SlideShare a Scribd company logo
ELECTORNICVOTINGMACHINE
INTRODUCTION
This project is designed for electronic
voting machine by using the fingerprint
identification method.
Here voters thumb impressions are used
for identifying the voters.
If it matches then system will allow the
voter to poll his voter and otherwise
prevent the voter from polling.
What is E-voting
E- voting is an election system that
allows voters to record a secret
ballot and have it tabulated
electronically. Votes are stored so
they can be re-counted should the
need arise.
What is paper ballot
Paper ballots were pieces of paper marked and supplied by
voters. Before the introduction of the secret ballot,
American political parties distributed ballots listing their
own candidates for party supporters to deposit in ballot
boxes.
Disadvantages of e- voting
 Voter could be tracked
 Lack of reliability
 Lack of verification
 Lack of transparency
 Undetectable fraud
 Wholesale fraud
 More expensive due to voting machines
Advantages & Disadvantages
Advantages
• It is simple to use and understand.
• There is a constituency link.
• Provides for strong government.
• Reduces the representation of fringe parties.
Disadvantages
 It is not proportional.
 Security issues and unequal internet access.
 We have to use external chip to store the votes.
 We have provide continuous power supply.
Name: Gurpreet Kaur
Unit -2
Trade: Marketing Executive

More Related Content

What's hot

E-voting
E-votingE-voting
E-voting
Dushyant Singh
 
Automated ballot Vote.ppt
Automated ballot Vote.pptAutomated ballot Vote.ppt
Automated ballot Vote.ppt
Girish Chandra
 
CODER Pollwatch Election Monitoring Guide
CODER Pollwatch Election Monitoring GuideCODER Pollwatch Election Monitoring Guide
CODER Pollwatch Election Monitoring Guide
Muyiwa Gbadegesin
 
Project synopsis on online voting system
Project synopsis on online voting systemProject synopsis on online voting system
Project synopsis on online voting systemLhakpa Yangji
 
Online voting job presentation
Online voting job presentationOnline voting job presentation
Online voting job presentationbondito
 
online E-voting system
online E-voting systemonline E-voting system
online E-voting system
shubham patil
 
Election managment
Election managmentElection managment
Election managment
chikkujacob
 
Automated ballot vote
Automated ballot voteAutomated ballot vote
Automated ballot votevaibhavijani
 
Online Voting System - Project
Online Voting System - ProjectOnline Voting System - Project
Online Voting System - Project
Subhashis Das
 
Distributed algorithm for electronic voting system
Distributed algorithm for electronic voting systemDistributed algorithm for electronic voting system
Distributed algorithm for electronic voting system
Casper Chingwe
 
Online voting system project by bipin bhardwaj
Online voting system project by bipin bhardwajOnline voting system project by bipin bhardwaj
Online voting system project by bipin bhardwaj
PT Bipin Bhardwaj
 
A Transition To Mobile Voting Systems
A Transition To Mobile Voting SystemsA Transition To Mobile Voting Systems
A Transition To Mobile Voting Systems
Cloud Vote
 
Computerised voting system
Computerised voting systemComputerised voting system
Computerised voting system
Sushrut Bhosale
 
Feasibility Study on e-Voting System
Feasibility Study on e-Voting SystemFeasibility Study on e-Voting System
Online Voting System-using Advanced Java
Online Voting System-using Advanced JavaOnline Voting System-using Advanced Java
Online Voting System-using Advanced Java
Sarthak Srivastava
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile sms
eSAT Journals
 
Online votingsystem
Online votingsystemOnline votingsystem
Online votingsystemManish Kumar
 
Online polling system
Online polling systemOnline polling system
Online polling system
Avinash Prakash
 

What's hot (20)

E-voting
E-votingE-voting
E-voting
 
Automated ballot Vote.ppt
Automated ballot Vote.pptAutomated ballot Vote.ppt
Automated ballot Vote.ppt
 
CODER Pollwatch Election Monitoring Guide
CODER Pollwatch Election Monitoring GuideCODER Pollwatch Election Monitoring Guide
CODER Pollwatch Election Monitoring Guide
 
Project synopsis on online voting system
Project synopsis on online voting systemProject synopsis on online voting system
Project synopsis on online voting system
 
Online voting job presentation
Online voting job presentationOnline voting job presentation
Online voting job presentation
 
online polling system
online polling systemonline polling system
online polling system
 
online E-voting system
online E-voting systemonline E-voting system
online E-voting system
 
Election managment
Election managmentElection managment
Election managment
 
Automated ballot vote
Automated ballot voteAutomated ballot vote
Automated ballot vote
 
Online Voting System - Project
Online Voting System - ProjectOnline Voting System - Project
Online Voting System - Project
 
M voting
M votingM voting
M voting
 
Distributed algorithm for electronic voting system
Distributed algorithm for electronic voting systemDistributed algorithm for electronic voting system
Distributed algorithm for electronic voting system
 
Online voting system project by bipin bhardwaj
Online voting system project by bipin bhardwajOnline voting system project by bipin bhardwaj
Online voting system project by bipin bhardwaj
 
A Transition To Mobile Voting Systems
A Transition To Mobile Voting SystemsA Transition To Mobile Voting Systems
A Transition To Mobile Voting Systems
 
Computerised voting system
Computerised voting systemComputerised voting system
Computerised voting system
 
Feasibility Study on e-Voting System
Feasibility Study on e-Voting SystemFeasibility Study on e-Voting System
Feasibility Study on e-Voting System
 
Online Voting System-using Advanced Java
Online Voting System-using Advanced JavaOnline Voting System-using Advanced Java
Online Voting System-using Advanced Java
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile sms
 
Online votingsystem
Online votingsystemOnline votingsystem
Online votingsystem
 
Online polling system
Online polling systemOnline polling system
Online polling system
 

Similar to ELECTRONICE VOTING MACHINE AND OLD BALLOT

IRJET- RFID Based Smart Voting System
IRJET- RFID Based Smart Voting SystemIRJET- RFID Based Smart Voting System
IRJET- RFID Based Smart Voting System
IRJET Journal
 
Electronic voting machine
Electronic voting machine Electronic voting machine
Electronic voting machine
SonyKhan8
 
PPT
PPT PPT
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET Journal
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - review
akshay hebbar
 
EVM AND PAPER BALLET MACHINE.pptx
EVM AND PAPER BALLET MACHINE.pptxEVM AND PAPER BALLET MACHINE.pptx
EVM AND PAPER BALLET MACHINE.pptx
PunitaYadav14
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
Gautam Kumar
 
EVM.pptx
EVM.pptxEVM.pptx
EVM.pptx
BohtyarKhan
 
Internet of Devices in Election Duty
Internet of Devices in Election DutyInternet of Devices in Election Duty
Internet of Devices in Election Duty
Thayalan Danusan
 
IRJET- Digitized Election Voting System : An Innovative Approach
IRJET-  	  Digitized Election Voting System : An Innovative ApproachIRJET-  	  Digitized Election Voting System : An Innovative Approach
IRJET- Digitized Election Voting System : An Innovative Approach
IRJET Journal
 
Online voting system full thesis project by jahir
Online voting system full thesis project by jahirOnline voting system full thesis project by jahir
Online voting system full thesis project by jahir
Jahir Khan
 
kgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdfkgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdf
ShubhamGour29
 
ADVANCED BIOMETRIC - BASED VOTING SYSTEM ENSURING SECURITY AND INTELLIGENCE-1...
ADVANCED BIOMETRIC - BASED VOTING SYSTEM ENSURING SECURITY AND INTELLIGENCE-1...ADVANCED BIOMETRIC - BASED VOTING SYSTEM ENSURING SECURITY AND INTELLIGENCE-1...
ADVANCED BIOMETRIC - BASED VOTING SYSTEM ENSURING SECURITY AND INTELLIGENCE-1...
srajece
 
Report on online voting system
Report on online voting systemReport on online voting system
Report on online voting system
RajatMohanty12
 
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICA SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
IJERA Editor
 
Seminar(smartvotingsystemmmmmmmmmm).pptx
Seminar(smartvotingsystemmmmmmmmmm).pptxSeminar(smartvotingsystemmmmmmmmmm).pptx
Seminar(smartvotingsystemmmmmmmmmm).pptx
Geetha982072
 
Biometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded securityBiometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded security
Remya R
 

Similar to ELECTRONICE VOTING MACHINE AND OLD BALLOT (20)

IRJET- RFID Based Smart Voting System
IRJET- RFID Based Smart Voting SystemIRJET- RFID Based Smart Voting System
IRJET- RFID Based Smart Voting System
 
Electronic voting machine
Electronic voting machine Electronic voting machine
Electronic voting machine
 
PPT
PPT PPT
PPT
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
 
EVM.pptx
EVM.pptxEVM.pptx
EVM.pptx
 
EVM.pptx
EVM.pptxEVM.pptx
EVM.pptx
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - review
 
EVM AND PAPER BALLET MACHINE.pptx
EVM AND PAPER BALLET MACHINE.pptxEVM AND PAPER BALLET MACHINE.pptx
EVM AND PAPER BALLET MACHINE.pptx
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
 
INNOVATIA
INNOVATIAINNOVATIA
INNOVATIA
 
EVM.pptx
EVM.pptxEVM.pptx
EVM.pptx
 
Internet of Devices in Election Duty
Internet of Devices in Election DutyInternet of Devices in Election Duty
Internet of Devices in Election Duty
 
IRJET- Digitized Election Voting System : An Innovative Approach
IRJET-  	  Digitized Election Voting System : An Innovative ApproachIRJET-  	  Digitized Election Voting System : An Innovative Approach
IRJET- Digitized Election Voting System : An Innovative Approach
 
Online voting system full thesis project by jahir
Online voting system full thesis project by jahirOnline voting system full thesis project by jahir
Online voting system full thesis project by jahir
 
kgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdfkgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdf
 
ADVANCED BIOMETRIC - BASED VOTING SYSTEM ENSURING SECURITY AND INTELLIGENCE-1...
ADVANCED BIOMETRIC - BASED VOTING SYSTEM ENSURING SECURITY AND INTELLIGENCE-1...ADVANCED BIOMETRIC - BASED VOTING SYSTEM ENSURING SECURITY AND INTELLIGENCE-1...
ADVANCED BIOMETRIC - BASED VOTING SYSTEM ENSURING SECURITY AND INTELLIGENCE-1...
 
Report on online voting system
Report on online voting systemReport on online voting system
Report on online voting system
 
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICA SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
 
Seminar(smartvotingsystemmmmmmmmmm).pptx
Seminar(smartvotingsystemmmmmmmmmm).pptxSeminar(smartvotingsystemmmmmmmmmm).pptx
Seminar(smartvotingsystemmmmmmmmmm).pptx
 
Biometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded securityBiometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded security
 

More from GurpreetKaur447706

Product.pptx
Product.pptxProduct.pptx
Product.pptx
GurpreetKaur447706
 
Information_Services.pptx
Information_Services.pptxInformation_Services.pptx
Information_Services.pptx
GurpreetKaur447706
 
Mobile_Ticketing.pptx
Mobile_Ticketing.pptxMobile_Ticketing.pptx
Mobile_Ticketing.pptx
GurpreetKaur447706
 
Mobile_Money_Transfer.pptx
Mobile_Money_Transfer.pptxMobile_Money_Transfer.pptx
Mobile_Money_Transfer.pptx
GurpreetKaur447706
 
Mobile_banking.pptx
Mobile_banking.pptxMobile_banking.pptx
Mobile_banking.pptx
GurpreetKaur447706
 
Mobile_browsing.pptx
Mobile_browsing.pptxMobile_browsing.pptx
Mobile_browsing.pptx
GurpreetKaur447706
 
B2C Marketing.pptx
B2C Marketing.pptxB2C Marketing.pptx
B2C Marketing.pptx
GurpreetKaur447706
 
Fire_Extinguishers.pptx
Fire_Extinguishers.pptxFire_Extinguishers.pptx
Fire_Extinguishers.pptx
GurpreetKaur447706
 
Factory_act_1948.pptx
Factory_act_1948.pptxFactory_act_1948.pptx
Factory_act_1948.pptx
GurpreetKaur447706
 
PPT
PPT PPT
Ppt
PptPpt

More from GurpreetKaur447706 (11)

Product.pptx
Product.pptxProduct.pptx
Product.pptx
 
Information_Services.pptx
Information_Services.pptxInformation_Services.pptx
Information_Services.pptx
 
Mobile_Ticketing.pptx
Mobile_Ticketing.pptxMobile_Ticketing.pptx
Mobile_Ticketing.pptx
 
Mobile_Money_Transfer.pptx
Mobile_Money_Transfer.pptxMobile_Money_Transfer.pptx
Mobile_Money_Transfer.pptx
 
Mobile_banking.pptx
Mobile_banking.pptxMobile_banking.pptx
Mobile_banking.pptx
 
Mobile_browsing.pptx
Mobile_browsing.pptxMobile_browsing.pptx
Mobile_browsing.pptx
 
B2C Marketing.pptx
B2C Marketing.pptxB2C Marketing.pptx
B2C Marketing.pptx
 
Fire_Extinguishers.pptx
Fire_Extinguishers.pptxFire_Extinguishers.pptx
Fire_Extinguishers.pptx
 
Factory_act_1948.pptx
Factory_act_1948.pptxFactory_act_1948.pptx
Factory_act_1948.pptx
 
PPT
PPT PPT
PPT
 
Ppt
PptPpt
Ppt
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

ELECTRONICE VOTING MACHINE AND OLD BALLOT

  • 2. INTRODUCTION This project is designed for electronic voting machine by using the fingerprint identification method. Here voters thumb impressions are used for identifying the voters. If it matches then system will allow the voter to poll his voter and otherwise prevent the voter from polling.
  • 3. What is E-voting E- voting is an election system that allows voters to record a secret ballot and have it tabulated electronically. Votes are stored so they can be re-counted should the need arise.
  • 4. What is paper ballot Paper ballots were pieces of paper marked and supplied by voters. Before the introduction of the secret ballot, American political parties distributed ballots listing their own candidates for party supporters to deposit in ballot boxes.
  • 5. Disadvantages of e- voting  Voter could be tracked  Lack of reliability  Lack of verification  Lack of transparency  Undetectable fraud  Wholesale fraud  More expensive due to voting machines
  • 6. Advantages & Disadvantages Advantages • It is simple to use and understand. • There is a constituency link. • Provides for strong government. • Reduces the representation of fringe parties. Disadvantages  It is not proportional.  Security issues and unequal internet access.  We have to use external chip to store the votes.  We have provide continuous power supply.
  • 7. Name: Gurpreet Kaur Unit -2 Trade: Marketing Executive