SlideShare a Scribd company logo
1 of 7
Download to read offline
Jan Zizka (Eds) : CCSIT, SIPP, AISC, PDCTA - 2013
pp. 297–303, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3634
A NOVEL VOTING SYSTEM USING SMS
Dr.M.Kamaraju, P.V.Subba Rao and T.Venkata Lakshmi
Dept.of Electronics and Communication Engineering
Gudlavalleru Engineering College, Gudlavalleru, Andhra Pradesh, India
{madduraju@yahoo.com,subbarao.4c6@gmail.com,tvlthota@gmail.com}
ABSTRACT
Electronic voting systems have the potential to improve traditional voting procedures by
providing added convenience and flexibility to the voter. Numerous electronic voting schemes
have been proposed in the past, but most of them have failed to provide voter authentication in
an efficient and transparent way. On the other hand, GSM (Global System for Mobile
communications) is the most widely used mobile networking standard. There are more than one
billion GSM users worldwide that represent a large user potential not for mobile telephony, but
also for other mobile applications that exploit the mature GSM infrastructure. In this paper, the
electronic voting scheme using GSM mobile technology is presented. By integrating an
electronic voting scheme with the GSM infrastructure, we are able to exploit existing GSM
authentication mechanisms and provide enhanced voter authentication and mobility while
maintaining voter privacy. The objective of this project is to avoid the queue in voting time.
Voting machines provide easy access to cast the vote by using mobile phone.
KEYWORDS
GSM, Mobile, LCD, Subscriber Identity Module (SIM)
1. INTRODUCTION
Voting is a vital part of the democratic process. As such, the efficiency, reliability, and security
of the Technologies involved are critical. Traditional voting technologies include hand-counted
paper ballots. These paper-based systems can result in a number of problems, including:
Unacceptable percentages of lost, stolen, or miscounted ballots, Votes lost through unclear or
invalid ballot marks, Limited accommodations for people with disabilities
Today, the development and widespread use of information technologies is changing the way
people view voting processes and, ultimately, the way they vote. At the forefront of these new
technologies is poll-site direct recording electronic (DRE) voting and remote Internet-based
voting. In democratic societies, voting is an important toll to Collect and reflect people’s
opinions. Traditionally, voting is conducted in centralized or distributed places called voting
booths. Voters go to voting booths and cast their votes under the supervision of authorized
parities.
298 Computer Science & Information Technology (CS & IT)
The votes are then counted manually once the election has finished. With the rapid development
of computer technology and cryptographic methods, electronic voting systems can be employed
that replace the inefficient and most importantly error-prone human component. To increase the
efficiency and accuracy of voting procedures, computerized voting systems were developed to
help colleting and counting the votes. These include lever voting machines, punched cards for
voting, optical mark-sense scanners and direct recording electronic (DRE) voting systems.
For a variety of reasons voters may be unable to attend voting booths physically, but need to vote
remotely, for example, from home or while travelling abroad. Hence, there is grade demand for
remote voting procedures that are easy, transparent and most importantly, secure. Today, the most
common way for remote voting is postal voting, where voters their votes by post. However, it
lacks proper authentication and involves a time-consuming procedure. To improve mobility,
address security problems of remote voting procedures and systems. We present an electronic
voting using GSM. With more than one billon users, the GSM authentication infrastructure is the
most widely deployed authentication mechanism by far. We make use of well-designed GSM
authentication infrastructure to improve mobility and security of mobile voting procedures.
1.1 Characteristics
Voting system using sms offer multiple advantages over traditional paper-based voting systems-
advantages that increase citizen access to democratic processes and encourage participation.
Reduced costs - E-voting systems reduce the materials required for printing and distributing
ballots. Internet based voting, in particular, offers superior economies of scale in regard to the
size of the electoral roll.
Increased participation and voting options - E-voting offers increased convenience to the
voter, encourages more voters to cast their votes remotely, and increases the likelihood of
participation for mobile voters. Additionally, it permits access to more information regarding
voting options.
Greater speed and accuracy placing and tallying votes -E-voting's step-by-step processes help
minimize the number of miscast votes. The electronic gathering and counting of ballots reduces
the amount of time spent tallying votes and delivering results.
Flexibility - E-voting can support multiple languages, and the flexible design allows up-to-the
minute ballot modifications.
2. VOTING SYSTEM USING SMS
In this section, we review the GSM security features, in particular the authentication function.
2.1 Security Features in GSM
GSM is a digital wireless network standard widely used in European and Asian countries. It
provides a common set of compatible services and capabilities to all GSM mobile users. The
services and security features to subscribers are subscriber identity confidentiality, subscriber
identity authentication, user data confidentiality on physical connections, connectionless user data
Computer Science & Information Technology (CS & IT) 299
confidentiality and signalling information element confidentiality. They are summarized as
follows: Subscriber identity confidentiality is the property that the subscriber's real identity
remains secret by protecting his International Mobile Subscriber Identity(IMSI), which is an
internal subscriber identity used only by the network, and using only temporary identities for
visited networks. Subscriber identity authentication is the property that ensures that the mobile
subscriber who is accessing the network or using the service is the one claimed. In our proposed
GSM mobile voting scheme, communication between the mobile equipment and the GSM
network uses standard GSM technology. Hence GSM security features apply. Among which, the
subscriber identity authentication feature is particularly used in the protocol. A random challenge
RAND is issued when a mobile subscriber tries to access a visited network. The Authentication
Centre (AC) computes a response SRES from RAND using an algorithm A3 under the control of
a subscriber authentication key Ki, where the key Ki is unique to the subscriber, and is stored in
the Subscriber Identity Module (SIM) on the Mobile Equipment (ME), as well as the Home
Location Register (HLR). The ME also computes a response SRES from RAND as well. Then the
value SRES computed by the ME is signaled to the visited network, where it is compared with the
value SRES computed by the AC. The access of the subscriber will be accepted or denied
depending upon the result of comparing the two values. If the two values of SRES are the same,
the mobile subscriber has been authenticated, and the connection is allowed to proceed. If the
values are different, then access is denied.
Fig.1. Block Diagram of Voting System using SMS
This paper is designed with Supporting GSM Modem LCD
Here two mobile phones are used. One is transmitter another one is receiver. The receiver mobile
is interfaced with Microcontroller AT89s8252. Transmitter mobile is voter’s mobile. If the voter
wants to vote, then he has to enter their correct voter ID number, password and then enter
candidates ID number in this message for enrol his vote. If he sends his message along with these
details to receiver mobile number, the microcontroller unit will read the message from the
receiving mobile through serial port and checks the ID number, password; if both are matched the
microcontroller will count the vote for selected candidate and store it in database. If the ID
number doesn’t matched or already voted means the microcontroller unit will reject that message
and do not count the vote. Before this we have to create the database in microcontroller for this
application in Assembly language.
3. IMPLEMENTATION
3.1 Hardware
The receiver mobile is connected to the microcontroller unit through MAX 232 com 3 port using
DB9 connector. MAX 232 is used for converting the RS logic voltage which is coming from
microcontroller to TTL logic voltage is given to Microcontroller and vice versa. Scan Keys are
used to display the total number of votes in LCD if we gave the correct password.LCD is
300 Computer Science & Information Technology (CS & IT)
connected to Microcontroller.LCD 3rd pin is connected to variable resistor to control the
brightness of the LCD. It is a 32 characters display 16 characters per line. 9th pin is used to reset
the Microcontroller for normal voting system. Microcontroller is operating at 12 MHZ clock
frequency. Ballet unit is used for normal voting purpose. Fig.2.2 shows the circuit diagram of on-
line voting system.
Power Supply
Fig. 2. Implementation of the Voting System using SMS
TABLE 1. Commands Description
Command Description
AT
Check if serial interface and GSM
modem is working.
ATE0
Turn echo off, less traffic on serial
line.
AT+CNMI Display of new incoming SMS.
AT+CPMS Selection of SMS memory.
AT+CMGR
Read new message from a given
memory location.
AT+CMGS Send message to a given recipient.
AT+CMGD Delete message.
Computer Science & Information Technology (CS & IT) 301
3.2 Software
Fig. 3 Flow chart of Voting System using SMS
Switch on the power supply, display in LCD as “VOTING SYSTEM USING SMS”. If received
vote is “A”, send acknowledgement to the corresponding voter as “THANKU FOR VOTING”.
Increment the candidate vote and write into the memory. The procedure is same for different
candidates. If total key is used to display the total no. of votes for each candidate and the total no.
of votes. Finally counting is over, clear key is used to clear the memory.
4. RESULTS
By using this project conduct voting and count the total number of votes per a particular
candidate. The voter can vote to the particular candidate from any place in a given time. If the
voter sms the correct password then his or her vote is counted and got acknowledgement as
“Thank you for voting”. If the voter sms the wrong password then his or her vote is not counted
and will not provide any acknowledgement. Fig.3 shows the Photograph of Voting System using
SMS.
START
VOTE=A
VOTE=B
VOTE=C
VOTE=D
Total
key is
Clear
key is
stop
Display the total no. of
votes for each candidate
Clear the memory
Sends
acknowledgment to
the correspondent
Increment the
candidate vote and
write into the memory
Switch on the power
supply
Display in LCD as “ONLINE
302 Computer Science & Information Technology (CS & IT)
Fig. 3 Photograph shows Voting system using SMS
Acknowledgments. Fig.4 shows the Photograph of Acknowledgement given to the Voter
Fig.4. Photograph shows Acknowledgement given to the Voter
Fig.5 shows the Photograph of total number of Votes for each candidate.
Fig. 5. Photograph shows the Total Number of Votes
5. CONCLUSION
By using this paper security performance is improved, avoid the security tensions and also avoid
the queue in the voting time at polling booth. Voter can cast his or her vote easily from any place
in given time. It can saves the time of the voter and avoid the forgery votes. Authentication is
always a difficult requirement to fulfil for remote voting schemes, most of which apply a public-
Computer Science & Information Technology (CS & IT) 303
key based signature scheme for voter authentication. In our scheme, by using the existing GSM
authentication infrastructure, the public-key overhead is largely reduced. Our scheme also
enhances the security and provides more mobility and convenience to voters. In this paper, we
presented the basic structure and protocol of our GSM based mobile voting system.
REFERENCES
[1] Burmester, M., Magkos, E., :Towards secure and practical e-elections in the new era. In D. Gritzalis,
editor, Secure Electronic Voting, pages 63–72. Kluwer Academic Publishers, (2003).
[2] Chaum, D.,: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications
of the ACM, 24(2):84–88, February (1981).
[3] Rivest, R., Sherman, A., editors, Advances in Cryptology—Crypto ’82, pages 199–203, New York,.
Plenum Press, (1983).
[4] Chaum, D., : The dining cryptographers problem: Unconditional sender and recipient untraceability.
Journal of Cryptology, (1):65–75, (1988).
[5] Cranor, L., Cytron,L.F., Sensus: A security-conscious electronic polling system for the internet. In
Proceedings of IEEE 30th Hawai’i International Conference on System Sciences (HICSS-30), pages
561– 570, January (1997).
[6] ETS 300 506. Security aspects (GSM 02.09 version 4.5.1), Digital cellular telecommunications
system (phase 2), (2000).
[7] Fujioka, T., Okamoto, K.,Ohta :A practical secret voting scheme for large scale elections. In J.
Seberry and Y. Zheng, editors, Advances in Cryptology—Auscrypt’92, volume 718 of Lecture Notes
in Computer Science, pages pp. 244–251, Gold Coast, Queensland, Austrailia, 13-16 December 1992.
Springer Verlag,(1992).
[8] Hirt ,M., Sako, K.,: Efficient receipt-freesvoting based on homomorphic encryption. In B. Preneel,
editor, Advances in Cryptology— EUROCRYPT ’00, volume 1807 of Lecture Notes in Computer
Science, pages 539 556. Springer-Verlag, May (2000).
[9] Jefferson, D., Rubin, A. D., Simons, B., D. Wagner.,: A Security Analysis of the Secure Electronic
Registration and Voting Experiment (SERVE), (2004).
[10] Lin, Y., Chlamtac,I.,:Wireless and Mobile Network Architectures. Wiley, (2000).
[11] A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC
Press, Inc., (1996).
[12] Naor, M.,: Bit commitment using pseudo-randomness (extended abstract). In G. Brassard, editor,
CRYPTO ’89: Proceedings on Advances in cryptology, pages 128–136. Springer-Verlag New York,
Inc., (1989).

More Related Content

What's hot

Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computingBhupesh Rawat
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technologyijsrd.com
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system securityAdeel Javaid
 
15 13248 telecommunication mamana aji
15 13248 telecommunication mamana aji15 13248 telecommunication mamana aji
15 13248 telecommunication mamana ajiIAESIJEECS
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerIOSR Journals
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Editor IJARCET
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile smseSAT Journals
 
IVRS and DTMF based Voting System
IVRS and DTMF based Voting System IVRS and DTMF based Voting System
IVRS and DTMF based Voting System iosrjce
 
End of year project report on remote sms based voting system by fomagha tatou...
End of year project report on remote sms based voting system by fomagha tatou...End of year project report on remote sms based voting system by fomagha tatou...
End of year project report on remote sms based voting system by fomagha tatou...Mohamed Fomagha Tatou
 
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTIONA MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTIONIJNSA Journal
 
Development of a Global Positioning System-Enabled Electronic Voting System
Development of a Global Positioning System-Enabled Electronic Voting SystemDevelopment of a Global Positioning System-Enabled Electronic Voting System
Development of a Global Positioning System-Enabled Electronic Voting Systemiosrjce
 

What's hot (17)

Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computing
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technology
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
 
15 13248 telecommunication mamana aji
15 13248 telecommunication mamana aji15 13248 telecommunication mamana aji
15 13248 telecommunication mamana aji
 
M voting
M votingM voting
M voting
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
 
Method to Provide Mobile Signal when the Network Provider Has Failed
Method to Provide Mobile Signal when the Network Provider Has FailedMethod to Provide Mobile Signal when the Network Provider Has Failed
Method to Provide Mobile Signal when the Network Provider Has Failed
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - review
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile sms
 
IVRS and DTMF based Voting System
IVRS and DTMF based Voting System IVRS and DTMF based Voting System
IVRS and DTMF based Voting System
 
M – Voting
M – VotingM – Voting
M – Voting
 
End of year project report on remote sms based voting system by fomagha tatou...
End of year project report on remote sms based voting system by fomagha tatou...End of year project report on remote sms based voting system by fomagha tatou...
End of year project report on remote sms based voting system by fomagha tatou...
 
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTIONA MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
 
Development of a Global Positioning System-Enabled Electronic Voting System
Development of a Global Positioning System-Enabled Electronic Voting SystemDevelopment of a Global Positioning System-Enabled Electronic Voting System
Development of a Global Positioning System-Enabled Electronic Voting System
 

Similar to A NOVEL VOTING SYSTEM USING SMS

A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...SIR SUCCESS PRINCE DUAH DUAH
 
337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf
337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf
337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdfAdmiralkabman
 
mobile-iris voting system(1)
mobile-iris voting system(1)mobile-iris voting system(1)
mobile-iris voting system(1)vasim hasina
 
IRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting SystemIRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting SystemIRJET Journal
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET Journal
 
Gsm energy meter
Gsm energy meterGsm energy meter
Gsm energy meterikm104
 
Efficacious electronic voting using biometry
Efficacious electronic voting using biometryEfficacious electronic voting using biometry
Efficacious electronic voting using biometryIAEME Publication
 
IRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET Journal
 
IRJET- Decentralized E-Voting System
IRJET-  	  Decentralized E-Voting SystemIRJET-  	  Decentralized E-Voting System
IRJET- Decentralized E-Voting SystemIRJET Journal
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting systemMonira Monir
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Editor IJARCET
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415Shubham Jadhav
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...IRJET Journal
 
Paper id 24201457
Paper id 24201457Paper id 24201457
Paper id 24201457IJRAT
 
global wireless e-voting
global wireless e-votingglobal wireless e-voting
global wireless e-votingsahiba javid
 

Similar to A NOVEL VOTING SYSTEM USING SMS (20)

GLOBAL WIRELESS E-VOTING
GLOBAL WIRELESS E-VOTINGGLOBAL WIRELESS E-VOTING
GLOBAL WIRELESS E-VOTING
 
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
 
337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf
337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf
337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
mobile-iris voting system(1)
mobile-iris voting system(1)mobile-iris voting system(1)
mobile-iris voting system(1)
 
IRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting SystemIRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting System
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
 
Gsm energy meter
Gsm energy meterGsm energy meter
Gsm energy meter
 
01362503
0136250301362503
01362503
 
Efficacious electronic voting using biometry
Efficacious electronic voting using biometryEfficacious electronic voting using biometry
Efficacious electronic voting using biometry
 
IRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival System
 
IRJET- Decentralized E-Voting System
IRJET-  	  Decentralized E-Voting SystemIRJET-  	  Decentralized E-Voting System
IRJET- Decentralized E-Voting System
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting system
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...
 
Paper id 24201457
Paper id 24201457Paper id 24201457
Paper id 24201457
 
global wireless e-voting
global wireless e-votingglobal wireless e-voting
global wireless e-voting
 
new Algorithm1
new Algorithm1new Algorithm1
new Algorithm1
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

A NOVEL VOTING SYSTEM USING SMS

  • 1. Jan Zizka (Eds) : CCSIT, SIPP, AISC, PDCTA - 2013 pp. 297–303, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3634 A NOVEL VOTING SYSTEM USING SMS Dr.M.Kamaraju, P.V.Subba Rao and T.Venkata Lakshmi Dept.of Electronics and Communication Engineering Gudlavalleru Engineering College, Gudlavalleru, Andhra Pradesh, India {madduraju@yahoo.com,subbarao.4c6@gmail.com,tvlthota@gmail.com} ABSTRACT Electronic voting systems have the potential to improve traditional voting procedures by providing added convenience and flexibility to the voter. Numerous electronic voting schemes have been proposed in the past, but most of them have failed to provide voter authentication in an efficient and transparent way. On the other hand, GSM (Global System for Mobile communications) is the most widely used mobile networking standard. There are more than one billion GSM users worldwide that represent a large user potential not for mobile telephony, but also for other mobile applications that exploit the mature GSM infrastructure. In this paper, the electronic voting scheme using GSM mobile technology is presented. By integrating an electronic voting scheme with the GSM infrastructure, we are able to exploit existing GSM authentication mechanisms and provide enhanced voter authentication and mobility while maintaining voter privacy. The objective of this project is to avoid the queue in voting time. Voting machines provide easy access to cast the vote by using mobile phone. KEYWORDS GSM, Mobile, LCD, Subscriber Identity Module (SIM) 1. INTRODUCTION Voting is a vital part of the democratic process. As such, the efficiency, reliability, and security of the Technologies involved are critical. Traditional voting technologies include hand-counted paper ballots. These paper-based systems can result in a number of problems, including: Unacceptable percentages of lost, stolen, or miscounted ballots, Votes lost through unclear or invalid ballot marks, Limited accommodations for people with disabilities Today, the development and widespread use of information technologies is changing the way people view voting processes and, ultimately, the way they vote. At the forefront of these new technologies is poll-site direct recording electronic (DRE) voting and remote Internet-based voting. In democratic societies, voting is an important toll to Collect and reflect people’s opinions. Traditionally, voting is conducted in centralized or distributed places called voting booths. Voters go to voting booths and cast their votes under the supervision of authorized parities.
  • 2. 298 Computer Science & Information Technology (CS & IT) The votes are then counted manually once the election has finished. With the rapid development of computer technology and cryptographic methods, electronic voting systems can be employed that replace the inefficient and most importantly error-prone human component. To increase the efficiency and accuracy of voting procedures, computerized voting systems were developed to help colleting and counting the votes. These include lever voting machines, punched cards for voting, optical mark-sense scanners and direct recording electronic (DRE) voting systems. For a variety of reasons voters may be unable to attend voting booths physically, but need to vote remotely, for example, from home or while travelling abroad. Hence, there is grade demand for remote voting procedures that are easy, transparent and most importantly, secure. Today, the most common way for remote voting is postal voting, where voters their votes by post. However, it lacks proper authentication and involves a time-consuming procedure. To improve mobility, address security problems of remote voting procedures and systems. We present an electronic voting using GSM. With more than one billon users, the GSM authentication infrastructure is the most widely deployed authentication mechanism by far. We make use of well-designed GSM authentication infrastructure to improve mobility and security of mobile voting procedures. 1.1 Characteristics Voting system using sms offer multiple advantages over traditional paper-based voting systems- advantages that increase citizen access to democratic processes and encourage participation. Reduced costs - E-voting systems reduce the materials required for printing and distributing ballots. Internet based voting, in particular, offers superior economies of scale in regard to the size of the electoral roll. Increased participation and voting options - E-voting offers increased convenience to the voter, encourages more voters to cast their votes remotely, and increases the likelihood of participation for mobile voters. Additionally, it permits access to more information regarding voting options. Greater speed and accuracy placing and tallying votes -E-voting's step-by-step processes help minimize the number of miscast votes. The electronic gathering and counting of ballots reduces the amount of time spent tallying votes and delivering results. Flexibility - E-voting can support multiple languages, and the flexible design allows up-to-the minute ballot modifications. 2. VOTING SYSTEM USING SMS In this section, we review the GSM security features, in particular the authentication function. 2.1 Security Features in GSM GSM is a digital wireless network standard widely used in European and Asian countries. It provides a common set of compatible services and capabilities to all GSM mobile users. The services and security features to subscribers are subscriber identity confidentiality, subscriber identity authentication, user data confidentiality on physical connections, connectionless user data
  • 3. Computer Science & Information Technology (CS & IT) 299 confidentiality and signalling information element confidentiality. They are summarized as follows: Subscriber identity confidentiality is the property that the subscriber's real identity remains secret by protecting his International Mobile Subscriber Identity(IMSI), which is an internal subscriber identity used only by the network, and using only temporary identities for visited networks. Subscriber identity authentication is the property that ensures that the mobile subscriber who is accessing the network or using the service is the one claimed. In our proposed GSM mobile voting scheme, communication between the mobile equipment and the GSM network uses standard GSM technology. Hence GSM security features apply. Among which, the subscriber identity authentication feature is particularly used in the protocol. A random challenge RAND is issued when a mobile subscriber tries to access a visited network. The Authentication Centre (AC) computes a response SRES from RAND using an algorithm A3 under the control of a subscriber authentication key Ki, where the key Ki is unique to the subscriber, and is stored in the Subscriber Identity Module (SIM) on the Mobile Equipment (ME), as well as the Home Location Register (HLR). The ME also computes a response SRES from RAND as well. Then the value SRES computed by the ME is signaled to the visited network, where it is compared with the value SRES computed by the AC. The access of the subscriber will be accepted or denied depending upon the result of comparing the two values. If the two values of SRES are the same, the mobile subscriber has been authenticated, and the connection is allowed to proceed. If the values are different, then access is denied. Fig.1. Block Diagram of Voting System using SMS This paper is designed with Supporting GSM Modem LCD Here two mobile phones are used. One is transmitter another one is receiver. The receiver mobile is interfaced with Microcontroller AT89s8252. Transmitter mobile is voter’s mobile. If the voter wants to vote, then he has to enter their correct voter ID number, password and then enter candidates ID number in this message for enrol his vote. If he sends his message along with these details to receiver mobile number, the microcontroller unit will read the message from the receiving mobile through serial port and checks the ID number, password; if both are matched the microcontroller will count the vote for selected candidate and store it in database. If the ID number doesn’t matched or already voted means the microcontroller unit will reject that message and do not count the vote. Before this we have to create the database in microcontroller for this application in Assembly language. 3. IMPLEMENTATION 3.1 Hardware The receiver mobile is connected to the microcontroller unit through MAX 232 com 3 port using DB9 connector. MAX 232 is used for converting the RS logic voltage which is coming from microcontroller to TTL logic voltage is given to Microcontroller and vice versa. Scan Keys are used to display the total number of votes in LCD if we gave the correct password.LCD is
  • 4. 300 Computer Science & Information Technology (CS & IT) connected to Microcontroller.LCD 3rd pin is connected to variable resistor to control the brightness of the LCD. It is a 32 characters display 16 characters per line. 9th pin is used to reset the Microcontroller for normal voting system. Microcontroller is operating at 12 MHZ clock frequency. Ballet unit is used for normal voting purpose. Fig.2.2 shows the circuit diagram of on- line voting system. Power Supply Fig. 2. Implementation of the Voting System using SMS TABLE 1. Commands Description Command Description AT Check if serial interface and GSM modem is working. ATE0 Turn echo off, less traffic on serial line. AT+CNMI Display of new incoming SMS. AT+CPMS Selection of SMS memory. AT+CMGR Read new message from a given memory location. AT+CMGS Send message to a given recipient. AT+CMGD Delete message.
  • 5. Computer Science & Information Technology (CS & IT) 301 3.2 Software Fig. 3 Flow chart of Voting System using SMS Switch on the power supply, display in LCD as “VOTING SYSTEM USING SMS”. If received vote is “A”, send acknowledgement to the corresponding voter as “THANKU FOR VOTING”. Increment the candidate vote and write into the memory. The procedure is same for different candidates. If total key is used to display the total no. of votes for each candidate and the total no. of votes. Finally counting is over, clear key is used to clear the memory. 4. RESULTS By using this project conduct voting and count the total number of votes per a particular candidate. The voter can vote to the particular candidate from any place in a given time. If the voter sms the correct password then his or her vote is counted and got acknowledgement as “Thank you for voting”. If the voter sms the wrong password then his or her vote is not counted and will not provide any acknowledgement. Fig.3 shows the Photograph of Voting System using SMS. START VOTE=A VOTE=B VOTE=C VOTE=D Total key is Clear key is stop Display the total no. of votes for each candidate Clear the memory Sends acknowledgment to the correspondent Increment the candidate vote and write into the memory Switch on the power supply Display in LCD as “ONLINE
  • 6. 302 Computer Science & Information Technology (CS & IT) Fig. 3 Photograph shows Voting system using SMS Acknowledgments. Fig.4 shows the Photograph of Acknowledgement given to the Voter Fig.4. Photograph shows Acknowledgement given to the Voter Fig.5 shows the Photograph of total number of Votes for each candidate. Fig. 5. Photograph shows the Total Number of Votes 5. CONCLUSION By using this paper security performance is improved, avoid the security tensions and also avoid the queue in the voting time at polling booth. Voter can cast his or her vote easily from any place in given time. It can saves the time of the voter and avoid the forgery votes. Authentication is always a difficult requirement to fulfil for remote voting schemes, most of which apply a public-
  • 7. Computer Science & Information Technology (CS & IT) 303 key based signature scheme for voter authentication. In our scheme, by using the existing GSM authentication infrastructure, the public-key overhead is largely reduced. Our scheme also enhances the security and provides more mobility and convenience to voters. In this paper, we presented the basic structure and protocol of our GSM based mobile voting system. REFERENCES [1] Burmester, M., Magkos, E., :Towards secure and practical e-elections in the new era. In D. Gritzalis, editor, Secure Electronic Voting, pages 63–72. Kluwer Academic Publishers, (2003). [2] Chaum, D.,: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84–88, February (1981). [3] Rivest, R., Sherman, A., editors, Advances in Cryptology—Crypto ’82, pages 199–203, New York,. Plenum Press, (1983). [4] Chaum, D., : The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, (1):65–75, (1988). [5] Cranor, L., Cytron,L.F., Sensus: A security-conscious electronic polling system for the internet. In Proceedings of IEEE 30th Hawai’i International Conference on System Sciences (HICSS-30), pages 561– 570, January (1997). [6] ETS 300 506. Security aspects (GSM 02.09 version 4.5.1), Digital cellular telecommunications system (phase 2), (2000). [7] Fujioka, T., Okamoto, K.,Ohta :A practical secret voting scheme for large scale elections. In J. Seberry and Y. Zheng, editors, Advances in Cryptology—Auscrypt’92, volume 718 of Lecture Notes in Computer Science, pages pp. 244–251, Gold Coast, Queensland, Austrailia, 13-16 December 1992. Springer Verlag,(1992). [8] Hirt ,M., Sako, K.,: Efficient receipt-freesvoting based on homomorphic encryption. In B. Preneel, editor, Advances in Cryptology— EUROCRYPT ’00, volume 1807 of Lecture Notes in Computer Science, pages 539 556. Springer-Verlag, May (2000). [9] Jefferson, D., Rubin, A. D., Simons, B., D. Wagner.,: A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE), (2004). [10] Lin, Y., Chlamtac,I.,:Wireless and Mobile Network Architectures. Wiley, (2000). [11] A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, Inc., (1996). [12] Naor, M.,: Bit commitment using pseudo-randomness (extended abstract). In G. Brassard, editor, CRYPTO ’89: Proceedings on Advances in cryptology, pages 128–136. Springer-Verlag New York, Inc., (1989).