerations 20
3. 7.8 Limitations ofthe Study 21
CHAPTER FOUR 22
SYSTEM DESIGN AND IMPLEMENTATION 22
4.0 INTRODUCTION 22
4.1 OLD SYSTEM WEAKNESSES 22
4.2 ExPECTED VALUES OF THE NEW SYSTEM 22
4.3 SYSTEM REQUIREMENTS 22
4.3.2 Functional requirements 23
4.3.3 System Development Methodology 23
4.3.4 System Development Tools 23
4.3.5 Function needs ofthe system 23
4.4 SYSTEM DESIGN 24
4,4.1 Logical Design 24
4.4.2 Entity Relationship Diagram 24
4.4.3 Dataflow Diagram 25
4.4.4 Physical Design 27
4.4.5 Database Design 27
4.4.6 Login interfaces 27
4.4. 7 Voters’ registration form 28
4.4.8 Pollingform 28
4.4.9 Statistical votes results chat 29
4.5 SYSTEM DEVELOPMENT 29
4.5.1 Introduction 29
4.5.2 System implementation 29
4.5.2.1 Registration 30
4.5.2.2 Creating an account 30
4.5.2.3 Login 30
4.5.2.4 Cast the vote 30
4.5.2.5 View the results 30
4.6 COMPONENTS OF THE ONLINE VOTING SYSTEM 31
2
4.6.1 Online Voting System Home Page 31
4.6.2 Registration Form 31
4.6.3 Login Frame 32
4.6.4 Voter ‘5 account 33
4.6.5 Polling Frame 33
4.6.6 Candidates’ Frame 35
4.6.7 Database 35
4.6.8 Findings 35
5. SYSTEM CONVERSION 36
CHAPTER FIVE 37
SUMMARY, EVALUATION, CONCLUSION, AND RECOMMENDATIONS 37
5.0 INTRODUCTION
5.1 SUMMARy
5.2 EvALUATION OF THE NEW SYSTEM 37
5.3 CONCLUSION 38
5.4 RECOMMENDATIONS 38
REFERENCES
APPENDICES 41
APPENDIX I 41
APPENDIX II 46
APPENDIX III 47
APPENDIX IV 48
APPENDIX V 49
APPENDIX VI 50
APPENDIX VII 51
3
CHAPTER ONE
INTRODUCTION
1.0 Introduction
This study focuses on design and implementation of an online voting system for Uganda,
managed by Electoral Commission that will facilitate Uganda citizens in the diaspora and in the
country, to vote via Internet with a major focus on the overcoming of the election material and
time costs and allow anyone who would like to cast his/her vote, to do so from where he/she is
without going to line up at the polling stations. A good electoral process is one that ensures the
preservation of the secret ballot, accuracy, privacy, integrity and proper tabulation of the voter’s
intent regardless of his or her physical condition, language of origin, or literacy ability. The
election system must be sufficiently strong to withstand a variety of fraudulent behaviors, must
be sufficiently transparent and comprehensible that voters and candidates can accept the results
from an election. Indeed, free and fair elections are a component of all definitions of democracy.
The online voting system will work in parallel with an existing one. The existing system is
conducting election process in a traditional manner, where the voters have to go to line up at the
polling stations. However, the new system will no replace completely the old one since the
online voting system requires some computer knowledge to use it. Thus, the old system will be
maintained to serve those who are ignorant in computer environment until when every Ugandan
will be able to use a computerized system.
4
At the global level, electronic election started in the year 2000 for presidential election in United
States of America. The aim was to increase participation, lower the costs of running elections
and improve the accuracy of results. This briefing note looks at options for using new
technologies in voting, focusing on the pros and cons of Internet voting and the implications of
such a radical change in the way that elections are conducted, Jung-Ying Lai (2003).
In Africa, some countries still experience political and ethnic divisions, confirming that Africans
do not trust the counting of votes which is carried out manually. So, the dynamic of elections
should be changed from a traditional to an electronic one. So far, no African country has tried to
implement an electronic voting, Kyanda 5. (2004).
In Uganda, the voters suggest the concept of an online voting, by integrating Information
Technology to satisfy the characteristic of election such as uniqueness, accuracy, completeness,
verifiability, audibility, and privacy. This can also facilitate those in the Diaspora to vote from
abroad via the Internet at the time of voting to exercise their right, Kyanda 5. (2004).
This project intends to come up with an online voting system prototype that will facilitate any
Ugandan citizen to enjoy the right of casting the vote from where he/she is via the Internet.
The government of Uganda, according to the White Paper, (2001), is fully conscious of the
problems it is facing in its effort to cause rapid improvement of democratization. The quality of
elections has been seriously eroded at all levels due to depredation of war, civil strives and the
consequent financial decline during the last two decades. Ugandan citizens have experienced
dictatorship problem, security was just a dream, people were demoralized and many of them
have been killed during elections and others have been forced to take exile where some of them
5
are still outside the country and have no right to enjoy and participate in democratic exercise that
is taking place in the country.
In Uganda, it has been proved that election malpractice and or fraud has become a threat to the
democratization process. Furthermore, the corruption, loss of lives in election process, the delays
in election materials and high costs of conducting elections in a traditional manner have become
a burden for the country. Thus, IT has to be considered as a good solution for the above
problems.
In the light of the above scenario, the prevailing problem which this study intends to solve, is the
design and implementation of an online voting system which is the better solution for all
Ugandans wherever they are, because in case Ugandans in Diaspora are deprived of their voting
right, they may be a problem to the current regime by creating a strong opposition through which
they hope to be treated like other Ugandan nationals. This system will handle such problem since
it will be uploaded so that anyone can access it form the Internet wherever hi/she is located.
6
1.6 Research questions
1) Is it possible to design and implement an online voting system that will facilitate Uganda
citizens abroad and locally to vote via Internet?
2) Is it possible to design a database to store the voters’ identification, record, counting and
display statistically vote results?
3) Is it possible to build a dynamic website that will serve as interface between the users
(voters) and the voting system?
1.7 Scope
The government of Uganda will aim to achieve the good of good governance and
democracy. Then, it will save costs in terms of money and time it usually use to purchase
and ship the ballots; security will be sure and no cheating will be experienced since the
voters will be voting in absolute secret and the system will be designed in a such way that
no one will be given a gap for cheating.
7
The Uganda Electoral Commission will use the findings as empirical information to
improve the modern way of voting, quality standard in terms of democracy in Uganda
toward a free and fair election in countrywide and in Diaspora communities.
The future researchers will utilize the findings of this study to embark on a related study.
8
CHAPTER TWO
LITERATURE REVIEW
2.0 Introduction
This chapter involves looking through earlier research documents and related literature with an
aim of identifying a problem of concern such that no duplication of earlier research work was
done. This was sourced by reviewing documented resources such as text books and online
publications, related with the research topic.
In the field of Politics, Information and Communication Technology (ICT) has emerged as
voting and online voting. Computer scientists who have done work in, or are interested in,
electronic voting all seem to agree on two things:
1. Internet voting does not meet the requirements for public elections
2. Currently widely-deployed voting systems need improvement, Charles W. (2000).
Voting on the Internet using everyday PC’s offers only weak security, but its main disadvantages
are in the areas of anonymity and protection against oppression and/or vote selling. It’s such a
truly bad idea that there seems to be no credible academic effort to deploy it at all. The USA
Presidential elections of 2000 brought national attention to problems with current American
methods of casting and counting votes in public elections. Most people believe that the current
system should be changed; there is much disagreement on how such changes should be made,
Jamie B. (2003).
9
Other researchers have done work in electronic voting; while they may not explicitly mention
voting from remote poll sites, their work is nonetheless relevant to any effort at designing or
implementing a remote poii site voting system. Lorrie C. (2002) could be classified, like the
Caltech researchers, as a cautious optimist. She acknowledges the problems inherent in each kind
of voting apparatus, but doesn’t make an overt recommendation on her site for one technology
over the rest.
Mercuri, R. (2002) invented the Mercuri method for electronic voting. A critical component of
this method is very similar to the Caltech proposal: a voting machine must produce human-
readable hardcopy paper results, which can be verified by the voter before the vote is cast, and
manually recounted later if necessary.
Dr. Michael, S.(2002) provides a sharp counterpoint to Mercuri’s view. He is less afraid of the
catastrophic failures and sweeping fraud made possible by imperfections in electronic voting
machines actually occurring in a real election. Shamos is also much less impressed with paper
ballots than is Mercuri. He places a great deal of faith in decentralization to make fraud difficult
to commit and easy to detect.
According to Reding V. (2008), ICT has increasingly been identified as a major contributor to
the process of business development and improvement and it has been identified that ICT is
responsible for around half of productivity growth in modern economies. It drives improved
efficiency and better services and products across the entirely of the private and the public
sectors.
According to BBC, (2005), the use of ICT has affected every aspect of business, transforming
not only the way that business is conducted but also creating new business sectors and jobs. The
10
creation of companies like Google and e-Bay which did not exist 10 years ago, was only made
possible by advances in ICT and the changes that this has created in the way that people behave
(currently Google is valued at 44~billion).
2.1.2 Database
Widom J. (2001) defines a database as a collection of data, organized for access and
modification preserved over a long period.
According to C.J.Date (1990), a database is a computerized record keeping system; that is, it is a
computerized system whose overall purpose is to maintain information and to make that
information available on demand.
2.1.3 Network
Andrew S. Tanenbaum (2002) defines a network as an interconnected collection of autonomous
computers and other communication devices that are able to share resources and exchange the
information.
According to Glenn Berg (1998), a network is a set of interconnected systems with something to
share. The shared resource can be data, a printer, a fax modem, or service such as a database or
an e-mail system. The individual systems must be connected through a pathway (called a
transmission media) that is used to transmit the resource or service between the computers. All
the systems on the pathway must follow a set of common communication rules for data to arrive
at its intended destination and for the sending and receiving systems to understand each other.
11
2.1.4 Internet
According to Layman L. (2001), Internet is a network of networks. Internet is basically a
collection of computers that span the entire globe and connected by satellites, cables, routers and
switches etc. Communication between these computers is by a protocol called Transmission
Control protocol / Internet Protocol (TCP/IP). Using one Computer on the Internet, you can
access another computer on the Internet to obtain data such as Pages, Videos, Audios, and
applications, also over the same Internet one can place a phone call.
To logon to the Internet, a Personal Computer (PC) must have a Browser application program
running on it. Browsers include Internet Explorer, Mozilla Firefox, Google chrome, Netscape
navigator, etc. Documents, files, movies, audio files and any other Internet data can be stored on
a certain Computer over the Internet and each bearing a special Uniform Resource Locator
(URL) address specifying the computer on which this information is residing and the path to this
file on the computer where it is found.
2.1.7 Communication
12
2.1.7.2 Communication via Internet
According to Jay Dax Designs (2000), Internet is a great alternative to the conventional methods
of communication. Using Internet you can: send an e-mail, send a fax by e-mail, receive fax by
e-mail, chat to an individual, send and receive instant messages, chat to a group, talk by voice
(Internet telephony), video conferencing, register for voting, cast votes, and display votes report.
In e-voting, Internet is used for online voters’ registration, online vote casting and online election
results updates checking. Furthermore, the voters can interact with BC staff by sending and
receiving messages via the Internet.
In the absence of controversy, surveys of voter attitudes usually reflect satisfaction and trust.
When concerns are raised by experts and in the media, however, public opinion can change
13
dramatically. For example: in Ireland in 2003 a survey by Amarach Consulting found that a
majority of Irish citizens were in favor of the introduction of e-voting.
This instinctive trust of c-voting systems also appears to exist amongst officials. When
government representatives speak about e-voting it tends to be in very positive terms. Their
statements emphasize the benefits of e-voting; the largest obstacle, from their point of view, is
usually gaining the voters’ trust. The idea that the system in question might not deserve such
trust is given little or no attention, except where it overlaps with “allaying public concern” about
the security of the system. Two prime examples of this are the web pages for the voting systems
of the Irish Government and the Swiss state of Geneva.
Examples of worrying incidents in real elections in the US have been gathered by the Verified
Voting Foundation’s Election Incident Reporting System.
This study attempts to address the challenges faced by Uganda and other developing countries in
the use of c-voting by proposing a strategy aimed at reducing the setup and operational costs for
election process, increasing the potential for sustainability and creating an envirornrient that will
encourage the development of the ICT infrastructure.
14
ONLINE VOTING SYSTEM
DATABASE
VOTERS’ REGISTRATION
WEBSITE
: COMMUNICATION
NETWORK
: VOTES CASTING
:
: :
INTERNET VOTES RECORDING
:
VOTES COUNTING
VOTES REPORT
:
15
separate from its external environment but with permeable and often ill-defined boundaries. It is
a purposeful entity producing output which it exchanges with stake holders in its external
environment in return for resources and support and so is dependent upon its environment.
In this study, our web based voting system will be an open system that will allow the system
administrator to upgrade it when need be. Its components such as Database, web site, networks
and internet will be independent so that in case of any upgrading task performed on a particular
component will not affect the other. However, all these components will be interacting and work
as a single system.
Fujioka et al. (1992) pioneered the verifiability in e-voting protocols by forcing voters to involve
more than one round. Voter has to participate in the counting stage by checking that his vote is
listed correctly in the tallying list, and then sending a part of the vote in order to complete voting.
In this protocol, verifiability is defined as “No one can falsify the result of the voting”.
Later, Sako et al. (1995) introduces the concept of universal verifiability to emphasize the
importance of auditing of overall election by categorizing the verifiability as individual
variability and universal verifiability.
Further e-voting studies apply this categorization. Sako et al. defines individual and universal
verifiability respectively as “A sender can verify whether or not his message has reached its
destination, but cannot determine if this is true for the other voters” and “In the course of the
protocol the participants broadcast information that allows any voter or interested third party to
at a later time verify that the election was performed properly”.
Cranor et al. (1997) makes the definition of universal verifiability narrow by limiting it as just
counting the votes and defines verifiability as “Anyone can independently verify that all votes
have been counted correctly”. Most of the later studies use this definition since it is much more
specific and measurable.
16
He et al. (He 1998) and Riera et al. (Riera 1998) give a variant of the aforementioned definitions
for verifiability. He et al. handles verifiability as “Every voter can make sure that his vote has
been taken into account in the final tabulation”; and Riera et al. handles verifiability as “A
system is verifiable if voters can independently verify that their votes have been counted
correctly”.
Karlof et al. (2005) combines the verifiability definition without distinguishing universal or
individual as follows: “Verifiably cast-as-intended means each voter should be able to verify his
ballot accurately represents the vote he cast. Verifiably counted-as-cast means everyone should
be able to verify that the final tally is an accurate count of the ballots.”
It is obvious that all the above studies left a knowledge gap in their researches. No one of the
above authors talked about web based or online / Internet voting, where by a voter can cast
his/her vote from anywhere he/she is without going to line up at the polling station. Therefore,
this study intends to assess an existing voting system and integration of ICT in voting process in
Uganda. Furthermore; the study will design and implement an online voting system for Uganda
Electoral Commission that will facilitate Uganda citizens abroad and in the country to vote via
Internet without going to line up at the polling stations.
17
CHAPTER THREE
METHODOLOGY
3.0 Introduction
This chapter includes items like research design, research population, sample size, sampling
procedures, research instruments, data gathering procedures, data analysis, system development
methodology and tools and project plan schedule.
In data gathering both quantitative and qualitative approaches were considered. Both primary
and secondly data were gathered. Primary data are responses retrieved from respondents whereas
secondly data are from documents, report literature and related publications.
The target population included a total number of one hundred sixty four (164) senior, middle,
and lower staffs of Uganda’s Electoral commission which is up to now operating in a traditional
way. This is because; the three categories of staff are able to give complete and concrete
information that can be used to determine requirements for the system under investigation. The
research also targeted Electoral commission agents and voters in order to augment the
information gathered from the target institution.
As a number of population is big, a sample from the target population was taken. The Sloven’s
formula was used to determine the minimum sample size.
1. Male or female respondents in any of the LC 1 from five divisions in Kampala District.
2. EC staff and Agents with experience under ICT discipline ranging from one year and above.
From the list of qualified respondents chosen based on the inclusion criteria, the random
sampling were used to finally select the respondents with consideration of the minimum sample
size.
3.5.1 Questionnaires
Questionnaires are set of documents with questions that are sent out to respondents.
Questionnaires are useful for getting information from large group of people when you cannot
get around to interview everyone .Questionnaires may also yield more information if respondents
can be anonymous. In addition, this tool is convenient, is inexpensive, and yields a lot of data.
3.5.2 Observation
Observation technique was used by the researchers to monitor obvious items of the system
without applying interview or questionnaires methods. These led to the best conclusion of the
whole situation within the Electoral Commission. Through observation, the researchers saw how
19
voters interact with EC agents (during by election exercises), how time of voting was not enough
and how people in diasporas had no right of voting; etc. The observation was conducted secretly
by the researchers as participant observers in order to get more insights by experiencing the
conflicts and responsibilities of the people they were working with. We avoided making people
to know that they were being observed, because they might falsify their behavior in some way.
20
3. We request the respondents to sign in the Informed Consent Form
4. We present the findings in a generalized manner.
Extraneous variables which were beyond the researchers’ control such as respondents’ honesty,
personal biases and uncontrolled setting of the study.
Instrumentation: The research instruments on ICT resources availability and utilization were
not standardized. Therefore a validity and reliability test was done to produce a credible
measurement of the research variables.
Testing: The use of research assistants could bring about inconsistency in the administration of
the questionnaires in terms of time of administration, understanding of the items in the
questionnaires and explanations given to the respondents. To minimize this threat, the research
assistants were oriented and briefed on the procedures to be done in data collection.
21
CHAPTER FOUR
4.0 Introduction
This chapter explains the logical design, physical design developed by the researcher, entity
relationship diagram, data flow diagram, the new design system, data input and findings from
questionnaires and observation. The new system is designed to meet the needs of Electoral
Commission as far as voters’ registration and election results report are concerned. It is also
designed to ensure accurate voters’ record keeping and provide better services to voters. It will
be expected to overcome the shortfalls associated with the current voting system that uses
traditional manual methods to operate.
22
4.3.2 Functional requirements
Functional requirements are statements of services the system should provide, how the system
should react to a particular inputs and how the system should behave in a particular situation. In
some cases, the functional requirements may also explicitly state what the system should not do.
This involved a collection of programs, routines and subroutines that facilitated programming
and operation of the system, but also included documentation and operational procedures.A
content management system “Joomla 1.5.26” was used to develop a system’s website and user
interfaces. MYSQL server used to build a powerful database to store the information and handle
the large number of voters. This is because MYSQL can be used in distributed computing, in a
networked environment. The application operates on Windows7 ultimate and Windows server
2008 operating systems. This is because windows operating system is user friendly and widely
used in many organizations. Windows Internet Explorer 8 was used as a web browser.Other
requirements included RAM for Windows (2 GB), disk space at least 160 GB, printer, monitor.
A dual core processor with at least 3GHZ was used to enable faster computation and allowed
further investigations of new components into the application and run it.
23
4.4 System Design
System design is specification or construction of a technical, computer based solution for the
business requirements identified in a system analysis. Whereas system analysis emphasizes the
business problem, system design focuses on the technical or implementation concerns of the
system. It is driven by the technical concerns of the system designer. System design is looked at
from the three perspectives: Logical design, Physical design and Database design.
Logical design is concerned with the conversion of logical records structures of a data model
supported by a database management system identifying entities and their matching attributes
and the relationship types determining the attributes domain. It involves the use of entity
relations diagrams.
24
From the above diagram, one candidate can be voted by many voters. From the above diagram
the relationship between the voter table and candidate table is many to one.
25
The above flow chart shows how the voter interacts with the online voting system. When a voter
casts the vote to the candidate the system enters the vote into the database and it displays the
updated results.
The design of the Online Voting System has been tailored to fulfill the objectives of the project.
Section 4.1,4 looks at the design of the interface, section 4.1.5 looks at the Voters ‘Registration
form, 4.1.6 looks at Polling form, section 4.1.7 looks at Statistical votes results and 4.1.8 looks
at Results updates form.
Usrn~e~
This is where the only registered voter has the right to login and view either the polling menu for
voting or to view the election results.
27
4.4.7 Voters’ registration form
~ REGISTRATION FORM
R~qofred
FISRT NAME
LAST NAME
GENDER * M
AGE 15/0812012
NA]1ONAUTY
OCCUPATION
ADDRESS
~ATHERS NAMES
MOTHERS NAMES
FATHERS
OCCUPATION
SUBMIT RESET
In order to get right for voting or viewing the election results updates, the voter has to fill the
following form to get registered with the Online Voting System.
i~N WK4AMUZ8
T~W3~A QaOrB
This is where the candidates’ names appear with the option of voting by selecting the name of
the candidate of your choice. To vote, you select a radio button behind the candidate’s name. The
poling frame is entitled “Cast your vote now”.
28
4.4.9 Statistical votes results chat
Cas~You,~ Vote Now
~ W KWEFE~
1647%
~ K Mq$EV~H 1647%
ABeD ~WAt~áKA~ 33 ~%
B~W NAMS.~3~c3c~ 0%
B1pAt~D~ ~$SA14 ~0%
~ kYArØ~Jz~ 1847%
OBQT~- I4~
1bf~at vo~e~~ ~
~ have~ ~1read~/ vqtéd
On~ o~ø Vote per user is
showed.
View d.~a%
This is where the updated statistical election results will automatically appear after casting a
vote, showing the name of candidates, the number of people that have voted so far and the
number, percentage and graphical representation of the votes each candidate has got.
4.5.1 Introduction
This contains program testing, project implementation, user interfaces and system conversion.
System implementation entails the construction of the new system and delivery of that system
into production. Prior to system implementation, it’s necessary to carry out training since it
enables users to gain maximum benefits from the new system. Managers should learn that the
system is capable of functioning to the benefits of the organization. Operators need training in
how to interact with the new system.
29
1. Registration
2. Creating an account
3. Login
4.5.2.1 Registration
In order to get right for voting or viewing the election results updates, the voter has to fill the
registration form to get registered with the Online Voting System.
4.5.2.3 Login
This is where the only registered voter has the right to login and view either the polling menu for
voting or to view the election results. The login form prompts the voter to enter the online voting
system.
30
4.6 Components of the Online Voting System
Flash tslaypr
This svebsite is one of the ehnnuels we expect to ole io edocotiog nod sensitising voters on elcctiotts
OyUosw Nfl and refeeendo for effective
We itt Eleotceel Coooniteinn snoo~y believe in haeoessiog the potential of eoodeto technology, like the internet, to
ptovide slId itd’ctntodoti and ditto (It tree iliot,dly fontiat) Ott dnvnlnpotootn in electicsi s0000getttnnt in Uganda nbc din
post two denadet. The site will also highlight hey ocltieceotentt in the development of elentoral democracy 0 Ugaoda, as
] svefl an the challenges esoontOeeed in the process
The site ilntltee penvides neetid iofcetnotion, doted at ednooting the geoecal pohilo, nod voted in potticolor. on the vatiotts
aspeots of die electoral process, tlonogh an integeoted t0000gemetit of infntttzatinn system foe efficiency mci
effecticeness.
At the same time, we believe this (site) still enable us (an nlentino os000gees) to receive and respond to issues thot you.
one esteeinedpttbhc, will raise front tIne to dine
4 As the PC aitus Os bettee deliverc of electoral sosonces in Ugaodo, we realise the hnpontnnoe of public soppoet and
iosolveeneot I theoefoee, invite you on stokeholdeos, to join and snppntt one efforts of toldng election to an even notch
higher lesel
Figure 6 shows the home page of online voting system web site
31
1~ON NT~M-~ —
- lecaihost p
flash ~ia
Passw~d FISRTNAME
LAST NAME
M
GENDER
Ft~obro~d~ F
o~u ~h~tfi AGE 1710812012 La
NA11ONALrr(~
OCCUPA11ON
ADDRESS
FATHERS NAMES
MOTHERS NAMES
4 FATHERS
OCCUPA11ON
SUBMIT RESET.
Usorname
Passwo,rd
Remerpber Me
~,r~ot~p~Jr 3sEth~d?
For’f~ooq~e dtq~
Stó~D~öOUflL
32
4.6.4 Voter’s account
In order to get the full right of login for voting or viewing the election results. each voter has to
be with an account with the s~ stern. This is where you are authenticated to enable you vote once
your details are identified. A voter~ s account is created by filling the form below:
-. j P,,~:.., ~ ‘g~t,_~n
Gal Mob’
- - FlDobpbver
I - - C REGISTRATION
Usernamo Name
Usor’iarn-~
Rcrn~niber in E-rn~ul
Login Paso.o d
- \‘orJy Pass:,~’u
- - RogisSar
fl~
~
‘~ 1~ ~ -J~.
- [. ,-~r,.E.e~:ssCmL,E
m,Ii,:t~., ~ ~, - -
33
I~ ‘tocaThni/vnrk~~ONUNEVo1~Gliy$Tgt,4:A~ foix~oeao tYST 01 + ~pu 03
loraihort
c ~“F ‘p * ~3,
Gal Adobe
Flash ylayer
34
4.6.6 Candidates’ Frame
L~ Z~j~—~~——--— ~~OHLfl~EVOnHGsvsTo~ f~3Cththt.~
4. -~ b~.IhoP - -, ~ e~-r- O~ ~ P * ~-
Get Mobe
~Jaer
ONLINE VOTING SYS~
EXERCI~
I__
NRM
S~ft~
MIRIAORQTE
uPc
a 4OPGERT tIAO DY
4.6.7 Database
The database stores the users and voters’ identification, candidates’ identification and votes. The
database for this project was created by the use of Joomla 1.5.26 and wamp server 2.O.The
database and some tables’ figures are shown in the appendices.
4.6.8 Findings
The research undertaken under the defined aim and objectives of this project gave the following
findings:
Security has been for a long time a major concern for computing systems and more so
with the advent of the distributed networked system. Viruses, worms and hackers have
35
given the greatest challenge to the system security personnel as they strive to cover all
loopholes into their systems.
e Authentication is also of the big challenge since one person may register for more than
once using different names in this system prototype. During the system real life
implementation, the finger print control system will be thought about.
The preservation of the secret ballot, accuracy, privacy, integrity and proper tabulation of
the voter’s intent were given a great value in this system’s design. The voter casts his/her
vote secretly, no one can change the votes, no one can vote more than once and a voter as
long as he/she is registered with the system has a right to come, login and review the
election updates as the voting process is going on.
o The poling exercise is scheduled in a way that the beginning and the end of the voting
process is specified so, anyone who comes before or after the appropriate time will not be
allowed to vote.
5. System conversion
System conversion which is also called system change over, takes place upon the approval of the
system testing. The parallel method of conversion from the current system to the new system was
selected as the most appropriate for the current scenario.
The above figure shows how the system’s change over takes place. Both the new and old
systems are used concurrently. This allows the users to learn how to use the new system and also
the system’s performance is monitored.
36
CHAPTER FIVE
5.0 Introduction
This chapter explains the evaluation, recommendation and conclusion arrived at by the
researcher.
5.1 Summary
I have designed an Online Voting System that offers three different types of authentication
measures. This indeed enables voter details anonymous makes it reliable and safe for individual
during voting. The login page offers the first level of security offered by this system by making
sure that only authorized user gets access to the poll results thus avoids rigging.
The use of Contents Management System (Joomla) and Mysql language has broadened my
website construction and my programming and problem solving skills as well.
However, the project was characterized with a number of challenges and experiences. This
among others included the limited resources especially implementation of the system on a virtual
server, software, hardware, money, and time.
The methodology utilized entailed visiting websites and reviewing existing literature on the area
of research.
The online voting system will increase efficiency and effectiveness in its operations, making it
stand at the democratic environment. For instance, the system will permit only registered voters
into the database to cast their votes. To make sure that this is accomplished; the system will
validate the voter’s user name and password.
37
Once a voter has cast his/her vote, he/ she will not be prompted to vote any more. However, the
system will permit the voters to login in order to view the updated election results in a statistical
way, but the system will not show the polling form to anyone who will have already voted.
Although the new system achieved the above performances it has some Limitations.
1. During the use of this application, only voters with some computer knowledge will enjoy this
modernized voting process. Also, one is likely to forget his/her user name or password and hence
not get access to the application.
2.The system has no algorithm that can be able to filter or identify different categories of voters,
for instance, identify already registered voters from the non registered ones so that no one can
register more than once using different names.
5.3 Conclusion
It has been proved that this online voting system achieves efficiency in conducting the voting
processes, hence saving time and money. Further, it ensures the preservation of the secret ballot,
accuracy, privacy, integrity and proper tabulation of the voter’s intent regardless of his or her
voting right, and political preferences even with the flaws that still need to be addressed. The
major area in this project for further research would be, an algorithm that can be able to filter or
identify different categories of voters, for instance, identify already registered voters from the not
registered ones so that no one can register more than once using different names.
5.4 Recommendations
Much as the system is ready for use, the author feels that more work can be done to make it
interactive. This work includes:
More research could be carried out to find out an algorithm that can be able to filter or identify
different categories of voters, for instance, identify already registered voters from the not
registered ones so that no one can register more than once using different names.
38
REFERENCES
1. Aronson E, (2001) Decision Support Systems And Intelligent Systems Pearson Education Inc.
India
2. Case J, Bradely A, Milispaugh C (2000) Programming in Visual Basic 6.0. McGraw-Hill.
New York.
3. Charles W. (2000).Electronic Voting.
4. Cranor et al. (Cranor 1997). Verification and Validation Issues in Electronic Voting.
Computer Engineering, METU, Ankara, Turkey.
5. David Flanagan, (1997) Java in A Nutshell. O’Reilly and Associates Inc. United States of
America.
6. David F. (2000).Electronic Voting Literature Review
7.D. Chaum (2002). Untraceable Electronic Mail, Return Addresses, and Digital
Pseudonyms. http://www.vreceipt.com/article.pdf
8. Dr Corina Sas (2004). Public Voting System. [email protected]
9. Dr. Michael Shamos (2002).Electronic voting Evaluating the Threat, 2002. Maryland 21218,
-
USA
10.Fujioka 1992) , Verification and Validation Issues in Electronic Voting. Institute of Applied
Mathematics, METU, Ankara, Turkey.
11 .He et al. (He 1998). Verification and Validation Issues in Electronic Voting. Institute of
Applied Mathematics, METU, Ankara, Turkey.
12.Henry Lucas (1997).Introduction to Information Systems.Calfornia University.
13.Hoffer J,George F. and Valancith (2005) Modern system analysis and design,
Benj aminlcummings Masachusetts.
14.James A. 0’ Brien (2003); Essential for E-business Enterprise, 11th edition, College of
Business Administration, Northern Arizona University.
15,Jamie B. (2003), E-voting System: Specification and Design Document. Carl Steinebach,
2003
16. Jung-Ying Lai (2003), Design and Implementation of an Electronic Voting System with
Contactiess IC Cards, Institute of Information and Computer Education, National Kaohsiung
Normal University, [email protected]
17. Kenneth C. Laudon Jane Laudon (2001); Essential of Management Information Systems,
organization and technology in the networked enterprises, ~ edition, New York
University.
18. Kenneth C. Laudon Jane Laudon (2003); Essential of Management Information Systems,
Managing Digital firm,5t~~ edition, New York University.
19.KYANDA SWAIB KAAWAASE (2004). A web-based voter registration tool. Makerere
University.
20. Mercuri (2000).Electronic Journal of c-Government Volume 5 Issue 2 2007 (117-126).
21.Sako et al. (Sako 1995). Verification and Validation Issues in Electronic Voting. Computer
Engineering, METU, Ankara, Turkey.
22.Stephen Coleman (2001). Information Communication Technology. Oxford, UK.
23 .TADAYOSHI KOHNO (2003). Analysis of an Electronic Voting System. University of
California at San Diego.
24. Jeffrey Whittin, Lonnie .D Bentley, Kevin C Dittman (2000) System Analysis And Design
39
Methods. McGraw- Hill. New York.
25 .John Edwards, Sage Software (2006) http ://itconsulting.com/interviews/sfa-trends
chrisreich- 12(2006)
26. Ramachandra, T.m Nambissan, (1995) Computerized Business Application. Suned Golgotia.
India
40
APPENDICES
Appendix I
This questionnaire is seeking information on the voting system of Electoral Commission. The
information you will provide will be treated with the highest level of confidentiality. You are
kindly asked to fill the form below appropriately.
Objective: design a database to record the votes and keep voters’ information.
Questioni
(a) Do the employees of the Electoral Commission store votes and voters’ information on a
database?
Yes Yes
No
41
(b) What do you think about a database being developed to be used for storing votes and voters’
information?
y
It’s necessary
Not necessary
Idon’t know
Objective: computerize and automate the voting process of the Electoral Commission.
Question 2
No
42
(b) What do you think about computerizing voting process in Uganda?
It’s necessary
Not necessary
I don’t know
Yes
No
(d) What do you think about design and implementation of an online voting system in
Uganda?
It’s necessary
Not necessary
I don’t know
43
OBSERVATION CHECKLIST
Checklist for observing employees and polling agents performing their duties at Electoral
Commission
1. Were the employees using a database to store votes and voters information? If yes what kind
of database and which database management system were they using?
2. Which kind of system were they using? Was it manual or computerized? Was the current
system efficient?
3. Were the employees efficient while doing their job? How long did it take to serve one voter?
4. Approximately how many voters can cast their votes per hour?
5. Were the votes and voters’ information records organized so that it enables easy retrieval or
votes counting?
6. Approximately how long does it take to come up with election results report after voting?
45
Appendix III
S ios..p~o joa_coreJog_searches iS - 7<o <7 7< 0 MyISAM oilS general ci 1.0 610 -
~~ ::~—~: jos_groups
los_menu
1W
11
iS 17<1 Ia
iS 1W Ia
ItS 7<
ItS 7<
3
0
MyISAM u118 general ci
MyISAM utfti_generaLci
2.1 0010
‘.3 610
-
-
S joe sections —, —
~ - los_menu tv~es 1W iS 17<1 it~ 1W >7 1 MyISAM utftigeoioraici 3,1 261 -
~o7$ ntot~aoecIo iS Ia 7< 7< 0 ,ci 1.0 610 —
Figure 13 shows Online voting system Database as made by Joomla contents management
system,
(Joomla basically provides a framework for your content. You manage it through a GUI in a web
browser, so you don’t have to ever see the php/css/whatever of your pages.)
47
Appendix IV
Users table
host/toca5t/nn~fjosjun... ONUOSEVOTtNOSYOTEM ]~~odhost/ Ieoalhe,I fatting /jos us.. 0 L±_ _~__.
tecnlhonI~ .. - C ~4 (atr~ P * ~
~Jai~A~ ~ 5J Server: localhost ~ Database: voting tO Table: jon_users
~Browse ~Structure ~tSQL ~. Search 8-Slnsert ~5Export fl5lmport ~Operations iBEmpty 3?DrOp
Database
voting (48)
III Showing rows 0-8 (9 total, Query took 0.0004 sec)
voting (48)
rSQL query:—
0 jasscepcttsppttons SELECT
8 jasacepsts~pulis FROM jus_usern
8 jus_scep8s~_vutrs LIMIFO f
8 jun_ak_ad
8 jos_ak_~rn5le~
8 jon_ak_stats
8 jos_ak_storoan
8 jon_banner
I ] Edit I Explain SQL]] Create PHP Code]] Refres~j
0 jos_baansrchsnt
8 jon bunnetrack
8 jon_cotegones
rovory results operations
8 jon_cE (do
8 o~cklonnn
j Print mew .~ Print mew (with lull texts) 5~ Export
8 jasckfsmrnl
8 jon_ckpnfte5elds [~t1owl 30 row(s) starling from record 8 0
8 jos_ckp~utIes
8 jon components in horizontal mode and repeal headers after 100 cells
8 jos_contact_detatls Sort by key None [Go]
8 jot_COsted
8 j_csntsnt_frontpa~e T • Id name usemame email password
8 jos_COotent_ratln5
8 jon_coat_act_are J X 62 Admimstrator admai [email protected] f8957ccfaa538l90e3ee316b2d31 301 3.9OwTUO2bpOB5qkMOk,..
8 J_cnee_acjoro_5wops
8 jon_cnre_acLaro_rnnp J 3< 63 KEMBABAZI JACKUNE kernbajacklinelQlyahoo corn 581617I871485d2875046784b1e7af28iX0wpr53dt~~qtAZy
8 jon_csre_acl._sro_sechont
8 jsn_cnro_acl.~nrOups_arojI J 3< 64 MUWUMUZA JUSTUS justo~yahoo.com e54a4fa681a5896460d6db1543e6c279.KS7deCEuZW5drnl nc
8 jo core_Inn_items
S jon_core_log_searches
S jon_9.toopn 5578b38943e3035698e2462c70613d983 7yRtcBaTR4GVrnKM1
S jon_menu 3< 65 KATO EMMA errima@yahoo corn
S jon_isesuJypen
S jon_messages
S jos_messagus_cfg 7ttdcbl626l336Ofdc4babc6fa3a42btL5RrtjLzZpqOOpl sTg..
S jos_erotwn_backl(nks J 3< 66 WINNIE NATUKUNDA nalu@yahoo corn
S jmmedules ~? 3< 67 GEREVAZ HABUMUCISHA habagervata@gmaiLcorn c9eoo3befl65ecltdbaal c821 hi 5d81 85:chDuflNoFlkTrkcvtrX..
S jon_modutes_wesu
S jos_nowufeeds
S jjtktgmns
S jun_puSs Li ~ 3< 68 NKURUNZIZA INNOCENT [email protected] 729d8aeb946088b8f6736016f14816a7:yoMh2VOE4olB8Hf2k...
S jospdL data 69 KAMAU JOHN 77ba8aadb40257aa16d9c98291096ca2E9As9Z6qI nlcq8e7b
S jon_pull_date .? 3< john@yahoo corn
S jon_poll_menu .? 3< 70 BERNARD BEN ben~yahoo.com 4789a123b9d56cl71 862c6269367521bXQOJLF5i0mJ11 401 C..
S jos_secbonn
S jon_session t.. Check All! Uscheck All With selected- ~) 3<55
Ion 000mg
~E~J
Figure 14 shows the users table. The users ‘passwords are encrypted.
48
Appendix V
Votes table
jJ~3JdJioooi0jit/oo5n5jj [ ONUNNYSTEM J.~ineethoit/loselhost/ootinv /ies_se... ° [+ i ~. ~;
iocalhact—. -p * ~.
*
13) Server: locathost & Database: voting 0) Table: jos_acepolls_votes
~ Browse ~ Structure ~l SQL ,~ Search Insert ~13 Export I~9 Import ~Oporattons [~Empty 7<Drop
Database
voting (48)
II Showing rows 0 -6 (7 total. Query took 00005 nec)
vcsttng(48)
r~~- query:
B jos_ucepons_ephoss SELECT
B jonacspets_psltu rnou jos_ecapolls_vutnu
B tss_acepolts_Yetns LIMITS 30
B joe_ak_act
B in° ak_profiles [Edit]] Explain SQL]] Create PHP Code]] Refresh]
B p5 akntats
B os_aIc_stnragv
B jon_banner
B ~
B jos_banne,track rQuery results operations
B juscatagsnas
B jos_clilelds ~ Printmew Pdnt~ew(mthfulltm4s) ~ Export
B jotcidomis
B jos_ckleims_1
B jos_ckprvelnlnldu Esiow., 30 row(s) starting from record 4 0
B jas_ckpeettes
B jOS cnmpnvvvts in toonzontal mode and repeat headers after 100 cells
B jos_contact_dotails Sort by key: Noes [R~J
B jun content
B Joe centeni fmontpugo T Id date option_id poltjd tp user_id
B joe content_eating
B juu_Foce_act_are ~ 3< 1 2012-08-09 14:35.06 7 1 2130706433 63
B jss.curect.Fro_gresps .. 7< 2 2012-08-1015:10:20 3 1 2130706433 65
B jss_cnie_nct_urojnap
B jsu_cura_pcl_aro_snttiosn ,~‘ 3< 3 2012-08-11 113755 3 1 2130706433 66
B jscnre_act_gFOupn_sre_fl Y 3< 4 2012-08-13 141759 6 1 2130706433 67
B joe coca log items ~Jo 7< 5 2012-08-1412:16:16 2 1 2130706433 138
B jos_cnrejng_unnrchos
B Jon_groups ) 3< 6 2012-08-1511 20:45 1 1 2130706433 69
B Jon meeu
B jon_menu_typos ~ 7< 7 2012-08-15 12:10:11 6 1 2130706433 70
B jon_messages t__ Check All I Uncheck All With selected. , 7<
B joe_messages_pIg
B jes_rmgratmon_bocktmnkn 30 row(s) starting from record # 0
B 1ns_moduteo
B jss_mndutes_mvnu in trortzontsl mode and repeat headers after 100 cells
B joe_newsfeeds
B jos_idogins
B Jon ~OOS
B jos_pdLdata
B jos_pult_dala
B jon_pu0 menu
B jos_sectiuns
B jon session
on on elgen anOde
49
Appendix VI
Registration table
LJ4tsl~i~theejfkrheotI~obngJjeexm~ ONUNEVOTtNGSVSTEM j ihnet/iobont/voxn5JJonoL t
,0 ~
+ ioolho,t.
Database
voting (48)
QJ Showing rows 0 - 11(12 total, Query took 00059 sac)
voting (48)
FSQL query:
~ jas_acepats_aptionn SELECT
~ jas_ecepalts_pslir FROM jos_ckEetds
D jao_acepeIls_~ates UMITO
~ jan alt act
~
nt
~
jon_ak_preStos
jan_ak_slots
jsn_nk_stara5a
I I Edit]] Explain SQL] [ Create PHP Code]] Refresh ij
ot jon banner
~ jas_bassarclleflt
D jonboasorleack ~Query results opmations
ot jascate5unen
~ jsnctsetds ~ Print view Print view (with full texts) ~ Export
ot janekfsrms
nt jan_sutures_i 30 row(s) starting from record # 0
ot jssckpratletelds
~ jan_ckproilas in horizontal mode and repeat headers alter 100 cells
ot Jan carnrponestn
ut jss_cnatact_detarln Sort by key: None I Go~
ot pro_cantons mandatory tea
~ jascnt_trsntruran T Id ltd name tabel tjrpettetd dafauttvalue
nt ja~caatest_Pt Sri 2 3< 1 1 FISRTNAME FISRT NAME test tJnjtvatueT=ee[~~]t_maxcham=25]_1t_teXttypeo-..
S jon_core_ad_ace r
S jos_care_act_ara_greups 2 3< 2 1 LASTNAME LFoST NAME text tjrntsalueTame(_]t_maxctraex25t~~]t_texttyPecme.
S jna_care_acl_ara_prop 2 3< 3 I GENDER GENDER radrobutton t_listHRB===optrb0aaM~~M[~]optrb1F)~F[_)t_di5Pl..
S jss_csre_acLaro_ssctisss
S jos_cnre_acLrjreupn_uro_a 2 3< 4 1 AGE AGE text ~
S jon_caror_lag_riems
S jss_csrejag_searctren 2 3< 5 1 ADDRESS ADDRESS text t_initvalueT=a[—]t_maschar°°°’SO[--)t_testtype°°°.
S jos_wsat~~ $ 3< 8 1 FATHERNAMES FAThERS tent t~nitsalueT==a[~~)t_maxchsre50[_]t_texttypee
S jon_menu NAMES
S Iso_mess_typos
5 jas_mossagos $ 3< 7 1 MATHER MOTHERS tent ~
S jas_mensoges_cis NAMES
S jas_mrsralien_bsckiinkn
S jss_nrsdalea 2 3< 8 1 OCCUPATION
FAThERS tent ~
S jon madams menu OCCUPATION
S tan_5sWufse~s 9 1 OCCUPATION OCCUPATION text tjniIvalueT=oe]—)t_maxcham~50[~)t_teettype~~
S Jss_pluens
S jon_puts 10 1 NATIONALtTY NATIONALtTY tent t_rntvatueT===I~.]I_maxchsr~~~25[_Jt_texftype
S jos_psll_dsta 11 1 SUBMf~ SUBMIT button t_typesT=aasubmit 0
5 jan_pall date
S jnn_poIl_mesu 12 1 RESET RESET button ttype8T=ereset 0
S ~ssnsCtrann
S ~ L_ CheckjolllUncheck.5JlWrths&ected: f 3< ~
5 jos_stots_aaaste
S jas_tempiotes_mesu [~tio~1 30 row(s) starting from record St 0
S jon_users in horizontal mode and repeat headers after 100 cells
~ jss_raebltsks
~zI L~L~i
Figure 16 show the voters’ registration table
50
Appendix VII
voting (48)
~ jua_acepulis_nptienn
W Showing rows 0 - 11(12 total, Query took 0.0004 nec)
~ jus_acepefapeUs
~ jus_asepulls_reteu rSQL query:—
~ ins_ak_ad
m jan ak_pinkies sELECr’
m jes:ak_stsIs FROM jas_peli_dala
m jun_ak_StOrage LIMIT S
~ jsa banner
m jea_bannerchent
~ 1uslesnrieilrauk
~ Jun catepexes
I [ Edit] Explain SQL] [ Create PHP Code] [Refresh)
m jan shIelds
~ ins ~ results operations
m ins ciduems I
~ jascbpreflefeldn ~rint dew .~ Prini dew (seth full tests) ~ Espod
m jusckpeufiIen
m jes_cnmpeennla
~ jea_cantacl_detals 30 row(s) starling from record 8 0
m jas_cealent cells
D jsscnnte~tfraeIPa9e in horizorilal mode and repeat headers after 100
m JOS_COCICTItJSI 09
m jeacnee_aci_aru Sort by key: None
m ~ne cnee_aci_srn_gresps eTi Id pollid text hits
~ jun_core_aol_am_map
~ jos_cnre_acLaro.,,aectiana , 3< 1 YOWERI KAGUTA MUSEVENI I
m jus_csre_asi_gruupu_aia_e 3< 2 I3ESIGYE WARREN KIFEFE 4
S jon_cnee_Iagjtems
S jes_cereJua_sesrcheu ~ 3< 3 BElLY OLIVE NAMISANGO KAMYO 3
S jesjeuepx ,)< 4 0
~ ins menu
s ins menu types 5 0
S jaa_messagnn 6 0
S 1esmeasages_cfg
S jasnegeaknnkachinks ‘3< 7 0
5 jusmadelen 8 0
5 1ns_medulen_mnnu
S jas_newsfeeda ~3< 9 0
S jus_ylegms .~ 3< 10
S jet_pulls
S joe_pull_dale -,~ 3< 11
19 1aa_pell_date 3< 12 0
S jun_pull_menu
S jos_sectens t__ __________
Check All I Uncheck All With selected. J 3< ~
S ion session
S jon creSS agents
5 jan templates menu
ri~J 30 rOW(S) starting from record 8 0
mode and repeal headers after 100 cells
s p5:50cm m horizontal
~ ten minis
51