Internet voting systems have gained popularity and have been used for government elections and referendums in the United Kingdom, Estonia and Switzerland as well as municipal elections in Canada and party primary elections in the United States. Voting system can involve transmission of ballots and votes via private computer networks or the Internet. Electronic voting technology can speed the counting of ballots and can provide improved accessibility for disabled voters. The aim of this paper is to people who have citizenship of India and whose age is above 18 years and of any sex can give their vote through online without going to any physical polling station. Election Commission Officer (Election Commission Officer who will verify whether registered user and candidates are authentic or not) to participate in online voting. This online voting system is highly secured, and its design is very simple, ease of use and also reliable. The proposed software is developed and tested to work on Ethernet and allows online voting. It also creates and manages voting and an election detail as all the users must login by user name and password and click on his favorable candidates to register vote. This will increase the voting percentage in India. By applying high security it will reduce false votes.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The E-voting promises the possibility of convenient, easy and safe way to capture and count the votes in an election[1]. This research project provides the specification and requirements for E-Voting using an Android platform. The e-voting means the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All the candidates vote count is encrypted and stored in the database in order to avoid any attacks and disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The E-voting promises the possibility of convenient, easy and safe way to capture and count the votes in an election[1]. This research project provides the specification and requirements for E-Voting using an Android platform. The e-voting means the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All the candidates vote count is encrypted and stored in the database in order to avoid any attacks and disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project provides the specification and requirements for E-Voting using an Android platform. The e-voting means the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling booth. The application follows proper authentication measures in order to avoid fraud voters using the system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and disclosure of results by third person other than the administrator. Once the session is completed the admin can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
Electronic Voting: Challenges and Prospects in Nigeria’s Democracytheijes
One basic feature of democracy is that it cuts across all divides of people in the act of election. It also encourages individual freedom according to the rule of law; hence people may behave and express themselves as they choose. This paper examines the development and implementation of and Electronic Voting System (EVS) that enables voters to cast their votes online and also enables the officials to register voters and print out the results of the votes casted. It equally provides security such that voters can only vote once with their identification details. The system therefore eliminates common fraud, speed up the processing of results, increase accessibility and make voting more convenient for the citizenry.
Mobile, Secure E - Voting Architecture for the Nigerian Electoral Systemiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Online voting system full thesis project by jahirJahir Khan
“ONLINE VOTING SYSTEM” is an online voting technique. In this system people who have citizenship can vote online without going to any physical polling station. There is a database which is maintained in which all the names of voters with complete information is stored.
In “ONLINE VOTING SYSTEM” a voter can use his\her voting right online without any difficulty. He\She has to be registered first for him/her to vote. Registration is mainly done by the system administrator for security reasons. The system Administrator registers the voters on a special site of the system visited by him only by simply filling a registration form to register voter. Citizens seeking registration are expected to contact the system administrator to submit their details. After the validity of them being citizens of India has been confirmed by the system administrator by comparing their details submitted with those in existing databases such as those as the Registrar of Persons, the citizen is then registered as a voter.
After registration, the voter is assigned a secret Voter ID with which he/she can use to log into the system and enjoy services provided by the system such as voting. If invalid/wrong details are submitted, then the citizen is not registered to vote.
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICIJERA Editor
The problem of voting is still critical in terms of safety and security. This paper is about the
design and development of a voting system using fingerprint to provide a high performance with high security
to the voting system. Fingerprint biometrics is widely used for identification. Biometrics identifiers cannot be
misplaced and they represent any individual identity. The integration of biometric with electronic voting
machine requires less manpower, save much time of voters and personal, ensure accuracy,transparency and fast
result in election. In this paper a framework for electronic voting machine based on biometric verification is
proposed and implemented. The proposed framework provides secured identification and authentication
processes for the voters and candidates through the use of fingerprint biometric
Facial Feature Recognition Using Biometricsijbuiiir1
Face recognition is one of the few biometric methods that possess the merits of both high accuracy and low intrusiveness. Biometric requires no physical interaction on behalf of the user. Biometric allows to perform passive identification in a one to many environments. Passwords and PINs are hard to remember and can be stolen or guessed; cards, tokens, keys and the like can be misplaced, forgotten, purloined or duplicated; magnetic cards can become corrupted and unreadable. However individuals biological traits cannot be misplaced, forgotten, stolen or forged.
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...ijbuiiir1
Color of the surface is one of the most imperative characteristics in the process of recognition as well as classification of the object which is based on camera. On the other hand, color of the object sometimes differs a lot due to the difference in illumination as well as the conditions of the surface. Utilization of the diverse features of the color gets impeded due to such variations. However, Characterization of the color of the object is possible with a controlling tool known as color invariants without considering the factors such asillumination and conditions of the surface. In the research proposal, analysis has been done on the estimation procedure related to RGB images color invariants. Object color is an imperative descriptor that can find the corresponding matching object in applications based on image matching as well as search, like- Object searching based on template and CBIR otherwise known as Content Based Image Retrieval. But, many times it has been observed that the apparent color of different objects gets varied significantly due to illumination, conditions of the surface as well as observation (Finlayson et al., 1996)
More Related Content
Similar to Highly Secured Online Voting System (OVS) Over Network
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project provides the specification and requirements for E-Voting using an Android platform. The e-voting means the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling booth. The application follows proper authentication measures in order to avoid fraud voters using the system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and disclosure of results by third person other than the administrator. Once the session is completed the admin can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
Electronic Voting: Challenges and Prospects in Nigeria’s Democracytheijes
One basic feature of democracy is that it cuts across all divides of people in the act of election. It also encourages individual freedom according to the rule of law; hence people may behave and express themselves as they choose. This paper examines the development and implementation of and Electronic Voting System (EVS) that enables voters to cast their votes online and also enables the officials to register voters and print out the results of the votes casted. It equally provides security such that voters can only vote once with their identification details. The system therefore eliminates common fraud, speed up the processing of results, increase accessibility and make voting more convenient for the citizenry.
Mobile, Secure E - Voting Architecture for the Nigerian Electoral Systemiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Online voting system full thesis project by jahirJahir Khan
“ONLINE VOTING SYSTEM” is an online voting technique. In this system people who have citizenship can vote online without going to any physical polling station. There is a database which is maintained in which all the names of voters with complete information is stored.
In “ONLINE VOTING SYSTEM” a voter can use his\her voting right online without any difficulty. He\She has to be registered first for him/her to vote. Registration is mainly done by the system administrator for security reasons. The system Administrator registers the voters on a special site of the system visited by him only by simply filling a registration form to register voter. Citizens seeking registration are expected to contact the system administrator to submit their details. After the validity of them being citizens of India has been confirmed by the system administrator by comparing their details submitted with those in existing databases such as those as the Registrar of Persons, the citizen is then registered as a voter.
After registration, the voter is assigned a secret Voter ID with which he/she can use to log into the system and enjoy services provided by the system such as voting. If invalid/wrong details are submitted, then the citizen is not registered to vote.
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICIJERA Editor
The problem of voting is still critical in terms of safety and security. This paper is about the
design and development of a voting system using fingerprint to provide a high performance with high security
to the voting system. Fingerprint biometrics is widely used for identification. Biometrics identifiers cannot be
misplaced and they represent any individual identity. The integration of biometric with electronic voting
machine requires less manpower, save much time of voters and personal, ensure accuracy,transparency and fast
result in election. In this paper a framework for electronic voting machine based on biometric verification is
proposed and implemented. The proposed framework provides secured identification and authentication
processes for the voters and candidates through the use of fingerprint biometric
Facial Feature Recognition Using Biometricsijbuiiir1
Face recognition is one of the few biometric methods that possess the merits of both high accuracy and low intrusiveness. Biometric requires no physical interaction on behalf of the user. Biometric allows to perform passive identification in a one to many environments. Passwords and PINs are hard to remember and can be stolen or guessed; cards, tokens, keys and the like can be misplaced, forgotten, purloined or duplicated; magnetic cards can become corrupted and unreadable. However individuals biological traits cannot be misplaced, forgotten, stolen or forged.
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...ijbuiiir1
Color of the surface is one of the most imperative characteristics in the process of recognition as well as classification of the object which is based on camera. On the other hand, color of the object sometimes differs a lot due to the difference in illumination as well as the conditions of the surface. Utilization of the diverse features of the color gets impeded due to such variations. However, Characterization of the color of the object is possible with a controlling tool known as color invariants without considering the factors such asillumination and conditions of the surface. In the research proposal, analysis has been done on the estimation procedure related to RGB images color invariants. Object color is an imperative descriptor that can find the corresponding matching object in applications based on image matching as well as search, like- Object searching based on template and CBIR otherwise known as Content Based Image Retrieval. But, many times it has been observed that the apparent color of different objects gets varied significantly due to illumination, conditions of the surface as well as observation (Finlayson et al., 1996)
Applying Clustering Techniques for Efficient Text Mining in Twitter Dataijbuiiir1
Knowledge is the ultimate output of decisions on a dataset. The revolution of the Internet has made the global distance closer with the touch on the hand held electronic devices. Usage of social media sites have increased in the past decades. One of the most popular social media micro blog is Twitter. Twitter has millions of users in the world. In this paper the analysis of Twitter data is performed through the text contained in hash tags. After Preprocessing clustering algorithms are applied on text data. The different clusters formed are compared through various parameters. Visualization techniques are used to portray the results from which inferences like time series and topic flow can be easily made. The observed results show that the hierarchical clustering algorithm performs better than other algorithms.
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
Today, Cybercrime has caused lot of damages to individuals, organizations and even the Government. Cybercrime detection methods and classification methods have came up with varying levels of success for preventing and protecting data from such attacks. Several laws and methods have been introduced in order to prevent cybercrime and the penalties are laid down to the criminals. However, the study shows that there are many countries facing this problem even today and United States of America is leading with maximum damage due to the cybercrimes over the years. According to the recent survey carried out it was noticed that year 2013 saw the monetary damage of nearly 781.84 million U.S. dollars. This paper describes about the common areas where cybercrime usually occurs and the different types of cybercrimes that are committed today. The paper also shows the studies made on e-mail related crimes as email is the most common medium through which the cybercrimes occur. In addition, some of the case studies related to cybercrimes are also laid down
Vehicle to Vehicle Communication of Content Downloader in Mobileijbuiiir1
The content downloading is internet based service and the expectation of this services are highly popular in wireless communication it will be supporting for road side communication. We are focusing in content downloading system for both infrastructure-to-vehicle and vehicle-to-vehicle communication. The goal to improving system throughput and formulating a max-flow problem including the channel contention and data transfer paradigm. A system communication while transferring the files or downloading some application in road side environment there is the possibility of getting disconnected. The purpose of this study used to avoid the in conventional connection at the road side environment while using system or mobile based internet connection used for content or file downloader using MILP(Mixed Integer Linear programming) for max flow problem. The bounding box technique will be used to get the proper signal from base station. To avoid the traffic and access the quick response from the server the bounding box will used. The mail goal of the mobility management service is to trace the location where the subscribers are, allowing calls, SMS and other mobile phone services to be delivered to them. First we can analysing the data and select for correct location.. It will be provide challenging in vehicular networks, that is the transmission speed of the nodes will even more efficient though the area surrounded of buildings and many other architectural infrastructures of the radio signal.
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...ijbuiiir1
Today we have an abundant increase in the development of Information and Technology, which inturn made the Humans body even to carry a Mini- Computer in their Palms with Screen touch, Ex: Smart phone�s & Tablets etc., and parallel with the rich Enhancement in the Wireless Body Sensor Units, it is quite useful to the Enrichment of the Medical Treatment to be perfectly useful, comfortable via Smart Phones Using the networks (2G & 3G) carriers and made the treatment very easy even to the Common person in the society with the low cost money. With these the healthcare Authorities can treat the Patients (medical users) remotely where the patients reside at home or company or school or college or anywhere or at various places they work. This type of a treatment called for MHealthcare (Mobile- Healthcare). Although in the mhealthcare service there are many security and data Private problems to be overcome. Here we have A Secure and Private- Preserving Opportunistic Computing Framework called M-HealthCare, for Mobile-Healthcare Emergency. Using the Smart phone and SPOC, the Software or Hardware like computing power and energy can be gathered opportunistically to process the intensive Personal Health Information (PHI) of the medical user when he/she is in critical situation with minimal Private Disclosure. And also we introduce an efficient usercentric Private access control in SPOC Framework which is based on attribute access control and a new privatepreserving scalar product computation (PPSPC) technique and Makes a medical user (patient) to participate in opportunistic computing in transmitting his PHI data. Elaborated security analysis describes that the proposed SPOC framework can efficiently achieve usercentric Private access control in M-Healthcare emergency. In this paper we introduce Private-Preserving Support for Mobile Healthcare using Message Digest where we have used MD5 algorithm ,which can certainly achieves an efficient way and minimizes the memory consumed and the large amount of PHI data of the medical user (patient) is reduced to a fixed amount of size compared to AES which parallels increases the Speed of the data to be sent to TA without any delay which in-turn the professionals at Healthcare center can get exactly the Recent tablet user PHI data and can save their lives in correct time. As the algorithm is provided tight security in transmitting the patients PHI to TA. In respective performance evaluations with extensive simulations explains the MD (message digest) effectiveness in-term of providing high-reliable Personal Health Information (PHI) process and transmission while reducing the Private disclosure during Mobile-Healthcare emergency
A Survey on Implementation of Discrete Wavelet Transform for Image Denoisingijbuiiir1
Image Denoising has been a well studied problem in the field of image processing. Images are often received in defective conditions due to poor scanning and transmitting devices. Consequently, it creates problems for the subsequent process to read and understand such images. Removing noise from the original signal is still a challenging problem for researchers because noise removal introduces artifacts and causes blurring of the images. There have been several published algorithms and each approach has its assumptions, advantages, and limitations. This paper deals with using discrete wavelet transform derived features used for digital image texture analysis to denoise an image even in the presence of very high ratio of noise. Image Denoising is devised as a regression problem between the noise and signals, therefore, Wavelets appear to be a suitable tool for this task, because they allow analysis of images at various levels of resolution.
A Study on migrated Students and their Well - being using Amartya Sens Functi...ijbuiiir1
This paper deals with the multidimensional analysis of well-being from the theoretical point of views suggested by Dr. Amartya Sen. Sens Functioning Multidimensional Approach is broadly recognized as one of the most satisfying approaches to well-being. The Capability approach and the Functioning approach of Sen have found relatively many pragmatic applications mainly for its strong informational and methodological requirements. An attempt has been made to realize a multidimensional assessment of Sens concept of wellbeing with the use of the Fuzzy Set theory. The methodology is applied to the evaluative space of Functionings, with an experimental application to migrated students studying in Chennai, Tamil Nadu.
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...ijbuiiir1
Web Usage Mining is a kind of web mining which provides knowledge about user navigation behavior and gets the interesting patterns from web. Web usage mining refers to the mechanical invention and scrutiny of patterns in click stream and linked data treated as a consequence of user interactions with web resources on one or more web sites. Identify the need and interest of the user and its useful for upgrade web Sources. Web site developers they can update their web site according to their attention. In this paper discuss about the different types of Methodologies which has been carried out in previous research work for Discovering User Behavior and Predicting the Future Request.
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
Automatic recognition and verification of human faces is a significant problem in the development and application of Human Computer Interaction (HCI).In addition, the demand for reliable personal identification in computerized access control has resulted in an increased interest in biometrics to replace password and identification (ID) card. Over the last couple of years, face recognition researchers have been developing new techniques fuelled by the advances in computer vision techniques, Design of computers, sensors and in fast emerging face recognition systems. In this paper, a Face Recognition and Verification System has been designed which is robust to variations of illumination, pose and facial expression but very sensitive to variations of the features of the face. This design reckons in the holistic or global as well as the analyticor geometric features of the face of the human beings. The global structure of the human face is analysed by Principal Component Analysis while the features of the local structure are computed considering the geometric features of the face such as the eyes, nose and the mouth. The extracted local features of the face are trained and later tested using Artificial Neural Network (ANN). This combined approach of the global and the local structure of the face image is proved very effective in the system we have designed as it has a correct recognition rate of over 90%.
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Modelijbuiiir1
Levels of conceptual interoperability model is used to develop the method and model towards enhancing interoperability among mobile apps. The LCIM is used as descriptive and prescriptive form and it also make available of both metric of the degree of conceptual representation that exists between interoperating systems. In descriptive form LCIM is used to decrease the discrepancies in rating mobile apps based on content by suggesting a rating system that is completely based on interoperability. In the prescriptive form it receives information for app development, which allows producing apps with prominent level of interoperability. The Levels of Conceptual Interoperability has the abstract backbone for developing and implementing an interoperability framework that supports to exchange of XML based languages used by M&S systems across the web
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...ijbuiiir1
The emerging increase in vehicles and very high traffic, demands the need for improved Intelligent Transport Systems (ITS). The available ITSs do not meet all the requirements of the present day situation in providing safetravels and avoidance of congestionin spite of its limitations on road. Intelligent Transport Systemsrequiremore research and implementation of better solutions on the traffic network with increased mobility and more rapid acquisition of data by sense network technology. In this paper a review is made on the present ITS where research is required so that improvement in the course of implementing reality mining can enhance the behavior of ITS. This will breed a forward leap in the improvement of safety and convenience of personal and commercial travel and in turn guarantee an ultimate drop in fatality in the society
Stock Prediction Using Artificial Neural Networksijbuiiir1
Accurate prediction of stock price movements is highly challenging and significant topic for investors. Investors need to understand that stock price data is the most essential information which is highly volatile, non-linear, and non-parametric and are affected by many uncertainties and interrelated economic and political factors across the globe. Artificial Neural Networks (ANN) have been found to be an efficient tool in modeling stock prices and quite a large number of studies have been done on it. In this paper ANN modeling of stock prices of selected stocks under BSE is attempted to predict closing prices. The network developed consists of an input layer, one hidden layer and an output layer and the inputs being opening price, high, low, closing price and volume. Mean Absolute Percentage Error, Mean Absolute Deviation and Root Mean Square Error are used as indicators of performance of the networks. This paper is organized as follows. In the first section, the adaptability of ANN in stock prediction is discussed. In section two, we justify the using of ANNs in forecasting stock prices. Section three gives the literature review on the applications of ANNs in predicting the stock prices. Section four gives an overview of artificial neural networks. Section five presents the methodology adopted. Section six gives the simulation and performance analysis. Last section concludes with future direction of the study
Indian Language Text Representation and Categorization Using Supervised Learn...ijbuiiir1
India is the home of different languages, due to its cultural and geographical diversity. The official and regional languages of India play an important role in communication among the people living in the country. In the Constitution of India, a provision is made for each of the Indian states to choose their own official language for communicating at the state level for official purpose. In the eighth schedule as of May 2008, there are 22 official languages in India.The availability of constantly increasing amount of textual data of various Indian regional languages in electronic form has accelerated. So the Classification of text documents based on languages is essential. The objective of the work is the representation and categorization of Indian language text documents using text mining techniques. South Indian language corpus such as Kannada, Tamil and Telugu language corpus, has been created. Several text mining techniques such as naive Bayes classifier, k-Nearest-Neighbor classifier and decision tree for text categorization have been used.There is not much work done in text categorization in Indian languages. Text categorization in Indian languages is challenging as Indian languages are very rich in morphology. In this paper an attempt has been made to categories Indian language text using text mining algorithms
Software Developers Performance relationship with Cognitive Load Using Statis...ijbuiiir1
The success of the software development highly appreciated with the intellectual capital instead of physical assets of the concern. Human resource is the challenging resource in the software development industry to meet the customer requirement and deliver the project on time to the client. The software industry requires multi-skill and dynamic performers to meet the challenges. The skills domain knowledge and the developer�s performance are considered as the potential key factors for the success of the delivery of projects. The developer�s performance is influenced with cognitive factors and its measures. This study aimed to relate developer�s performance in the software industry with his/her cognitive workload. The various statistical measures like correlation, regression, variance and standard deviations are to be calculated for the developer�s performance with the cognitive load. The real-time development sector observations made of around 250 employees, 15 projects work and its corresponding cognitive load such as physical ability, mental ability, temporal ability, effort, frustration and performance in Web application, Database application and Multimedia. This paper provides the measurable analysis of the development process of the developers with their assigned task using statistical approach
Wireless Health Monitoring System Using ZigBeeijbuiiir1
Recent developments in off-the-shelf wireless embedded computing boards and the increasing need for efficient health monitoring systems, fueled by the increasing number of patients, has prompted R&D professionals to explore better health monitoring systems that are both mobile and cheap. This work investigates the feasibility of using the ZigBee embedded technology in health-related monitoring applications. Selected vital signs of patients are acquired using sensor nodes and readings are transmitted wirelessly using devices that utilize the ZigBee communications protocols. A prototype system has been developed and tested with encouraging results
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transformijbuiiir1
This research paper presents a proposed method for the compression of medical images using hybrid compression technique (DWT, DCT and Huffman coding). The objective of this hybrid scheme is to achieve higher compression rates by first applying DWT and DCT on individual components RGB. After applying this image is quantized to calculate probability index for each unique quantity so as to find out the unique binary code for each unique symbol for their encoding. Finally the Huffman compression is applied. Results show that the coding performance can be significantly improved by the hybrid DWT, DCT and Huffman coding algorithm
Agile development methodologies are very promising in the software industry. Agile development techniques are very realistic n understanding the fact that requirement in a business environment changes constantly. Agile development processes optimize the opportunity provided by cloud computing by doing software release iteratively and getting user feedback more frequently. The research work, a study on Agile Methods and cloud computing. This paper analyzes the Agile Management and development methods and its benefits with cloud computing. Combining agile development methodology with cloud computing brings the best of both worlds. A business strategy, the outcomes of which optimize profitability revenue and customer satisfaction by organizing around customer segments, fostering customer-satisfying behaviors, and implementing customer-centric processes
SOA is becoming important for Business Process Management and Enterprises. Now SOA is widely used by Enterprises as it provides seamless environment, flexibility, interoperability, but at the same time security should also consider because the basic SOA framework doesn�t possess any security. It depends upon the respective proprietor for security [1]. In recent times many research work had done for SOA security. Researchers have also proposed various frameworks and models such as FIX [2], SAVT [3] which tries a lot, but cannot achieve any landmark as they are based on XML schema.This proposed novel work contains an inbuilt security module which was based on PKI. At the same time this model will intact the flexibility and interoperability as the security module is embedded by analyzing the nature of WSDL, UDDI, SOAP and XML. These protocols are also compatible with PKI. Proposed Model was implemented in the asp.net environment then experimental results are compared with other security methods such as data mining based web security and automata based web security
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet Schedulingijbuiiir1
Bluetooth includes the concept of devices participating in multiple �piconets� interconnected via bridge devices and thereby forming a �scatternet�. This paper presents a scheme for Bluetooth scatternet operation that adapts to varying traffic patterns. According to the traffic information of all masters that the bridge is connected, the bridge switches to the masters with high traffic loads and increase the usage of the bridge. In addition, load adaptive interpiconet scheduling can reduce the number of failed unsniffs and the overhead of the bridge switch wastes to further increase the overall system performance.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Highly Secured Online Voting System (OVS) Over Network
1. Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 02 Issue: 02 December 2013 Page No.32-36
ISSN: 2278-2389
32
Highly Secured Online Voting System (OVS)
Over Network
1
S.N.Mugunthan, 2
Ms. D.Parameswari
1
MCA,Jerusalem College of Engineering, Chennai, India
2
Sr. Assistant professor, Jerusalem College of Engineering, Chennai, India.
Abstract- Internet voting systems have gained popularity and
have been used for government elections and referendums in
the United Kingdom, Estonia and Switzerland as well as
municipal elections in Canada and party primary elections in
the United States. Voting system can involve transmission of
ballots and votes via private computer networks or the Internet.
Electronic voting technology can speed the counting of ballots
and can provide improved accessibility for disabled voters. The
aim of this paper is to people who have citizenship of India and
whose age is above 18 years and of any sex can give their vote
through online without going to any physical polling station.
Election Commission Officer (Election Commission Officer
who will verify whether registered user and candidates are
authentic or not) to participate in online voting. This online
voting system is highly secured, and its design is very simple,
ease of use and also reliable. The proposed software is
developed and tested to work on Ethernet and allows online
voting. It also creates and manages voting and an election
detail as all the users must login by user name and password
and click on his favorable candidates to register vote. This will
increase the voting percentage in India. By applying high
security it will reduce false votes.
Keywords- Internet voting, e-voting, Face recognition, Image
Processing, Secured network, JDBC.
I. INTRODUCTION
In every country Election is a basic ornament of democracy
that allows people to show their opinions by electing their
leaders. India is in need of such a system where people can
vote without any problem and feel secure and no one can
manipulate the results. Such environment can only be created
through some automated system which cannot be cheated by
any one. Breaking down the problems more deeply into the
security concerns we found that the present day system being
followed by the Government of India is not secure and hence
people can misuse the facilities. As there are a lot of financial
issues with the election commission and hence cannot appoint
so many security guards to make sure that the process runs
smoothly without corruption and even if they do so, it is likely
they will have a way to deceive them as well and keep on
bluffing the Government and the people [15] [16]. As soon as
computer went on e – move there was a need to figure out how
to safe guard the sensitive information of companies and
governments. Understanding the needs of time, the
governments measured how to start and where to start. Security
and trust are among the main issues in e – Government, and are
the main problems in practicing e – Government [13]. Along
with these issues one the main emergence of e – government is
e – democracy specifically eVoting. How to secure eVoting;
may it be electronics machines being used at polling stations,
or getting citizen cast their votes through specifically driven
websites for the sake of election.One basic precondition for e-
elections must be the feasibility of implementing the voting
under such conditions that the principles underpinning the
electoral system are not disregarded. Accordingly, the system
must be at least as secure as corresponding traditional voting
procedures. Another precondition is that the e-voting procedure
must be simple and function smoothly for the voters. Its overall
purpose is to enhance accessibility to voters.The present form
of voting in general elections is founded entirely on paperbased
and largely manual voting procedures. New technology with
advanced vote-client machines (computer terminals used for
voting) for eelections may entail several advantages. It may, as
mentioned above, enhance the voters’ scope for participating in
the election. It also creates scope for more rapid tallying of
votes and distribution of seats. This also enables the electoral
administration to promptly announce the election results to a
broader circle. The risk of error in vote-tallying can also be
largely eliminated. The new technology also entails
disadvantages that must be considered. One is the difficulty of
guaranteeing ballot secrecy with absolute certainty. Another is
the question of how to guarantee the reliability of the system,
i.e. that the system will in all situations function in the manner
in which it is meant to function. Another disadvantage is the
expense of development and operation. All in all, then, the
primary considerations are security and reliability.
In this proposed system, the Internet is changing citizen
expectations around the speed and convenience with which all
government services and elections should be delivered. We use
the Internet to shop, bank, maintain our social and professional
networks, and to find answers to our questions. Since 2004,
when Elections BC introduced North America’s first fully
integrated online voter registration service, British Columbians
have also been using the Internet to register to vote. It is
natural that citizens are asking when they will be able to vote
online, especially given that banking and other transactions
requiring security to protect personal information are now
routinely performed in the virtual world.Questions about
Internet voting have sparked a vibrant debate, as policy
makers, election administrators, computer experts, academics,
private technology suppliers and interested members of the
public discuss the potentially far-reaching implications of this
form of voting for the security, transparency and integrity of
voting and counting processes. Several prominent computer
security and e-law experts have expressed concerns about the
suitability of the Internet as a voting platform. Figure 1.1
shows the architecture of the voting system through online.
2. Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 02 Issue: 02 December 2013 Page No.32-36
ISSN: 2278-2389
33
Figure 1.1 Architecture of online voting.
1.1 Problem Background
This discussion paper addresses the question of what Internet
voting may mean for through a review of the relevant
literature. Our intent is not to propose a particular online voting
solution, but rather to provide input to a future government
committee or task force that may be created to delve further
into the topic.The potential benefits and risks of Internet voting
are discussed in terms of seven of the core democratic
principles that shape modern electoral systems: accessibility,
equal voting power, secrecy, security, audit ability,
transparency, and simplicity.
1.2 Problem Statement
Internet voting is about making the act of voting as convenient
as possible and it holds great promise to improve accessibility,
particularly to those who are absent from the jurisdiction, live
in a remote area, or who have mobility issues. However, this
voting channel introduces risks to some of the fundamental
principles of democratic systems. As policy makers consider a
place for Internet voting, it is important that a balance is struck
between competing principles, all of which are critical to
electoral integrity, so that public confidence in election
outcomes is maintained.
1.3 Research Objective
The main objective of this work is to develop an interactive
voting system application with which users can participate
using their information stored prior in database while creating
the voter ID and the information need to be updated at an
period of less than six months for perfect user verification by
the Independent Electoral Commission of India (IECI). In this
system people who have citizenship of India and whose age is
above 18 years and of any sex can give their vote through
online without going to any physical polling station. After
registration each voter/user is assigned with the particular ID
generated by the Electoral Commission of India along with the
online registration ID i.e. user name. With every time logging
in to the system the user is validated with both of the ID.
Through these development we can obtain a secured website
comprises of all the voting methodologies in a single website.
1.4 Scope of Study
The scope of the work is that it will use the ID and password
created by user to register him/her in the voting site, through
this all the details of voter are saved in database. And it will act
as the main security to the votes system.
Advanced technology: It is an advanced technology used now
a day. It increases the internet knowledge of the users which is
very necessary for current generation.
Internet: It is an online facility and hence very useful for the
users. Voters can vote from anywhere at any time in India.
E-Mails: Election Commission can send the error report to a
particular user if he/she entered false information.
Image: Image is being captured through online and that image
is being validated with the image on the database.
II. LITERATURE STUDY
2.1 Background
Traditionally in a manual, paper based election system, voters
have to reach at polling stations to cast their votes by standing
in a long queue, therefore it is very much difficult for voters to
vote their votes in this way there is a low rate of vote
casting[1]. In 2004, Chaum [Ch04] and, independently, Neff
[Ne04] proposed 316 cryptographically secure voting systems
in which the voter has access to no computational device at the
time of voting. Since then, most research has focused on such
bare-handed, end-to-end verifiable voting systems [2].In 2004,
the Department of Defense cancelled the Internet-based voting
system SERVE that was developed by Accenture on a $22
million contract [4] because of justified security concerns
raised by the academic community [5]. At the same time, the
source code of currently used electronic voting systems was
put under scrutiny and a multitude of flaws was unearthed
[6].In 2010, Washington, D.C. developed an Internet voting
pilot project that was intended to allow overseas absentee
voters to cast their ballots using a website. Prior to deploying
the system in the general election, the District held a unique
public trial: a mock election during which anyone was invited
to test the system or attempt to compromise its security [9].
There are some drawbacks with this system are, there can be
software failure issue, insecure access of internet and also voter
should be familiar with internet [7].In our proposed system we
proposed new Blind signature which is a special form of digital
signature, which was introduced by David Chaum in 1982
[13], in which the content of a message is blinded before
signature. In blind signature scheme, signer signs on the blind
message using his/her private key and anyone can verify the
legitimacy of the signature using signer’s public key [14]. This
software is being developed for use of e-voting. Here each user
is registered with the application. After registration each
voter/user is assigned with the particular ID generated by the
Electoral Commission of India along with the online
registration ID i.e. user name. With every time logging in to
the system the user is validated with both of the ID. Through
these development we can obtain a secured website comprises
of all the voting methodologies in a single website.Internet
voting presents a challenge to policy makers. On the positive
side, Internet voting fits with the B.C. government policy
direction to provide citizens with access to a greater variety of
high quality online services. Internet voting offers voters a
convenient alternative to in-person voting. This may be
particularly important to voters who have difficulty attending
in-person voting opportunities. And finally, concerns about the
digital divide are diminishing as the proportion of British
Columbians who use the Internet continues to grow. Policy
makers need to weigh these positive considerations with
compromises that Internet voting would entail for several
3. Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 02 Issue: 02 December 2013 Page No.32-36
ISSN: 2278-2389
34
foundational principles of elections. With the current state of
technology, Internet voting is considered to be less effective
than traditional, in-person and postal voting methods at
protecting ballots against larges cale fraud, ensuring the
secrecy of the vote, and providing a fully transparent and
observable process that can be effectively audited. Because
specialized computer skills are required to observe an Internet
voting process, voters would have to delegate their trust to
“experts” to confirm that the election is conducted
properly.Through these methodologies an objective of this
research is to capture the image through camera at the time of
logging on to the page and it validates the image along with the
password generated. Then the particular login is authenticated.
2.2 Design and Implementation
Electronic voting technology can include punched cards,
optical scan voting systems and specialized voting kiosks
(including self-contained direct-recording electronic voting
systems, or DRE). To increase the security of this e-voting
system to another level which is quiet concern at different
origins we have implemented an online image verification
system.The aim of this design is to develop an interactive
voting system with which users can participate using their
images stored prior in database while creating the voter ID and
the image need to be updated at an period of less than six
months for perfect user verification. The project will involve
three phases: the development of a graphical front-end to the
voting system; the development of a method of interaction with
web cams, and the development of a web-based administration
tool. The new user must produce their photo while registering
in the e-voting system.This should not be surprising. Almost
weekly we learn of one system or another that is penetrated by
outsiders, including teens and overseas criminals.
Organizations that have been unable to protect networks and
applications include banks, government agencies, the
Department of Defense and ironically, Internet security firms.
To the public, like some legislators, it seems intuitive to accept
that "We use ATMs and bank online with no problems, why
not vote that way?" This argument fails theoretically and
practically. The anonymous ballot does not provide the
verification and proof of banking receipts or double entry
bookkeeping which help detect fraud. ATMs are bank-owned
computers with special network security, much safer than
general purpose computers. Even so, banks lose billions each
year to fraud with ATMs and online banking. The system is
highly insecure and prone to election malpractice. Due to the
fact that any student can come and fill out a ballot sheet
without prior authentication to determine who he/she says they
are, is a major concern.
2.3. Algorithm
Recent work on face identification using continuous density
Hidden Markov Models (HMMs) has shown that stochastic
modelling can be used successfully to encode feature
information. When frontal images of faces are sampled using
top-bottom scanning, there is a natural order in which the
features appear and this can be conveniently be modelled using
a top-bottom HMM. However, a top-bottom HMM is
characterised by different parameters, the choice of which has
so far been based on subjective intuition. This paper presents a
set of experimental results in which various HMM
parameterisations are analysed. Matlab is used to implement
the Eigenfaces, Fisherfaces, and SIFT matching algorithms.
The following algorithm states the work of Principal
Component Analysis (PCA):
Principal Component Analysis:
a random vector
do c times:
(a vector of length m)
for each row
return
2.4 Methodology
Every voter should have a personal identification number. This
number will be automatically checked along with the ID stored
on the database. Let us use 256*256 pixels bitmap cover image
which should be clear so that it will be very easy for
comparison. This image will be chosen from among a set of
images in the system which matches the cover image. Cover
image is a simple image for personal identification over the
base image. So, the cover image for each voter is different
which will reduce the chances of predicting the image by an
attacker during transmission.
2.5 Workflow
The Figure 2.5.1 shows the workflow where the user identity
and a perfect image is being compared and validated.
2.6 Experimental result
Voting System needs the verification of the user through the
username and password and the figure 2.6.1 shows the home
page along with the login panel.
From the above page while login the image stored on the
database is compared with the image taken while
authentication is done through Figure 2.6.2.
4. Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 02 Issue: 02 December 2013 Page No.32-36
ISSN: 2278-2389
35
Figure 2.5.1 WorkFlow
Figure 2.6.1 Home Page
Figure 2.6.2 Image Recognition
After perfect authentication is made then the user can vote up
for the desired candidate as the figure 2.6.3.
Figure 2.6.3 Voting Page
III. CONCLUSION
In this paper we have enforced a method for integrating
Cryptography over network to present a highly secure Online
Voting System. The security level of our system is greatly
improved by the new idea of random cover image generation
for each voter. The user authentication process of the system is
improved by adding both face recognition and password
security. The recognition portion of the system is secured by
the cover image. This system will preclude the illegal practices
like rigging. Thus, the citizens can be sure that they alone can
choose their leaders, thus exercising their right in the
democracy. The usage of online voting has the capability to
reduce or remove unwanted human errors. In addition to its
reliability, online voting can handle multiple modalities, and
provide better scalability for large elections. Online voting is
also an excellent mechanism that does not require geographical
proximity of the voters. For example, soldiers abroad can
participate in elections by voting online. Hence, by this voting
percentage will increase drastically.
REFERENCES
[1] R. Mercuri, “Electronic Vote Tabulation Checks and Balances”, PhD
thesis, University of Pennsylvania, Philadelphia, PA, October 2000
[2] A New Implementation of a Dual (Paper and Cryptographic) Voting
System Jonathan Ben-Nun, Niko Farhi, Morgan Llewellyn, Ben Riva1,
Alon Rosen, Amnon Ta-Shma, Douglas Wikström
[3] Highly Secure Online Voting System with Multi Security using
Biometric and Steganography - B. Swaminathan, J. Cross Datson
Dinesh
[4] J. Schwartz. Online Voting Canceled for Americans Overseas . The
New York Times, February, 6 2004.
[5] D. Jefferson, A. Rubin, B. Simmons, and D. Wagner. A Security
Analysis of the Secure Electronic Registration and Voting Experiment
(SERVE). Technical report, 2004. http://servesecurityreport.org/.
[6] T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach. Analysis of an
Electronic Voting System. In IEEE Symposium on Security and
Privacy, May 2004.
[7] An Efficient Online Voting System - Ankit Anand, Pallavi Divya
[8] Internetvoting.VerifiedVoting.http://www.verifiedvoting.org/article.php
?list= type&type=27, May 2011.
[9] Attacking the Washington, D.C. Internet Voting System Scott Wolchok,
Eric Wustrow, Dawn Isabel, and J. Alex Halderman.
[10] http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html
[11] Adida, B. Helios: Web-based open-audit voting. In Proc. 17th USENIX
Security Symposium (July 2008).
5. Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 02 Issue: 02 December 2013 Page No.32-36
ISSN: 2278-2389
36
[12] Rubin, A. Security considerations for remote electronic voting over the
Internet. http://avirubin.com/e-voting.security.html
[13] D. Chaum, "Blind Signature Systems", U.S. Patent 4,759,063, 19 Jul
1988.
[14] Zuowen Tan, Zhuojun Liu, Chunming Tang, "Digital Proxy Blind
Signature Schemes Based on DLP and ECDLP", MM Research
Preprints, 212–217, 21, December 2002.
[15] ECDLP", MM Research Preprints, 212–217, 21, December 2002.
[16] Daily Times, PPP wants fresh election in Bannu
http://www.dailytimes.com.pk/default.asp?page=200
7%5C04%5C03%5Cstory_3-4-2007_pg11_2
[17] 2002,MonitoryReport
http://action.web.ca/home/sap/attach/pk%20election
%20monitor%202002.rtf
[18] J. Gilberg. E-VOTE: An Internet-based Electronic Voting System:
Consolidated Prototype 2 Documentation. Technical Report e-
VOTE/WP-7/D7.4/3.0/29-05-2003, May 2003.
http://www.instore.gr/evote/evote end/htm/3public/doc3/public/public
deliverables/d7 4/Consolidated Docu final.zip.
[19] I. Damgård, J. Groth, and G. Salomonsen. Secure Electronic Voting,
chapter 6, pages 77–99. Kluwer Academic Publishers, 2003.
[20] A. Riera and P. Brown. Bringing Confidence to Electronic Voting.
EJEG, 2(1), July 2004.
[21] Lin, Y. and Chlamtac, I. (2000) Wireless and Mobile Network
Architectures. Wiley Publications.
[22] R.J. Baron, ªMechanisms of Human Facial Recognition,º Int'l J. Man
Machine Studies, vol. 15, pp. 137-178, 1981.
[23] Cardinaux, F., Sanderson, C., and Bengio, S. User authentication via
adapted statistical models of face images. IEEE Transactions on Signal
Processing 54 (January 2006), 361-373.
[24] Lee, K.-C., Ho, J., and Kriegman, D. Acquiring linear subspaces for
face recognition under variable lighting. IEEE Transactions on Pattern
Analysis and Machine Intelligence (PAMI) 27, 5 (2005).
[25] Maturana, D., Mery, D., and Soto, A. Face recognition with local binary
patterns, spatial pyramid histograms and naive bayes nearest neighbor
classification. 2009 International Conference of the Chilean Computer
Science Society (SCCC) (2009), 125-132.
[26] Rowley, H., Baluja, S., & Kanade, T. (1998). Neural network-based
face detection. IEEE Trans. on Pattern Analysis and Machine
Intelligence, 1 (20), 23–28.