This document proposes a blockchain-based secure and distributed voting system for decision making on government policies and projects in Sri Lanka. It discusses how blockchain technology can increase transparency, security, and efficiency in the voting process. Specifically, it presents a system where Grama Sewa (village) officers in Sri Lanka's 14020 regions can securely cast anonymous votes on projects using their mobile devices and blockchain. The votes would be recorded on a distributed ledger to prevent tampering and determine the final decision. The system aims to better incorporate citizen opinions and ensure accountability in government decision making.
Paper on e-voting system with a usage of Block chain, making the voting system more easy to use and secure. Block chain technology adds a perfect security layer to it.
In recent years, frameworks that employ Generative Adversarial Networks (GANs) have achieved immense results for various applications in many fields especially those related to image generation both due to their ability to create highly realistic and sharp images as well as train on huge data sets. However, successfully training GANs are notoriously difficult task in case ifhigh resolution images are required. In this article, we discuss five applicable and fascinating areas for image synthesis based on the state-of-theart GANs techniques including Text-to-Image-Synthesis, Image-to-Image-Translation, Face Manipulation, 3D Image Synthesis and DeepMasterPrints. We provide a detailed review of current GANs-based image generation models with their advantages and disadvantages.The results of the publications in each section show the GANs based algorithmsAREgrowing fast and their constant improvement, whether in the same field or in others, will solve complicated image generation tasks in the future.
Paper on e-voting system with a usage of Block chain, making the voting system more easy to use and secure. Block chain technology adds a perfect security layer to it.
In recent years, frameworks that employ Generative Adversarial Networks (GANs) have achieved immense results for various applications in many fields especially those related to image generation both due to their ability to create highly realistic and sharp images as well as train on huge data sets. However, successfully training GANs are notoriously difficult task in case ifhigh resolution images are required. In this article, we discuss five applicable and fascinating areas for image synthesis based on the state-of-theart GANs techniques including Text-to-Image-Synthesis, Image-to-Image-Translation, Face Manipulation, 3D Image Synthesis and DeepMasterPrints. We provide a detailed review of current GANs-based image generation models with their advantages and disadvantages.The results of the publications in each section show the GANs based algorithmsAREgrowing fast and their constant improvement, whether in the same field or in others, will solve complicated image generation tasks in the future.
The year 2018 is the year of blockchain applications with several ongoing use-cases coming to realization and the vendor landscape also gained more depth and a better structure after years of press and vendor hype, fueled equally by commercial self-interest and a genuine desire for innovation.
Second line of defense for cybersecurity : BlockchainAhmed Banafa
With the fact that cybercrime and cyber security attacks hardly seem to be out of the news these days and the threat is growing globally.
Nobody would appear immune to malicious and offensive acts targeting computer networks, infrastructures and personal computer devices.
Firms clearly must invest to stay resilient.
Gauging the exact size of cybercrime and putting a precise US dollar value on it is nonetheless tricky.
Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond.
Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models.
The Blockchain Wave in 2019 and BeyondAhmed Banafa
We’re still in the early days of Blockchain as a technology, and so we’re yet to see the full impact that it will have on the world that we live in. Still, it’s already showing potential across a range of industries and started to enter the public consciousness, so the real question is what will happen when Blockchain technology starts to mature.
The purpose of this article is to provide an overview of the PKI project initiated part of the UAE national ID card program. It primarily shows the operational model of the PKI implementation that is indented to integrate the federal government identity management infrastructure with e-government initiatives owners in the country. It also explicates the agreed structure of the major components in relation to key stakeholders; represented by federal and local e-government authorities, financial institutions, and other organizations in both public and private sectors. The content of this article is believed to clarify some of the misconceptions about PKI implementation in national ID schemes, and explain how the project is envisaged to encourage the diffusion of e-government services in the United Arab Emirates. The study concludes that governments in the Middle East region have the trust in PKI technology to support their e-government services and expanding outreach and population trust, if of course accompanied by comprehensive digital laws and policies.
The following list of predictions (Figure 1) explores the state of IoT in 2019 and covering IoT impact on many aspects business and technology including Digital Transformation, Blockchain, AI, and 5G.
IoT, AI and Blockchain: Catalysts for Digital TransformationAhmed Banafa
The digital revolution has brought with it a new way of thinking about manufacturing and operations. Emerging challenges associated with logistics and energy costs are influencing global production and associated distribution decisions. Significant advances in technology, including big data and analytics, AI, Internet of Things, robotics and additive manufacturing, are shifting the capabilities and value proposition of global manufacturing. In response, manufacturing and operations require a digital renovation: the value chain must be redesigned and retooled and the workforce retrained. Total delivered cost must be analyzed to determine the best places to locate sources of supply, manufacturing and assembly operations around the world. In other words we need a digital transformation.
The year 2018 is the year of blockchain applications with several ongoing use-cases coming to realization and the vendor landscape also gained more depth and a better structure after years of press and vendor hype, fueled equally by commercial self-interest and a genuine desire for innovation.
Second line of defense for cybersecurity : BlockchainAhmed Banafa
With the fact that cybercrime and cyber security attacks hardly seem to be out of the news these days and the threat is growing globally.
Nobody would appear immune to malicious and offensive acts targeting computer networks, infrastructures and personal computer devices.
Firms clearly must invest to stay resilient.
Gauging the exact size of cybercrime and putting a precise US dollar value on it is nonetheless tricky.
Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond.
Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models.
The Blockchain Wave in 2019 and BeyondAhmed Banafa
We’re still in the early days of Blockchain as a technology, and so we’re yet to see the full impact that it will have on the world that we live in. Still, it’s already showing potential across a range of industries and started to enter the public consciousness, so the real question is what will happen when Blockchain technology starts to mature.
The purpose of this article is to provide an overview of the PKI project initiated part of the UAE national ID card program. It primarily shows the operational model of the PKI implementation that is indented to integrate the federal government identity management infrastructure with e-government initiatives owners in the country. It also explicates the agreed structure of the major components in relation to key stakeholders; represented by federal and local e-government authorities, financial institutions, and other organizations in both public and private sectors. The content of this article is believed to clarify some of the misconceptions about PKI implementation in national ID schemes, and explain how the project is envisaged to encourage the diffusion of e-government services in the United Arab Emirates. The study concludes that governments in the Middle East region have the trust in PKI technology to support their e-government services and expanding outreach and population trust, if of course accompanied by comprehensive digital laws and policies.
The following list of predictions (Figure 1) explores the state of IoT in 2019 and covering IoT impact on many aspects business and technology including Digital Transformation, Blockchain, AI, and 5G.
IoT, AI and Blockchain: Catalysts for Digital TransformationAhmed Banafa
The digital revolution has brought with it a new way of thinking about manufacturing and operations. Emerging challenges associated with logistics and energy costs are influencing global production and associated distribution decisions. Significant advances in technology, including big data and analytics, AI, Internet of Things, robotics and additive manufacturing, are shifting the capabilities and value proposition of global manufacturing. In response, manufacturing and operations require a digital renovation: the value chain must be redesigned and retooled and the workforce retrained. Total delivered cost must be analyzed to determine the best places to locate sources of supply, manufacturing and assembly operations around the world. In other words we need a digital transformation.
A novel smart contract based blockchain with sidechain for electronic votingIJECEIAES
Several countries have been researching digital voting methods in order to overcome the challenges of paper balloting and physical voting. The recent coronavirus disease 2019 (COVID-19) epidemic has compelled the remote implementation of existing systems and procedures. Online voting will ultimately become the norm just like unified payments interface (UPI) payments and online banking. With digital voting or electronic voting (e-voting) a small bug can cause massive vote rigging. E-voting must be honest, exact, safe, and simple. E-voting is vulnerable to malware, which can disrupt servers. Blockchain’s end-to-end validation solves these problems. Three smart contracts-voter, candidate, and voting-are employed. The problem of fraudulent actions is addressed using vote coins. Vote coins indicate voter status. Sidechain technology complements blockchain. Sidechains improve blockchain functionality by performing operations outside of blockchains and delivering the results to the mainchain. Thus, storing the encrypted vote on the sidechain and using the decrypted result on the mainchain reduces cost. Building access control policies to grant only authorized users’ access to the votes for counting is made simpler by this authorization paradigm. Results of the approach depict the proposed e-voting system improves system security against replay attacks and reduces the processing cost as well as processing time.
Designing a framework for blockchain-based e-voting system for LibyaCSITiaesprime
A transition to democratic rule is considered the first step down a long road towards Libya’s recovery and prosperity. Thus, it strives to improve the country’s elections by introducing new technologies. A blockchain is a distributed ledger that is characterised by independence and security. Therefore, it has been widely applied in various fields ranging from credit encryption and digital currency. With the development of internet technology, electronic voting (E-voting) systems have been greatly popularised. However, they suffer from various security threats, which create a sense of distrust among existing systems. Integrating blockchain with online elections is a promising trend, which could lead to make an election transparent, immutable, reliable, and more secure. In this paper, we present a literature review and a case analysis of blockchain technology. Moreover, a framework for an E-voting system based on blockchain is proposed. The methodology is adopted on the basis of three activities, they are identification of the relevant literature about E-voting, system modelling, and the determination of suitable technological tools. The framework is secure and reliable. Thus, it could help increase the number of voters and ensure a high level of participation, as well as facilitate free and fair electoral processes.
Highly Secured Online Voting System (OVS) Over Networkijbuiiir1
Internet voting systems have gained popularity and have been used for government elections and referendums in the United Kingdom, Estonia and Switzerland as well as municipal elections in Canada and party primary elections in the United States. Voting system can involve transmission of ballots and votes via private computer networks or the Internet. Electronic voting technology can speed the counting of ballots and can provide improved accessibility for disabled voters. The aim of this paper is to people who have citizenship of India and whose age is above 18 years and of any sex can give their vote through online without going to any physical polling station. Election Commission Officer (Election Commission Officer who will verify whether registered user and candidates are authentic or not) to participate in online voting. This online voting system is highly secured, and its design is very simple, ease of use and also reliable. The proposed software is developed and tested to work on Ethernet and allows online voting. It also creates and manages voting and an election detail as all the users must login by user name and password and click on his favorable candidates to register vote. This will increase the voting percentage in India. By applying high security it will reduce false votes.
In the EXISTING SYSTEM, Ballot
based Voting is present, but still there is no system to
avoid Proxy Casting and Recasting is implemented.
We do not have an option to see our casted Vote also.
There is no security in this current application. In the
PROPOSED SYSTEM, a novel electronic voting
system based on Blockchain that addresses some of
the limitations in existing systems and evaluates some
of the popular blockchain frameworks for the purpose
of constructing a blockchain-based e-voting system.
In the MODIFICATION part of the project, we
integrate Aadhaar card linked mobile number for
OTP generation, only then the voter can cast the vote,
this system prevents casting and re-casting of proxies.
Blockchain Developments is building a comprehensive solution for Supply chain, Politics, Decentralized currency, Financial Technology, Healthcare, Infrastructure, and other business verticals. Read our blockchain case studies and use cases of successful implementations of blockchain development solutions for our various clients.
ELECTION SYSTEM BASED ON BLOCKCHAIN TECHNOLOGYijcsit
There is no uncertainty that the chroma currency is very popular for the transaction information stored in the block of blocks. To initiate the importance of blocking, there is only one distributed ledger in which data is stored, since many of the centers in the blockchain network limit enough records for these records. This document proposes a decision-making framework based on innovation to create a secure, unjustifiable, accurate and transparent framework for voter privacy. In addition, it is voted and declared in this context that the race has a short period of time, since it is automatically registered in the table. This framework also gives society confidence in its legislation when applying this technique. In this framework, an administrator can add a candidate and a voter to the block. In different hands, a voter can log into the framework and then decide in favor of a candidate that the details of the vote should be stored in the block. In addition, each square in the blockchain innovation that relates to the previous square contains the hash of the previous square, and each square contains explicit data based on the square footage. The hub is connected by a peer network in this framework, with all the hubs in the block site network that have a complete duplicate block.
Similar to Blockchain-based Secure, Reliable, and Distributed Voting System for Decision Making in Government Policies and Projects (20)
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
2. II. ELECTRONIC VOTING AND BLOCKCHAIN PREREQUISITES
This section explains the capabilities of blockchain and
smart contract technology and its capabilities as an electronic
voting system.
Blockchain-based secure and reliable voting system is a
distributed, immutable, incontrovertible, public ledger. This
new technology operates through four main components,
i. The ledger is in multiple locations, and there is no
point in failing to maintain a distributed ledger.
ii. Any "new block" proposed to the ledger must specify
an earlier version of the ledger and create a chain that cannot
be changed from where the blockchain receives its name,
thereby preventing the integrity of previous entries.
iii. The ledger has a distributed control over who can add
new transactions.
iv. The majority of network nodes must agree before the
proposed new entries become a permanent part of the ledger.
These technologies are implemented through advanced
cryptography, which makes security levels equal and or higher
than any previously known database.
Below is a list of the essential requirements that must be
met by an electronic voting system for effective use in a
blockchain-based secure and reliable voting system for
government policies and projects
i. An electronic voting system should not be allowed to vote
by force.
ii. An electronic voting system should not enable traceability
of a vote of a voters.
iii. An electronic voting system should not be allowed to
change any vote by a third party.
iv. An electronic voting system must ensure that a vote count
correctly.
v. An electronic voting system should not allow a single
entity to control the counting of votes and the election
results.
vi. Eligible people should be allowed to vote one vote for one
project in an election through an electronic voting system.
vii. Eligible people can change vote for several time before the
deadline. only last one counts.
A. Blockchain as a Service
In 2008, Satoshi Nakamoto (a person or group of
people) was invented the Blockchain mechanism. It helps
Figure 1: Election roles and process
3. to serve the public transaction ledger of the cryptocurrency
bitcoin. Each transaction can be publicly verified by
signing up for reverse chain of cryptocurrencies so that no
data written to the blockchain can harm anyone.
Blockchain Structure is a collectible data structure that
can write new pieces of data but cannot be changed.
Blocking, ensuring that it cannot be changed.
B. Smart Contracts for blockchain
Smart contracts are scalable and irreversible
applications that can be executed in a decentralized
environment (Example: blockchain). After deploying a
smart contract, no one can edit the code or change its
execution behaviour. The execution of smart contracts
guarantees the parties to come together for a written
contract. This creates a new strong, trusting relationship
that does not depend on a single party.
Smart contracts provide better management for
realizing and managing digital contracts due to self-
verification and self-execution. [VII]
III. ELECTRONIC VOTING PROCESS
As can be seen in Figure 1,in this research paper involve
following roles.
A. Election administrators:
Manage the lifecycle of an electronic voting system. The
electronic voting Administrators can register the device
through unique IMEI number , create and activate key pool
(key pool is collection of random 14020 keys that is distribute
independently on key pool.
Figure 2: Activities of the election
4. Where keys can be obtain by gramasewa members and
owner of the key cannot track since its random) and specify
the type of election, create the above election, submit the
ballot papers, register the voters, determine the lifespan of the
election and issue authorized entries.
B. Voters:
Voters (Grama sewa officers )can log in to the device after
registration of IMEI of the device, then they can get random
key from key pool(Key pool change project to
project) then define the wallet for future funds, penalty or
obtain vote state, then join for poll and cast the vote (member
get a chance to cast his vote. One vote for one project, can
change it before the deadline, only last one counts). For the
elections they are eligible for verifying themselves, cast
ballots, submit the vote and confirm voting before the
electronic election is over.
C. Boot Nodes:
Each grama sewa officers, with permissioned access to
the network, host a bootnode. A bootnode helps to find Region
Node and communicate with each other. The bootnodes does
not hold any status in the blockchain and runs on a static IP,
thereby enabling regional nodes to speed up its peers.
D. Region Node:
When the electronic voting administrators create an
election, each ballot smart contracts, representing each voting
region, are deployed onto the blockchain. When voting smart
contracts are created, individual region nodes are allowed to
interact with their corresponding voting smart contracts.
When a single grama sewa officer votes from their
corresponding smart contract, the voting data is verified by all
the relevant region nodes, and all votes they agree to are added
to the blockchain when the block period has reached.
IV. ELECTION FOR THE PROJECT AS A SMART CONTRACT
As can be seen in Figure 2, there are several smart
contracts involved in an election as smart contracts are
involved for each regional area. For each grama sewa officer
with its corresponding voting region location, during the voter
registration phase, the smart contract with the relevant
location will be prompted to the grama sewa officer after
he/she authenticates himself when voting.
A. Election creation:
Election administrator create election ballots for project
using a dApp. This decentralized application interacts with a
smart contract for creating elections, and the administrator
lists a list of IMEI numbers and polling regions. With a list of
the IMEI numbers, for each voting regions, where each voting
region is a parameter in each ballot smart contract. When
creating an election, each corresponding region zone node can
interact with his corresponding ballot smart contract.
B. Vote transaction:
When an individual vote of grama sewa officer in a voting
region, the voter works with that voting region in a smart
contract. This smart contract interacts with the blockchain
through the corresponding region nodes, adding it to the
voting blockchain after the deadline. (Grama sewa officer can
change his vote any time before deadline.). Vote can be seen
after the deadline. Each vote is stored as a transaction on the
blockchain and each voter receives a transaction ID for their
vote for verification purposes.
When a grama sewa officer votes (after deadline), their
wallet is reduced by 1, so they are unable to vote more than
once. A single transaction on the blockchain includes the
transaction ID, the part where the transaction is block located
(Table 1). Wallet value will be increase by 1 after election
over. The wallet in which the transaction was sent (In future
penalty or funds will send to the wallet and the this field may
help to know the which project) and who received it, and the
total value sent.
C. Calculation of results
The calculation of the election is done on the ballot smart
contract. Each ballot smart contract makes their own
assessment for the corresponding location in their store. When
an election is over, the results for each smart contract are
announced.
D. Penalty or Fund procedure
If the Grama sewa officer has voted for a project and depends
on its success sometime later, the officer may be involved in a
fund or a fine. Voting for government policies or projects is
mandatory and the Grama sewa officer cannot avoid it. This
will help to get the best option for government policies or
projects.
V. SECURITY AND LEGAL FRAMEWORK
A. Security analysis:
i. Distributed denial-of-service (DDoS) attack: The attacker
must DDoS every boot node on the network. If that
happens, the person or entity will immediately find out.
Each node operates with a Byzantine fault tolerance
algorithm, which helps to detect system failure nodes.
ii. Authentication vulnerability: Each individual is identified
and authenticated by the system by presenting an IMEI
number of the device. Therefore, attackers cannot enter to
the system without authorised IMEI number.
iii. Sybil[26]: Sybil attack is against centralized systems
where a person creates a large number of nodes in an
attempt to disrupt network functionality by hijacking or
dropping messages. Proposed electronic voting system
Transaction ID Block ID Sent Hash Received Hash Amount
0x011235 1987 0xtest001 0xsomeone01 -1
0x454582 1990 0xtest456 0xsometwo23 -1
0x012525 1945 0xtest7485 0xsomethree1 -1
Table 1: Sample Table Structure
5. runs on a private network so nobody has access to create
it.
B. Legal issues:
i. Remote voting: Remote elections are not forcibly resisted
due to the unsupervised factor of a remote election.
Therefore, remote voting cannot guarantee the privacy of
the people who vote in a polling booth.
VI. RELATED WORK
When examined on the impact of Blockchain-Based
Secure and Reliable Voting System for Government Policies
and Projects, found out some varieties of scenarios. There is a
rich literature on regarding electronic voting.
There are some studies based on electronic voting systems
and blockchain done by several researches.
Htet Ne , Aye Moe Aung in 2014 done a research based
on “A Survey of Different Electronic Voting Systems”. This
paper renders a survey on various kinds of electronic voting
systems with their strength and defects [I].
Subhash N. Ariyadasa in 2016 done a research based on
“Applicability of an Electronic Voting System in Sri Lankan
Context”. This paper renders an electronic voting system have
many advantages over traditional hand counted paper ballots,
therefore it will be a needful replacement for the future of Sri
Lankan democracy [III].
Kashif Mehboob Kha, Junaid Arshad, Muhammad
Mubashir Khan in 2017 done a research based on “Secure
Digital Voting System based on Blockchain Technology”.
This paper renders in-depth evaluation of the scheme which
successfully demonstrates its effectiveness to achieve an end-
to-end verifiable e-voting scheme. [VIII]
Dr. Ekta Walia, Mr. Sanjay Kuma in 2017 done a research
based on “Analysis of electronic voting system in various
countries”. This paper renders an overview of the experiences
of other countries using electronic voting machine. The
comparative focus is on the adoption of electronic voting
systems adopted at the international level [II].
Nir Kshetri , Jeffrey Voas in 2018 published a research on
IEEE based on “Blockchain-Enabled E-Voting”. His article
highlights some Blockchain enabled e-voting
implementations and the approach's potential benefits and
challenges [XIX].
Chinmay Saraf , Siddharth Sabadra in 2018 published a
research on IEEE based on “Blockchain platforms: A
compendium”. This paper renders provide a comparative
analysis of all the hyperledger platforms, ethereum, corda to
make a choice of the platform easily according to the
requirement [XIV].
Researcher Michele Marchesi published a research on
IEEE based on “Why blockchain is important for software
developers, and why software engineering is important for
blockchain software (Keynote)” in 2018. This paper renders
blockchain development offers, such as the certification of
empirical data used for experiment; the ability to design
processes where developers are paid upon completion of their
tasks through Blockchain tokens, after acceptance tests
performed using Smart Contracts; and more sound techniques
enabling pay-per-use software, again using tokens [XV].
Tara Salman , Raj Jain , Lav Gupta in 2018 Published a
research on IEEE based on “Probabilistic Blockchains: A
Blockchain Paradigm for Collaborative Decision-Making”.
This paper renders analyses the application of probabilistic
blockchains for intrusion detection systems for computer
networks. [XVII]
Mrs. Harsha V. Patil, Mrs. Kanchan G. Rathi, Mrs. Malati
V.Tribhuwan in 2018 done a research based on “A Study on
Decentralized E-Voting System Using Blockchain
Technology”. This paper renders some of the popular
blockchain frameworks that offer blockchain as a service and
associated electronic E-voting system which is based on
blockchain that addresses all limitations respectively, it also
preserve participant’s anonymity while still being open to
public inspection.[X]
In 2018, Clement Chan Zheng Wei, Chuah Chai Wen
done a research based on “Blockchain-Based Electronic
Voting Protocol”. This paper renders how to leverage the
advantages from blockchain into electronic voting protocol.
This blockchain-based electronic voting protocol promise to
provide a secure electronic election process given the
proposed system works. Implement a protocol using
blockchain to turn election protocol into an automated control
system without relying any single point of entity. Lastly,
discuss the characteristics of our proposed blockchain-based
electronic voting protocol in this paper. However, there are
also emerging challenges and limitations awaiting to
overcome. This paper gives a comprehensive overview of
proposed Blockchain-Based protocol. [XI]
In 2019, Ping Zhong, Yang Xiang published a research on
IEEE based on “Privacy-Protected Blockchain System”. This
paper renders that future blockchain smart contract system
needs not only to keep immutability but also to protect user
privacy [XVIII].
S. F. Sayyad, Mangesh Pawar, Ashutosh Patil, Vandana
Pathare, Prayag Poduval in 2019 done a research based on
“Features of Blockchain Voting: A Survey”. This paper
renders blockchain has been misunderstood as the public
ledger which can be used for maintaining the online currency
transaction record. People were less aware of the other
features and so the applications of Blockchain [XII].
In 2019, Artur Rot , Bartosz Blaicke published a research
on IEEE based on “Blockchain’s Future Role in
Cybersecurity. Analysis of Defensive and Offensive Potential
Leveraging Blockchain-Based Platforms”. This paper renders
further adoption of blockchain-based solutions should be
encouraged or not from a security standpoint and if the overall
potential for change could be net positive [XVI].
Amrita Dhillon, Grammateia Kotsialou, Peter McBurney,
Luke Riley, in 2019 done a research based on “Introduction to
Voting and the Blockchain: some open questions for
economists”. This paper renders potential of a blockchain
based infrastructure for a decentralised online voting platform.
When compared to paper-based voting, online voting can
vastly increase the speed that votes can be counted, expand the
overall accessibility of the election system and decrease the
cost of turnout. Yet despite these advantages, online voting for
political office is subject to fraud at various levels due to its
centralised nature. [XIII]
6. In 2019, the researcher Saghar Estehghari done a research
based on ” Exploiting the Client Vulnerabilities in Internet E-
voting Systems”. This paper renders defences against this
attack, generalizations and the impact of the latest upgrade of
Helios on security [IV].
Researcher Haibo Yi done a research based on “Securing
e-voting based on blockchain in P2P network” in 2019. This
paper renders electronic voting (e-voting) is an electronic
means for casting and counting votes. It is an efficient and
cost-effective way for conducting a voting procedure, which
has characteristic of being magnanimous data and real time
and requesting high safety. However, concerns on security of
networking and privacy of communication for e-voting have
been grown [IX].
Researcher Gunnlaugur done a research based on
“Blockchain-Based E-Voting System”. This paper evaluates
the potential of distributed ledger technologies through the
description of a case study, namely the process of an
election and implementing a blockchain-based application
which improves the security and decreases the cost of
hosting a nationwide election[V]. When compared to the
proposed system, the way the wallet is handled can be seen as
major similarity. As a major dissimilarity between proposed
system and the Gunnlaugur system is activation of key pool
through unique IMEI number with public keys. Here, we
propose a new e-voting protocol that can use the block chain
as a transparent ballot box. Therefore, there is greater
transparency between the Grama Seva officer and the system.
VII. CONCLUSION
The idea of adapting of blockchain-based secure and
reliable voting system to make voting process cheaper, faster,
trustworthiness and easier is powerful in modern society. This
system will be benefited to government as well as grama sewa
officer. Government can decide best solutions for their
policies and projects and also good decision will be benefited
to obtain fund to officers who voted.
VIII.REFERENCES
I. Htet Ne , Aye Moe Aung, (2014). A Survey of
Different Electronic Voting Systems.
II. Dr. Ekta Walia, Mr. Sanjay Kuma (2017) Analysis of
electronic voting system in various countries
III. Subhash N. Ariyadasa, (2016) Applicability of an
Electronic Voting System in Sri Lankan Context.
IV. Saghar Estehghari, (2019) Exploiting the Client
Vulnerabilities in Internet E-voting Systems:
HackingHelios2.0asanExample
V. Gunnlaugur (2018), Blockchain-Based E-Voting
System
VI. Sos.ca.gov. (2007). Top-to-Bottom Review |
California Secretary of State. Available
VII. Steve Ellis, Ari Juels and Sergey Nazarov. (2017).
ChainLink: A Decentralized Oracle Network
VIII. Kashif Mehboob Kha, Junaid Arshad, Muhammad
Mubashir Khan (2017), Secure Digital Voting
System based on Blockchain Technology.
IX. Haibo Yi (2019), Securing e-voting based on
blockchain in P2P network.
X. Mrs. Harsha V. Patil, Mrs. Kanchan G. Rathi, Mrs.
Malati V.Tribhuwan (2018), A Study on
Decentralized E-Voting System Using Blockchain
Technology.
XI. Clement Chan Zheng Wei, Chuah Chai Wen (2018),
Blockchain-Based Electronic Voting Protocol.
XII. S. F. Sayyad, Mangesh Pawar, Ashutosh Patil,
Vandana Pathare, Prayag Poduval (2019), Features
of Blockchain Voting: A Survey.
XIII. Amrita Dhillon, Grammateia Kotsialou, Peter
McBurney, Luke Riley (2019), Introduction to Voting
and the Blockchain: some open questions for
economists
XIV. Chinmay Saraf , Siddharth Sabadra (2018),
Blockchain platforms: A compendium, Published in:
2018 IEEE International Conference on Innovative
Research and Development (ICIRD)
XV. Michele Marchesi (2018), Why blockchain is
important for software developers, and why software
engineering is important for blockchain software
(Keynote), Published in: 2018 International
Workshop on Blockchain Oriented Software
Engineering (IWBOSE).
XVI. Artur Rot , Bartosz Blaicke (2019), Blockchain’s
Future Role in Cybersecurity. Analysis of Defensive
and Offensive Potential Leveraging Blockchain-
Based Platforms, Published in: 2019 9th
International Conference on Advanced Computer
Information Technologies (ACIT).
XVII. Tara Salman , Raj Jain , Lav Gupta (2018)
Probabilistic Blockchains: A Blockchain Paradigm
for Collaborative Decision-Making, Published in:
2018 9th IEEE Annual Ubiquitous Computing,
Electronics & Mobile Communication Conference
(UEMCON)
XVIII. Ping Zhong, Yang Xiang (2019), Privacy-Protected
Blockchain System. Published in: 2019 20th IEEE
International Conference on Mobile Data
Management (MDM).
XIX. Nir Kshetri , Jeffrey Voas (2018), Blockchain-
Enabled E-Voting. Published in: IEEE Software (
Volume: 35 , Issue: 4 , July/August 2018 )