SlideShare a Scribd company logo
1 of 6
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3294-3299 (2017) ISSN: 0975-0290
3294
Embedded Computer Application Software for
Secured Voter Card Transfer: An Approach to
Improve Electoral Integrity & Electoral Fraud
Prevention Mechanism1
Yekini N. Asafe., 2
Akinyele A. Okedola., 3
Oloyede Adetokunbo Olamide
1,3
Computer Engineering Department Yaba College of Technology, Yaba Lagos, Nigeria
2
Computer Engineering Department Lagos State Polytechnics, Ikorodu Lagos, Nigeria
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Voter registration helps to facilitate the credibility of the electoral process by preventing multiple voting as each
person is only allowed to register once. One out of many causes of disenfranchisement of register voter is the
failure to transfer their Voter Registration from one place to another when the case arises. That scenario has led
to multiple registrations which is a criminal offense in Nigeria context. This research work is to address the
difficulty involved in Voter Card Transfer. We design embedded application software proposed to be integrated
into the INEC existing website. A flowchart was designed using the procedure for Voter Register Transfer in the
INEC website. The prototype of the application was coded with C++. It was tested to meet the demands and
objective of the study.
Keyword: Electoral Fraud, Electoral Integrity, INEC, Voter registration, Voter Card Transfer, register voter.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: July 24, 2017 Date of Acceptance: August 03, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
One of the irreplaceable features of democracy is
election. Democracy encourages individual’s freedom with
respect to the rule of law, so that individuals can express
their opinion the way they wish, giving individuals the
opportunity to decide their leaders, and uninhibitedly
express their feelings on issues. Voter registration is
crucial for political participation in a democratic
context[1]. Election is the process that enables individuals
to choose their delegates and express their feelings on the
way they will be administered [2,3,4]. Nigerian election
process has been done manually (voting for local and
general elections done by electors with ballot papers and
ballot boxes in which the papers are placed) since returned
to democratic rule in the year 1999, the manual voting
process was associated with a lot of problems and always
resulted to post-election violence. Most countries, Nigeria
not an exception have problems when it comes to voting.
Some of the problems involved include rigging votes
during election, insecure or inaccessible polling stations,
inadequate polling materials, inexperienced personnel and
the problem of Voter’s Card Transfer [5]. The current
method of Voters Register Transfer is manual and this
make it almost impossible for any registered voters that
relocate far away from area of his registration to vote on
election day, or ventures into multiple voter’s registration.
Multiple registration is an electoral offence that is
punishable under law in that case, a person who is in
possession of more than one valid voter’s card is liable on
conviction to a maximum fine of 100,000 or 12 months’
imprisonment or both. The electoral law makes it a big
offence to engage in double registration and many Nigeria
ns are engaging in multiple registration due to difficult y in
voter registration transfer, thousands of Nigerians
including some past and serving governors, high profile
politician have been confirmed to have engaged in multiple
registration in the past and present. [6,7].
The focus of this research work is to automate the process
involve in Voter’s Card Transfer. Embedded computer
application software will be designed for the purpose of
voter’s card transfer. The software to be produced is proposed
to be embedded in the current INEC website for any registered
voters that wish to transfer his/her voters card due to one
reason or the other will apply, and INEC official will take
timely action on the application. The automation of voter
transfer will enhance credibility in electioneering process and
promote free and fair elections, also solve problem of
apolitical currently been exhibited by some Nigerians because
of various hardship involves in voter’s card transfer. Eligible
register voters can apply for transfer of his/her voter’s card to
another state, local government or ward before election at their
convenience before the election.
II. LITERATURE REVIEW
A. Procedure for Transfer of Voter’s Registration
There is no doubt that, voter card transfer process is
cumbersome in Nigeria and this has results to
disenfranchisement of some registered voters because of
their relocation to another area far from their initial area
of registration. Some of these people engaged in multiple
registration exercise which can led to political fraud. A
Nigerian has the right to live in any part of the country.
An important part of voter registration is that an eligible
person is advised to register at a center nearest to him or
her within the Ward in which he or she resides. This is to
make it easy for the voter to access the polling unit and
vote on election day. Electoral law makes a provision for
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3294-3299 (2017) ISSN: 0975-0290
3295
Transfer of Registered Voters and Agency (INEC)
saddled with responsibility of electioneering process also
provides the procedure for transfer of voter’s registration
as follows: [8,9].
 Step 1- The person who intends to transfer his
registration will write an application to INEC’s
Resident Electoral Commissioner of the State
where he is currently residing.
 Step 2- The applicant will attach his voters card
to the application.
 Step 3- The applicant must apply to the Resident
Electoral Commissioner not later than 30 days
before the date of an election in the constituency
where he is residing.
 Step 4- The Resident Electoral Commissioner
will direct the Electoral Officer of the applicants
Local Government Area to enter his name in the
transferred voters list.
 Step 5- The Electoral Officer will assign the
applicant to a polling unit in his constituency.
 Step 6- The Electoral Officer will issue the
applicant with a new voter’s card
 Step 7- The Electoral officer will retrieve the
applicant’s previous voter’s card
 Step 8- He will then send a copy of the entry to
the Electoral officer of the constituency where
the person whose name has been so entered was
originally registered.
 Step 9- Upon receipt of this entry, that Electoral
Officer shall delete the name from his voters list.
B. Electoral Integrity Concept
Electoral integrity is one of tools used by election
researchers and practitioners to evaluate the degree of
freeness and fairness of elections in democratic setting
[10]. Electoral integrity could be ascertaining by putting in
place the mechanism for prevention of electoral fraud
during electoral process. Nigeria has witness lot of
challenges and electoral fraud during elections such as
voter registration fraud, dead people voting, double voting
etc, all these has put electoral integrity of Nigeria in doubt.
An Automated Direct Recording Electronic Voting
System (ADREVOS), can improve Nigeria electoral
Integrity [11].Electoral fraud can truncate democratic
system of a nation. Hence affect sustainability of
democracy. In Nigeria electoral Integrity is been affected
badly by various form of fraud. The input of the people in
deciding who rule them is destroyed; popular participation
in governance and elections of public officers have been
hijacked by political gladiators, god-fathers and god-
mothers. A total over haul of social structures in electoral
process is necessary electoral integrity in Nigeria [12].
C. Effect of Electoral Fraud On the Nation
Democratic System
There is no doubt that electoral fraud has contributed
negatively to sustainability of democratic system and
development in Nigeria. Electoral frauds such as:
implausible turn out figures, under-age voting,
disenfranchising and intimidation of voters etc. has
weakened electoral process in Nigeria. There is need for
more enhance and participatory political education among
Nigeria populace. Electoral frauds have plunged Nigeria
into problems like post electoral violence, wasting of
national resources in conducting bye election, spending of
nation money wasteful by sitting political office holders to
pursue litigation in court towards retaining the sit by all
means [13].Electoral fraud is one of the most shattering
reasons why Nigeria has remained poor in the midst of her
abundant natural, human and mineral resources. There is
need to checkmate and terminate the incidence of electoral
fraud in Nigeria’s democracy. A rigorous transparency,
increased people participation in the pre and post-
electionprocesses is important tool to prevent electoral
fraud in Nigeria. A clear departure from the Electoral
Fraud in Nigeria could be further promote the electoral
integrity in Nigeria [14].
III. METHODS AND DESIGN
A. Data Gathering
We gatherer data through the use of questionnaire to
sample the opinion of various registered voter that have
moved away from their previous abode where they
registered during the registration process. We also studied
the existing voter transfer exercise. A total of one
thousand and fifty (1050) questionnaire was distributed
among the sample population within Lagos Mainland
Local Govt. Only eighty hundred and ninety-nine (899)
was analyzable. The result is tabulated as in table I.
Table 1. Research Data
Question (X, Y, Z) Yes No
X: Are you a register voter with
Permanent Voter’s Card.
701 198
Y: Did you register as a voter in
this State and a local govt’ very
close to where you are staying
right now.
503 396
Z: Are you aware that you can
transfer your Voter Card from one
location to another?
117 782
Figure 1. Pictorial Representation of Research Data
0
200
400
600
800
1000
X Y Z
Yes No
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3294-3299 (2017) ISSN: 0975-0290
3296
B. Result and Its Implication
Implication of the data gathered from the survey are:
- About 80% of the sampled population were
registered voters without permanent voter’s card.
Actually the reason for that is not known. But we
assumed it may not be unconnected to the manual
processes involved in the distribution of PVC.
- 55.95% of the sampled population has relocated
to a new place that differed from where they
registered as voters. The implication of this is that
these categories of people are automatically
disenfranchise. Because they cannot vote during
the election.
- 86.98% of the sampled population are not aware
that they can transfer their voter’s registration to
their current location. This implied that those
people considered themselves disenfranchise
during the election. These categories of people
may engage themselves in multiple registration
which is an offence under electoral law in
Nigeria.
From the study of the Existing Voter Registration System,
the INEC officers collect application from registered
voters that seek for voter’s card transfer. The current
system is associated with the following problems:
- Expensive and Time consuming: The process of
collecting data and entering this data into the
database takes too much time and is expensive to
conduct.
- Purely manual and paper-based: The process
involves too much paper work and paper storage
which is difficult as papers become bulky with
the population size.
- Loss of application detail: Some times,
application detail gets lost after being filled in
with voters’ details, in most cases these are
difficult to follow-up and therefore many remain
unattended.
Consequent to our findings, there is need to for effective
automated system for voter’s registration transfer in
Nigeria. This will go a long way to resolved all problem
associated to voter’s register transfer. Hence improved our
electoral Integrityfor credible and generally acceptable
election result.
C. System Design
After considering the need for automation of Voter’s
Register Transfer in Nigeria. We design a flowchartas
shown in fig I.
The flowchart is based on the procedure laid down by
INEC. From the laid down procedure, we proposed five
categories of users, their role is exemplified in the
flowchart: System Administrator, INEC official, and
Applicant. The INEC official is of three categories, the
Residential Electoral Officer (REC) of the state where the
applicant is seeking transfer of voter’s registration,
Electoral Officer I i.e, the Electoral Officer of the Local
Government Area where the Applicant is seeking transfer,
and Electoral Officer II i.e. the Electoral Officer of the
Local Government Area where the applicant is seeking
transfer to. The flowchart given in figure 1, depict transfer
within state, if it is interstate, the REC of the state where
the applicant applied from will have to contact the REC of
the new state, which will then direct the REC under his
supervision to act accordingly.
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3294-3299 (2017) ISSN: 0975-0290
3297
Figure 2. Proposed System Flowchart
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3294-3299 (2017) ISSN: 0975-0290
3298
IV. TESTING & IMPLEMENTATION
The flowchart in figure II was implemented using C++,
system was developed and tested. Figure 3 – 7 shows the
users interface during the testing and implementation of
the proposed system.
Figure 3 is the proposedsystem welcome screen where the
user start to interact with the system. Here, the user/voter
can either apply for the voter’s card transfer, login as the
INEC REC (officials) or as the Admin.
Figure 3. Welcome Screen
When click on apply for Voter’s Card button is clicked the
request page pops up. Here, the user/voter can now request
for the duplicating of his/her voter’s card and give the
reason(s).
Figure 4. Applicant Users Interface
After all the application form is filled, applicant will then
click OK button is clicked a message pops up saying
Request Received as shown in figure 5.
Figure 5. Screen that shows Completion of Application
If user is INEC official, he/she click on the “INEC REC”
button, and interface figure 6 LOGIN PAGE appear.
Figure 6. Log In page for INEC official
After successful log in, Voter’s list Page, appear and
applicant can then be selected from the voter list for
transfer or to delete from old list. See figure 7.
Figure 7. Voter list page:
V. CONCLUSSION
There is no doubt that circumstances surround Voter
Register Transfer in the current Nigeria situation is purely
manual and complex. That has resulted to unjustified
disenfranchisement of registered voters, and double
registration exercise which is an electoral offence in
Nigeria context. Hence has negative effect Electoral
Integrity. This work addressed the problem by automation
of the voter transfer processes through design and
implementation of Embedded Computer Application
Software for Secured Voter Card Transfer. This will go
long way to Improve Electoral Integrity, and serve as
Electoral Fraud Prevention Mechanism in implemented by
INEC.
We recommended that Nigeria electoral umpire INEC
should study this work, and come up with team of expert
to design a working version of the system that will be use
by INEC and applicant for voter transfer in future.
REFERENCES
[1.] Ashok Kumar D., UmmalSariba Begun T., (2011).
Review Paper on Fingerprint based voting.
Available at http: www.ijareeie.com.
[2.] KohnoT., Stubblefield A’, Rubin A., Wallch D.S.
(2003). Analysis of University Information Security
Technical Report TR-2003-19.
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 01 Pages: 3294-3299 (2017) ISSN: 0975-0290
3299
[3.] MalkawiM., Khsawneh M., Al-Jarah O., (2009).
Modeling and Simulation of the IBIMA, Volume 8,
2009. Issn 1943-7765.
[4.] Ashok Kumar D., UmmalSariba Begun T., (2011).
A comparative study on fingerprint matching
algorithm for EVM. Availble at http:
pubs.sciepub.com/jcsa.
[5.] Yekini, N.A., Oyeyinka I. K., Oludipe O.O., and
Lawal O.N., 2012. Computer-Based Automated
Voting Machine (AVM) forElections in Nigeria.
IJCSNS International Journal of Computer Science
and Network Security, VOL.12 No.5, May 2012
[6.] Hassan Adebayo (May 25, 2017). INEC-formally-
accuses-kogi-gov-bello-of-double-voter-
registration. Available at
http://www.premiumtimesng.com/news/232202-
[7.] Tope Alabi May 24, 2017. Kogi State Governor in
double voter’s registration scandal Available
at:http://www.informationng.com/2017/05/kogi-
state-governor-double-voters-registration-
scandal.html
[8.] Electoral Act, 2010: Act No. Short Title. Vol. 97.
Page. 6. Electoral Act, 2010. A 1103-1202. Printed
and Published by The Federal Government Printer,
Abuja, Nigeria.
[9.] (INEC n.d). Guidelines for Transfer of Registered
Voters available at
http://www.inecnigeria.org/?page_id=2051
[10.] Hakeem Onapajo (2016) How Credible Were the
Nigerian 2015 General Elections? An “Electoral
Integrity” Framework of Analysis. Postdoctoral
fellow, Department of Politics and International
Studies, University of Zululand, South Africa.
[11.] Aranuwa F.O.& O. Oriola O. (2012). Improved
Electoral Fraud Prevention Mechanism for Efficient
and Credible Elections in Nigeria. African Journal
of Computing & ICT. Vol 5. No. 6. Dec 2012 ISSN
2006-1781. Available at www.ajocict.net. IEEE
[12.] Kia, Bariledum (2013). Electoral Corruption and
Democratic Sustainability in Nigeria. IOSR Journal
of Humanities and Social Science (IOSR-JHSS)
Volume 17, Issue 5 (Nov. - Dec. 2013), PP 42-48 e-
ISSN: 2279-0837, p-ISSN: 2279-0845.
www.iosrjournals.org www.iosrjournals.org Page
42-48
[13.] Onwe, Sunday O., Nwogbaga David, M.E.2, Ogbu,
Mark O. (2015). Effects of Electoral Fraud and
Violence on Nigeria Democracy: Lessons from
2011 Presidential Election. IOSR Journal of
Humanities and Social Science (IOSR-JHSS)
Volume 20, Issue 4, Ver. 1 (Apr. 2015), PP 10-15
e-ISSN: 2279-0837, p-ISSN: 2279-0845.
www.iosrjournals.org DOI: 10.9790/0837-
20411015 www.iosrjournals.org
[14.] Casmir etal (2013) Electoral Fraud in Nigeria: A
Philosophical Evaluation of the Framework of
Electoral Violence. 2013. Vol.3, No.4, 167-174
Published Online October 2013 in SciRes available
at (http://www.scirp.org/journal/ojps)
Authors Biography
AKINYELE Akinleye Okedola
Obtained B.Sc. Electronics &
Computer Engineering from Lagos
State University and M.Sc. in System
Engineering from University of
Lagos. He is a Certified Wireless
Network Administrator (CWNA), I.T Consultant,
Engineer and a Professional Teacher. He was a head of
Department of Computer Engineering, Lagos State
Polytechnic, and presently the Head, Record and Statistics
in the Academic Planning Unit of Lagos State Poly-
technic.
Engr. Yekini Nureni Asafe obtained
his academic qualification as follows:
M.Sc. in Computer Science,
University of Lagos Nigeria
(UNILAG); B.Sc. in Electronic and
Computer Engineering, Lagos State
University (LASU), and NCE (National Certificate in
Education) in Physics Lagos State College of Education
Ijanikin (LACOED). He is a Member Nigeria Computer
Society (NCS), International Association of Engineers
(IAENG), International Association of Computer Science
and Information Technology (IACSIT), and Member
Institute of Electrical Electronic (MIEEE). Registered
Engineer COREN. He has co-author, and singular author
of several academic/research publications that has features
in some revered international journals and conference
proceedings both in Nigeria and in abroad. He has written
about seventeen textbooks in computer science and
engineering. He is Academic Planning Officer in the
academic Planning Unit of YabaTech, Nigeria.
Oloyede O. Adetokunbohas a
National Diploma in Computer
science from Federal Polytechnic
Offa (1997); BSc Computer
Engineering from Obafemi Awolowo
University, Ile-Ife (2005) and just
completed M.Engr (Information and
Communication Engineering) from Covenant University
Ota (2016). She is presently a lecturer in the department of
Computer Engineering, Yaba College of Technology,
Yaba, Lagos Nigeria; a prolific researcher; the secretary of
her institution's faculty journal and has over 8 years of
teaching experience in Polytechnic education having
taught both national and higher national undergraduate
students in various courses such as wired and wireless
networks, computer architecture, assembly language,
microprocessor and microcontroller to mention a few. She
has published several papers in various international and
national journals and conferences. She is a student fellow
of IEEE and IEE.

More Related Content

What's hot

Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technologyijsrd.com
 
How to vote in Estonia with the i-voting system
How to vote in Estonia with the i-voting systemHow to vote in Estonia with the i-voting system
How to vote in Estonia with the i-voting systemSmartmatic
 
Final project report on evm 16.04.2019
Final project report on evm 16.04.2019Final project report on evm 16.04.2019
Final project report on evm 16.04.2019mhjit
 
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET Journal
 
ADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEMADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEMabadmgr
 
11 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may1211 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may12Traitet Thepbandansuk
 
Response to questions from the Speakers Commission on Digital Democracy regar...
Response to questions from the Speakers Commission on Digital	Democracy regar...Response to questions from the Speakers Commission on Digital	Democracy regar...
Response to questions from the Speakers Commission on Digital Democracy regar...Smartmatic
 
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...Fatemeh Ahmadi
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanShahzaib Mahesar
 
Improving inec and election observers relationship evaluation of achievement,...
Improving inec and election observers relationship evaluation of achievement,...Improving inec and election observers relationship evaluation of achievement,...
Improving inec and election observers relationship evaluation of achievement,...oladsmighty
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET Journal
 
Electronic Voting: Challenges and Prospects in Nigeria’s Democracy
Electronic Voting: Challenges and Prospects in Nigeria’s DemocracyElectronic Voting: Challenges and Prospects in Nigeria’s Democracy
Electronic Voting: Challenges and Prospects in Nigeria’s Democracytheijes
 
Estonian E-Voting
Estonian E-VotingEstonian E-Voting
Estonian E-Votingashevch
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting Systemapolama
 
A Transition To Mobile Voting Systems
A Transition To Mobile Voting SystemsA Transition To Mobile Voting Systems
A Transition To Mobile Voting SystemsCloud Vote
 

What's hot (20)

CHAOS
CHAOSCHAOS
CHAOS
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technology
 
How to vote in Estonia with the i-voting system
How to vote in Estonia with the i-voting systemHow to vote in Estonia with the i-voting system
How to vote in Estonia with the i-voting system
 
Final project report on evm 16.04.2019
Final project report on evm 16.04.2019Final project report on evm 16.04.2019
Final project report on evm 16.04.2019
 
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
 
ADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEMADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEM
 
11 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may1211 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may12
 
Response to questions from the Speakers Commission on Digital Democracy regar...
Response to questions from the Speakers Commission on Digital	Democracy regar...Response to questions from the Speakers Commission on Digital	Democracy regar...
Response to questions from the Speakers Commission on Digital Democracy regar...
 
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
Surveillance and E-Government: Real and Potential Threats to Privacy in Europ...
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Improving inec and election observers relationship evaluation of achievement,...
Improving inec and election observers relationship evaluation of achievement,...Improving inec and election observers relationship evaluation of achievement,...
Improving inec and election observers relationship evaluation of achievement,...
 
Electronic Voting System
Electronic Voting SystemElectronic Voting System
Electronic Voting System
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
 
F017513138
F017513138F017513138
F017513138
 
Electronic Voting: Challenges and Prospects in Nigeria’s Democracy
Electronic Voting: Challenges and Prospects in Nigeria’s DemocracyElectronic Voting: Challenges and Prospects in Nigeria’s Democracy
Electronic Voting: Challenges and Prospects in Nigeria’s Democracy
 
Online election tools
Online election toolsOnline election tools
Online election tools
 
Estonian E-Voting
Estonian E-VotingEstonian E-Voting
Estonian E-Voting
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
Feasibility Study on e-Voting System
Feasibility Study on e-Voting SystemFeasibility Study on e-Voting System
Feasibility Study on e-Voting System
 
A Transition To Mobile Voting Systems
A Transition To Mobile Voting SystemsA Transition To Mobile Voting Systems
A Transition To Mobile Voting Systems
 

Similar to Embedded Computer Application Software for Secured Voter Card Transfer: An Approach to Improve Electoral Integrity & Electoral Fraud Prevention Mechanism

Application of ICT and Electronic Technology in Election Management: Challeng...
Application of ICT and Electronic Technology in Election Management: Challeng...Application of ICT and Electronic Technology in Election Management: Challeng...
Application of ICT and Electronic Technology in Election Management: Challeng...IJAEMSJORNAL
 
The adoption and challenges of electronic voting technologies within the sout...
The adoption and challenges of electronic voting technologies within the sout...The adoption and challenges of electronic voting technologies within the sout...
The adoption and challenges of electronic voting technologies within the sout...IJMIT JOURNAL
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Networkijbuiiir1
 
The proposal of giving two receipts for voters to increase the security of el...
The proposal of giving two receipts for voters to increase the security of el...The proposal of giving two receipts for voters to increase the security of el...
The proposal of giving two receipts for voters to increase the security of el...csandit
 
THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF EL...
THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF EL...THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF EL...
THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF EL...cscpconf
 
Online voting system
Online voting systemOnline voting system
Online voting systemArti Gupta
 
Online Voting System Project File
Online Voting System Project FileOnline Voting System Project File
Online Voting System Project FileNitin Bhasin
 
Engaging citizens
Engaging citizensEngaging citizens
Engaging citizensJanix Joy
 
Web Based Electronic Voting System Using Finger Print Authentication and GSM ...
Web Based Electronic Voting System Using Finger Print Authentication and GSM ...Web Based Electronic Voting System Using Finger Print Authentication and GSM ...
Web Based Electronic Voting System Using Finger Print Authentication and GSM ...ijtsrd
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionM2SYS Technology
 
IRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting SystemIRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting SystemIRJET Journal
 
Citizen Engagement Initiative - Bomo Albert-Oguara
Citizen Engagement Initiative - Bomo Albert-OguaraCitizen Engagement Initiative - Bomo Albert-Oguara
Citizen Engagement Initiative - Bomo Albert-OguaraBomo Albert-Oguara
 
Online voting system project by bipin bhardwaj
Online voting system project by bipin bhardwajOnline voting system project by bipin bhardwaj
Online voting system project by bipin bhardwajPT Bipin Bhardwaj
 
A case for political parties in Pakistan-Making the Opinion of Party Members ...
A case for political parties in Pakistan-Making the Opinion of Party Members ...A case for political parties in Pakistan-Making the Opinion of Party Members ...
A case for political parties in Pakistan-Making the Opinion of Party Members ...Aqeel Hayat
 
IRJET- Digitized Election Voting System : An Innovative Approach
IRJET-  	  Digitized Election Voting System : An Innovative ApproachIRJET-  	  Digitized Election Voting System : An Innovative Approach
IRJET- Digitized Election Voting System : An Innovative ApproachIRJET Journal
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting SystemIRJET Journal
 

Similar to Embedded Computer Application Software for Secured Voter Card Transfer: An Approach to Improve Electoral Integrity & Electoral Fraud Prevention Mechanism (20)

Application of ICT and Electronic Technology in Election Management: Challeng...
Application of ICT and Electronic Technology in Election Management: Challeng...Application of ICT and Electronic Technology in Election Management: Challeng...
Application of ICT and Electronic Technology in Election Management: Challeng...
 
E017222736
E017222736E017222736
E017222736
 
The adoption and challenges of electronic voting technologies within the sout...
The adoption and challenges of electronic voting technologies within the sout...The adoption and challenges of electronic voting technologies within the sout...
The adoption and challenges of electronic voting technologies within the sout...
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Network
 
The proposal of giving two receipts for voters to increase the security of el...
The proposal of giving two receipts for voters to increase the security of el...The proposal of giving two receipts for voters to increase the security of el...
The proposal of giving two receipts for voters to increase the security of el...
 
THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF EL...
THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF EL...THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF EL...
THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF EL...
 
Online voting system
Online voting systemOnline voting system
Online voting system
 
Online Voting System Project File
Online Voting System Project FileOnline Voting System Project File
Online Voting System Project File
 
Engaging citizens
Engaging citizensEngaging citizens
Engaging citizens
 
Web Based Electronic Voting System Using Finger Print Authentication and GSM ...
Web Based Electronic Voting System Using Finger Print Authentication and GSM ...Web Based Electronic Voting System Using Finger Print Authentication and GSM ...
Web Based Electronic Voting System Using Finger Print Authentication and GSM ...
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration Solution
 
IRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting SystemIRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting System
 
Citizen Engagement Initiative - Bomo Albert-Oguara
Citizen Engagement Initiative - Bomo Albert-OguaraCitizen Engagement Initiative - Bomo Albert-Oguara
Citizen Engagement Initiative - Bomo Albert-Oguara
 
Online voting system project by bipin bhardwaj
Online voting system project by bipin bhardwajOnline voting system project by bipin bhardwaj
Online voting system project by bipin bhardwaj
 
Election Day 2013 and its Aftermath
Election Day 2013 and its AftermathElection Day 2013 and its Aftermath
Election Day 2013 and its Aftermath
 
A case for political parties in Pakistan-Making the Opinion of Party Members ...
A case for political parties in Pakistan-Making the Opinion of Party Members ...A case for political parties in Pakistan-Making the Opinion of Party Members ...
A case for political parties in Pakistan-Making the Opinion of Party Members ...
 
Voter Registration for the 2013 General Elections in Kenya
Voter Registration for the 2013 General Elections in KenyaVoter Registration for the 2013 General Elections in Kenya
Voter Registration for the 2013 General Elections in Kenya
 
IRJET- Digitized Election Voting System : An Innovative Approach
IRJET-  	  Digitized Election Voting System : An Innovative ApproachIRJET-  	  Digitized Election Voting System : An Innovative Approach
IRJET- Digitized Election Voting System : An Innovative Approach
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
INNOVATIA
INNOVATIAINNOVATIA
INNOVATIA
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Embedded Computer Application Software for Secured Voter Card Transfer: An Approach to Improve Electoral Integrity & Electoral Fraud Prevention Mechanism

  • 1. Int. J. Advanced Networking and Applications Volume: 09 Issue: 01 Pages: 3294-3299 (2017) ISSN: 0975-0290 3294 Embedded Computer Application Software for Secured Voter Card Transfer: An Approach to Improve Electoral Integrity & Electoral Fraud Prevention Mechanism1 Yekini N. Asafe., 2 Akinyele A. Okedola., 3 Oloyede Adetokunbo Olamide 1,3 Computer Engineering Department Yaba College of Technology, Yaba Lagos, Nigeria 2 Computer Engineering Department Lagos State Polytechnics, Ikorodu Lagos, Nigeria -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- Voter registration helps to facilitate the credibility of the electoral process by preventing multiple voting as each person is only allowed to register once. One out of many causes of disenfranchisement of register voter is the failure to transfer their Voter Registration from one place to another when the case arises. That scenario has led to multiple registrations which is a criminal offense in Nigeria context. This research work is to address the difficulty involved in Voter Card Transfer. We design embedded application software proposed to be integrated into the INEC existing website. A flowchart was designed using the procedure for Voter Register Transfer in the INEC website. The prototype of the application was coded with C++. It was tested to meet the demands and objective of the study. Keyword: Electoral Fraud, Electoral Integrity, INEC, Voter registration, Voter Card Transfer, register voter. -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: July 24, 2017 Date of Acceptance: August 03, 2017 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION One of the irreplaceable features of democracy is election. Democracy encourages individual’s freedom with respect to the rule of law, so that individuals can express their opinion the way they wish, giving individuals the opportunity to decide their leaders, and uninhibitedly express their feelings on issues. Voter registration is crucial for political participation in a democratic context[1]. Election is the process that enables individuals to choose their delegates and express their feelings on the way they will be administered [2,3,4]. Nigerian election process has been done manually (voting for local and general elections done by electors with ballot papers and ballot boxes in which the papers are placed) since returned to democratic rule in the year 1999, the manual voting process was associated with a lot of problems and always resulted to post-election violence. Most countries, Nigeria not an exception have problems when it comes to voting. Some of the problems involved include rigging votes during election, insecure or inaccessible polling stations, inadequate polling materials, inexperienced personnel and the problem of Voter’s Card Transfer [5]. The current method of Voters Register Transfer is manual and this make it almost impossible for any registered voters that relocate far away from area of his registration to vote on election day, or ventures into multiple voter’s registration. Multiple registration is an electoral offence that is punishable under law in that case, a person who is in possession of more than one valid voter’s card is liable on conviction to a maximum fine of 100,000 or 12 months’ imprisonment or both. The electoral law makes it a big offence to engage in double registration and many Nigeria ns are engaging in multiple registration due to difficult y in voter registration transfer, thousands of Nigerians including some past and serving governors, high profile politician have been confirmed to have engaged in multiple registration in the past and present. [6,7]. The focus of this research work is to automate the process involve in Voter’s Card Transfer. Embedded computer application software will be designed for the purpose of voter’s card transfer. The software to be produced is proposed to be embedded in the current INEC website for any registered voters that wish to transfer his/her voters card due to one reason or the other will apply, and INEC official will take timely action on the application. The automation of voter transfer will enhance credibility in electioneering process and promote free and fair elections, also solve problem of apolitical currently been exhibited by some Nigerians because of various hardship involves in voter’s card transfer. Eligible register voters can apply for transfer of his/her voter’s card to another state, local government or ward before election at their convenience before the election. II. LITERATURE REVIEW A. Procedure for Transfer of Voter’s Registration There is no doubt that, voter card transfer process is cumbersome in Nigeria and this has results to disenfranchisement of some registered voters because of their relocation to another area far from their initial area of registration. Some of these people engaged in multiple registration exercise which can led to political fraud. A Nigerian has the right to live in any part of the country. An important part of voter registration is that an eligible person is advised to register at a center nearest to him or her within the Ward in which he or she resides. This is to make it easy for the voter to access the polling unit and vote on election day. Electoral law makes a provision for
  • 2. Int. J. Advanced Networking and Applications Volume: 09 Issue: 01 Pages: 3294-3299 (2017) ISSN: 0975-0290 3295 Transfer of Registered Voters and Agency (INEC) saddled with responsibility of electioneering process also provides the procedure for transfer of voter’s registration as follows: [8,9].  Step 1- The person who intends to transfer his registration will write an application to INEC’s Resident Electoral Commissioner of the State where he is currently residing.  Step 2- The applicant will attach his voters card to the application.  Step 3- The applicant must apply to the Resident Electoral Commissioner not later than 30 days before the date of an election in the constituency where he is residing.  Step 4- The Resident Electoral Commissioner will direct the Electoral Officer of the applicants Local Government Area to enter his name in the transferred voters list.  Step 5- The Electoral Officer will assign the applicant to a polling unit in his constituency.  Step 6- The Electoral Officer will issue the applicant with a new voter’s card  Step 7- The Electoral officer will retrieve the applicant’s previous voter’s card  Step 8- He will then send a copy of the entry to the Electoral officer of the constituency where the person whose name has been so entered was originally registered.  Step 9- Upon receipt of this entry, that Electoral Officer shall delete the name from his voters list. B. Electoral Integrity Concept Electoral integrity is one of tools used by election researchers and practitioners to evaluate the degree of freeness and fairness of elections in democratic setting [10]. Electoral integrity could be ascertaining by putting in place the mechanism for prevention of electoral fraud during electoral process. Nigeria has witness lot of challenges and electoral fraud during elections such as voter registration fraud, dead people voting, double voting etc, all these has put electoral integrity of Nigeria in doubt. An Automated Direct Recording Electronic Voting System (ADREVOS), can improve Nigeria electoral Integrity [11].Electoral fraud can truncate democratic system of a nation. Hence affect sustainability of democracy. In Nigeria electoral Integrity is been affected badly by various form of fraud. The input of the people in deciding who rule them is destroyed; popular participation in governance and elections of public officers have been hijacked by political gladiators, god-fathers and god- mothers. A total over haul of social structures in electoral process is necessary electoral integrity in Nigeria [12]. C. Effect of Electoral Fraud On the Nation Democratic System There is no doubt that electoral fraud has contributed negatively to sustainability of democratic system and development in Nigeria. Electoral frauds such as: implausible turn out figures, under-age voting, disenfranchising and intimidation of voters etc. has weakened electoral process in Nigeria. There is need for more enhance and participatory political education among Nigeria populace. Electoral frauds have plunged Nigeria into problems like post electoral violence, wasting of national resources in conducting bye election, spending of nation money wasteful by sitting political office holders to pursue litigation in court towards retaining the sit by all means [13].Electoral fraud is one of the most shattering reasons why Nigeria has remained poor in the midst of her abundant natural, human and mineral resources. There is need to checkmate and terminate the incidence of electoral fraud in Nigeria’s democracy. A rigorous transparency, increased people participation in the pre and post- electionprocesses is important tool to prevent electoral fraud in Nigeria. A clear departure from the Electoral Fraud in Nigeria could be further promote the electoral integrity in Nigeria [14]. III. METHODS AND DESIGN A. Data Gathering We gatherer data through the use of questionnaire to sample the opinion of various registered voter that have moved away from their previous abode where they registered during the registration process. We also studied the existing voter transfer exercise. A total of one thousand and fifty (1050) questionnaire was distributed among the sample population within Lagos Mainland Local Govt. Only eighty hundred and ninety-nine (899) was analyzable. The result is tabulated as in table I. Table 1. Research Data Question (X, Y, Z) Yes No X: Are you a register voter with Permanent Voter’s Card. 701 198 Y: Did you register as a voter in this State and a local govt’ very close to where you are staying right now. 503 396 Z: Are you aware that you can transfer your Voter Card from one location to another? 117 782 Figure 1. Pictorial Representation of Research Data 0 200 400 600 800 1000 X Y Z Yes No
  • 3. Int. J. Advanced Networking and Applications Volume: 09 Issue: 01 Pages: 3294-3299 (2017) ISSN: 0975-0290 3296 B. Result and Its Implication Implication of the data gathered from the survey are: - About 80% of the sampled population were registered voters without permanent voter’s card. Actually the reason for that is not known. But we assumed it may not be unconnected to the manual processes involved in the distribution of PVC. - 55.95% of the sampled population has relocated to a new place that differed from where they registered as voters. The implication of this is that these categories of people are automatically disenfranchise. Because they cannot vote during the election. - 86.98% of the sampled population are not aware that they can transfer their voter’s registration to their current location. This implied that those people considered themselves disenfranchise during the election. These categories of people may engage themselves in multiple registration which is an offence under electoral law in Nigeria. From the study of the Existing Voter Registration System, the INEC officers collect application from registered voters that seek for voter’s card transfer. The current system is associated with the following problems: - Expensive and Time consuming: The process of collecting data and entering this data into the database takes too much time and is expensive to conduct. - Purely manual and paper-based: The process involves too much paper work and paper storage which is difficult as papers become bulky with the population size. - Loss of application detail: Some times, application detail gets lost after being filled in with voters’ details, in most cases these are difficult to follow-up and therefore many remain unattended. Consequent to our findings, there is need to for effective automated system for voter’s registration transfer in Nigeria. This will go a long way to resolved all problem associated to voter’s register transfer. Hence improved our electoral Integrityfor credible and generally acceptable election result. C. System Design After considering the need for automation of Voter’s Register Transfer in Nigeria. We design a flowchartas shown in fig I. The flowchart is based on the procedure laid down by INEC. From the laid down procedure, we proposed five categories of users, their role is exemplified in the flowchart: System Administrator, INEC official, and Applicant. The INEC official is of three categories, the Residential Electoral Officer (REC) of the state where the applicant is seeking transfer of voter’s registration, Electoral Officer I i.e, the Electoral Officer of the Local Government Area where the Applicant is seeking transfer, and Electoral Officer II i.e. the Electoral Officer of the Local Government Area where the applicant is seeking transfer to. The flowchart given in figure 1, depict transfer within state, if it is interstate, the REC of the state where the applicant applied from will have to contact the REC of the new state, which will then direct the REC under his supervision to act accordingly.
  • 4. Int. J. Advanced Networking and Applications Volume: 09 Issue: 01 Pages: 3294-3299 (2017) ISSN: 0975-0290 3297 Figure 2. Proposed System Flowchart
  • 5. Int. J. Advanced Networking and Applications Volume: 09 Issue: 01 Pages: 3294-3299 (2017) ISSN: 0975-0290 3298 IV. TESTING & IMPLEMENTATION The flowchart in figure II was implemented using C++, system was developed and tested. Figure 3 – 7 shows the users interface during the testing and implementation of the proposed system. Figure 3 is the proposedsystem welcome screen where the user start to interact with the system. Here, the user/voter can either apply for the voter’s card transfer, login as the INEC REC (officials) or as the Admin. Figure 3. Welcome Screen When click on apply for Voter’s Card button is clicked the request page pops up. Here, the user/voter can now request for the duplicating of his/her voter’s card and give the reason(s). Figure 4. Applicant Users Interface After all the application form is filled, applicant will then click OK button is clicked a message pops up saying Request Received as shown in figure 5. Figure 5. Screen that shows Completion of Application If user is INEC official, he/she click on the “INEC REC” button, and interface figure 6 LOGIN PAGE appear. Figure 6. Log In page for INEC official After successful log in, Voter’s list Page, appear and applicant can then be selected from the voter list for transfer or to delete from old list. See figure 7. Figure 7. Voter list page: V. CONCLUSSION There is no doubt that circumstances surround Voter Register Transfer in the current Nigeria situation is purely manual and complex. That has resulted to unjustified disenfranchisement of registered voters, and double registration exercise which is an electoral offence in Nigeria context. Hence has negative effect Electoral Integrity. This work addressed the problem by automation of the voter transfer processes through design and implementation of Embedded Computer Application Software for Secured Voter Card Transfer. This will go long way to Improve Electoral Integrity, and serve as Electoral Fraud Prevention Mechanism in implemented by INEC. We recommended that Nigeria electoral umpire INEC should study this work, and come up with team of expert to design a working version of the system that will be use by INEC and applicant for voter transfer in future. REFERENCES [1.] Ashok Kumar D., UmmalSariba Begun T., (2011). Review Paper on Fingerprint based voting. Available at http: www.ijareeie.com. [2.] KohnoT., Stubblefield A’, Rubin A., Wallch D.S. (2003). Analysis of University Information Security Technical Report TR-2003-19.
  • 6. Int. J. Advanced Networking and Applications Volume: 09 Issue: 01 Pages: 3294-3299 (2017) ISSN: 0975-0290 3299 [3.] MalkawiM., Khsawneh M., Al-Jarah O., (2009). Modeling and Simulation of the IBIMA, Volume 8, 2009. Issn 1943-7765. [4.] Ashok Kumar D., UmmalSariba Begun T., (2011). A comparative study on fingerprint matching algorithm for EVM. Availble at http: pubs.sciepub.com/jcsa. [5.] Yekini, N.A., Oyeyinka I. K., Oludipe O.O., and Lawal O.N., 2012. Computer-Based Automated Voting Machine (AVM) forElections in Nigeria. IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, May 2012 [6.] Hassan Adebayo (May 25, 2017). INEC-formally- accuses-kogi-gov-bello-of-double-voter- registration. Available at http://www.premiumtimesng.com/news/232202- [7.] Tope Alabi May 24, 2017. Kogi State Governor in double voter’s registration scandal Available at:http://www.informationng.com/2017/05/kogi- state-governor-double-voters-registration- scandal.html [8.] Electoral Act, 2010: Act No. Short Title. Vol. 97. Page. 6. Electoral Act, 2010. A 1103-1202. Printed and Published by The Federal Government Printer, Abuja, Nigeria. [9.] (INEC n.d). Guidelines for Transfer of Registered Voters available at http://www.inecnigeria.org/?page_id=2051 [10.] Hakeem Onapajo (2016) How Credible Were the Nigerian 2015 General Elections? An “Electoral Integrity” Framework of Analysis. Postdoctoral fellow, Department of Politics and International Studies, University of Zululand, South Africa. [11.] Aranuwa F.O.& O. Oriola O. (2012). Improved Electoral Fraud Prevention Mechanism for Efficient and Credible Elections in Nigeria. African Journal of Computing & ICT. Vol 5. No. 6. Dec 2012 ISSN 2006-1781. Available at www.ajocict.net. IEEE [12.] Kia, Bariledum (2013). Electoral Corruption and Democratic Sustainability in Nigeria. IOSR Journal of Humanities and Social Science (IOSR-JHSS) Volume 17, Issue 5 (Nov. - Dec. 2013), PP 42-48 e- ISSN: 2279-0837, p-ISSN: 2279-0845. www.iosrjournals.org www.iosrjournals.org Page 42-48 [13.] Onwe, Sunday O., Nwogbaga David, M.E.2, Ogbu, Mark O. (2015). Effects of Electoral Fraud and Violence on Nigeria Democracy: Lessons from 2011 Presidential Election. IOSR Journal of Humanities and Social Science (IOSR-JHSS) Volume 20, Issue 4, Ver. 1 (Apr. 2015), PP 10-15 e-ISSN: 2279-0837, p-ISSN: 2279-0845. www.iosrjournals.org DOI: 10.9790/0837- 20411015 www.iosrjournals.org [14.] Casmir etal (2013) Electoral Fraud in Nigeria: A Philosophical Evaluation of the Framework of Electoral Violence. 2013. Vol.3, No.4, 167-174 Published Online October 2013 in SciRes available at (http://www.scirp.org/journal/ojps) Authors Biography AKINYELE Akinleye Okedola Obtained B.Sc. Electronics & Computer Engineering from Lagos State University and M.Sc. in System Engineering from University of Lagos. He is a Certified Wireless Network Administrator (CWNA), I.T Consultant, Engineer and a Professional Teacher. He was a head of Department of Computer Engineering, Lagos State Polytechnic, and presently the Head, Record and Statistics in the Academic Planning Unit of Lagos State Poly- technic. Engr. Yekini Nureni Asafe obtained his academic qualification as follows: M.Sc. in Computer Science, University of Lagos Nigeria (UNILAG); B.Sc. in Electronic and Computer Engineering, Lagos State University (LASU), and NCE (National Certificate in Education) in Physics Lagos State College of Education Ijanikin (LACOED). He is a Member Nigeria Computer Society (NCS), International Association of Engineers (IAENG), International Association of Computer Science and Information Technology (IACSIT), and Member Institute of Electrical Electronic (MIEEE). Registered Engineer COREN. He has co-author, and singular author of several academic/research publications that has features in some revered international journals and conference proceedings both in Nigeria and in abroad. He has written about seventeen textbooks in computer science and engineering. He is Academic Planning Officer in the academic Planning Unit of YabaTech, Nigeria. Oloyede O. Adetokunbohas a National Diploma in Computer science from Federal Polytechnic Offa (1997); BSc Computer Engineering from Obafemi Awolowo University, Ile-Ife (2005) and just completed M.Engr (Information and Communication Engineering) from Covenant University Ota (2016). She is presently a lecturer in the department of Computer Engineering, Yaba College of Technology, Yaba, Lagos Nigeria; a prolific researcher; the secretary of her institution's faculty journal and has over 8 years of teaching experience in Polytechnic education having taught both national and higher national undergraduate students in various courses such as wired and wireless networks, computer architecture, assembly language, microprocessor and microcontroller to mention a few. She has published several papers in various international and national journals and conferences. She is a student fellow of IEEE and IEE.