This document proposes a global wireless e-voting system that uses eye retina scanning and remote server storage of votes to improve security over conventional voting machines. Votes and scanned retina patterns would be sent via radio waves to a remote server for authentication and storage. This system aims to reduce opportunities for vote tampering and more accurately determine voter eligibility compared to current systems. However, security, efficiency, and geographical challenges around areas without necessary technology infrastructure would need to be addressed for full implementation.
In the era of technology, the voting machine, which is present today, is highly unsecured. Being in the age of Computers we are compromising the security by opting for Electronic voting machine because in the present electronic voting machine is not intelligent that is it cannot determine the person came for the voting is eligible or not . That mean the whole control is kept in the hand of voting in charge officer. One more risk with the present voting machine is that anybody can increase the vote count, since the count is present in the machine itself.
In proposed machine that is “Global Wireless E-Voting” , The machine is made intelligent which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it it is store in the remote server by converting it into radio waves. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. The machine provides high level of security, authentication, reliability, and corruption -free mechanism. By this we can get result within minute after a completion of voting. Minimum manpower Utilization, hence mechanism is error free.
Global Wireless E-Voting is an intelligent system which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it is store in the remote server by converting it into radio waves.
.
The machine provides high level of security, authentication, reliability, and corruption -free mechanism. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. Results of election can be found out within minutes of completion of the election. Minimum manpower Utilization, hence mechanism is error free.
In the era of technology, the voting machine, which is present today, is highly unsecured. Being in the age of Computers we are compromising the security by opting for Electronic voting machine because in the present electronic voting machine is not intelligent that is it cannot determine the person came for the voting is eligible or not . That mean the whole control is kept in the hand of voting in charge officer. One more risk with the present voting machine is that anybody can increase the vote count, since the count is present in the machine itself.
In proposed machine that is “Global Wireless E-Voting” , The machine is made intelligent which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it it is store in the remote server by converting it into radio waves. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. The machine provides high level of security, authentication, reliability, and corruption -free mechanism. By this we can get result within minute after a completion of voting. Minimum manpower Utilization, hence mechanism is error free.
Global Wireless E-Voting is an intelligent system which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it is store in the remote server by converting it into radio waves.
.
The machine provides high level of security, authentication, reliability, and corruption -free mechanism. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. Results of election can be found out within minutes of completion of the election. Minimum manpower Utilization, hence mechanism is error free.
Obstacle Avoiding Robot
Robotics is a branch of science that deals with Mechanical, Electrical and Software fields. Robots are the machines that are used in our day-to-day to life to reduce men power and work accurately without any distortions. Robots can be classified into two different sections basing upon their skills as Automated and Manual. Obstacle detector is a Automated robot which itself recognizes the obstacle in its path and moves in free direction. Robot detects the obstacle by using two IR Sensors placed in front.
The IR sensors are placed on left and right side of the robot through which continuous Infrared radiation is emitted for detection of obstacles in the path. These IR Sensors are connected to a controlling element AT89c51 µc. When a obstacle is placed in the path of robot IR beam is reflected to the sensor from the obstacle. On detecting obstacle in the path sensor sends 0 volts to µc. This 0 voltage is detected by Microcontroller which avoids the obstacle by taking left or right turn. Similarly if the sensor sends +5v to Microcontroller, the Microcontroller assumes it as clear path and makes the robot to move in straight.
Two motors namely right motor and left motor are connected to Motor driver IC (L293D). L293D is interface with Microcontroller. Microcontroller sends logic 0 & logic 1 as per the programming to driver IC which makes motors to rotate in clockwise and anticlockwise direction. Wheels attached to the motors rotate accordingly with the motor shaft causing in the moment of the robot by wheels. In front portion of the robot a free wheel is attached to move the robot easily in any direction as per the requirement.
A 12Volts DC battery is attached to the circuit. As the microcontroller and sensors requires only 5v, set of resistors and capacitors are used to supply 5v DC to them. Power Management System is not maintained in the circuit as the battery can be removed after the usage of robot. So it does not cause any loss in the power of battery.
This type of robots has multiple applications in various fields. They can be used to know the strength of the opposite army in defense system. They can be used as floor and wall cleaners. They are used in automated GPS vehicles to calculate the moment of the vehicle overhead. These robots are easy to construct and cheaper in cost with long durability.
India's greatest threat is the safety of its women. Women do not feel safe in a variety of situations. This needs to be addressed as quickly as feasible. Technology evolves and develops on a daily basis, affecting how people live. As a result, the focus of this article is on modernising the technological framework in order to strengthen women's safety mechanisms. We introduce a new security method in this study to protect women during unusual behaviours. A new security technique based on a patrolling robot using the Raspberry Pi has been proposed. In this case, a night vision camera can be employed to secure any location. Various machine learning methods are applied to improve the classifier's accuracy. The findings suggest that the suggested method outperforms existing methods.
automatic railway gate control system using arduinoantivirusspam
The objective of this project is to manage the control system of railway gate using the arduino. When train arrives at the sensing point alarm is triggered at the railway crossing point so that the people get intimation that gate is going to be closed. Then the control system activates and closes the gate on either side of the track once the train crosses the other end control system automatically lifts the gate.
Obstacle Avoiding Robot
Robotics is a branch of science that deals with Mechanical, Electrical and Software fields. Robots are the machines that are used in our day-to-day to life to reduce men power and work accurately without any distortions. Robots can be classified into two different sections basing upon their skills as Automated and Manual. Obstacle detector is a Automated robot which itself recognizes the obstacle in its path and moves in free direction. Robot detects the obstacle by using two IR Sensors placed in front.
The IR sensors are placed on left and right side of the robot through which continuous Infrared radiation is emitted for detection of obstacles in the path. These IR Sensors are connected to a controlling element AT89c51 µc. When a obstacle is placed in the path of robot IR beam is reflected to the sensor from the obstacle. On detecting obstacle in the path sensor sends 0 volts to µc. This 0 voltage is detected by Microcontroller which avoids the obstacle by taking left or right turn. Similarly if the sensor sends +5v to Microcontroller, the Microcontroller assumes it as clear path and makes the robot to move in straight.
Two motors namely right motor and left motor are connected to Motor driver IC (L293D). L293D is interface with Microcontroller. Microcontroller sends logic 0 & logic 1 as per the programming to driver IC which makes motors to rotate in clockwise and anticlockwise direction. Wheels attached to the motors rotate accordingly with the motor shaft causing in the moment of the robot by wheels. In front portion of the robot a free wheel is attached to move the robot easily in any direction as per the requirement.
A 12Volts DC battery is attached to the circuit. As the microcontroller and sensors requires only 5v, set of resistors and capacitors are used to supply 5v DC to them. Power Management System is not maintained in the circuit as the battery can be removed after the usage of robot. So it does not cause any loss in the power of battery.
This type of robots has multiple applications in various fields. They can be used to know the strength of the opposite army in defense system. They can be used as floor and wall cleaners. They are used in automated GPS vehicles to calculate the moment of the vehicle overhead. These robots are easy to construct and cheaper in cost with long durability.
India's greatest threat is the safety of its women. Women do not feel safe in a variety of situations. This needs to be addressed as quickly as feasible. Technology evolves and develops on a daily basis, affecting how people live. As a result, the focus of this article is on modernising the technological framework in order to strengthen women's safety mechanisms. We introduce a new security method in this study to protect women during unusual behaviours. A new security technique based on a patrolling robot using the Raspberry Pi has been proposed. In this case, a night vision camera can be employed to secure any location. Various machine learning methods are applied to improve the classifier's accuracy. The findings suggest that the suggested method outperforms existing methods.
automatic railway gate control system using arduinoantivirusspam
The objective of this project is to manage the control system of railway gate using the arduino. When train arrives at the sensing point alarm is triggered at the railway crossing point so that the people get intimation that gate is going to be closed. Then the control system activates and closes the gate on either side of the track once the train crosses the other end control system automatically lifts the gate.
Electronic voting (also known as e-voting) is voting using electronic means to record or count votes. Depending on the particular implementation, e-voting may encompass a range of Internet services, from a touchscreen kiosk at a polling station to voting online, and from a local-only solution to a networked system.
Machine Learning Techniques for the Smart Grid – Modeling of Solar Energy usi...Wilfried Elmenreich
This talk covers the application of machine learning techniques for energy applications, in particular for modeling solar radiation. The first part explores meta-heuristic search algorithms and envisioned their application for designing distributed, self-organizing control systems using evolutionary algorithms. The second part gives an introduction to solar radiation modeling and shows how neural networks can be used to artificial neural networks to learn the correlation of input parameters such as latitude, longitude, temperature, humidity, month, day, hour to predict global and diffuse solar radiation.
Global Wireless E-Voting is an intelligent system which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it is store in the remote server by converting it into radio waves.
.
The machine provides high level of security, authentication, reliability, and corruption -free mechanism. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. Results of election can be found out within minutes of completion of the election. Minimum manpower Utilization, hence mechanism is error free.
Electronic voting system is an effective approach for counting of votes could be faster, more accurate and less labor intensive. In this system we use one effective algorithm called minutiae for Fingerprint. This algorithm can be used to match the Fingerprint images. The Proposed system is used to avoid the vote recasting with help of RFID and Fingerprint. There is way to prohibit the same person from casting multiple ballots using Fingerprint and RFID. In an E-voting system, there is way to prohibit the same person from casting multiple ballots using Fingerprint.
SENSOR ID is a company founded by a team of young engineers, that polarizes its own activity into designing and production devices dedicated to the world of applications of IoT. Thanks to the experience gained with CUBIT Innovation Lab and University of Pisa, SensorID has developed a strong know-how in wireless technology standard integration and implementation and in wireless network topology design. SensorID built a complete portfolio of embedded electronic modules based on NFC, UHF, RFID.
Electronic voting systems have the potential to improve traditional voting procedures by providing added convenience and flexibility to the voter. Numerous electronic voting schemeshave been proposed in the past, but most of them have failed to provide voter uthentication in an efficient and transparent way. On the other hand, GSM (Global System for Mobile communications) is the most widely used mobile networking standard. There are more than one
billion GSM users worldwide that represent a large user potential not for mobile telephony, but also for other mobile applications that exploit the mature GSM infrastructure. In this paper, theelectronic voting scheme using GSM mobile technology is presented. By integrating anelectronic voting scheme with the GSM infrastructure, we are able to exploit existing GSM authentication mechanisms and provide enhanced voter authentication and mobility while maintaining voter privacy. The objective of this project is to avoid the queue in voting time. Voting machines provide easy access to cast the vote by using mobile phone.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
3. CONTENTS
WORKING OF WHOLE SYSTEM
HURDLES IN PATH OF IMPLEMENTATION
FUTURE ENHANCEMENT
CONCLUSION
4. INTRODUCTION
“Global Wireless E-Voting” is an intelligent voting
system which can determine the eligibility of the
voter by scanning the eye pattern .
Vote count is not kept into the same machine itself
instead of it is stored in the remote server .
More secure than conventional voting system
5. PRESENT SYSTEM
In present system each and every booth is given an
electronic machine which stores the votes of the
people.
Control of present system is given to the incharge
officer who checks the eligibility of the candidates
for voting.
Finally incharge collect all the voting machine at a
place and go for counting.
7. DISADVANTAGES OF
PRESENT SYSTEM
The machine is not able to recognize the eligibility
of a candidate, so the corrupted officers may
misguide the people
The corrupted officers may increase the count of
the voting.
After voting if any technical problems or damage
occurs with the machines it may leads to the re
election
8. CONTINUED…
During transportation of the machines, the person
in charge can change the status of machines and
even may destroy.
This system is not a cost effective one. Since we
need security, in charge officers, secured place for
counting and election place.
The voting take place where the machine is
located.
9. PROPOSED SYSTEM
In this system we trying to keep counting of votes
in to a remote secured system.
Our machine can check the eligibility of the
candidate by itself, so there is no question of
corruption.
In this system we are using an electronic circuit
which enable the voter to vote and transfer this
vote to the remote system using mobile tower.
10. CONTINUED..
A error in a vote does not affect the remaining
system, there by reducing the risk of re-election.
Cost for an election is comparatively less than
current system
11.
12. EXPLANATION
1. Radio waves representing scanned retina pattern and
vote to Mobile tower.
2. Radio waves representing scanned retina pattern and
vote to remote server.
3. Acknowledgement (+ve or –ve) from the server to
mobile tower.
13. CONTINUED..
4. Acknowledgement (+ve or –ve) from mobile
tower to Interface device.
5. Ready signal if retina is scanned properly to
voting machine. And if –ve signal then alert
alarm will be activated.
6. Accepted vote is made to flow to the interface
device.
14. VOTING MACHINE
The voting machine is actually a device which
generates the different voltages for different votes.
These voltages are fed to the (ADC) which is then
converted to digital bits then can be converted to
radio waves.
16. EYE RETINA SCANNING
A biometric identifier known as a retinal scan is used
to map the unique patterns of a person's retina.
These eye retina machine can be a high quality web
cam or device which can capture the images effectively.
A retinal scan is performed by casting an unperceived
beam of low-energy infrared light into a person’s eye as
they look through the scanner's eyepiece.
18. INTERFACE DEVICE
This is an electronic kit which converts the
input digital signals such as (retina pattern
+ votes+ secure bits) to radio waves.
19. WORKING OF THE WHOLE
SYSTEM
Whenever voters enter to voting booth then he will be
instructed to directly look at retina scanning machine and
the machine scans the retina.
Once retina scanning properly confirmed then voter is
made to vote
Now the whole data including the retina pattern is sent to
interfacing device which converts it into radio waves and
these radio waves are sent to mobile tower
And then to the remote server, where the authentication
and voters identification is stored into a secured database.
20. CONTINUED…
The received data is first converted into digital format
from the radio waves through the interface device kept at
the server side, and from the encrypted data retina pattern
and vote separated.
Next the retina pattern is matched against the existing
database .
If match is found then flag is checked which indicates its
voting status i.e. +ve ack.
This ack is recognized by the receiver kept at the voter side
and machine is made to scan next retina pattern and
vote, otherwise if –ve ack then alert alarm is made to ring
21. HURDLES IN THE PATH OF
IMPLEMENTATION
Security
Efficiency
Geographical problem
22. SECURITY
Uses Key Complex Encryption algorithm
First it finds the length of the string
Generate the random numbers equal to the length
of the string
Add the corresponding Characters from the given
string and random values
23. EXPLANATION
E.g. ISHANT
8 12 34 4 11 9
The ASCII value for ISHANT are
73 83 72 65 78 84
Add corresponding A) and B) values as
8+73 12+83 34+72 4+65 11+78 9+84
27. GEOGRAPHICAL PROBLEMS
It occurs where the technical facilities like
mobile tower or Internet service is not present.
In this case will have to store the vote and retina
pattern in a external memory location
And pass it when we reach the area where the
technical facilities like internet or mobile tower is
available.
Here the eye scanner will be web cam.
29. CONCLUSION
Provides high level of
security, authentication, reliability, and corruption-
free mechanism.
By this we can get result with in minute after the
completion of voting.
Minimum manpower Utilization, hence mechanism is
error free.