SlideShare a Scribd company logo
CHAPTER-1
INTRODUCTION
In India election has supreme weight-age. So to make it secured and efficient in
the vision of modern technology we are “Global Wireless E-Voting”.
1.1 Why we are looking for it?
• Since now days voting system is replaced by electronic machine to carry out
voting.
• Now in a present system each and every section is given a electronic machine
which stores the votes of the people how have voted for the particular candidate.
• Control of present system is given to the in charge officer. He only check for the
eligibility of the candidates and allow for the voting.
• Finally we collect all the voting machine at a place and go for counting.
1.2 Disadvantages of the present system:
• After voting if any technical problems or damage occurs with the machines it may
leads to the re election.
• The machine is not able to recognize the eligibility of a candidate, so the corrupted
officers may misguide the people.
• The corrupted officers may increase the count of the voting.
• During transportation of the machines the in charge person can change the status
of machines and even may destroy.
• This system is not a cost effective one. Since we need security, in charge officers,
secured place for counting and election place.
• The person from any other region cannot vote in for a candidate of other region.
• The voting take place where the machine is located.
CHAPTER-2
PROPOSED SYSTEM
• In our system we trying to keep counting of votes in to a remote secured system.
• In this system we are using a electronic circuit which enable the voter to vote and
transfer this vote to the remote system by converting it to radio wave through the
mobile towers.
• Our machine can check the eligibility of the candidate by itself , so there is no
question of corruption . machine itself is automated to check the eligibility of the
candidates.
• Here we need not to go for the re election even if the machine is damaged .
• A person even can vote from a mobile system and also from Internet.
• We can vote from any where even though being an voter of another region .
2
CHAPTER-3
BLOCK DIAGRAM
5
5
6 Vote flow channel
Mobile tower
1. Radio waves representing scanned retina pattern and vote to Mobile tower.
2. Radio waves representing scanned retina pattern and vote to remote server.
3. Acknowledgement (+ve or –ve) from the server to mobile tower.
4. Acknowledgement (+ve or –ve) from mobile tower to Interface device.
5. Ready signal if retina is scanned properly to voting machine. And if –ve signal
then alert alarm will be activated.
3
Voting
machine Retina
scanne
r
Interface
Device
Ready signal
Server or
Distributed LAN
+ Interface
device
1
4
2
3
Alert
alarm
6. Accepted vote is made to flow to the interface device.
3.1 Detail Diagram of voting machine
The voting machine is actually a device which generate the different voltages for
different votes these voltages are fed to the (ADC) which is then converted to digital bits
then can be converted to radio waves.
The detail diagram is overleaf.
4
Final Out put
Antenna
5
Mixer
Retina
scanner
Security
bits gen.
Comp.
Terminal
Interface
device
Radio
Wave
Gen
CHAPTER-4
BLOCK DIAGRAM OF CLIENT SIDE CIRCUIT
CHAPTER-5
EYE RETINA SCANNING
The eye retina machine be a simple web cam or device which can capture the
images effectively .the captured image will be represented in the form of a matrix where
each pixel represents 24-bit (RGB, 8+8+8 format) let us see and understand
Here for e.g.:
here the matrix pattern of this type of picture may be as
R G B R G B R G B
[12 a1 15] [11 21 54] [25 f4 5c]
[ 2d 1c 5A] [ 99 85 57] [2c fa b3]
[1b b1 a2] [11 b1 ac] [50 b4 5F]
[CA 1f 3c] [11 2c d4] [03 ca e5]
6
5.1 INTERFACE DEVICE
This is an electronic kit which converts the input digital signals such as (retina
pattern votes+ secure bits) to radio waves.
CHAPTER-6
WORKING OF WHOLE SYSTEM
Whenever voters enter to voting booth then he will be instructed to directly look
at retina scanning machine at this time the machine scans the retina. once retina scanning
properly confirmed then it sent signal to the voting machine as to accept the vote it will
be powered on .then voter is made to vote. Now the whole data including the retina
pattern is sent to interfacing device which convert into radio waves of mobile frequency
range and these radio waves are sent to mobile tower and then to the remote server, where
the authentication and voters identification is stored into a secured database. The received
data is first converted into digital format from the radio waves through the interface
device kept at the server side, and then retina pattern and vote separated . Next the retina
pattern is matched against the existing database .If match is found then flag is check
which indicates its voting status i.e if the voter is not voted yet then +ve ack is send to the
mobile tower and then to the corresponding voting machine. This ack is recognized by
the receiver kept at the voter side and machine is made to scan next retina pattern and
vote , otherwise if –ve ack then alert alarm is made to ring .
6.1 HURDLES IN THE PATH OF IMPLEMENTATION
There are several more issues that we have to consider along the Implementation
such as
 Security
 Efficiency
 Geographical Problems
7
CHAPTER-7
ECURITY
The radio waves of a mobile frequency consist of Retina pattern and vote can be
Generated by means of external source .That’s why we need to provide some sot of
security to avoid this problem . One of the idea to solve this problem is CDMA (which
will be explained later ) and another technique is inserting security bits at regular interval
of time during the transmission of radio waves (Ex.2 msec) .At the server side after the
given interval (2 msec ) security bits are checked (ex 1001) . In case of positive
confirmation we can accept as valid vote, other wise simply rejected.
Another problem is that one may trap the radio waves in between and can
determine the person and the vote, this may disclose the result of the election before the
completion of the voting process. To avoid this problem we can go for applying the
efficient and complex encryption algorithm so that the transparency of data can be hidden
and the server side the encrypted data can be again decrypted and original data can
retrieved this make the trapping of wave meaningless .The encryption algorithm can be
termed as Key Complex Algorithm, which is as follows,
• First it finds the length of the string.
• Generate the random numbers equal to the length of the string.
• Add the corresponding Characters from the given string and random values.
Eg. KSHITIJ
Let this be the given words.
8
The length of the given string is 7. So let us Generate the 7 random numbers .Let
numbers be
A) 8 12 34 4 11 9 26 .The ascii value for KSHITIJ are
K S H I T I J
B) 75 83 72 73 84 73 74
Add corresponding A) and B) values as
8+75 12+83 34+72 4+73 11+84 9+73 26+74
83 95 106 77 95 82 100
The corresponding ascii character for these are
S _ j M _ R d
The corresponding characters for random values
ℵ ϑ θ ♥ ♦ ↔ ψ
Finally encrypted data as
S ℵ _ ϑ j θ M ♥ _ ♦ R ↔ d ψ
The final encrypted data is formed in such a way that the random data at the even place
and rest at odd place. This makes Decryption very easy. Simply subtract the character at
even place from odd place character.
9
CHAPTER-8
EFFICIENCY
Whenever the data which is sent from the voter (client) side, it is in the large amount,
this delays a bit a voting system and the data that is received at server side is in the
multiple access mode i.e more than one client is sending the data . To over come this
problem the following
1. Applying compression Algorithms at the Client and server side so that to decrease
the data transfer. Compression technique such as JPEG compression or any other
Compression.
2. Instead of using single server PC we will go for distributed Operating system
environment with multiple servers. This makes the job sharing and processing
faster which leads to fast responds in case of Multiple Access Environment
3. To solve the concurrency problem in case of Multiple access environment we will
use CDMA technique which is as follow
10
Key 1
data 1
Key 2
data 2
Key 4
data 4
Key 3
data 3
k1*d1+
k2*d2 +
k3*d3+
k4*d4
Here the key values are orthogonal to each other i.e k1*k2=0 and k1*k1=1 i.e if
any tries to decode the information with any other key the data will be vanished as the
data will be in the form d1*k1.
If you try to decode with K2 then effect will be as d1*k1*k2=0. this will vanish
the data .And if correct decoding key i.e k1 is used then decoding will be d1*k1*k1=d1.
this decodes the data correctly. As per the controlling concurrency for multiple access the
data from all the nodes is accepted as k1*d1+k2*d2 +k3*d3+k4*d4.In this case if you
want the data corresponding to the second node then simply multiply the whole equation
with the k2. This will give d2 as
(k1*d1+k2*d2 +k3*d3+k4*d4)*k2=d2 . So by this we can show that any numbers of
nodes are allowed to send the data, the server will accept all the data and which ever has
to be extracted will be just multiplied with corresponding key. This gets the
corresponding data. Hence the concept of Multiple access.
11
CHAPTER-9
GEOGRAPHICAL PROBLEMS
This is the problem regarding the area where technical facilities like mobile tower or
Internet service is not present. In this case will convert the vote and retina pattern into the
electrical information and pass it through the electrical conductors until we can reach the
area where the technical facilities like internet or mobile tower is available, and if only
internet facility is available is then we can convert this electrical information to digital
means and with these data using computers connected to internet we can pass the vote
and retina pattern. Here the eye scanner will be web cam.
Future Enhancements
This project can be enhanced to work over the mobiles that is voting is made
possible through the mobile through SMS.
This machine can be made vote through the INTERNET.
12
CHAPTER-10
CONCLUSION
• Thus this machine can be used for any level voting purpose. The machine
provides high level of security, authentication, reliability, and corruption -free
mechanism.
• By this we can get result with in minute after a completion of voting.. Minimum
manpower Utilization, hence mechanism is error free.
13
CHAPTER-11
REFERENCES
• Electronic circuit by Boylestead.
• Digital Integrated Electronics by Herbert Taub and Donald Schilling.
• Adini, Y., Moses, Y., and Ullman, S. (1997) Face recognition: the problem of
compensating for changes in illumination direction. Trans. Pat. Anal. Mach. Intell.
19(7): 721-732.
• Belhumeur, P.N., Hespanha, J.P., and Kriegman, D.J. (1997) Eigenfaces vs.
Fisherfaces: Recognition using class-speci_c linear projection. Trans. Pat. Anal.
Mach. Intell. 19(7): 711-720.
• Berggren, L. (1985) Iridology: A critical review. Acta Ophthalmologica 63(1): 1-8.
• Daugman, J. (1988) Complete discrete 2D Gabor transforms by neural networks for
image analysis and compression. Trans. Acous. Sp. Sig. Proc. 36(7): 1169-1179.
• Phillips, P.J., Martin, A., Wilson, C.L., and Przybocki, M. (2000) An introduction to
evaluating biometric systems. Computer 33(2): 56-63.
• Simon, A., Worthen, D.M., and Mitas, J.A. (1979) An evaluation of iridology.
Journal of the American Medical Association 242: 1385-1387.
• Viveros, R., Balasubramanian, K., and Balakrishnan, N. (1984) Binomial and
negative binomial analogues under correlated Bernoulli trials.
14

More Related Content

What's hot

Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
Abhishek Abhi
 
Global Wirelesse Voting Machine
Global Wirelesse Voting MachineGlobal Wirelesse Voting Machine
Global Wirelesse Voting Machine
Ankita Khadatkar
 
Futex ppt
Futex  pptFutex  ppt
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar report
Jeevan Kumar D
 
Pill Camera ppt
Pill Camera pptPill Camera ppt
Pill Camera ppt
Avinash Kunapareddy
 
Global Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scanGlobal Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scan
Shubh Agarwal
 
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEMAUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
Anamika Vinod
 
Traffic sign recognition
Traffic sign recognitionTraffic sign recognition
Traffic sign recognition
AKR Education
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
Lovely Professional University
 
Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
-jyothish kumar sirigidi
 
silent sound technology final report(17321A0432) (1).pdf
silent sound technology final report(17321A0432) (1).pdfsilent sound technology final report(17321A0432) (1).pdf
silent sound technology final report(17321A0432) (1).pdf
ssuser476810
 
Silent sound technology NEW
Silent sound technology NEW Silent sound technology NEW
Silent sound technology NEW
Neha Tyagi
 
Electronic Paper Technology Report
Electronic Paper Technology ReportElectronic Paper Technology Report
Electronic Paper Technology Report
PrakharAgrawal75
 
Seminar report Of Touchless Touchscreen
Seminar report Of Touchless TouchscreenSeminar report Of Touchless Touchscreen
Seminar report Of Touchless Touchscreen
Lovely Professional University
 
silent sound technology
silent sound technologysilent sound technology
silent sound technology
kamesh0007
 
Final project report on evm 16.04.2019
Final project report on evm 16.04.2019Final project report on evm 16.04.2019
Final project report on evm 16.04.2019
mhjit
 
Screenless display report
Screenless display reportScreenless display report
Screenless display report
Vikas Kumar
 
Jini technology ppt
Jini technology pptJini technology ppt

What's hot (20)

E voting
E votingE voting
E voting
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
 
Global Wirelesse Voting Machine
Global Wirelesse Voting MachineGlobal Wirelesse Voting Machine
Global Wirelesse Voting Machine
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar report
 
Pill Camera ppt
Pill Camera pptPill Camera ppt
Pill Camera ppt
 
Global Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scanGlobal Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scan
 
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEMAUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
 
Traffic sign recognition
Traffic sign recognitionTraffic sign recognition
Traffic sign recognition
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
 
silent sound technology final report(17321A0432) (1).pdf
silent sound technology final report(17321A0432) (1).pdfsilent sound technology final report(17321A0432) (1).pdf
silent sound technology final report(17321A0432) (1).pdf
 
Silent sound technology NEW
Silent sound technology NEW Silent sound technology NEW
Silent sound technology NEW
 
Electronic Paper Technology Report
Electronic Paper Technology ReportElectronic Paper Technology Report
Electronic Paper Technology Report
 
Seminar report Of Touchless Touchscreen
Seminar report Of Touchless TouchscreenSeminar report Of Touchless Touchscreen
Seminar report Of Touchless Touchscreen
 
silent sound technology
silent sound technologysilent sound technology
silent sound technology
 
Final project report on evm 16.04.2019
Final project report on evm 16.04.2019Final project report on evm 16.04.2019
Final project report on evm 16.04.2019
 
Screenless display report
Screenless display reportScreenless display report
Screenless display report
 
Jini technology ppt
Jini technology pptJini technology ppt
Jini technology ppt
 
M voting
M votingM voting
M voting
 

Viewers also liked

Xmax Technology Doc
Xmax Technology DocXmax Technology Doc
Xmax Technology Doc
Charan Reddy Mutyala
 
XG Technology
XG TechnologyXG Technology
XG Technology
The Loudcrowd
 
xG Technology Cognitive Radio Rural Broadband Wireless Symposium Jan 2013
xG Technology Cognitive Radio Rural Broadband Wireless Symposium Jan 2013xG Technology Cognitive Radio Rural Broadband Wireless Symposium Jan 2013
xG Technology Cognitive Radio Rural Broadband Wireless Symposium Jan 2013
xG Technology, Inc.
 
GLOBAL WIRELESS E_VOTING(JAYESH J)
GLOBAL WIRELESS E_VOTING(JAYESH J)GLOBAL WIRELESS E_VOTING(JAYESH J)
GLOBAL WIRELESS E_VOTING(JAYESH J)
The federation of lazy jobless people (FLJP)
 
Xmax
XmaxXmax
xG Technology Presentation March 2014 Cognitive Radio Networks for Public Sa...
xG Technology Presentation  March 2014 Cognitive Radio Networks for Public Sa...xG Technology Presentation  March 2014 Cognitive Radio Networks for Public Sa...
xG Technology Presentation March 2014 Cognitive Radio Networks for Public Sa...
xG Technology, Inc.
 
Cognitive Radio Networks for Emergency Communications June 2012
Cognitive Radio Networks for Emergency Communications June 2012Cognitive Radio Networks for Emergency Communications June 2012
Cognitive Radio Networks for Emergency Communications June 2012
xG Technology, Inc.
 
Xmax technology
Xmax technologyXmax technology
Xmax technology9758582456
 
Navidad
NavidadNavidad
Navidad
fgarciaal
 
globel wireless e votingSlides
globel wireless e votingSlidesglobel wireless e votingSlides
globel wireless e votingSlides
Binumon Joseph
 
Cognitive Radio for Public Safety Applications September 2012
Cognitive Radio for Public Safety Applications September 2012Cognitive Radio for Public Safety Applications September 2012
Cognitive Radio for Public Safety Applications September 2012
xG Technology, Inc.
 
Cognitive Radio: When might it Become Economically and Technically Feasible?
Cognitive Radio: When might it Become Economically and Technically Feasible? Cognitive Radio: When might it Become Economically and Technically Feasible?
Cognitive Radio: When might it Become Economically and Technically Feasible?
Jeffrey Funk
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
Rahul Sidhu
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
Vatsala Sharma
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesKuncoro Wastuwibowo
 
What is Cognitive Radio?
What is Cognitive Radio? What is Cognitive Radio?
What is Cognitive Radio?
xG Technology, Inc.
 
Blue brain
Blue brainBlue brain
Blue brain
Abhishek Abhi
 
Body Area Network
Body Area NetworkBody Area Network
Body Area Network
Deepak Chandra Pant
 
Samsung Electronics Strategy & Business Model
Samsung Electronics Strategy & Business ModelSamsung Electronics Strategy & Business Model
Samsung Electronics Strategy & Business Model
Evgenii Gvozdev
 

Viewers also liked (20)

Xmax Technology Doc
Xmax Technology DocXmax Technology Doc
Xmax Technology Doc
 
XG Technology
XG TechnologyXG Technology
XG Technology
 
xG Technology Cognitive Radio Rural Broadband Wireless Symposium Jan 2013
xG Technology Cognitive Radio Rural Broadband Wireless Symposium Jan 2013xG Technology Cognitive Radio Rural Broadband Wireless Symposium Jan 2013
xG Technology Cognitive Radio Rural Broadband Wireless Symposium Jan 2013
 
GLOBAL WIRELESS E_VOTING(JAYESH J)
GLOBAL WIRELESS E_VOTING(JAYESH J)GLOBAL WIRELESS E_VOTING(JAYESH J)
GLOBAL WIRELESS E_VOTING(JAYESH J)
 
Xmax
XmaxXmax
Xmax
 
xG Technology Presentation March 2014 Cognitive Radio Networks for Public Sa...
xG Technology Presentation  March 2014 Cognitive Radio Networks for Public Sa...xG Technology Presentation  March 2014 Cognitive Radio Networks for Public Sa...
xG Technology Presentation March 2014 Cognitive Radio Networks for Public Sa...
 
Cognitive Radio Networks for Emergency Communications June 2012
Cognitive Radio Networks for Emergency Communications June 2012Cognitive Radio Networks for Emergency Communications June 2012
Cognitive Radio Networks for Emergency Communications June 2012
 
Xmax technology
Xmax technologyXmax technology
Xmax technology
 
Navidad
NavidadNavidad
Navidad
 
globel wireless e votingSlides
globel wireless e votingSlidesglobel wireless e votingSlides
globel wireless e votingSlides
 
Cognitive Radio for Public Safety Applications September 2012
Cognitive Radio for Public Safety Applications September 2012Cognitive Radio for Public Safety Applications September 2012
Cognitive Radio for Public Safety Applications September 2012
 
Cognitive Radio: When might it Become Economically and Technically Feasible?
Cognitive Radio: When might it Become Economically and Technically Feasible? Cognitive Radio: When might it Become Economically and Technically Feasible?
Cognitive Radio: When might it Become Economically and Technically Feasible?
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main Issues
 
E voting
E voting E voting
E voting
 
What is Cognitive Radio?
What is Cognitive Radio? What is Cognitive Radio?
What is Cognitive Radio?
 
Blue brain
Blue brainBlue brain
Blue brain
 
Body Area Network
Body Area NetworkBody Area Network
Body Area Network
 
Samsung Electronics Strategy & Business Model
Samsung Electronics Strategy & Business ModelSamsung Electronics Strategy & Business Model
Samsung Electronics Strategy & Business Model
 

Similar to Global Wireless E-Voting Documentation

Global wireless e voting
Global wireless e votingGlobal wireless e voting
Global wireless e votingDibya Ranjan
 
Global wireless E-voting
Global wireless E-votingGlobal wireless E-voting
Global wireless E-voting
Mohd Khan
 
seminar ppt 06.pptx
seminar ppt 06.pptxseminar ppt 06.pptx
seminar ppt 06.pptx
kunalc9022
 
Global wireless electronic voting system
Global wireless electronic voting systemGlobal wireless electronic voting system
Global wireless electronic voting system
GunturiPrasanna1
 
Global Wireless e-voting
Global Wireless e-votingGlobal Wireless e-voting
Global Wireless e-voting
Megha Mahindrakar
 
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
IJERA Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
IRJET- Smart Card Based Automated Toll Plaza System
IRJET-  	  Smart Card Based Automated Toll Plaza SystemIRJET-  	  Smart Card Based Automated Toll Plaza System
IRJET- Smart Card Based Automated Toll Plaza System
IRJET Journal
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
IRJET Journal
 
Performance Evaluation of MC-CDMA for Fixed WiMAX with Equalization
Performance Evaluation of MC-CDMA for Fixed WiMAX with EqualizationPerformance Evaluation of MC-CDMA for Fixed WiMAX with Equalization
Performance Evaluation of MC-CDMA for Fixed WiMAX with Equalization
IRJET Journal
 
Data link layer
Data link layerData link layer
Data link layer
Hassanein Alwan
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
ijceronline
 
337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf
337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf
337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf
Admiralkabman
 
( KEVIN SONI )DATA ACQUISITION SYSTEM
( KEVIN SONI )DATA ACQUISITION SYSTEM ( KEVIN SONI )DATA ACQUISITION SYSTEM
( KEVIN SONI )DATA ACQUISITION SYSTEM
Kevin Soni
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
Ronoh Kennedy
 
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
IJERA Editor
 
Cisco Activity
Cisco ActivityCisco Activity
Cisco Activity
Ashley Davis
 
Electronic Toll Collection
Electronic Toll CollectionElectronic Toll Collection
Electronic Toll CollectionAditya Pandey
 

Similar to Global Wireless E-Voting Documentation (20)

Global wireless e voting
Global wireless e votingGlobal wireless e voting
Global wireless e voting
 
Global wireless E-voting
Global wireless E-votingGlobal wireless E-voting
Global wireless E-voting
 
seminar ppt 06.pptx
seminar ppt 06.pptxseminar ppt 06.pptx
seminar ppt 06.pptx
 
Global wireless electronic voting system
Global wireless electronic voting systemGlobal wireless electronic voting system
Global wireless electronic voting system
 
Global Wireless e-voting
Global Wireless e-votingGlobal Wireless e-voting
Global Wireless e-voting
 
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Smart Card Based Automated Toll Plaza System
IRJET-  	  Smart Card Based Automated Toll Plaza SystemIRJET-  	  Smart Card Based Automated Toll Plaza System
IRJET- Smart Card Based Automated Toll Plaza System
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
 
Performance Evaluation of MC-CDMA for Fixed WiMAX with Equalization
Performance Evaluation of MC-CDMA for Fixed WiMAX with EqualizationPerformance Evaluation of MC-CDMA for Fixed WiMAX with Equalization
Performance Evaluation of MC-CDMA for Fixed WiMAX with Equalization
 
Data link layer
Data link layerData link layer
Data link layer
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf
337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf
337387524-136445446-SMS-BASED-VOTING-MACHINE-Project-Report-pdf.pdf
 
( KEVIN SONI )DATA ACQUISITION SYSTEM
( KEVIN SONI )DATA ACQUISITION SYSTEM ( KEVIN SONI )DATA ACQUISITION SYSTEM
( KEVIN SONI )DATA ACQUISITION SYSTEM
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
Analysis and Implementation of Hard-Decision Viterbi Decoding In Wireless Com...
 
Cisco Activity
Cisco ActivityCisco Activity
Cisco Activity
 
Electronic Toll Collection
Electronic Toll CollectionElectronic Toll Collection
Electronic Toll Collection
 

Recently uploaded

The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 

Recently uploaded (20)

The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 

Global Wireless E-Voting Documentation

  • 1. CHAPTER-1 INTRODUCTION In India election has supreme weight-age. So to make it secured and efficient in the vision of modern technology we are “Global Wireless E-Voting”. 1.1 Why we are looking for it? • Since now days voting system is replaced by electronic machine to carry out voting. • Now in a present system each and every section is given a electronic machine which stores the votes of the people how have voted for the particular candidate. • Control of present system is given to the in charge officer. He only check for the eligibility of the candidates and allow for the voting. • Finally we collect all the voting machine at a place and go for counting. 1.2 Disadvantages of the present system: • After voting if any technical problems or damage occurs with the machines it may leads to the re election. • The machine is not able to recognize the eligibility of a candidate, so the corrupted officers may misguide the people. • The corrupted officers may increase the count of the voting. • During transportation of the machines the in charge person can change the status of machines and even may destroy. • This system is not a cost effective one. Since we need security, in charge officers, secured place for counting and election place.
  • 2. • The person from any other region cannot vote in for a candidate of other region. • The voting take place where the machine is located. CHAPTER-2 PROPOSED SYSTEM • In our system we trying to keep counting of votes in to a remote secured system. • In this system we are using a electronic circuit which enable the voter to vote and transfer this vote to the remote system by converting it to radio wave through the mobile towers. • Our machine can check the eligibility of the candidate by itself , so there is no question of corruption . machine itself is automated to check the eligibility of the candidates. • Here we need not to go for the re election even if the machine is damaged . • A person even can vote from a mobile system and also from Internet. • We can vote from any where even though being an voter of another region . 2
  • 3. CHAPTER-3 BLOCK DIAGRAM 5 5 6 Vote flow channel Mobile tower 1. Radio waves representing scanned retina pattern and vote to Mobile tower. 2. Radio waves representing scanned retina pattern and vote to remote server. 3. Acknowledgement (+ve or –ve) from the server to mobile tower. 4. Acknowledgement (+ve or –ve) from mobile tower to Interface device. 5. Ready signal if retina is scanned properly to voting machine. And if –ve signal then alert alarm will be activated. 3 Voting machine Retina scanne r Interface Device Ready signal Server or Distributed LAN + Interface device 1 4 2 3 Alert alarm
  • 4. 6. Accepted vote is made to flow to the interface device. 3.1 Detail Diagram of voting machine The voting machine is actually a device which generate the different voltages for different votes these voltages are fed to the (ADC) which is then converted to digital bits then can be converted to radio waves. The detail diagram is overleaf. 4
  • 5. Final Out put Antenna 5 Mixer Retina scanner Security bits gen. Comp. Terminal Interface device Radio Wave Gen CHAPTER-4 BLOCK DIAGRAM OF CLIENT SIDE CIRCUIT
  • 6. CHAPTER-5 EYE RETINA SCANNING The eye retina machine be a simple web cam or device which can capture the images effectively .the captured image will be represented in the form of a matrix where each pixel represents 24-bit (RGB, 8+8+8 format) let us see and understand Here for e.g.: here the matrix pattern of this type of picture may be as R G B R G B R G B [12 a1 15] [11 21 54] [25 f4 5c] [ 2d 1c 5A] [ 99 85 57] [2c fa b3] [1b b1 a2] [11 b1 ac] [50 b4 5F] [CA 1f 3c] [11 2c d4] [03 ca e5] 6
  • 7. 5.1 INTERFACE DEVICE This is an electronic kit which converts the input digital signals such as (retina pattern votes+ secure bits) to radio waves. CHAPTER-6 WORKING OF WHOLE SYSTEM Whenever voters enter to voting booth then he will be instructed to directly look at retina scanning machine at this time the machine scans the retina. once retina scanning properly confirmed then it sent signal to the voting machine as to accept the vote it will be powered on .then voter is made to vote. Now the whole data including the retina pattern is sent to interfacing device which convert into radio waves of mobile frequency range and these radio waves are sent to mobile tower and then to the remote server, where the authentication and voters identification is stored into a secured database. The received data is first converted into digital format from the radio waves through the interface device kept at the server side, and then retina pattern and vote separated . Next the retina pattern is matched against the existing database .If match is found then flag is check which indicates its voting status i.e if the voter is not voted yet then +ve ack is send to the mobile tower and then to the corresponding voting machine. This ack is recognized by the receiver kept at the voter side and machine is made to scan next retina pattern and vote , otherwise if –ve ack then alert alarm is made to ring . 6.1 HURDLES IN THE PATH OF IMPLEMENTATION There are several more issues that we have to consider along the Implementation such as  Security  Efficiency  Geographical Problems 7
  • 8. CHAPTER-7 ECURITY The radio waves of a mobile frequency consist of Retina pattern and vote can be Generated by means of external source .That’s why we need to provide some sot of security to avoid this problem . One of the idea to solve this problem is CDMA (which will be explained later ) and another technique is inserting security bits at regular interval of time during the transmission of radio waves (Ex.2 msec) .At the server side after the given interval (2 msec ) security bits are checked (ex 1001) . In case of positive confirmation we can accept as valid vote, other wise simply rejected. Another problem is that one may trap the radio waves in between and can determine the person and the vote, this may disclose the result of the election before the completion of the voting process. To avoid this problem we can go for applying the efficient and complex encryption algorithm so that the transparency of data can be hidden and the server side the encrypted data can be again decrypted and original data can retrieved this make the trapping of wave meaningless .The encryption algorithm can be termed as Key Complex Algorithm, which is as follows, • First it finds the length of the string. • Generate the random numbers equal to the length of the string. • Add the corresponding Characters from the given string and random values. Eg. KSHITIJ Let this be the given words. 8
  • 9. The length of the given string is 7. So let us Generate the 7 random numbers .Let numbers be A) 8 12 34 4 11 9 26 .The ascii value for KSHITIJ are K S H I T I J B) 75 83 72 73 84 73 74 Add corresponding A) and B) values as 8+75 12+83 34+72 4+73 11+84 9+73 26+74 83 95 106 77 95 82 100 The corresponding ascii character for these are S _ j M _ R d The corresponding characters for random values ℵ ϑ θ ♥ ♦ ↔ ψ Finally encrypted data as S ℵ _ ϑ j θ M ♥ _ ♦ R ↔ d ψ The final encrypted data is formed in such a way that the random data at the even place and rest at odd place. This makes Decryption very easy. Simply subtract the character at even place from odd place character. 9
  • 10. CHAPTER-8 EFFICIENCY Whenever the data which is sent from the voter (client) side, it is in the large amount, this delays a bit a voting system and the data that is received at server side is in the multiple access mode i.e more than one client is sending the data . To over come this problem the following 1. Applying compression Algorithms at the Client and server side so that to decrease the data transfer. Compression technique such as JPEG compression or any other Compression. 2. Instead of using single server PC we will go for distributed Operating system environment with multiple servers. This makes the job sharing and processing faster which leads to fast responds in case of Multiple Access Environment 3. To solve the concurrency problem in case of Multiple access environment we will use CDMA technique which is as follow 10 Key 1 data 1 Key 2 data 2 Key 4 data 4 Key 3 data 3 k1*d1+ k2*d2 + k3*d3+ k4*d4
  • 11. Here the key values are orthogonal to each other i.e k1*k2=0 and k1*k1=1 i.e if any tries to decode the information with any other key the data will be vanished as the data will be in the form d1*k1. If you try to decode with K2 then effect will be as d1*k1*k2=0. this will vanish the data .And if correct decoding key i.e k1 is used then decoding will be d1*k1*k1=d1. this decodes the data correctly. As per the controlling concurrency for multiple access the data from all the nodes is accepted as k1*d1+k2*d2 +k3*d3+k4*d4.In this case if you want the data corresponding to the second node then simply multiply the whole equation with the k2. This will give d2 as (k1*d1+k2*d2 +k3*d3+k4*d4)*k2=d2 . So by this we can show that any numbers of nodes are allowed to send the data, the server will accept all the data and which ever has to be extracted will be just multiplied with corresponding key. This gets the corresponding data. Hence the concept of Multiple access. 11
  • 12. CHAPTER-9 GEOGRAPHICAL PROBLEMS This is the problem regarding the area where technical facilities like mobile tower or Internet service is not present. In this case will convert the vote and retina pattern into the electrical information and pass it through the electrical conductors until we can reach the area where the technical facilities like internet or mobile tower is available, and if only internet facility is available is then we can convert this electrical information to digital means and with these data using computers connected to internet we can pass the vote and retina pattern. Here the eye scanner will be web cam. Future Enhancements This project can be enhanced to work over the mobiles that is voting is made possible through the mobile through SMS. This machine can be made vote through the INTERNET. 12
  • 13. CHAPTER-10 CONCLUSION • Thus this machine can be used for any level voting purpose. The machine provides high level of security, authentication, reliability, and corruption -free mechanism. • By this we can get result with in minute after a completion of voting.. Minimum manpower Utilization, hence mechanism is error free. 13
  • 14. CHAPTER-11 REFERENCES • Electronic circuit by Boylestead. • Digital Integrated Electronics by Herbert Taub and Donald Schilling. • Adini, Y., Moses, Y., and Ullman, S. (1997) Face recognition: the problem of compensating for changes in illumination direction. Trans. Pat. Anal. Mach. Intell. 19(7): 721-732. • Belhumeur, P.N., Hespanha, J.P., and Kriegman, D.J. (1997) Eigenfaces vs. Fisherfaces: Recognition using class-speci_c linear projection. Trans. Pat. Anal. Mach. Intell. 19(7): 711-720. • Berggren, L. (1985) Iridology: A critical review. Acta Ophthalmologica 63(1): 1-8. • Daugman, J. (1988) Complete discrete 2D Gabor transforms by neural networks for image analysis and compression. Trans. Acous. Sp. Sig. Proc. 36(7): 1169-1179. • Phillips, P.J., Martin, A., Wilson, C.L., and Przybocki, M. (2000) An introduction to evaluating biometric systems. Computer 33(2): 56-63. • Simon, A., Worthen, D.M., and Mitas, J.A. (1979) An evaluation of iridology. Journal of the American Medical Association 242: 1385-1387. • Viveros, R., Balasubramanian, K., and Balakrishnan, N. (1984) Binomial and negative binomial analogues under correlated Bernoulli trials. 14