This document is a seminar synopsis on global wireless e-voting submitted by Pushkar Zagade. It proposes a system where voter eligibility is determined by retina scanning and votes are transmitted via radio waves to a remote server for storage, preventing manipulation of vote counts at individual voting machines. The system aims to provide high security, authentication, reliability and prevent corruption through minimizing human involvement. Key features described include retina scanning, radio wave transmission of votes to a server, matching scans to a voter database, and generating acknowledgments to allow voting.
In the era of technology, the voting machine, which is present today, is highly unsecured. Being in the age of Computers we are compromising the security by opting for Electronic voting machine because in the present electronic voting machine is not intelligent that is it cannot determine the person came for the voting is eligible or not . That mean the whole control is kept in the hand of voting in charge officer. One more risk with the present voting machine is that anybody can increase the vote count, since the count is present in the machine itself.
In proposed machine that is “Global Wireless E-Voting” , The machine is made intelligent which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it it is store in the remote server by converting it into radio waves. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. The machine provides high level of security, authentication, reliability, and corruption -free mechanism. By this we can get result within minute after a completion of voting. Minimum manpower Utilization, hence mechanism is error free.
Global Wireless E-Voting is an intelligent system which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it is store in the remote server by converting it into radio waves.
.
The machine provides high level of security, authentication, reliability, and corruption -free mechanism. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. Results of election can be found out within minutes of completion of the election. Minimum manpower Utilization, hence mechanism is error free.
India's greatest threat is the safety of its women. Women do not feel safe in a variety of situations. This needs to be addressed as quickly as feasible. Technology evolves and develops on a daily basis, affecting how people live. As a result, the focus of this article is on modernising the technological framework in order to strengthen women's safety mechanisms. We introduce a new security method in this study to protect women during unusual behaviours. A new security technique based on a patrolling robot using the Raspberry Pi has been proposed. In this case, a night vision camera can be employed to secure any location. Various machine learning methods are applied to improve the classifier's accuracy. The findings suggest that the suggested method outperforms existing methods.
Smart Note Taker is a helpful product that satisfies the needs of the people in today's technologic and fast life. This product can be used in many ways. The Smart Note Taker provides taking fast and easy note making to people who are busy with one's self.
With the help of Smart Note Taker, people will be able to write notes in air, while being busy with their work. The written note will be stored in the memory chip of the pen, and will be able to read in digital medium after the job is done. This saves time and facilitate life.
This product is simple but powerful. It has the ability to sense 3D shapes and motions that the user tries to draw. The sensed information will be processed and transferred to the memory chip and then will be monitored on the display device. The shape that is drawn can be broadcasted to the network or sent to a mobile device.
It was the touch screens which initially created great foregone are the days when you have to fiddle with the touch screens and end scratching up. Touch screen displays are ubiquitous worldwide. Frequent touching a touchscreen display with a pointing device such as a finger can result in the gradual de-sensitization of the touchscreen to input and can ultimately lead to failure of the touchscreen. To avoid this a simple user interface for Touchless control of electrically operated equipment is being developed. Elliptic Labs innovative technology lets you control your gadgets like Computers, MP3 players or mobile phones without touching them. A simple user interface for Touchless control of electrically operated equipment. Unlike other systems which depend on distance to the sensor or sensor selection this system depends on hand and or finger motions, a hand wave in a certain direction, or a flick of the hand in one area, or holding the hand in one area or pointing with one finger for example. The device is based on optical pattern recognition using a solid state optical matrix sensor with a lens to detect hand motions. This sensor is then connected to a digital image processor, which interprets the patterns of motion and outputs the results as signals to control fixtures, appliances, machinery, or any device controllable through electrical signals.
New development in sensors, radar and ultrasonic technologies has proved to be a boon for electronics
travelling aids (ETAs). These devices are widely used by blind and physically challenged peoples. C5 laser
cane, Mowat sensor, belt and binaural sonic aid, NAV guide cane are among popular electronic travelling
aids used by blind peoples. For physically challenged person electric wheel chairs controlled by joystick,
eye movement and voice recognition are also available but they have their own limitation in terms of
operating complexity, noise environment and cost. Our paper proposes an automated innovative
wheelchair controlled by neck position of person. It uses simple LEDs, photo sensor, motor and
microcontroller to control the movement of wheelchair
Global Wireless E-Voting is an intelligent system which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it is store in the remote server by converting it into radio waves.
.
The machine provides high level of security, authentication, reliability, and corruption -free mechanism. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. Results of election can be found out within minutes of completion of the election. Minimum manpower Utilization, hence mechanism is error free.
In the era of technology, the voting machine, which is present today, is highly unsecured. Being in the age of Computers we are compromising the security by opting for Electronic voting machine because in the present electronic voting machine is not intelligent that is it cannot determine the person came for the voting is eligible or not . That mean the whole control is kept in the hand of voting in charge officer. One more risk with the present voting machine is that anybody can increase the vote count, since the count is present in the machine itself.
In proposed machine that is “Global Wireless E-Voting” , The machine is made intelligent which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it it is store in the remote server by converting it into radio waves. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. The machine provides high level of security, authentication, reliability, and corruption -free mechanism. By this we can get result within minute after a completion of voting. Minimum manpower Utilization, hence mechanism is error free.
Global Wireless E-Voting is an intelligent system which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it is store in the remote server by converting it into radio waves.
.
The machine provides high level of security, authentication, reliability, and corruption -free mechanism. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. Results of election can be found out within minutes of completion of the election. Minimum manpower Utilization, hence mechanism is error free.
India's greatest threat is the safety of its women. Women do not feel safe in a variety of situations. This needs to be addressed as quickly as feasible. Technology evolves and develops on a daily basis, affecting how people live. As a result, the focus of this article is on modernising the technological framework in order to strengthen women's safety mechanisms. We introduce a new security method in this study to protect women during unusual behaviours. A new security technique based on a patrolling robot using the Raspberry Pi has been proposed. In this case, a night vision camera can be employed to secure any location. Various machine learning methods are applied to improve the classifier's accuracy. The findings suggest that the suggested method outperforms existing methods.
Smart Note Taker is a helpful product that satisfies the needs of the people in today's technologic and fast life. This product can be used in many ways. The Smart Note Taker provides taking fast and easy note making to people who are busy with one's self.
With the help of Smart Note Taker, people will be able to write notes in air, while being busy with their work. The written note will be stored in the memory chip of the pen, and will be able to read in digital medium after the job is done. This saves time and facilitate life.
This product is simple but powerful. It has the ability to sense 3D shapes and motions that the user tries to draw. The sensed information will be processed and transferred to the memory chip and then will be monitored on the display device. The shape that is drawn can be broadcasted to the network or sent to a mobile device.
It was the touch screens which initially created great foregone are the days when you have to fiddle with the touch screens and end scratching up. Touch screen displays are ubiquitous worldwide. Frequent touching a touchscreen display with a pointing device such as a finger can result in the gradual de-sensitization of the touchscreen to input and can ultimately lead to failure of the touchscreen. To avoid this a simple user interface for Touchless control of electrically operated equipment is being developed. Elliptic Labs innovative technology lets you control your gadgets like Computers, MP3 players or mobile phones without touching them. A simple user interface for Touchless control of electrically operated equipment. Unlike other systems which depend on distance to the sensor or sensor selection this system depends on hand and or finger motions, a hand wave in a certain direction, or a flick of the hand in one area, or holding the hand in one area or pointing with one finger for example. The device is based on optical pattern recognition using a solid state optical matrix sensor with a lens to detect hand motions. This sensor is then connected to a digital image processor, which interprets the patterns of motion and outputs the results as signals to control fixtures, appliances, machinery, or any device controllable through electrical signals.
New development in sensors, radar and ultrasonic technologies has proved to be a boon for electronics
travelling aids (ETAs). These devices are widely used by blind and physically challenged peoples. C5 laser
cane, Mowat sensor, belt and binaural sonic aid, NAV guide cane are among popular electronic travelling
aids used by blind peoples. For physically challenged person electric wheel chairs controlled by joystick,
eye movement and voice recognition are also available but they have their own limitation in terms of
operating complexity, noise environment and cost. Our paper proposes an automated innovative
wheelchair controlled by neck position of person. It uses simple LEDs, photo sensor, motor and
microcontroller to control the movement of wheelchair
Global Wireless E-Voting is an intelligent system which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it is store in the remote server by converting it into radio waves.
.
The machine provides high level of security, authentication, reliability, and corruption -free mechanism. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. Results of election can be found out within minutes of completion of the election. Minimum manpower Utilization, hence mechanism is error free.
An online voting system is a web- based system that allows groups to securely conduct votes and elections in a free and fair manner. High- quality online voting systems balance ballot security, accessibility and the overall requirements of an institutions voting event. Secure Voting System is a very safe, efficient and easy to casting of vote. In this report, I analysed the work in the International Journal of Applied Engineering Research Volume 13, Number 11 (2018), which was titled, “A Secure E- Voting System using RSA and Md5 Algorithms and Random Number Generators”. RSA and MD 5 Algorithms have been used for the online voting system for security purpose. This was achieved in a total three steps required for electronic registration of voter, vote uploading and result display. Though, the algorithms provide some e- voting system security requirements but there are some deficiencies that makes it vulnerable to attacks or collision resistance. Though, the RSA and MD 5 algorithms provide certain amount of bit and data, so calculation takes more time for encryption. The paper is therefore a report on the analysis of the algorithms and its deficiencies in securing electronic voting system.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Traditionally, in paper based election,voters cast their vote to select right candidate, where they simply put their vote in voting box and at the end of the voting day the votes are going to be count manually. This process was much time consuming as well as was erroneous. To overcome this drawback Electronic Voting Machine (EVM) was introduced. In EVM, Voter cast their vote by pressing the voting button which was on EVM. The Major advantage of EVM system is , the votes are counted automatically instead of manually. But the drawback of EVM machine was, the votes may get manipulated and was not secure. So to overcome all these drawbacks, research on biometric based voting system is going on. This Paper focuses on survey of different voting system using Fingerprint biometric through different algorithms and methods.
is work's main purpose is to provide a secure voting system that fits all of the voting process' requirements, including authentication, confidentiality, and morality. Simplicity is also required to guarantee that ordinary people participate. Other factors to consider are dependability, convenience, flexibility, mobility, and affordability, in addition to security and simplicity. We wanted to build a system where the whole encryption and decryption of the ballots is transparent and nevertheless safe to ensure that the user utilizes a secure voting system.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Electronic voting systems have the potential to improve traditional voting procedures by providing added convenience and flexibility to the voter. Numerous electronic voting schemeshave been proposed in the past, but most of them have failed to provide voter uthentication in an efficient and transparent way. On the other hand, GSM (Global System for Mobile communications) is the most widely used mobile networking standard. There are more than one
billion GSM users worldwide that represent a large user potential not for mobile telephony, but also for other mobile applications that exploit the mature GSM infrastructure. In this paper, theelectronic voting scheme using GSM mobile technology is presented. By integrating anelectronic voting scheme with the GSM infrastructure, we are able to exploit existing GSM authentication mechanisms and provide enhanced voter authentication and mobility while maintaining voter privacy. The objective of this project is to avoid the queue in voting time. Voting machines provide easy access to cast the vote by using mobile phone.
Embedded Based Electronic Voting Machine Using PasswordIJERA Editor
The Electronic voting machine plays a key role in elections. The Earlier EVM’S needs more man power, time and mislead the voting scenario due to influence of local people vote and after voting the other may vote only after the Password is set then the system gets ready to accept the polling. After completion of the polling we may make the system to reset .If the person is authenticated then the vote is issued and the polling process is done using buzzer system, else that denies the process. At every regular intervals of time the polled votes are recorded and give the count that how many votes are casted through LCD. This system gives an efficient way to conduct elections and display the results on the same day.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
The Art Pastor's Guide to Sabbath | Steve Thomason
GLOBAL WIRELESS E-VOTING
1. PushkarZagade
A
Seminar Synopsis
On
“Global Wireless E-Voting”
Submitted to
JSPM’s
JAYAWANTRAO SAWANT COLLEGE OF ENGINEERING
PUNE 28
SavitribaiPhule Pune University, Pune
In Partial Fulfillment of
T.E. Computer Engineering
T.E. Semester II
Submitted by
Mrs. Pushkar Girish Zagade
Under the Guidance of
Prof. Ishwar Kalbandi
Department Of Computer Engineering
JSPM’s
JAYAWANTRAO SAWANT COLLEGE OF ENGINEERING
Academic Year 2014-15
1
2. PushkarZagade
Abstract
With significant U.S. federal funds now available to replace outdated
punch-card and mechanical voting systems, municipalities and states through-
out the U.S. are adopting paperless electronic voting. systems from a number
of different vendors. We present a security analysis of the source code to one
such machine used in a significant share of the market. Our analysis shows
that this voting system is far below even the most minimal security stan-
dards applicable in other contexts. We identify several problems including
unauthorized privilege escalation, incorrect use of cryptography, vulnerabil-
ities to network threats, and poor software development processes. We show
that voters, without any insider privileges, can cast unlimited votes without
being detected by any mechanisms within the voting terminal software. Fur-
thermore, we show that even the most serious of our outsider attacks could
have been discovered and executed without access to the source code. In
the face of such attacks, the usual worries about insider threats are not the
only concerns; outsiders can do the damage. That said, we demonstrate
that the insider threat is also quite considerable, showing that not only can
an insider, such as a poll worker, modify the votes, but that insiders can
also violate voter privacy and match votes with the voters who cast them.
We conclude that this voting system is unsuitable for use in a general elec-
tion. Any paperless electronic voting system might suffer similar flaws, de-
spite any certification it could have otherwise received. We suggest that the
best solutions are voting systems having a voter-verifiable audit trail,where
a computerized voting system might print a paper ballot that can be read and
verified by the voter.
2
3. PushkarZagade
1 Introduction
In the era of technology, the voting machine, which is present today, is highly
unsecured. Being in the age of Computers we are compromising the security
by opting for Electronic voting machine because in the present electronic vot-
ing machine is not intelligent that is it cannot determine the person came for the
voting is eligible or not . That mean the whole control is kept in the hand of vot-
ing in charge officer. One more risk with the present voting machine is that any
body can increase the vote count, since the count is present in the machine itself.
In proposed machine that is Global Wireless E-Voting , the machine is made
intelligent which can determine the eligibility of the voter by scanning the eye
pattern and also the vote count is not kept into the same machine itself instead of
it it is store in the remote server by converting it into radio waves. Here there is no
chance of increasing the vote count of machine. Even in case of damage to voting
machine there will not be harm to continuity of the election process.
2 Working Of Whole System
Whenever voters enter to voting booth then he will be instructed to directly
look at retina scanning machine at this time the machine scans the retina. once
retina scanning properly confirmed then it sent signal to the voting machine as to
accept the vote it will be powered on .then voter is made to vote. Now the whole
data including the retina pattern is sent to interfacing device which convert into
radio waves of mobile frequency range and these radio waves are sent to mobile
tower and then to the remote server, where the authentication and voters identi-
fication is stored into a secured database.This will helpfull for us.The received
data is first converted into digital format from the radio waves through the in-
terface device kept at the server side, and then retina pattern and vote separated.
Next the retina pattern is matched against the existing database .If match is
found then flag is check which indicates its voting status i.e. if the voter is not
voted yet then +veack is send to the mobile tower and then to the corresponding
voting machine. This ack is recognized by the receiver kept at the voter side and
machine is made to scan next retina pattern and vote, otherwise if -veack then alert
alarm is made to ring.So this is working of whole global wireless e-voting system.
3
4. PushkarZagade
3 Application
• We can use big data to collect large set of informations and use it for data ware
house purpose.
• Using this technique we can predict the weather information of next 2,3 month
in advance . Using this we can avoid the delays as well as cancellation of
flight due to bad weather.
• Big data can also use for data mining purpose.
• By using big data we can analyse the large set of information.
4 Conclusion
Thus this machine can be used for any level voting purpose. The machine pro-
vides high level of security, authentication, reliability, and corruption -free mech-
anism. By this we can get result with in minute after a completion of voting..
Minimum manpower Utilization, hence mechanism is error free.
4
5. PushkarZagade
References
[1]C. Lambrinoudakis, S. Kokolakis, M. Karyda, V. Tsoumas,
D. Gritzalis, and S. Katsikas, Electronic Voting Systems:
Security Implications of the Administrative Workflow, in
DEXA 03: Proceedings of the 14th International Work-
shop on Database and Expert Systems Applications. Wash-
ington, DC, USA: IEEE Computer Society, 2003, p. 467.
[2] M. Volkamer and M. McGaley, Requirements and
Evaluation Procedures for eVoting, in ARES 07: Pro-
ceedings of the The Second International Conference
on Availability, Reliability and Security. Washington,
DC, USA: IEEE Computer Society, 2007, pp. 895902.
[3] T. Kohno, A. Stubblefield, A. Rubin, and D.
Wallach, Analysis of an Electronic Voting System,
in IEEE Symposium on Security and Privacy, 2004.
[4]K. Weldemariam and A. Villafiorita, Formal Procedural
Security Modeling and Analysis, in CRiSIS 08: Third Inter-
national Conference on Risks and Security of Internet and
Systems. Washington, DC, USA: IEEE, October 2008, pp. 249254.
[5] T. Kohno, A. Stubblefield, A. D. Rubin, and D. S.
Wallach, Analysis of an Electronic Voting System, Secu-
rity and Privacy, IEEE Symposium on, vol. 0, p. 27, 2004.
[6]M. Bellare, R. Canetti, and H. Krawczyk. Key-
ing hash functions for message authentication. In N.
Koblitz, editor, Advances in Cryptology CRYPTO 96,
volume 1109 of Lecture Notes in Computer Science,
pages 115. Springer-Verlag, Berlin Germany, Aug. 1996.
[7] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway.A con-
crete security treatment of symmetric encryption. In Proceedings
of the 38th Annual Symposium on Foundations of Computer
Science, pages 394403. IEEE Computer Society Press, 1997.
[8] M. Bellare and C. Namprempre. Authenticated encryption:
5
6. PushkarZagade
Relations among notions and analysis of the generic composition
paradigm. In T. Okamoto, editor, Advances in Cryptology ASI-
ACRYPT 2000, volume 1976 of Lecture Notes in Computer Sci-
ence, pages 531545. Springer-Verlag, Berlin Germany, Dec. 2000.
[9]California Internet Voting Task Force. A Re-
port on the Feasibility of Internet Voting,
Jan. 2000.http: //www.ss.ca.gov/executive/ivote/.
[10] Voting: What Is; What Could Be,
July 2001. http://www.vote.caltech.edu/Reports/.
6