This document proposes a biometric voting system for India using thumb impressions. As an introduction, it notes the challenges for election commissions in conducting free and fair elections in India. It then describes how the system would work, using thumb impressions stored in a database pre-election to verify voters' identities and ensure no double voting. Key advantages are that it could help curb rigging and deliver more accurate and instantaneous results. The document outlines the proposed design and components, including scanning, searching, networking capabilities and security features to establish a reliable and secure system.
Electronic voting system is an effective approach for counting of votes could be faster, more accurate and less labor intensive. In this system we use one effective algorithm called minutiae for Fingerprint. This algorithm can be used to match the Fingerprint images. The Proposed system is used to avoid the vote recasting with help of RFID and Fingerprint. There is way to prohibit the same person from casting multiple ballots using Fingerprint and RFID. In an E-voting system, there is way to prohibit the same person from casting multiple ballots using Fingerprint.
we try to give a biometric secure e voting system and with back end compilations supported by DNA archieves which hav d feature of parallel processing as their inherent nature ...
This project is designed for electronic voting machine by using the fingerprint identification method.
Here voters thumb impressions are used for identifying the voters.
During voting when the voter keeps his/her thumb in the scanner, the system will check whether it matches with pre stored impressions in the database.
If it matches then system will allow the voter to poll his vote and otherwise prevent the voter from polling.
ADVANTAGES
The main advantages of the systems are,
Providing the preventive measures system for voting.
It completely rules out the chance of invalid votes.
Its use results in reduction of polling time.
Results in fewer problems in electoral preparations, law and order candidates' expenditure.
Provide easy and accurate counting without any mischief at the counting centre.
It is capable of saving considerable printing stationery and transport of large volumes of electoral material.
FUTURE SCOPE OF THE PROJECT
This system can be used for elections since it provide complete security and will provide accurate results and save time and expenditure.
This can be modify by interfacing it with a PC through a serial port in order to provide additional security.
Electronic voting system is an effective approach for counting of votes could be faster, more accurate and less labor intensive. In this system we use one effective algorithm called minutiae for Fingerprint. This algorithm can be used to match the Fingerprint images. The Proposed system is used to avoid the vote recasting with help of RFID and Fingerprint. There is way to prohibit the same person from casting multiple ballots using Fingerprint and RFID. In an E-voting system, there is way to prohibit the same person from casting multiple ballots using Fingerprint.
we try to give a biometric secure e voting system and with back end compilations supported by DNA archieves which hav d feature of parallel processing as their inherent nature ...
This project is designed for electronic voting machine by using the fingerprint identification method.
Here voters thumb impressions are used for identifying the voters.
During voting when the voter keeps his/her thumb in the scanner, the system will check whether it matches with pre stored impressions in the database.
If it matches then system will allow the voter to poll his vote and otherwise prevent the voter from polling.
ADVANTAGES
The main advantages of the systems are,
Providing the preventive measures system for voting.
It completely rules out the chance of invalid votes.
Its use results in reduction of polling time.
Results in fewer problems in electoral preparations, law and order candidates' expenditure.
Provide easy and accurate counting without any mischief at the counting centre.
It is capable of saving considerable printing stationery and transport of large volumes of electoral material.
FUTURE SCOPE OF THE PROJECT
This system can be used for elections since it provide complete security and will provide accurate results and save time and expenditure.
This can be modify by interfacing it with a PC through a serial port in order to provide additional security.
The republic of Kenya comprises of eight (8) provinces now forty-seven counties. The country is located in East Africa and shares land borders with the Republics of Somalia in the East, Uganda in the West, Tanzania in the South and Ethiopia and Sudan (now South Sudan) in the North. The three largest and most influential ethnic groups in Kenya are the kikuyu, Luhya, and Kalenjins. In terms of religion Kenya is roughly split into 80% Christians while the rest are Muslims.
In Kenya, general elections are carried out every after five years where a head of state the President and The National Assembly representatives are elected. They are elected by the people. The national Assembly has about 220 members representing respective constituencies.
In the Local Governments they have the chairman and the Counselor. The counselors are all elected by the people of the state in the respective wards.
That is to say, in any given general elections, Kenyans vote for the president, the members of the National Assembly and the counselors.
Most African Electoral bodies IEBC not an exception right from their inception to date, even with latest advancements in technology, still use a primitive paper based methods during voting; this system is characterized by manual form filling to chose leaders and transfer of the information from manual data capture forms to computerized datasheets, this has led to an excessive number of mistakes making their way into the final vote counts hence leading to confusion at the time of announcing the results. The main advantage of paper-based systems is that ballot papers are easily human auditable. The disadvantages outweigh the advantages for instance the need to print ballot papers is a slow, expensive, inflexible, environmentally hostile process, visual impairments, or literacy limitations and also last minute changes to the voter register are difficult to accommodate among others.
www.electionproject.ajce.ind.in
online election managment system is for automate tasks of an election.
web application was developed using cakephp.
full report and code is available .
for more details contact chikkujoseph50@gmail.com
A mobile(Android app ) based election app. A website or app that will help in smart election system. It can be used by the government,and in every sector when election is a major issue.
Abstract The dynamic nature of loads, seasonal variation of soil properties, uneven soil strata below footings or inappropriate design of foundation makes differential settlement inevitable. Differential settlement is largely responsible for developing forces or changing the existing forces in the structure and is often considered as the underlying cause of many structural failures. A structural engineer has to take into account these forces while designing the structure. Different structural parameters like stiffness of columns and beams and number of storeys and bays affect the response of the structure to differential settlement. In the present study, a plain portal frame subjected to constant differential settlement of 10 mm is analyzed for different cases using a structural analysis software i.e. STAAD Pro. Different parameters of the frame are varied to understand their influence on frame forces developed due to differential settlement. The parameters taken into account in this study are length of beam, height of column, moment of inertia of beam and column and number of storeys and bays. It is found that the forces in the frame developed due to differential settlement decrease on increasing beam lengths and column heights. Also, decreasing the moment of inertia of beams and columns is effective in reducing these forces. In addition, differential settlement tends to affect forces more in lower storeys as compared to higher storeys. The frame forces are more prominent for bays which are near to the support subjected to settlement. The increase or decrease in frame forces due to differential settlement can be attributed to the change in stiffness of the members. Hence, the study concludes that the stiffer members tend to develop higher forces for constant differential settlement in frames. Key Words: Differential settlement, Portal frame, Structural response, Frame forces, Storey, Bays
Paper on e-voting system with a usage of Block chain, making the voting system more easy to use and secure. Block chain technology adds a perfect security layer to it.
E-Voting system is a system which allow all citizens of country to cast their vote online is to increase the overall voting percentage across the country, as in the recent scenario people have to visit the booth to cast their vote and those people who live out of their native place are not able to cast vote during the elections. So due to this the voting percentage across the country is very less. Through this software those people who live out of their home town will also be able to cast their votes as this system is online. The main objective of this software is to increase the overall voting percentage and create and manage polling and election details like general user details, nominated users, and election and result details efficiently.
The republic of Kenya comprises of eight (8) provinces now forty-seven counties. The country is located in East Africa and shares land borders with the Republics of Somalia in the East, Uganda in the West, Tanzania in the South and Ethiopia and Sudan (now South Sudan) in the North. The three largest and most influential ethnic groups in Kenya are the kikuyu, Luhya, and Kalenjins. In terms of religion Kenya is roughly split into 80% Christians while the rest are Muslims.
In Kenya, general elections are carried out every after five years where a head of state the President and The National Assembly representatives are elected. They are elected by the people. The national Assembly has about 220 members representing respective constituencies.
In the Local Governments they have the chairman and the Counselor. The counselors are all elected by the people of the state in the respective wards.
That is to say, in any given general elections, Kenyans vote for the president, the members of the National Assembly and the counselors.
Most African Electoral bodies IEBC not an exception right from their inception to date, even with latest advancements in technology, still use a primitive paper based methods during voting; this system is characterized by manual form filling to chose leaders and transfer of the information from manual data capture forms to computerized datasheets, this has led to an excessive number of mistakes making their way into the final vote counts hence leading to confusion at the time of announcing the results. The main advantage of paper-based systems is that ballot papers are easily human auditable. The disadvantages outweigh the advantages for instance the need to print ballot papers is a slow, expensive, inflexible, environmentally hostile process, visual impairments, or literacy limitations and also last minute changes to the voter register are difficult to accommodate among others.
www.electionproject.ajce.ind.in
online election managment system is for automate tasks of an election.
web application was developed using cakephp.
full report and code is available .
for more details contact chikkujoseph50@gmail.com
A mobile(Android app ) based election app. A website or app that will help in smart election system. It can be used by the government,and in every sector when election is a major issue.
Abstract The dynamic nature of loads, seasonal variation of soil properties, uneven soil strata below footings or inappropriate design of foundation makes differential settlement inevitable. Differential settlement is largely responsible for developing forces or changing the existing forces in the structure and is often considered as the underlying cause of many structural failures. A structural engineer has to take into account these forces while designing the structure. Different structural parameters like stiffness of columns and beams and number of storeys and bays affect the response of the structure to differential settlement. In the present study, a plain portal frame subjected to constant differential settlement of 10 mm is analyzed for different cases using a structural analysis software i.e. STAAD Pro. Different parameters of the frame are varied to understand their influence on frame forces developed due to differential settlement. The parameters taken into account in this study are length of beam, height of column, moment of inertia of beam and column and number of storeys and bays. It is found that the forces in the frame developed due to differential settlement decrease on increasing beam lengths and column heights. Also, decreasing the moment of inertia of beams and columns is effective in reducing these forces. In addition, differential settlement tends to affect forces more in lower storeys as compared to higher storeys. The frame forces are more prominent for bays which are near to the support subjected to settlement. The increase or decrease in frame forces due to differential settlement can be attributed to the change in stiffness of the members. Hence, the study concludes that the stiffer members tend to develop higher forces for constant differential settlement in frames. Key Words: Differential settlement, Portal frame, Structural response, Frame forces, Storey, Bays
Paper on e-voting system with a usage of Block chain, making the voting system more easy to use and secure. Block chain technology adds a perfect security layer to it.
E-Voting system is a system which allow all citizens of country to cast their vote online is to increase the overall voting percentage across the country, as in the recent scenario people have to visit the booth to cast their vote and those people who live out of their native place are not able to cast vote during the elections. So due to this the voting percentage across the country is very less. Through this software those people who live out of their home town will also be able to cast their votes as this system is online. The main objective of this software is to increase the overall voting percentage and create and manage polling and election details like general user details, nominated users, and election and result details efficiently.
New Opportunities with Wearable TechnologyMatthew Morey
As the Pebble watch and other wearable devices become ubiquitous new opportunities for innovative user interaction and functionality are being created. This presentation, by ChaiONE Senior Developer Matthew Morey, will look at the technical capabilities of the current leading wearable devices and how those capabilities can be leveraged to create unique user experiences, especially when paired with smart phones.
Why you should care about the wearable technology market? What are the technical limits of the current available wearable devices? How to integrate the Pebble with iOS to achieve unique user functionality not possible by each device alone?
Pill camera is an application of nanotechnology used in medicine to diagnose the disease particularly the small intestine and it is an alternative to endoscopy.
Wearables devices market and technologyKevin Huang
What is wearable technology?
Simply put, it’s technology that you incorporate into things you wear on a day-to-day basis, and it could be anything from a smart watch, augmented reality glasses, or even a personal health monitor in the form of a bracelet.
The idea is that technology will increasingly become more part of our daily lives, and it will become less intrusive, as it will be part of our clothing, and sometimes even part of our bodies!
Wearable tech presents a fascinating field to study. I have conducted some researches and hope you can also learn more about this high growth market.
The wearable technology market today spans across the fashion, medicine and technology industries. This presentation analyzes current trends across stye three industries and outline where the future of such products may be headed towards.
This report discusses the current and future trends in wearable technology ( wearables / wearable computer). Further, major drivers of successful wearables has been highlighted and 6 products have been compared as against each of the wearables.
Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Online voting system full thesis project by jahirJahir Khan
“ONLINE VOTING SYSTEM” is an online voting technique. In this system people who have citizenship can vote online without going to any physical polling station. There is a database which is maintained in which all the names of voters with complete information is stored.
In “ONLINE VOTING SYSTEM” a voter can use his\her voting right online without any difficulty. He\She has to be registered first for him/her to vote. Registration is mainly done by the system administrator for security reasons. The system Administrator registers the voters on a special site of the system visited by him only by simply filling a registration form to register voter. Citizens seeking registration are expected to contact the system administrator to submit their details. After the validity of them being citizens of India has been confirmed by the system administrator by comparing their details submitted with those in existing databases such as those as the Registrar of Persons, the citizen is then registered as a voter.
After registration, the voter is assigned a secret Voter ID with which he/she can use to log into the system and enjoy services provided by the system such as voting. If invalid/wrong details are submitted, then the citizen is not registered to vote.
Traditionally, in paper based election,voters cast their vote to select right candidate, where they simply put their vote in voting box and at the end of the voting day the votes are going to be count manually. This process was much time consuming as well as was erroneous. To overcome this drawback Electronic Voting Machine (EVM) was introduced. In EVM, Voter cast their vote by pressing the voting button which was on EVM. The Major advantage of EVM system is , the votes are counted automatically instead of manually. But the drawback of EVM machine was, the votes may get manipulated and was not secure. So to overcome all these drawbacks, research on biometric based voting system is going on. This Paper focuses on survey of different voting system using Fingerprint biometric through different algorithms and methods.
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
This paper describes an online electoral system for Indian election is proposed for the first time. The voting system is managed in a easier way as all the users should login by Aadhar card number and password and click on his/her favorable candidates to cast the vote. This features a larger security in the sense that voter high security password is confirmed before the vote is accepted in the main database of ECI. The extra feature of the model is that the voter will ensure if his/her vote has gone to correct candidate/party. The votes are going to be done automatically, therefore saving an enormous time and facultative ECI to announce the result at intervals a very short period.
Offline Handwritten Signature Identification and Verification using Multi-Res...CSCJournals
In this paper, we are proposing a new method for offline (static) handwritten signature identification and verification based on Gabor wavelet transform. The whole idea is offering a simple and robust method for extracting features based on Gabor Wavelet which the dependency of the method to the nationality of signer has been reduced to its minimal. After pre-processing stage that contains noise reduction and signature image normalisation by size and rotation, a virtual grid is placed on the signature image. Gabor wavelet coefficients with different frequencies and directions are computed on each points of this grid and then fed into a classifier. The shortest weighted distance has been used as the classifier. The weight that is used as the coefficient for computing the shortest distance is based on the distribution of instances in each of signature classes. As it was pointed out earlier, one of the advantages of this system is its capability of signature identification and verification of different nationalities; thus it has been tested on four signature dataset with different nationalities including Iranian, Turkish, South African and Spanish signatures. Experimental results and the comparison of the proposed system with other systems are consistent with desirable outcomes. Despite the use of the simplest method of classification i.e. the nearest neighbour, the proposed algorithm in comparison with other algorithms has very good capabilities. Comparing the results of our system with the accuracy of human\'s identification and verification, it shows that human identification is more accurate but our proposed system has a lower error rate in verification.
Electronic voting (also known as e-voting) is voting using electronic means to record or count votes. Depending on the particular implementation, e-voting may encompass a range of Internet services, from a touchscreen kiosk at a polling station to voting online, and from a local-only solution to a networked system.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
2. INTRODUCTION :INTRODUCTION :
It has always been an arduous task for the electionIt has always been an arduous task for the election
commission to conduct free and fair polls in our country, thecommission to conduct free and fair polls in our country, the
largest democracy in the worldlargest democracy in the world ..
Crores of rupees have been spent on this to make sure that theCrores of rupees have been spent on this to make sure that the
elections are riot free.elections are riot free.
This paper aims to present a new voting system employingThis paper aims to present a new voting system employing
biometrics in order to avoid rigging and to enhance thebiometrics in order to avoid rigging and to enhance the
accuracy and speed of the process.accuracy and speed of the process.
The system uses thumb impression for voter identification asThe system uses thumb impression for voter identification as
we know that the thumb impression of every human being haswe know that the thumb impression of every human being has
a unique pattern.a unique pattern.
3. BRIEF OVERVIEW :BRIEF OVERVIEW :
As a pre-poll procedure, a database consisting of the thumbAs a pre-poll procedure, a database consisting of the thumb
impressions of all the eligible voters in a constituency is created.impressions of all the eligible voters in a constituency is created.
During elections, the thumb impression of a voter is entered as inputDuring elections, the thumb impression of a voter is entered as input
to the system.to the system.
This is then compared with the available records in the database. IfThis is then compared with the available records in the database. If
the particular pattern matches with any one in the available record,the particular pattern matches with any one in the available record,
access to cast a vote is granted. But in case the pattern doesn’taccess to cast a vote is granted. But in case the pattern doesn’t
match with the records of the database or in case of repetition,match with the records of the database or in case of repetition,
access to cast a vote is denied or the vote gets rejected.access to cast a vote is denied or the vote gets rejected.
Also, the police station nearby to the election poll booth is informedAlso, the police station nearby to the election poll booth is informed
about the identity of the imposabout the identity of the imposter.ter.
4. DESIGN SPECIFICATIONS & COMPONENTSDESIGN SPECIFICATIONS & COMPONENTS
The design of the system consists of the following importantThe design of the system consists of the following important
parameters :parameters :
1.Scanning- using DSP Processor1.Scanning- using DSP Processor
2. Searching- based on the principle of GOOGLE SEARCH2. Searching- based on the principle of GOOGLE SEARCH
3.Networking- all the election booths are connected in a network3.Networking- all the election booths are connected in a network
4. Data transfer– using telephone lines..4. Data transfer– using telephone lines..
The only pre-requisite for the use of this finger printThe only pre-requisite for the use of this finger print
scanner is a personal identification card.scanner is a personal identification card.
5. BLOCK DIAGRAM FOR THEBLOCK DIAGRAM FOR THE
WHOLE PROCESS IN BRIEF:WHOLE PROCESS IN BRIEF:
ACCEPTING IMAGE ACCEPTING OPTION
PROCESSING OF IMAGE AND OPTION
COMPARISON OF IMAGE WITH DATABASE
IF IMAGE DOESN’T MATCH IF IMAGE MATCHES
OPTION IS REJECTED OPTION IS TRANSFERRED AS COUNT
AFTER TOTAL COUNT
COUNT OF EACH PARTY IS TRANSFERRED TO HOST
THROUGH TELEPHONE LINE
SUMS UP COUNT OF SIMILAR PARTIES AND DATA IS
ARRANGED IN AN ORDER
6. FINGER PRINT SCANNER:FINGER PRINT SCANNER:
The finger print scanner consists of the following parts:The finger print scanner consists of the following parts:
1.FINGER PRINT SENSOR:1.FINGER PRINT SENSOR: This is used to scan the thumbThis is used to scan the thumb
impression. The data obtained from this is analog in nature. Thisimpression. The data obtained from this is analog in nature. This
is transferred to the A/D converter for further processing.is transferred to the A/D converter for further processing.
2. A/D CONVERTER:2. A/D CONVERTER: This is used to convert the analog data fromThis is used to convert the analog data from
the SENSOR into the digital data and transfer it to the processor.the SENSOR into the digital data and transfer it to the processor.
3. FLASH ROM:3. FLASH ROM: This is for the storage of the data temporarily in theThis is for the storage of the data temporarily in the
DSP processor. This will work until the data is transferred to theDSP processor. This will work until the data is transferred to the
main memory of the HOST.main memory of the HOST.
4. DSP CHIP:4. DSP CHIP: This is used to receive the data and process it. This isThis is used to receive the data and process it. This is
connected to the USB port for further transfer of the data.connected to the USB port for further transfer of the data.
5. USB PORT:5. USB PORT: The sole purpose of the USB port is to establish aThe sole purpose of the USB port is to establish a
communication link between the DSP processor and thecommunication link between the DSP processor and the
MEMORY (DATABASE).MEMORY (DATABASE).
7. EXTRACTION OF THUMB IMPRESSION :EXTRACTION OF THUMB IMPRESSION :
1.1.The next step in the process is the extraction of theThe next step in the process is the extraction of the
thumb impression from the memory. The features of thethumb impression from the memory. The features of the
finger print are stored in the form of pixels.finger print are stored in the form of pixels.
2. This is further sent for pattern matching where the finger2. This is further sent for pattern matching where the finger
print is then compared with the records in the database.print is then compared with the records in the database.
If the pattern matches with any one of he records thenIf the pattern matches with any one of he records then
the vote is accepted.the vote is accepted.
3. If the feature doesn’t match with any one of the finger3. If the feature doesn’t match with any one of the finger
prints stored in the data base then the vote is rejected.prints stored in the data base then the vote is rejected.
8. BLOCK DIAGRAM :BLOCK DIAGRAM :
FINGER PRINT IMAGE FROM
SCANNER PRE-PROCESSING FEATURE EXTRACTION
REJECT THE OPTION MATCHING ACCEPT THE OPTION
DATABASE
NO YES
9. BLOCK DIAGRAMS FORBLOCK DIAGRAMS FOR
VARIOUS PROCESSESVARIOUS PROCESSES
VERIFICATION OF VOTERS :VERIFICATION OF VOTERS :
VERIFICATION OF VOTES
DATABASE SEARCH FOR THE FEATURES STORED ON THE
VOTER
BELONG TO SAME
CONSTITUENCY
PROCEED
DO NOT BELONG TO
CONSTITUENCY
REJECT
10. REJECTION OF VOTERREJECTION OF VOTER
REPETITIONREPETITION
CHECKING FOR MULTIPLE VOTES OR ACCESSING THE GIVEN VOTE
LIVE SCAN OF FINGER PRINTS
VERIFICATION OF ACCEPTIBILITY
CHECK IF THE VOTE IS REPEATED
REJECT AND STORE IDENTITY OF VOTERS
NOTIFICATION OF VOTERS NAME TO POLICE STATION
ACCEPT THE VOTE
YES
NO
11. FORMATION OF THE NETWORKFORMATION OF THE NETWORK
The voting machines present in a town are interlinked in the form of a highly secure LAN.The voting machines present in a town are interlinked in the form of a highly secure LAN.
This network is formed with the help of the telephone lines.This network is formed with the help of the telephone lines.
All the data collected in the voting system is first stored in the voting machine itself. ThenAll the data collected in the voting system is first stored in the voting machine itself. Then
it is sent to the HOST which will be located at headquarters of the town. All the data isit is sent to the HOST which will be located at headquarters of the town. All the data is
collected there and it is transferred to the main HOST.collected there and it is transferred to the main HOST.
The purpose of saving the data in the voting machine at first is that even if there is loss ofThe purpose of saving the data in the voting machine at first is that even if there is loss of
data by some means then it can be easily retrieved from the machine again. In thisdata by some means then it can be easily retrieved from the machine again. In this
way all the things are bought into a networkway all the things are bought into a network ..
12. ADVANTAGES :ADVANTAGES :
The system is highly reliable and secure.The system is highly reliable and secure.
In the long run the maintenance cost is very less whenIn the long run the maintenance cost is very less when
compared to the present systems.compared to the present systems.
Illegal practices like rigging in elections can beIllegal practices like rigging in elections can be
checked for.checked for.
It is possible to get instantaneous results and with highIt is possible to get instantaneous results and with high
accuracy.accuracy.
13. CONCLUSION:CONCLUSION:
Thus the advent of this biometric thumbThus the advent of this biometric thumb
impression voting system would enableimpression voting system would enable
hosting of fair elections in India. This willhosting of fair elections in India. This will
preclude the illegal practices like rigging.preclude the illegal practices like rigging.
The citizens can be sure that they aloneThe citizens can be sure that they alone
can choose their leaders, thus exercisingcan choose their leaders, thus exercising
their right in the democracy.their right in the democracy.