The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
This paper describes an online electoral system for Indian election is proposed for the first time. The voting system is managed in a easier way as all the users should login by Aadhar card number and password and click on his/her favorable candidates to cast the vote. This features a larger security in the sense that voter high security password is confirmed before the vote is accepted in the main database of ECI. The extra feature of the model is that the voter will ensure if his/her vote has gone to correct candidate/party. The votes are going to be done automatically, therefore saving an enormous time and facultative ECI to announce the result at intervals a very short period.
The purpose of this master‘s project is to develop an Online E-Voting prototype system
utilizing the Paillier Threshold Cryptosystem (PTC) web services and applying MESE processes
to it in an attempt to find possible solutions to further improve existing PTC web services.
Online voting (e-voting) would be more convenient, relatively secure and utilize fewer
resources. To be able to access e-voting system from a personal, business or even a public library
computer may be more convenient for many people needing to vote. This could potentially be a
solution for the low voter turnout at the polls. However, it is still questionable whether elections
can be conducted online or over the internet due to the high level of concern over security.
The purpose of this paper is to examine the main security problems in electronic voting systems, particularly security threats to DRE voting systems and security threats to the Internet voting systems. It will focus on how security problems can be addressed. The paper is divided into four parts. The first part will pinpoint the criteria of using electronic voting systems while focusing on the main security problems in DRE and Internet based voting systems and will suggest their solutions. The second and third parts will propose secure reference architecture for electronic and internet based voting systems while the last part will be the conclusion.
Traditionally, in paper based election,voters cast their vote to select right candidate, where they simply put their vote in voting box and at the end of the voting day the votes are going to be count manually. This process was much time consuming as well as was erroneous. To overcome this drawback Electronic Voting Machine (EVM) was introduced. In EVM, Voter cast their vote by pressing the voting button which was on EVM. The Major advantage of EVM system is , the votes are counted automatically instead of manually. But the drawback of EVM machine was, the votes may get manipulated and was not secure. So to overcome all these drawbacks, research on biometric based voting system is going on. This Paper focuses on survey of different voting system using Fingerprint biometric through different algorithms and methods.
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
This paper describes an online electoral system for Indian election is proposed for the first time. The voting system is managed in a easier way as all the users should login by Aadhar card number and password and click on his/her favorable candidates to cast the vote. This features a larger security in the sense that voter high security password is confirmed before the vote is accepted in the main database of ECI. The extra feature of the model is that the voter will ensure if his/her vote has gone to correct candidate/party. The votes are going to be done automatically, therefore saving an enormous time and facultative ECI to announce the result at intervals a very short period.
The purpose of this master‘s project is to develop an Online E-Voting prototype system
utilizing the Paillier Threshold Cryptosystem (PTC) web services and applying MESE processes
to it in an attempt to find possible solutions to further improve existing PTC web services.
Online voting (e-voting) would be more convenient, relatively secure and utilize fewer
resources. To be able to access e-voting system from a personal, business or even a public library
computer may be more convenient for many people needing to vote. This could potentially be a
solution for the low voter turnout at the polls. However, it is still questionable whether elections
can be conducted online or over the internet due to the high level of concern over security.
The purpose of this paper is to examine the main security problems in electronic voting systems, particularly security threats to DRE voting systems and security threats to the Internet voting systems. It will focus on how security problems can be addressed. The paper is divided into four parts. The first part will pinpoint the criteria of using electronic voting systems while focusing on the main security problems in DRE and Internet based voting systems and will suggest their solutions. The second and third parts will propose secure reference architecture for electronic and internet based voting systems while the last part will be the conclusion.
Traditionally, in paper based election,voters cast their vote to select right candidate, where they simply put their vote in voting box and at the end of the voting day the votes are going to be count manually. This process was much time consuming as well as was erroneous. To overcome this drawback Electronic Voting Machine (EVM) was introduced. In EVM, Voter cast their vote by pressing the voting button which was on EVM. The Major advantage of EVM system is , the votes are counted automatically instead of manually. But the drawback of EVM machine was, the votes may get manipulated and was not secure. So to overcome all these drawbacks, research on biometric based voting system is going on. This Paper focuses on survey of different voting system using Fingerprint biometric through different algorithms and methods.
E-Voting system is a system which allow all citizens of country to cast their vote online is to increase the overall voting percentage across the country, as in the recent scenario people have to visit the booth to cast their vote and those people who live out of their native place are not able to cast vote during the elections. So due to this the voting percentage across the country is very less. Through this software those people who live out of their home town will also be able to cast their votes as this system is online. The main objective of this software is to increase the overall voting percentage and create and manage polling and election details like general user details, nominated users, and election and result details efficiently.
A mobile(Android app ) based election app. A website or app that will help in smart election system. It can be used by the government,and in every sector when election is a major issue.
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Online voting system full thesis project by jahirJahir Khan
“ONLINE VOTING SYSTEM” is an online voting technique. In this system people who have citizenship can vote online without going to any physical polling station. There is a database which is maintained in which all the names of voters with complete information is stored.
In “ONLINE VOTING SYSTEM” a voter can use his\her voting right online without any difficulty. He\She has to be registered first for him/her to vote. Registration is mainly done by the system administrator for security reasons. The system Administrator registers the voters on a special site of the system visited by him only by simply filling a registration form to register voter. Citizens seeking registration are expected to contact the system administrator to submit their details. After the validity of them being citizens of India has been confirmed by the system administrator by comparing their details submitted with those in existing databases such as those as the Registrar of Persons, the citizen is then registered as a voter.
After registration, the voter is assigned a secret Voter ID with which he/she can use to log into the system and enjoy services provided by the system such as voting. If invalid/wrong details are submitted, then the citizen is not registered to vote.
— Short Message Service (SMS) is the text communication service component of phone, web or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices. The usage SMS as data application in the world is enormous, with 2.4 billion active users, or 74% of all mobile phone subscribers. This paper develops an SMS voting system that can be used in conducting a trustworthy and generally acceptable electoral conduct based on the legislation of a particular country. It is base on a level structure and a national SIM card module used for only electoral process. The SIM card can be used for either the Internet voting system or the SMS voting. The method is cheap and fast and guarantees prompt election result.
E-Voting system is a system which allow all citizens of country to cast their vote online is to increase the overall voting percentage across the country, as in the recent scenario people have to visit the booth to cast their vote and those people who live out of their native place are not able to cast vote during the elections. So due to this the voting percentage across the country is very less. Through this software those people who live out of their home town will also be able to cast their votes as this system is online. The main objective of this software is to increase the overall voting percentage and create and manage polling and election details like general user details, nominated users, and election and result details efficiently.
A mobile(Android app ) based election app. A website or app that will help in smart election system. It can be used by the government,and in every sector when election is a major issue.
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Online voting system full thesis project by jahirJahir Khan
“ONLINE VOTING SYSTEM” is an online voting technique. In this system people who have citizenship can vote online without going to any physical polling station. There is a database which is maintained in which all the names of voters with complete information is stored.
In “ONLINE VOTING SYSTEM” a voter can use his\her voting right online without any difficulty. He\She has to be registered first for him/her to vote. Registration is mainly done by the system administrator for security reasons. The system Administrator registers the voters on a special site of the system visited by him only by simply filling a registration form to register voter. Citizens seeking registration are expected to contact the system administrator to submit their details. After the validity of them being citizens of India has been confirmed by the system administrator by comparing their details submitted with those in existing databases such as those as the Registrar of Persons, the citizen is then registered as a voter.
After registration, the voter is assigned a secret Voter ID with which he/she can use to log into the system and enjoy services provided by the system such as voting. If invalid/wrong details are submitted, then the citizen is not registered to vote.
— Short Message Service (SMS) is the text communication service component of phone, web or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices. The usage SMS as data application in the world is enormous, with 2.4 billion active users, or 74% of all mobile phone subscribers. This paper develops an SMS voting system that can be used in conducting a trustworthy and generally acceptable electoral conduct based on the legislation of a particular country. It is base on a level structure and a national SIM card module used for only electoral process. The SIM card can be used for either the Internet voting system or the SMS voting. The method is cheap and fast and guarantees prompt election result.
Highly Secured Online Voting System (OVS) Over Networkijbuiiir1
Internet voting systems have gained popularity and have been used for government elections and referendums in the United Kingdom, Estonia and Switzerland as well as municipal elections in Canada and party primary elections in the United States. Voting system can involve transmission of ballots and votes via private computer networks or the Internet. Electronic voting technology can speed the counting of ballots and can provide improved accessibility for disabled voters. The aim of this paper is to people who have citizenship of India and whose age is above 18 years and of any sex can give their vote through online without going to any physical polling station. Election Commission Officer (Election Commission Officer who will verify whether registered user and candidates are authentic or not) to participate in online voting. This online voting system is highly secured, and its design is very simple, ease of use and also reliable. The proposed software is developed and tested to work on Ethernet and allows online voting. It also creates and manages voting and an election detail as all the users must login by user name and password and click on his favorable candidates to register vote. This will increase the voting percentage in India. By applying high security it will reduce false votes.
Mobile Voting System Using Advanced NFC Technologyijsrd.com
Electronic voting system are becoming popular with wide spread use of computer and embedded system. Security is the main important issue should be considered in such system. Mobile voting system is basically used for collecting and counting votes. In this technology include punch card, optical scan voting system. This paper proposes a new Mobile based voting system using advanced NFC technology, Voting is the process that allows the general public or the people to choose their leaders and articulate views on how they will be governed. This gives a comprehensive analysis of security with respect to NFC. This study deals with the use of information technology to handle electoral processes starting from voters and candidates registration to the actual casting and counting of ballots. Exploring mobile voting from a systems perspective can demonstrate the attributes of the current systems and the possible solutions for the voting process so any one can caste their vote from any place.
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESijcax
Semantic annotation of images is an important research topic on both image understanding and database
or web image search. Image annotation is a technique to choosing appropriate labels for images with
extracting effective and hidden feature in pictures. In the feature extraction step of proposed method, we
present a model, which combined effective features of visual topics (global features over an image) and
regional contexts (relationship between the regions in Image and each other regions images) to automatic
image annotation.In the annotation step of proposed method, we create a new ontology (base on WordNet
ontology) for the semantic relationships between tags in the classification and improving semantic gap
exist in the automatic image annotation.Experiments result on the 5k Corel dataset show the proposed
method of image annotation in addition to reducing the complexity of the classification, increased accuracy
compared to the another methods
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMijcax
Constrained Nonlinear programming problems are hard problems, and one of the most widely used and
common problems for production planning problem to optimize. In this study, one of the mathematical
models of production planning is survey and the problem solved by cuckoo algorithm. Cuckoo Algorithm is
efficient method to solve continues non linear problem. Moreover, mentioned models of production
planning solved with Genetic algorithm and Lingo software and the results will compared. The Cuckoo
Algorithm is suitable choice for optimization in convergence of solution
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any
pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as
a router, forwarding information packets for other mobile nodes. There are many routing protocols that
possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV,
OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational
conditions for each MANETs protocol. We study these five MANETs routing protocols by different
simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This
performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay,
Normalized Routing Load and Average Throughput.
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
In this study, which took place current year in the city of Maragheh in IRAN. Number of high school
students in the fields of study: mathematics, Experimental Sciences, humanities, vocational, business and
science were studied and compared. The purpose of this research is to predict the academic major of high
school students using Bayesian networks. The effective factors have been used in academic major selection
for the first time as an effective indicator of Bayesian networks. Evaluation of Impacts of indicators on
each other, discretization data and processing them was performed by GeNIe. The proper course would be
advised for students to continue their education.
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation ijcax
Automatic image annotation has emerged as an important research topic due to its potential application on
both image understanding and web image search. This paper presents a model, which integrates visual
topics and regional contexts to automatic image annotation. Regional contexts model the relationship
between the regions, while visual topics provide the global distribution of topics over an image. Previous
image annotation methods neglected the relationship between the regions in an image, while these regions
are exactly explanation of the image semantics, therefore considering the relationship between them are
helpful to annotate the images. Regional contexts and visual topics are learned by PLSA (Probability
Latent Semantic Analysis) from the training data. The proposed model incorporates these two types of
information by MCDM (Multi Criteria Decision Making) approach based on WSM (Weighted Sum
Method). Experiments conducted on the 5k Corel dataset demonstrate the effectiveness of the proposed
model.
On Fuzzy Soft Multi Set and Its Application in Information Systems ijcax
Research on information and communication technologies have been developed rapidly since it can be
applied easily to several areas like computer science, medical science, economics, environments,
engineering, among other. Applications of soft set theory, especially in information systems have been
found paramount importance. Recently, Mukherjee and Das defined some new operations in fuzzy soft
multi set theory and show that the De-Morgan’s type of results hold in fuzzy soft multi set theory with
respect to these newly defined operations. In this paper, we extend their work and study some more basic
properties of their defined operations. Also, we define some basic supporting tools in information system
also application of fuzzy soft multi sets in information system are presented and discussed. Here we define
the notion of fuzzy multi-valued information system in fuzzy soft multi set theory and show that every fuzzy
soft multi set is a fuzzy multi valued information system.
Web is a collection of inter-related files on one or more web servers while web mining means extracting
valuable information from web databases. Web mining is one of the data mining domains where data
mining techniques are used for extracting information from the web servers. The web data includes web
pages, web links, objects on the web and web logs. Web mining is used to understand the customer
behaviour, evaluate a particular website based on the information which is stored in web log files. Web
mining is evaluated by using data mining techniques, namely classification, clustering, and association
rules. It has some beneficial areas or applications such as Electronic commerce, E-learning, Egovernment, E-policies, E-democracy, Electronic business, security, crime investigation and digital library.
Retrieving the required web page from the web efficiently and effectively becomes a challenging task
because web is made up of unstructured data, which delivers the large amount of information and increase
the complexity of dealing information from different web service providers. The collection of information
becomes very hard to find, extract, filter or evaluate the relevant information for the users. In this paper,
we have studied the basic concepts of web mining, classification, processes and issues. In addition to this,
this paper also analyzed the web mining research challenges.
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR ijcax
The Pattern classification system classifies the pattern into feature space within a boundary. In case
adversarial applications use, for example Spam Filtering, the Network Intrusion Detection System (NIDS),
Biometric Authentication, the pattern classification systems are used. Spam filtering is an adversary
application in which data can be employed by humans to attenuate perspective operations. To appraise the
security issue related Spam Filtering voluminous machine learning systems. We presented a framework for
the experimental evaluation of the classifier security in an adversarial environments, that combines and
constructs on the arms race and security by design, Adversary modelling and Data distribution under
attack. Furthermore, we presented a SVM, LR and MILR classifier for classification to categorize email as
legitimate (ham) or spam emails on the basis of thee text samples.
Visually impaired people face many problems in their day to day lives. Among them, outdoor navigation is
one of the major concerns. The existing solutions based on Wireless Sensor Networks(WSN) and Global
Positioning System (GPS) track ZigBee units or RFID (Radio Frequency Identification) tags fixed on the
navigation system. The issues pertaining to these solutions are as follows: (1) It is suitable only when the
visually impaired person is commuting in a familiar environment; (2) The device provides only a one way
communication; (3) Most of these instruments are heavy and sometimes costly. Preferable solution would
be to make a system which is easy to carry and cheap.
The objective of this paper is to break down the technological barriers, and to propose a system by
developing an Android App which would help a visually impaired person while traveling via the public
transport system like Bus. The proposed system uses an inbuilt feature of smart phone such as GPS
location tracker to track the location of the user and Text to Speech converter. The system also integrates
Google Speech to Text converter for capturing the voice input and converts them to text. This system
recommends the requirement of installing a GPS module in buses for real time tracking. With minor
modification, this App can also help older people for independent navigation.
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...ijcax
The rapid growth of Internet has revolutionized online news reporting. Many users tend to use online news
websites to obtain news information. When considering Sri Lanka, there are numerous news websites,
which are subscribed on a daily basis. With the rise in this number of news websites, the Sri Lankan
authorities of media face the issue of lacking a proper methodology or a tool which is capable of tracking
and regulating publications made by different disseminators of news.
This paper proposes a News Agent toolbox which periodically extracts news articles and associated
comments with the aid of a concept called Mapping Rules; to classify them into Personalized Categories
defined in terms of keywords based Category Profiles. The proposed tool also analyzes comments made by
the readers with the aid of simple statistical techniques to discover the most popular news articles and
fluctuations in popularity of news stories.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
The design of silicon chips in every semiconductor industry involves the testing of these chips with other
components on the board. The platform developed acts as power on vehicle for the silicon chips. This
Printed Circuit Board design that serves as a validation platform is foundational to the semiconductor
industry.
The manual/repetitive design activities that accompany the development of this board must be minimized to
achieve high quality, improve design efficiency, and eliminate human-errors. One of the time consuming
tasks in the board design is the Trace Length matching. The paper aims to reduce the length matching time
by automating it using SKILL scripts.
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...ijcax
The purpose of this research is the analysis using meta-analysis of studies in the field of Educational
Technology in Turkey and in the field is to demonstrate how to get to that trend. For this purpose, a total of
263 studies were analyzed including 98 theses and 165 articles published between 2010-2018. Purpose
sampling method was used when selecting publications. In the research, while selecting articles and theses;
Turkey addressed; YOK Tez Tarama Database, Journal of Hacettepe University Faculty of Education,
Educational Sciences : Theory & Practice Journal, Education and Science Journal, Elementary Education
Online Journal, The Turkish Online Journal of Education and The Turkish Online Journal of Educational
Technology used in journals. Publications have been reviewed under 11 criteria. Index, year of
publication, research scope, method, education level, sample, number of samples, data collection methods,
analysis techniques, and research tendency, research topics in Educational Technology Research in Turkey
has revealed. The data is interpreted based on percentage and frequency and the results are shown using
the table.
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...ijcax
The purpose of this research is the analysis using meta-analysis of studies in the field of Educational
Technology in Turkey and in the field is to demonstrate how to get to that trend. For this purpose, a total of
263 studies were analyzed including 98 theses and 165 articles published between 2010-2018. Purpose
sampling method was used when selecting publications. In the research, while selecting articles and theses;
Turkey addressed; YOK Tez Tarama Database, Journal of Hacettepe University Faculty of Education,
Educational Sciences : Theory & Practice Journal, Education and Science Journal, Elementary Education
Online Journal, The Turkish Online Journal of Education and The Turkish Online Journal of Educational
Technology used in journals. Publications have been reviewed under 11 criteria. Index, year of
publication, research scope, method, education level, sample, number of samples, data collection methods,
analysis techniques, and research tendency, research topics in Educational Technology Research in Turkey
has revealed. The data is interpreted based on percentage and frequency and the results are shown using
the table
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...ijcax
With the great development that, modern medical technology is witnessing today, medical devices and
equipment have become a basic pillar of any healthcare system in the world and cannot be dispensed with,
so we find competition between the major companies that manufacture medical devices and equipment
resulting in a huge variety of complex modern medical technologies. These medical devices and equipment
require high accuracy in manufacturing and packaging in addition to operation, maintenance, and followup, because any error in any of the previous stages will have bad consequences for the patients and the
health system, there are many accidents that have led to some deaths. Therefore, we find that many medical
device producers and medical companies in addition to health service providers seek to find systems and
protocols to reduce accidents resulting from medical devices. As a result, many systems have recently
appeared that seek to protect from the dangers of medical devices and equipment. This research aims to
conduct a study of the effects of international standards on the safety of medical devices and equipment
and reduce their risks. By counting the international standards in force in the Kingdom of Saudi Arabia
that are applied by the Saudi Food and Drug Authority, making questionnaires, and distributing them to
health service providers and regulatory bodies for medical devices and equipment, considering the data,
these data will be analysed and evaluated the effectiveness of quality systems and standards in maintaining
Effectiveness and quality of medical devices and equipment. The study will include governmental and
private health services sectors.
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR ijcax
The Pattern classification system classifies the pattern into feature space within a boundary. In case adversarial applications use, for example Spam Filtering, the Network Intrusion Detection System (NIDS), Biometric Authentication, the pattern classification systems are used. Spam filtering is an adversary
application in which data can be employed by humans to attenuate perspective operations. To appraise the
security issue related Spam Filtering voluminous machine learning systems. We presented a framework for the experimental evaluation of the classifier security in an adversarial environments, that combines and constructs on the arms race and security by design, Adversary modelling and Data distribution under
attack. Furthermore, we presented a SVM, LR and MILR classifier for classification to categorize email as legitimate (ham) or spam emails on the basis of thee text samples
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...ijcax
Order placingis a crucial phase of lifecycle of a Mass-customizable product and seeks improvement in
Mechanical industry. ‘Product Configurator’ is a good solution to bring in data transparency and speed
up the process. Configuration tools arebeing used on a very small scale,reasons being lack of awareness
and dearer costs of existing tools. In this research work a product configurator is developedfor
Hydraulic Actuator (HA).This method uses Applicable Programing Interface (API) of a CAD tool coupled
with Visual Basics (VB) and MS Excel.Itis a standaloneapplication of VB and its integration into web
portal can be the future scope. The final aim was to reduce time delay at CRM phase,bring more
transparency in the ordering system and to establish a method which, small and medium scale enterprises
canafford. Trails on the tool developed generated Part-Assembly drawings, BOM and JT files in
moments.
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...ijcax
A large no. of automobile companies finding a convinient way to manage design changes with the use of
various PLM techniques. Change in any product is something that should occur on timely basis to match
up with customer requirement and cost reduction. The change made in the vehicle designs directly affects
various concerned agencies. Automobile Vehicle structures contains thousands of parts and if there is any
change is occurring in child parts then it becomes important to track that impacted part, propose a solution
on that part and release a new assembly structure with feasible changes such that all efforts need to be
done for cost reduction.
Visually impaired people face many problems in their day to day lives. Among them, outdoor navigation is
one of the major concerns. The existing solutions based on Wireless Sensor Networks(WSN) and Global
Positioning System (GPS) track ZigBee units or RFID (Radio Frequency Identification) tags fixed on the
navigation system. The issues pertaining to these solutions are as follows: (1) It is suitable only when the
visually impaired person is commuting in a familiar environment; (2) The device provides only a one way
communication; (3) Most of these instruments are heavy and sometimes costly. Preferable solution would
be to make a system which is easy to carry and cheap.
The objective of this paper is to break down the technological barriers, and to propose a system by
developing an Android App which would help a visually impaired person while traveling via the public
transport system like Bus. The proposed system uses an inbuilt feature of smart phone such as GPS
location tracker to track the location of the user and Text to Speech converter. The system also integrates
Google Speech to Text converter for capturing the voice input and converts them to text. This system
recommends the requirement of installing a GPS module in buses for real time tracking. With minor
modification, this App can also help older people for independent navigation.
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION ijcax
Today’s era is an era of modernization and globalization. Everything is happening at a very fast rate
whether it is politics, societal reforms, commercialization, transportation, or educational innovations. In
every few second, technology grows either in the form of arrival of the new devices/gadgets with millions of
apps and these latest technological objects may be in the form of hardware/software devices. We are the
educationists, teachers, students and stakeholders of present Indian educational system. These
gadgets/devices are partly being used by us or most of them are still unaware of these innovative
technologies due to the mass media or economical factor. So, there is a need to improvise ourselves
towards utilizing the future gadgets in order to explore the educational uses, barriers and preparatoryneeds of these available devices for educational purposes. This paper aims to study the opinion of the
teacher-educators about the usage of future gadgets in higher education. It will also contribute towards
establishing the list of latest technological devices, and how it can enhances the process of teachinglearning system.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
1. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
DOI:10.5121/ijcax.2017.4201 1
ADVANCED E-VOTING APPLICATION USING
ANDROID PLATFORM
Ganaraj K
PG Scholar, Computer Science Department,
Bearys Institute of technology and Engineering
Mangalore, Karnataka, India
ABSTRACT
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an e-
voting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed e-
voting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
KEYWORDS
Electronic voting, e-mail Network
1. INTRODUCTION
The proper execution of democratic rights has become linked to the availability and reliable
functioning of advanced information and communication technology (ICT). While modern
societies fully rely on ICT for business, work and leisure time activities, the use of ICT for
democratic decision making is still in its infancy. In fact, the out date technological concepts for
voting have been blamed in part for lost and uncounted votes and could therefore be responsible
for biased political decisions making [2]. Countries all over the world are examining e-voting [3],
for it has some striking advantages over traditional paper voting, including security for casting
votes, accuracy of counting and analyzing votes, options to conduct voting in a centralized and
decentralized manner, etc. The reasons why the e-voting technology has not matured to
equivalent levels as known for business and leisure time activities lies mostly in an inherent lack
of trust and fear of electronic threats. While most countries are still conceptualizing or testing e-
voting systems, three cantons in Switzerland have pioneered the development of e-voting to its
full technological maturity. The world is always in improvement and growth in technology, that's
why we should go parallel with it, to be able as much as we can get benefit from these
improvements.
2. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
2
The advanced e-voting technique makes use of main two phases- the registration and login phase.
During the registration phase the user need to provide required information and can get a secured
password in order to login the application for voting. In the second phase using the user-id and
password provided the user can login and can cast the vote from home or office or anywhere
securely. The votes are properly encrypted so that any third person cannot able to find voting
information of any others. The whole operation is managed by an administrator. The admin can
monitor the process and finally announces the result soon after voting session is completed. Even
the vote counts are stored in the encrypted form while getting stored in the database maintained
and managed by administrator. Hence the overall voting process will be safe and secure.
2. COMPARISON WITH THE EXISTING SYSTEMS
The current system which is present now is a machine and paper based voting system which
needs much man power and requires lot of resources. The present voting system finds difficulty
during the counting also because it is counted manually. To overcome this as we said earlier the e
voting system provides an efficient way to complete the whole voting system. The e voting
system is an android application which enables user to vote in his smart phone. This is more
advanced compared to the present system because it doesn't need any man power. And voter
doesn’t need to visit the polling booth. The application also reduces the complexity of counting
since it is automatic.
3. PROPOSED SYSTEM
The application can be installed in the android phones and voting will be enabled by the
administrator on the polling day. If there are different stages of polling then application will
enable the user only on the polling day. The user can enter into the application by giving his voter
id/Aadhar number (unique number) and a secret password which is provided to the user. As soon
as the user enters into the application he selects his constituency and his booth number or place
then the user can cast his vote and logout from the application. The vote should be kept secret and
it should be available on the voting day in the counting center. To keep the vote secret an
encryption and a decryption algorithm is used. So as soon as the user casts his vote the vote is
encrypted so that it is secret and the same is encrypted on the polling day.
4. REQUIREMENTS OF THE E-VOTING SYSTEM
The proposed project contain following modules:
Administrator
User
Account
ADMINISTRATOR:
• User Information: Consists of all information of the user those who are eligible for
voting.
• User Verification: Verify the user during registration and user Login.
• Voting Information: Storage for storing the vote information casted by the user.
3. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
3
USER:
• Registration: Registers with administrator to obtain a password for voting.
• Login: Initiates voting using the password provided by the administrator.
• Encryption: Encrypting the vote after the vote casted by the user
ACCOUNT:
• Registration: The user should register before using the application.
• Login: Logging into the application using user name and password.
5. E-VOTING SYSTEM DESIGN
Like most of the systems in the world, the security consideration is very important. We are taken
into account this part through sending password to users email account. Further encrypting the
vote while sending it to the admin. It is clear that the user information should be stored in the
database, so that the valid users can register themselves to get the password. It also stores the
password once it is sent to the user until the user cast s the vote. It is also possible to get
information of user who doesn't participated in voting process. The application should be secure
because it should not reveal vote information. So the vote should be encrypted once user confirms
the vote. Also the password is sent to users e-mail account in order to avoid the misuse of
password . Since the e-mail account is confidential we used that feature to avoid the misuse of our
applications password.
Figure 1: Sequence diagram of registration
The registration process is illustrated as in the figure1 shown above. When user chooses
registration option and provides required details those details are compared with the information
maintained by the admin. If user provided data is found to be correct a password is generated and
given to the user through mail service in order to make it safe and secure.
4. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
4
Figure 2: The Voting Process
6. E-VOTING SYSTEM WORKING
Android e-Voting application on smart phone user gives user to vote]. Admin can see the voting
results according to vote options[3].System can maintain the data about the voter like Name, ID
number and other relevant data. Even though the system enables voters to poll their vote from
anywhere, initially the voters should register themselves to get a password for voting purpose.
This constraint is imposed to ensure that only the genuine person is allowed to vote in the
elections. The aim of this work is to design and implement an electronic voting application for the
Android platform that will enable people to vote securely from anywhere. The application as a
whole is aimed at being compatible with devices from many manufacturers and running different
versions of the operating system. The application is also aimed at being localized [4]. Figure
Below shows the overall voting process.
Electronic voting refers to the use of computers or computerized voting equipment to cast ballots
in an election. Electronic systems can be used to register voters, tally ballots, and record votes
[5].The Caltech/MIT Voting Technology Project [6] came into being in order to develop a new
voting technology in order to prevent a recurrence of the problems that threatened the 2000 U. S.
Presidential Elections. The report assesses the magnitude of the problems, their root causes and
how technology can reduce them. They address a wide range of “What is” issues including voting
procedures, voting equipment, voter registration, polling places, absentee and early voting, ballot
security, cost and public finance of elections, etc
5. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
5
Figure 3: Overall voting process
.
The overall flow of the application is as depicted in the Figure4. It is clear that the user should
register in the beginning and obtain a password. The obtained password need to be used for login
and cast the vote.
6. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
6
Figure 4: Flowchart of Overall voting process
6.1 REGISTRATION PHASE
In the home page registration category will ask you to enter the following details.
• Name
• E-mail id
• Voter id
• Aadhar id
7. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
7
Figure 5: User Registration example
The Figure5 illustrates the registration procedure example when the application is developed and
installed in a smart phone for testing. It is clear that in the registration form the user need to
provide valid details. Whenever the valid details are matching the registration procedure becomes
successful. Else the user does not allowed for registration. After you submit the details asked by
the registration the application will give you a toast message whether your registration is
successful or not. At the same time if your registration is successful the application will send you
a mail which contains the password which is needed later for logging in.
6.2 LOGIN AND VOTING PROCESS
You need to login for voting by giving the the below details
• Aadhar id
• Voter id
• Password
Figure 6: Login Example
8. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
8
Once user submits the details the application checks the details given by the user in database at
the server side. If the details provided are proper then login successful status is shown as a toast
message. After this the user can choose voting option to cast the vote. A list of candidates
contesting in the election along with their details is displayed in users Smartphone. The candidate
list is updated from the server. Now it’s the right time to select a candidate from the available list.
When user taps against a candidate the application asks for confirming the vote. When user
confirms the candidate selected the information is sent to the server. Now vote count against the
selected candidate is updated which is stored in an encrypted form. Also a flag field maintained in
the database is enabled against the user once user casts the vote so that if the same user tries to
vote again then the application should not allow for it. All these processes are done at the server
side to make voting process safe and secured.
7. E-VOTING SYSTEM SECURITY LEVELS
For the security, we use e-mail service to provide the secured password to the user. When the
password is generated it will be sent to the users e-mail id which is linked to the aadhar-id stored
in the database. The e-mail account is self managed and none of the other user can access the e-
mail and get the password to login.
The most security part lies on securing the vote casted by the user. So the vote is encrypted using
Java Cryptology Extension algorithm and sent to admin [7]. However only the admin has the
permission to access the database. Even while storing the vote count it is stored in the encrypted
form hence it becomes a secured data. At any moment the admin only have the permission for
accessing and updating data in the server. To avoid fraud voters the aadhar-id which unique
number uniquely identifies the user. The possibility is that any user may try to revote again once
after voting. Some flag indicating that the user status (voted or not) is maintained at the server.
Whenever user casts the vote the flag field is updated and can be referred for future analysis. This
flag field also helpful to collect information about percentage of voting and will act as a reference
data.
8. CONCLUSION
This research paper proposed a real time e-voting system based on android phones. The usability
of this system is very high if it will be used in real life election process. It will definitely helpful
for the users who wish to vote and the voting process will be made very easy by using this
application. Advantages of the proposed e-voting system: e-voting minimizes the risk of
ambiguities as the voter makes his choice by touching the screen. E-voting could also minimize
the need for recounts as everything is tabulated by the computer. Also the user can cast vote
without visiting the polling booth. It saves a lot of time and many resources. Usually the people
wait eagerly for vote counting day to know the results. By using this system no need to wait to
know the results. The admin can announce the results soon after the voting session closes. The
results show that system is very efficient and easy to use.
REFERENCES
[1] Dr.Aree Ali Mohammed and Ramyar Adbolrahman Timour,Efficient E-voting Android Based
System, IJARCSSE,vol.3,Issue 11,2013
[2] A.S. Belenky and R.C. Larson, “To Queue or not to Queue?,” OR/MS 27, October 2013, pp. 30-34.
[3] “An Electronic Polling Service to Support Public Awareness Using Web Technologies”, Christos
Bouras, Nikolaos Katris, Vassilis Triantafillou.
9. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
9
[4] “E-voting on Android System” paper (International Journal of Emerging Technology and Advanced
Engineering) prepared by : Kirti Autade, Pallavi Ghadge, Sarika Kale ,Co-authors- Prof. N. J.
Kulkarni, Prof. S. S. Mujgond, February 2012.
[5] “Electronic Voting,” Encyclopedia of Computers and Computer History, prepared by Lorrie Faith
Cranor and edited by Raul Rojas, published by Fitzroy Dearborn, 2001.
[6] “Voting – What is, What Could be,” Caltech/MIT Voting Technology Project (VTP) Report,
July 2001.
[7] Java Cryptography an e-book by Jonathan B. Knudsen, First edition May 1998, ISBN:1-56592-402-9
AUTHOR
Ganaraj K PG Scholar, Computer Science and Engineering Department, Bearys
Institute of technology and Engineering, Mangalore, Karnataka, India.