In the proposed "Global Wireless E-Voting" system:
1. Votes would be cast using an electronic voting machine but stored on a remote server through radio waves, preventing tampering with vote counts on individual machines.
2. The machines would be made intelligent to verify voter eligibility by scanning eye patterns, reducing the risk of corruption.
3. Even if a machine is damaged, elections would not be disrupted since votes are stored remotely on a server.
In the era of technology, the voting machine, which is present today, is highly unsecured. Being in the age of Computers we are compromising the security by opting for Electronic voting machine because in the present electronic voting machine is not intelligent that is it cannot determine the person came for the voting is eligible or not . That mean the whole control is kept in the hand of voting in charge officer. One more risk with the present voting machine is that anybody can increase the vote count, since the count is present in the machine itself.
In proposed machine that is “Global Wireless E-Voting” , The machine is made intelligent which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it it is store in the remote server by converting it into radio waves. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. The machine provides high level of security, authentication, reliability, and corruption -free mechanism. By this we can get result within minute after a completion of voting. Minimum manpower Utilization, hence mechanism is error free.
Global Wireless E-Voting is an intelligent system which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it is store in the remote server by converting it into radio waves.
.
The machine provides high level of security, authentication, reliability, and corruption -free mechanism. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. Results of election can be found out within minutes of completion of the election. Minimum manpower Utilization, hence mechanism is error free.
In the era of technology, the voting machine, which is present today, is highly unsecured. Being in the age of Computers we are compromising the security by opting for Electronic voting machine because in the present electronic voting machine is not intelligent that is it cannot determine the person came for the voting is eligible or not . That mean the whole control is kept in the hand of voting in charge officer. One more risk with the present voting machine is that anybody can increase the vote count, since the count is present in the machine itself.
In proposed machine that is “Global Wireless E-Voting” , The machine is made intelligent which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it it is store in the remote server by converting it into radio waves. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. The machine provides high level of security, authentication, reliability, and corruption -free mechanism. By this we can get result within minute after a completion of voting. Minimum manpower Utilization, hence mechanism is error free.
Global Wireless E-Voting is an intelligent system which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it is store in the remote server by converting it into radio waves.
.
The machine provides high level of security, authentication, reliability, and corruption -free mechanism. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. Results of election can be found out within minutes of completion of the election. Minimum manpower Utilization, hence mechanism is error free.
It was the touch screens which initially created great foregone are the days when you have to fiddle with the touch screens and end scratching up. Touch screen displays are ubiquitous worldwide. Frequent touching a touchscreen display with a pointing device such as a finger can result in the gradual de-sensitization of the touchscreen to input and can ultimately lead to failure of the touchscreen. To avoid this a simple user interface for Touchless control of electrically operated equipment is being developed. Elliptic Labs innovative technology lets you control your gadgets like Computers, MP3 players or mobile phones without touching them. A simple user interface for Touchless control of electrically operated equipment. Unlike other systems which depend on distance to the sensor or sensor selection this system depends on hand and or finger motions, a hand wave in a certain direction, or a flick of the hand in one area, or holding the hand in one area or pointing with one finger for example. The device is based on optical pattern recognition using a solid state optical matrix sensor with a lens to detect hand motions. This sensor is then connected to a digital image processor, which interprets the patterns of motion and outputs the results as signals to control fixtures, appliances, machinery, or any device controllable through electrical signals.
This project is designed for electronic voting machine by using the fingerprint identification method.
Here voters thumb impressions are used for identifying the voters.
During voting when the voter keeps his/her thumb in the scanner, the system will check whether it matches with pre stored impressions in the database.
If it matches then system will allow the voter to poll his vote and otherwise prevent the voter from polling.
ADVANTAGES
The main advantages of the systems are,
Providing the preventive measures system for voting.
It completely rules out the chance of invalid votes.
Its use results in reduction of polling time.
Results in fewer problems in electoral preparations, law and order candidates' expenditure.
Provide easy and accurate counting without any mischief at the counting centre.
It is capable of saving considerable printing stationery and transport of large volumes of electoral material.
FUTURE SCOPE OF THE PROJECT
This system can be used for elections since it provide complete security and will provide accurate results and save time and expenditure.
This can be modify by interfacing it with a PC through a serial port in order to provide additional security.
That is touch screen technology as everything (laptop,desktop,mobiles,ATM machine) each and everything can be used by touch.so how it works.Take a tour of uploaded ppt.
It was the touch screens which initially created great foregone are the days when you have to fiddle with the touch screens and end scratching up. Touch screen displays are ubiquitous worldwide. Frequent touching a touchscreen display with a pointing device such as a finger can result in the gradual de-sensitization of the touchscreen to input and can ultimately lead to failure of the touchscreen. To avoid this a simple user interface for Touchless control of electrically operated equipment is being developed. Elliptic Labs innovative technology lets you control your gadgets like Computers, MP3 players or mobile phones without touching them. A simple user interface for Touchless control of electrically operated equipment. Unlike other systems which depend on distance to the sensor or sensor selection this system depends on hand and or finger motions, a hand wave in a certain direction, or a flick of the hand in one area, or holding the hand in one area or pointing with one finger for example. The device is based on optical pattern recognition using a solid state optical matrix sensor with a lens to detect hand motions. This sensor is then connected to a digital image processor, which interprets the patterns of motion and outputs the results as signals to control fixtures, appliances, machinery, or any device controllable through electrical signals.
This project is designed for electronic voting machine by using the fingerprint identification method.
Here voters thumb impressions are used for identifying the voters.
During voting when the voter keeps his/her thumb in the scanner, the system will check whether it matches with pre stored impressions in the database.
If it matches then system will allow the voter to poll his vote and otherwise prevent the voter from polling.
ADVANTAGES
The main advantages of the systems are,
Providing the preventive measures system for voting.
It completely rules out the chance of invalid votes.
Its use results in reduction of polling time.
Results in fewer problems in electoral preparations, law and order candidates' expenditure.
Provide easy and accurate counting without any mischief at the counting centre.
It is capable of saving considerable printing stationery and transport of large volumes of electoral material.
FUTURE SCOPE OF THE PROJECT
This system can be used for elections since it provide complete security and will provide accurate results and save time and expenditure.
This can be modify by interfacing it with a PC through a serial port in order to provide additional security.
That is touch screen technology as everything (laptop,desktop,mobiles,ATM machine) each and everything can be used by touch.so how it works.Take a tour of uploaded ppt.
Electronic voting (also known as e-voting) is voting using electronic means to record or count votes. Depending on the particular implementation, e-voting may encompass a range of Internet services, from a touchscreen kiosk at a polling station to voting online, and from a local-only solution to a networked system.
Protection Profile for E-Voting SystemsSeungjoo Kim
Protection Profile for E-Voting Systems @ ICCC 2008 (International Common Criteria Conference), which is a major conference for the community of experts involved in security evaluation
Software control systems for smart antennaeSAT Journals
Abstract A PCB containing microcontroller provides suitable DC voltages to the phase shifters and generates the smart antenna array beam steering. The detected WiFi signals are transferred into a mobile device through a WiFi adapter. This chapter will focus on the software design to automatically control the complete smart antenna array system. Since two microcontrollers PIC18F4550 and LPC1768 are used to build control PCBs. There are also two specifically designed software programs developed in order to configure the individual PCB. For the PIC18F4550, a graphical user interface (GUI) was developed to communicate between a laptop and the control PCB. The GUI sends commands to a Microchip compiler called MPLAB and transfers the control C code into a Hexadecimal (Hex) document. Through the Bootloader program, this Hex code will be copied into the microchip PIC18F4550 and then configures the digital potentiometers to generate variable output voltages. A script using VB is made to link all of the control steps automatically. Key Words: Software Control System, Smart Antenna, Manual Control, Switching Control, Automatic Control
Global Wireless E-Voting is an intelligent system which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it is store in the remote server by converting it into radio waves.
.
The machine provides high level of security, authentication, reliability, and corruption -free mechanism. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. Results of election can be found out within minutes of completion of the election. Minimum manpower Utilization, hence mechanism is error free.
Hard Decision Viterbi Decoder: Implementation on FPGA and Comparison of Resou...IJERA Editor
Viterbi decoder is the most important part in receiver section of wireless communication system. Viterbi
algorithm is one of the most common decoding algorithms used for decoding convolutional codes. Viterbi
decoder employs Maximum Likelihood technique to decode the convolutionally encoded data stream. In
practice, most of the communication systems use Viterbi decoding scheme in processors. But increased interest
on high speed Viterbi decoder in a single chip forced to realize with the speed of Giga-bit per second, without
using memory or off-chip processors. Implementation of proposed design and realization is possible due to
advanced Field Programmable Gate Array (FPGA) technologies and advanced Electronic Design Automatic
(EDA) tools. This paper involves designing an optimum structure of Viterbi decoder and implementing it on
different FPGA devices to compare the resource utilizations.
Electronic voting systems have the potential to improve traditional voting procedures by providing added convenience and flexibility to the voter. Numerous electronic voting schemeshave been proposed in the past, but most of them have failed to provide voter uthentication in an efficient and transparent way. On the other hand, GSM (Global System for Mobile communications) is the most widely used mobile networking standard. There are more than one
billion GSM users worldwide that represent a large user potential not for mobile telephony, but also for other mobile applications that exploit the mature GSM infrastructure. In this paper, theelectronic voting scheme using GSM mobile technology is presented. By integrating anelectronic voting scheme with the GSM infrastructure, we are able to exploit existing GSM authentication mechanisms and provide enhanced voter authentication and mobility while maintaining voter privacy. The objective of this project is to avoid the queue in voting time. Voting machines provide easy access to cast the vote by using mobile phone.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
1. ABSTRACT:
In the era of technology, the voting machine, which is present today, is highly unsecured.
Being in the age of Computers we are compromising the security by opting for Electronic
voting machine because in the present electronic voting machine is not intelligent that is it
cannot determine the person came for the voting is eligible or not . That mean the whole
control is kept in the hand of voting in charge officer. One more risk with the present voting
machine is that any body can increase the vote count, since the count is present in the
machine itself.
In proposed machine that is “Global Wireless E-Voting “. In this the machine is
made intelligent which can determine the eligibility of the voter by scanning the eye pattern
and also the vote count is not kept into the same machine itself instead of it it is store in the
remote server by converting it into radio waves. Here there is no chance of increasing the
vote count of machine. Even in case of damage to voting machine there will not be harm to
continuity of the election process. The overall concept of “Global Wireless E-Voting “is
explained.
2. INTRODUCTION:
In India election has supreme weight age. So to make it secured
and efficient in the vision of modern technology we are “Global
Wireless E-Voting”.
Why we are looking for it?
PRESENT SYSTEM:
• Since now days voting system is replaced by electronic
machine to carry out voting.
• Now in a present system each and every section is given a
electronic machine which stores the votes of the people how have
voted for the particular candidate.
• Control of present system is given to the in charge officer.
He only check for the eligibility of the candidates and allow for
the voting.
• Finally we collect all the voting machine at a place and
go for counting.
DIS ADVANTAGES OF THE PRESENT SYSTEM:
• After voting if any technical problems or damage occurs
with the machines it may leads to the re election.
• The machine is not able to recognize the eligibility of a
candidate, so the corrupted officers may misguide the people.
• The corrupted officers may increase the count of the
voting.
• During transportation of the machines the in charge person
can change the status of machines and even may destroy.
3. • This system is not a cost effective one. Since we need
security, in charge officers, secured place for counting and
election place.
• The person from any other region cannot vote in for a
candidate of other region.
• The voting take place where the machine is located.
PROPOSED SYSTEM:
• In our system we trying to keep counting of votes in to a
remote secured system.
• In this system we are using a electronic circuit which
enable the voter to vote and transfer this vote to the remote system
by converting it to radio wave through the mobile towers.
• Our machine can check the eligibility of the candidate by
itself, so there is no question of corruption. Machine itself is
automated to check the eligibility of the candidates.
• Here we need not to go for the re election even if the
machine is damaged.
• A person even can vote from a mobile system and also
from Internet.
• We can vote from any where even though being a voter of
another region.
BLOCK DIAGRAM:
5
Alert
alarm
4
4. 5 Ready signal
Voting Interface 3
1
machine Retina Device
scanne 2
r
6 Vote flow channel
Mobile tower Server or
Distributed LAN
+ Interface
device
1. Radio waves representing scanned retina pattern and vote to
Mobile tower.
2. Radio waves representing scanned retina pattern and vote to
remote server.
3. Acknowledgement (+ve or –ve) from the server to mobile
tower.
4. Acknowledgement (+ve or –ve) from mobile tower to
Interface device.
5. Ready signal if retina is scanned properly to voting
machine. And if –ve signal then alert alarm will be
activated.
6. Accepted vote is made to flow to the interface device.
7.
DETAIL DIAGRAM OF THE VOTING MACHINE:
The voting machine is actually a device which generates
the different voltages for different votes these voltages are fed to
the (ADC) which is then converted to digital bits then can be
converted to radio waves.
5. The detail diagram is overleaf.
Block diagram of the Client Side Circuit
Mixer Security
bits gen.
Final Out put
Radio
Retina Comp. Interface Wave
scanner Terminal device Gen
Antenna
Eye Retina scanning:
The eye retina machine be a simple web cam or device
which can capture the images effectively .the captured image will
be represented in the form of a matrix where each pixel represents
24-bit (RGB, 8+8+8 format) let us see and understand
Here for e.g.:
6. Here the matrix pattern of this type of picture may be as
R G B R G B R G B
[12 a1 15] [11 21 54] [25 f4 5c]
[2d 1c 5A] [99 85 57] [2c fa b3]
[1b b1 a2] [11 b1 ac] [50 b4 5F]
[CA 1f 3c] [11 2c d4] [03 ca e5]
Interface device
This is an electronic kit which converts the input digital signals
such as (retina pattern votes+ secure bits) to radio waves.
Working of whole system
Whenever voters enter to voting booth then he will be instructed to
directly look at retina scanning machine at this time the machine
scans the retina. once retina scanning properly confirmed then it
sent signal to the voting machine as to accept the vote it will be
powered on .then voter is made to vote. Now the whole data
including the retina pattern is sent to interfacing device which
convert into radio waves of mobile frequency range and these radio
waves are sent to mobile tower and then to the remote server,
where the authentication and voters identification is stored into a
secured database. The received data is first converted into digital
format from the radio waves through the interface device kept at
the server side, and then retina pattern and vote separated. Next the
retina pattern is matched against the existing database .If match is
7. found then flag is check which indicates its voting status i.e. if the
voter is not voted yet then +ve ack is send to the mobile tower and
then to the corresponding voting machine. This ack is recognized
by the receiver kept at the voter side and machine is made to scan
next retina pattern and vote, otherwise if –ve ack then alert alarm
is made to ring.
HURDLES IN THE PATH OF IMPLEMENTATION:
There are several more issues that we have to consider
along the Implementation such as
Security
Efficiency
Geographical Problems
Security
The radio waves of a mobile frequency consist of Retina pattern
and vote can be generated by means of external source. That’s why
we need to provide some sot of security to avoid this problem. One
of the idea to solve this problem is CDMA (which will be
explained later ) and another technique is inserting security bits at
regular interval of time during the transmission of radio waves
(Ex.2 msec) .At the server side after the given interval (2 msec )
security bits are checked (ex 1001) . In case of positive
confirmation we can accept as valid vote, other wise simply
rejected.
Another problem is that one may trap the radio waves in
between and can determine the person and the vote; this may
disclose the result of the election before the completion of the
voting process. To avoid this problem we can go for applying the
efficient and complex encryption algorithm so that the transparency
of data can be hidden and the server side the encrypted data can be
8. again decrypted and original data can retrieved this make the
trapping of wave meaningless .The encryption algorithm can be
termed as Key Complex Algorithm, which is as follows,
First it finds the length of the string.
Generate the random numbers equal to the length of the
string.
Add the corresponding Characters from the given string and
random values.
E.g. KSHITIJ
Let this be the given words.
The length of the given string is 7. So let us generate the 7 random
numbers .Let numbers be
A) 8 12 34 4 11 9 26 .The ASCII value for
KSHITIJ are
K S H I T I J
B) 75 83 72 73 84 73 74
Add corresponding A) and B) values as
8+75 12+83 34+72 4+73 11+84 9+73 26+74
83 95 106 77 95 82 100
The corresponding ASCII characters for these are
S _ j M _ R d
The corresponding characters for random values
ℵ ϑ θ ♥ ♦ ↔ ψ
Finally encrypted data as
S ℵ _ ϑ j θ M ♥ _ ♦ R ↔ d ψ
The final encrypted data is formed in such a way that the random
data at the even place and rest at odd place. This makes Decryption
very easy. Simply subtract the character at even place from odd
place character.
Efficiency
9. Whenever the data which is sent from the voter (client) side, it
is in the large amount, this delays a bit a voting system and the data
that is received at server side is in the multiple access mode i.e.
more than one client is sending the data. To over come this problem
the following
1. Applying compression Algorithms at the Client and server
side so those to decrease the data transfer. Compression
technique such as JPEG compression or any other
Compression.
2. Instead of using single server PC we will go for distributed
Operating system environment with multiple servers. This
makes the job sharing and processing faster which leads to
fast responds in case of Multiple Access Environment
3. To solve the concurrency problem in case of Multiple
access environment we will use CDMA technique which is
as follow
Key 1 Key 2
data 1 Data 2
k1*d1+
k2*d2 +
k3*d3+
Key 4 k4*d4 Key 3
data 4 data 3
Here the key values are orthogonal to each other i.e. k1*k2=0 and
k1*k1=1 i.e. if any tries to decode the information with any other key the
data will be vanished as the data will be in the form d1*k1.If you try to
decode with K2 then effect will be as d1*k1*k2=0. This will vanish the
data. And if correct decoding key i.e k1 is used then decoding will be
d1*k1*k1=d1. This decodes the data correctly. As per the controlling
10. concurrency for multiple access the data from all the nodes is accepted as
k1*d1+k2*d2 +k3*d3+k4*d4.In this case if you want the data
corresponding to the second node then simply multiply the whole equation
with the k2.
This will give d2 as (k1*d1+K2*d2 +k3*d3+k4*d4)*K2=d2. So by
this we can show that any numbers of nodes are allowed to send the data,
the server will accept all the data and which ever has to be extracted will
be just multiplied with corresponding key. This gets the corresponding
data. Hence the concept of Multiple access.
Geographical Problems
This is the problem regarding the area where technical facilities like
mobile tower or Internet service is not present. In this case will convert the
vote and retina pattern into the electrical information and pass it through
the electrical conductors until we can reach the area where the technical
facilities like internet or mobile tower is available, and if only internet
facility is available is then we can convert this electrical information to
digital means and with these data using computers connected to internet we
can pass the vote and retina pattern. Here the eye scanner will be web cam.
FUTURE ENHANCEMENTS:
This project can be enhanced to work over the mobiles that is voting is
made possible through the mobile through SMS.
This machine can be made vote through the INTERNET.
CONCLUSION:
Thus this machine can be used for any level voting purpose. The
machine provides high level of security, authentication, reliability, and
corruption -free mechanism.
11. By this we can get result with in minute after a completion of
voting. Minimum manpower Utilization, hence mechanism is error free.
BIBLIOGRAPHY:
• Electronic circuit by Boylestead.
• Digital Integrated Electronics by Herbert Taub and Donald
Schilling.
• www.howstuffworks.com
• www.google.com
12. By this we can get result with in minute after a completion of
voting. Minimum manpower Utilization, hence mechanism is error free.
BIBLIOGRAPHY:
• Electronic circuit by Boylestead.
• Digital Integrated Electronics by Herbert Taub and Donald
Schilling.
• www.howstuffworks.com
• www.google.com
13. By this we can get result with in minute after a completion of
voting. Minimum manpower Utilization, hence mechanism is error free.
BIBLIOGRAPHY:
• Electronic circuit by Boylestead.
• Digital Integrated Electronics by Herbert Taub and Donald
Schilling.
• www.howstuffworks.com
• www.google.com
14. By this we can get result with in minute after a completion of
voting. Minimum manpower Utilization, hence mechanism is error free.
BIBLIOGRAPHY:
• Electronic circuit by Boylestead.
• Digital Integrated Electronics by Herbert Taub and Donald
Schilling.
• www.howstuffworks.com
• www.google.com