The use of fingerprints in a voting system for registration and authentication
application has its limitations. Among these limitations are mismatches caused by
disparity in fingerprint trait and templates of voters taken at the point of registration
and at the point of authentication (voter’s accreditation). Manual labour, aging,
variations in user interaction (i.e. pressure on the scanner), environmental changes
and injuries are a few of the factors that can cause these disparities. The iris is more
resistant to these factors that cause disparity in biometrics. In this designed model, the
iris was used in place of fingerprints as the biometric measure to register and
authenticate voters. An iris scanner obtains the voter’s iris image, segments and
digitizes it. The digitized iris image of the voter is used as a training data and stored
in the template. This template is stored together with the voter’s particulars in a
database. An algorithm design using the C# (C sharp) language issues a PIN for the
voter’s authentication. At the point of authentication, the PIN of the voter is keyed in.
The iris scanner obtains the voter’s iris image, generates a template of the iris and
with the aid of the system’s embedded algorithm, compares the details of the voter’s
pin and iris trait with the one in the database for a match. A match grants the voter
the pass to vote. A mismatch denies the voter access to the voting system. This
implemented Iris Recognition Technology drastically reduces the chances of
mismatches for genuine voters and denies imposters in the voting system due to its
reliability and robustness as revealed by the tests carried out on the designed model.
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...IRJET Journal
This document summarizes a research paper on multimodal biometrics identification using fingerprint and iris images. It discusses how a multimodal biometric system that fuses fingerprint and iris traits can improve identification accuracy over unimodal systems. The document outlines the architecture of multimodal biometric systems, including how different biometrics are acquired, processed independently, and then fused using techniques like score-level fusion. It also discusses related work on fingerprint and iris recognition individually, as well as previous research on multimodal biometrics fusion.
A survey paper on various biometric security system methodsIRJET Journal
This document summarizes various biometric security systems for identification. It discusses fingerprint recognition, iris recognition, and face recognition methods. It provides an overview of different approaches that have been proposed, including using watermarking, edge detection techniques, adaptive boosting algorithms, and fuzzy logic. The document also analyzes the drawbacks of previous methods and proposes using a multimodal biometric system that fuses fingerprints, iris, and face for more secure identification. Overall, the document surveys different biometric identification techniques and highlights that a multimodal approach can help overcome limitations of individual methods.
This document compares various biometric methods for identification and verification. It discusses fingerprint recognition, face recognition, voice recognition, and iris recognition as some of the main biometric techniques. For each method, it describes how the biometric data is captured and analyzed, the advantages and disadvantages, and examples of applications where the technique can be used. The document provides an overview of the history of biometrics and the typical modules involved in a biometric system, such as sensors, feature extraction, matching, and template databases.
OSPCV: Off-line Signature Verification using Principal Component VariancesIOSR Journals
This document presents an offline signature verification system called OSPCV (Offline Signature Verification using Principal Component Variances) that analyzes two features - pixel density and center of gravity distance. It describes the related work in signature verification, the proposed OSPCV algorithm, and experimental results showing it provides a notable improvement over existing systems. The OSPCV system overcomes intra-signature and inter-signature variations to produce a better equal error rate for differentiating genuine versus forged signatures.
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
Overlapped fingerprints captured at the crime scene plays significant role as an evidence to capture the criminals. As latent fingerprints are the accidently left skin impressions, so these are found to be with broken ridge composition, overlapped patterns and spoiled minutiae information. The Graphical User Interface (GUI) system is developed by using MATLAB R2015a software. This project also includes the development of standalone program for this system. The main purpose of GUI development is to get the value of real end points and real-branch points of a overlapped fingerprint image. The value of this point is used in fingerprint image matching process to identify the owner of an overlapped fingerprint image. The image enhancement consists of several process such as histogram equalization process, enhancement by Fast Fourier Transform (FFT) factor, and image binarization while minutiae extraction consist of ridge thinning process, region of interest (ROI) extraction, and minutiae extraction process. All processes should be done one by one.
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
The document presents a highly secured palm print authentication system using undecimated bi-orthogonal wavelet (UDBW) transform. The proposed system has three main modules: registration, testing, and palm matching. In the registration module, morphological operations and region of interest extraction are used to preprocess palm images. Distance transform and 3-level UDBW transform are then used to extract low-level features and create feature vectors for registered palm prints. In testing, low-level features are extracted from input palm prints using the same approach. Palm matching involves comparing feature vectors of registered and input palm prints to identify matches. Simulation results show the system provides accurate recognition rates for palm print authentication.
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
Detail information about the real time errors in the biometrics devices and also how to secure encryption keys. To make authentication systems more secure. In this seminar report describe about the combination of the biometrics with the cryptography. and also describe the methods that are used to handle the real time error like fault accept and fault reject and also describe their their rates.i,e FRR and FAR by the biometrics systems.
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET Journal
This document describes a proposed system for advanced two-factor authentication using image processing for mobile transactions. The system uses fingerprint recognition and iris recognition for user authentication along with a personal identification number for added security. For fingerprint recognition, it uses minutiae-based matching algorithms like Minutiae Maps and Orientation Map. It also implements iris recognition using a K-Nearest Neighbors classifier. The system is designed to provide greater security for online transactions by minimizing security breaches during authentication. It aims to enhance confidentiality and integrity in online banking transactions.
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...IRJET Journal
This document summarizes a research paper on multimodal biometrics identification using fingerprint and iris images. It discusses how a multimodal biometric system that fuses fingerprint and iris traits can improve identification accuracy over unimodal systems. The document outlines the architecture of multimodal biometric systems, including how different biometrics are acquired, processed independently, and then fused using techniques like score-level fusion. It also discusses related work on fingerprint and iris recognition individually, as well as previous research on multimodal biometrics fusion.
A survey paper on various biometric security system methodsIRJET Journal
This document summarizes various biometric security systems for identification. It discusses fingerprint recognition, iris recognition, and face recognition methods. It provides an overview of different approaches that have been proposed, including using watermarking, edge detection techniques, adaptive boosting algorithms, and fuzzy logic. The document also analyzes the drawbacks of previous methods and proposes using a multimodal biometric system that fuses fingerprints, iris, and face for more secure identification. Overall, the document surveys different biometric identification techniques and highlights that a multimodal approach can help overcome limitations of individual methods.
This document compares various biometric methods for identification and verification. It discusses fingerprint recognition, face recognition, voice recognition, and iris recognition as some of the main biometric techniques. For each method, it describes how the biometric data is captured and analyzed, the advantages and disadvantages, and examples of applications where the technique can be used. The document provides an overview of the history of biometrics and the typical modules involved in a biometric system, such as sensors, feature extraction, matching, and template databases.
OSPCV: Off-line Signature Verification using Principal Component VariancesIOSR Journals
This document presents an offline signature verification system called OSPCV (Offline Signature Verification using Principal Component Variances) that analyzes two features - pixel density and center of gravity distance. It describes the related work in signature verification, the proposed OSPCV algorithm, and experimental results showing it provides a notable improvement over existing systems. The OSPCV system overcomes intra-signature and inter-signature variations to produce a better equal error rate for differentiating genuine versus forged signatures.
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
Overlapped fingerprints captured at the crime scene plays significant role as an evidence to capture the criminals. As latent fingerprints are the accidently left skin impressions, so these are found to be with broken ridge composition, overlapped patterns and spoiled minutiae information. The Graphical User Interface (GUI) system is developed by using MATLAB R2015a software. This project also includes the development of standalone program for this system. The main purpose of GUI development is to get the value of real end points and real-branch points of a overlapped fingerprint image. The value of this point is used in fingerprint image matching process to identify the owner of an overlapped fingerprint image. The image enhancement consists of several process such as histogram equalization process, enhancement by Fast Fourier Transform (FFT) factor, and image binarization while minutiae extraction consist of ridge thinning process, region of interest (ROI) extraction, and minutiae extraction process. All processes should be done one by one.
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
The document presents a highly secured palm print authentication system using undecimated bi-orthogonal wavelet (UDBW) transform. The proposed system has three main modules: registration, testing, and palm matching. In the registration module, morphological operations and region of interest extraction are used to preprocess palm images. Distance transform and 3-level UDBW transform are then used to extract low-level features and create feature vectors for registered palm prints. In testing, low-level features are extracted from input palm prints using the same approach. Palm matching involves comparing feature vectors of registered and input palm prints to identify matches. Simulation results show the system provides accurate recognition rates for palm print authentication.
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
Detail information about the real time errors in the biometrics devices and also how to secure encryption keys. To make authentication systems more secure. In this seminar report describe about the combination of the biometrics with the cryptography. and also describe the methods that are used to handle the real time error like fault accept and fault reject and also describe their their rates.i,e FRR and FAR by the biometrics systems.
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET Journal
This document describes a proposed system for advanced two-factor authentication using image processing for mobile transactions. The system uses fingerprint recognition and iris recognition for user authentication along with a personal identification number for added security. For fingerprint recognition, it uses minutiae-based matching algorithms like Minutiae Maps and Orientation Map. It also implements iris recognition using a K-Nearest Neighbors classifier. The system is designed to provide greater security for online transactions by minimizing security breaches during authentication. It aims to enhance confidentiality and integrity in online banking transactions.
This document presents an overview of a student project on multimodal biometrics. It discusses combining fingerprint and iris recognition through feature-level fusion using a hybrid wavelet-based approach. The document outlines the presentation structure, importance and motivation of the project, related work in biometrics and multimodal biometrics, relevant theory, and applications of biometrics. It defines the problem of fusing fingerprint and iris modalities for improved identification performance.
Integrating Fusion levels for Biometric Authentication SystemIOSRJECE
— Recently a lot of works are presented in the literature for the multimodal biometric authentication. And such biometric systems have been widely accepted with increasing accuracy rates and population coverage, reducing the vulnerability to spoofing. This paper descripts about the proposed multimodal biometric system that combines the feature extraction level and the score level fusion of iris and face unimodal biometric systems in order to take advantage of both fusion techniques. The experimental results shows the performance of the multimodal and multilevel fusion techniques which are analysed using TRR and TAR to study the recognition behaviour of the approach system. From the ROC Curve plotted, the performance of the proposed system is better compared to the individual fusion techniques.
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
The document discusses a proposed smart attendance management system that integrates fingerprint biometric authentication with wireless connectivity. The system uses an Android mobile application to register users and record their attendance through fingerprint scans. It ensures employees are physically present at work by only allowing attendance checks when the mobile device is connected to the organization's wireless router. This prevents employees from falsely checking in without remaining on-site. The system aims to reduce costs compared to traditional fingerprint scanners while providing increased portability and convenience through the use of mobile phones and wireless technology.
A comparative analysis of Iris data compressionIJSRED
This document provides an overview of the Aadhar identification system used in India. It discusses how Aadhar collects and stores biometric data like iris scans and fingerprints. It also describes the different processes involved, including enrollment where biometric data is collected, feature extraction and template generation, matching against stored templates for identification or verification, and storing templates in a database. The document also reviews several research papers on topics like iris recognition and compression, and the use of techniques like Huffman coding.
Optimization of human finger knuckle print as a neoteric biometric identifierIRJET Journal
This document proposes developing a finger knuckle print-based biometric identification system. It involves preprocessing input images from video, extracting features using principal component analysis (PCA) and local binary patterns (LBP), and using a k-nearest neighbors (k-NN) classifier for matching. The system is tested on a database of finger knuckle print images from multiple individuals. Accuracy is calculated for both PCA+k-NN and LBP+k-NN approaches, with PCA+k-NN achieving higher accuracy of 93.33% compared to 86.67% for LBP+k-NN. Statistical features are also extracted from training and testing images of one individual to analyze feature consistency.
This document proposes a centralized biometric voting system using fingerprint recognition. It discusses how fingerprint scanners work by scanning fingerprints and comparing them to a centralized database. The proposed system aims to improve security, reduce fake voting, and allow voters to cast their ballot from anywhere by authenticating through fingerprint biometrics. It analyzes the technical, economic, and operational feasibility of the system. The results suggest it improves the current voting process by making it more reliable, secure, and reducing required manpower through automation. The system aims to maximize voter participation using a centralized database for authentication.
This document discusses enhancing biometric authentication for network security using iris recognition. It proposes using iris biometrics to generate secure authentication keys. The methodology involves preprocessing iris images, extracting minutiae feature points from the iris, generating a secret key from the minutiae, and using the key to encrypt and authenticate network access. Experimental results on two iris image datasets show the method effectively provides network security through iris-based encryption and authentication.
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
This document summarizes an research paper on offline handwritten signature verification using local binary pattern features and K-nearest neighbors classification. It describes preprocessing signatures using Otsu thresholding, extracting local binary pattern features, and classifying signatures with KNN. 40 signature recognition approaches were reviewed before designing this system. The system achieved an accuracy of 85% on a dataset of bank cheque signatures during testing.
This document summarizes a study on iris recognition. It discusses how iris recognition works by capturing high-resolution images of a person's iris and extracting distinguishing features to create biometric templates for identification. The key steps described are iris localization to isolate the iris region, feature extraction using filters to encode patterns into binary codes, and template matching using Hamming distance to compare templates and identify matches. Advantages of iris recognition include very high accuracy and verification time under 5 seconds. Disadvantages include its intrusive nature and high memory requirements. Applications discussed include security for ATMs, computers, buildings, and airports.
IRJET- Library Management System with Facial Biometric AuthenticationIRJET Journal
This document proposes a library management system using facial recognition for biometric authentication. It would automate the entry and exit logging of users and reduce wait times. The system involves two phases: 1) enrolling images of authorized users in a dataset during initial setup and 2) verifying users in real-time by comparing their images to those in the stored dataset. If a match is found, the user is granted access, and if not, they are denied entry. The system aims to eliminate manual logging and prevent unauthorized access to library resources.
Smart Voting System with Face RecognitionNikhil Katte
This document proposes a smart voting system using face recognition to allow people to vote digitally using their smartphones. The system would have a server, registration center application, and voter android application. It works by capturing a live image of the voter's face on their phone, sending it to the server for authentication using face recognition algorithms, and allowing them to vote if authorized. The system aims to modernize voting and make it more convenient using digital technologies while maintaining security.
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET Journal
This document discusses using biometrics like fingerprints for banking security in India. It aims to overcome security problems faced by Indian banks and ensure 100% security by developing a system that uses human fingerprints to verify users and grant access to lockers. The system would work as a mini banking assistant for users. The document reviews biometrics research and discusses fingerprint identification and verification methods like ACE-V. It analyzes the advantages of identification vs verification modes and positive vs negative recognition in biometric systems. The goal is to develop an enhanced security approach for Indian banks using fingerprint biometrics.
The document discusses biometrics and biometric systems. It defines biometrics as measurable biological characteristics that can be used to identify individuals. It then describes the main components of a biometric system, including sensors, feature extraction, matching, and databases. The document discusses verification and identification modes of biometric systems. It also explains the different types of errors that can occur in biometric systems, including false accepts and false rejects, and how performance is evaluated using metrics like FMR, FNMR, FTE, and FTC rates.
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person’s identity. Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi biometric systems are used to overcome this issue by providing multiple pieces of indication of the same identity. This system provides effective fusion structure that combines information provided by the multiple field experts based on decision-level and score-level fusion method, thereby increasing the efficiency which is not conceivable in uni-modal system.Multi-modal biometrics can be attained through a fusion of two or more images, where the subsequent fused image will be more protected. This paper discusses various fusion techniques, architecture of multi-modal biometric authentication and working of biometric fusion i.e. Iris and Fingerprint recognition that are used in multi-modal biometrics
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
This document discusses using watermarking and visual cryptography for secure identity-based authentication. It proposes embedding an iris image using a watermarking algorithm and visual cryptography techniques for protection. Feature extraction and binomial distribution analysis are used to evaluate false acceptance and rejection rates to validate two algorithms, MASEK and Ma, for iris recognition on noisy images. The document also discusses discrete cosine transform (DCT) and discrete wavelet transform (DWT) techniques for image processing and compression in iris recognition systems.
Role of fuzzy in multimodal biometrics systemKishor Singh
This document summarizes a research paper on using fuzzy logic in a multimodal biometrics system combining face, ear, and foot recognition. It discusses how unimodal biometric systems have limitations that multimodal systems aim to overcome through data fusion. The methodology uses eigenfaces for face recognition, eigenimages for ear recognition, and sequential modified Haar transform for foot recognition. Scores are normalized and fused using fuzzy logic rules. Highest matching was found when fusing face and ear, lowest when fusing ear and foot. The fuzzy multimodal system enhanced identification accuracy over unimodal systems.
Wireless Student Attendance System using Fingerprint Sensorijtsrd
Nowadays accurate personal identification is becoming more and more important. Usual means smart cards, passwords… have shown their limits. Currently fingerprint recognition is the most widely used technique for personal identification. The development of an attendance management system using biometrics is proposed. As the manual method of attendance system produced errors and taking lot of time during lecture period, an efficient and organized biometrics system for students attendance is purposed. The electronic system not only used to take attendance for the students, but a database is also mentioned to store all the information which can be manipulated further in future. Optical fingerprint sensor will make adding fingerprint detection and verification super simple.This type of verification is widely used in various aspects of life for different purposes, like in security, police identification, etc. Node MCU is used which provides the wireless communication. It also send the attendance report to PC. In this system, there are two parts, one is transmitter and another is receiver. In transmitter module, there is a Liquid Crystal Display LCD , Arduino UNO, transmitter. In receiver module, Node MCU is mainly used. The resultant message will show on LCD. Yu Maw Win | Saw Aung Nyein Oo ""Wireless Student Attendance System using Fingerprint Sensor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25157.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25157/wireless-student-attendance-system-using-fingerprint-sensor/yu-maw-win
The document provides an overview of biometric security systems. It defines biometrics as measuring unique human characteristics and discusses various physiological and behavioral biometric traits used for identification, including fingerprints, facial recognition, voice recognition, hand geometry, retina and iris scanning. It covers classification of biometric traits, factors for determining their effectiveness, functions of biometric systems, and concerns regarding privacy, standardization and overreliance. The document concludes by discussing potential future applications of biometric technologies in hospitals, forensics and membership programs.
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTIRJET Journal
The document proposes a secure electronic voting machine (EVM) system that uses biometrics, Aadhar ID, and IoT. The key aspects are:
1. Voters are authenticated using fingerprint and face recognition for security.
2. Aadhar ID provides a unique identification number for each individual.
3. An IoT system is used to accurately count and transmit votes electronically.
4. The proposed system aims to provide secure voting, automatic vote counting, and secure data handling to address issues with existing EVM systems.
Fingerprint Based Voting Project is an application where the user is recognized by his finger pattern. Since the finger pattern of each human being is different, the voter can be easily authenticated. The system allows the voter to vote through his fingerprint. Finger print is used to uniquely identify the user. The finger print minutiae features are different for each human being. Finger print is used as an authentication of the voters. Voter can vote the candidate only once the system will not allow the candidate to vote for the second time. The system will allow admin to add the candidate’s name and candidate photo who are nominated for the election. Admin only has the right to add candidate name and photo who are nominated. Admin will register the voters name by verifying voter. Admin will authenticate the user by verifying the user’s identity proof and then admin will register the voter. The number of candidates added to the system by the admin will be automatically deleted after the completion of the election. Admin has to add the date when the election going to end. Once the user has got the user id and password from the admin the user can login and vote for the candidate who are nominated. The system will allow the user to vote for only one candidate. The system will allow the user to vote for one time for a particular election. Admin can add any number of candidates when the new election will be announced. Admin can view the election result by using the election id. Even user can view the election result. Rajashree Mahesh Hande | Rohini Nanasaheb Hirade | Puja Jyotiram Khamkar | Priyanka Suryakant Khatavkar | Sachin Hirnawale "Fingerprint Based E-Voting System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-4 , June 2022, URL: https://www.ijtsrd.com/papers/ijtsrd50061.pdf Paper URL: https://www.ijtsrd.com/computer-science/bioinformatics/50061/fingerprint-based-evoting-system/rajashree-mahesh-hande
This document proposes a fingerprint-based online voting system to address issues with India's election process like rigging and fake voting. It involves developing a biometric voting machine prototype that uses fingerprint authentication to verify each voter's identity and ensure one person casts only one vote. The system would link to India's Aadhaar biometric database for automatic voter registration. It aims to make the voting process more secure, accurate and reduce the potential for invalid votes by leveraging fingerprint biometrics and remote online voting capabilities. The proposed system seeks to modernize India's elections and strengthen its democratic process.
This document presents an overview of a student project on multimodal biometrics. It discusses combining fingerprint and iris recognition through feature-level fusion using a hybrid wavelet-based approach. The document outlines the presentation structure, importance and motivation of the project, related work in biometrics and multimodal biometrics, relevant theory, and applications of biometrics. It defines the problem of fusing fingerprint and iris modalities for improved identification performance.
Integrating Fusion levels for Biometric Authentication SystemIOSRJECE
— Recently a lot of works are presented in the literature for the multimodal biometric authentication. And such biometric systems have been widely accepted with increasing accuracy rates and population coverage, reducing the vulnerability to spoofing. This paper descripts about the proposed multimodal biometric system that combines the feature extraction level and the score level fusion of iris and face unimodal biometric systems in order to take advantage of both fusion techniques. The experimental results shows the performance of the multimodal and multilevel fusion techniques which are analysed using TRR and TAR to study the recognition behaviour of the approach system. From the ROC Curve plotted, the performance of the proposed system is better compared to the individual fusion techniques.
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
The document discusses a proposed smart attendance management system that integrates fingerprint biometric authentication with wireless connectivity. The system uses an Android mobile application to register users and record their attendance through fingerprint scans. It ensures employees are physically present at work by only allowing attendance checks when the mobile device is connected to the organization's wireless router. This prevents employees from falsely checking in without remaining on-site. The system aims to reduce costs compared to traditional fingerprint scanners while providing increased portability and convenience through the use of mobile phones and wireless technology.
A comparative analysis of Iris data compressionIJSRED
This document provides an overview of the Aadhar identification system used in India. It discusses how Aadhar collects and stores biometric data like iris scans and fingerprints. It also describes the different processes involved, including enrollment where biometric data is collected, feature extraction and template generation, matching against stored templates for identification or verification, and storing templates in a database. The document also reviews several research papers on topics like iris recognition and compression, and the use of techniques like Huffman coding.
Optimization of human finger knuckle print as a neoteric biometric identifierIRJET Journal
This document proposes developing a finger knuckle print-based biometric identification system. It involves preprocessing input images from video, extracting features using principal component analysis (PCA) and local binary patterns (LBP), and using a k-nearest neighbors (k-NN) classifier for matching. The system is tested on a database of finger knuckle print images from multiple individuals. Accuracy is calculated for both PCA+k-NN and LBP+k-NN approaches, with PCA+k-NN achieving higher accuracy of 93.33% compared to 86.67% for LBP+k-NN. Statistical features are also extracted from training and testing images of one individual to analyze feature consistency.
This document proposes a centralized biometric voting system using fingerprint recognition. It discusses how fingerprint scanners work by scanning fingerprints and comparing them to a centralized database. The proposed system aims to improve security, reduce fake voting, and allow voters to cast their ballot from anywhere by authenticating through fingerprint biometrics. It analyzes the technical, economic, and operational feasibility of the system. The results suggest it improves the current voting process by making it more reliable, secure, and reducing required manpower through automation. The system aims to maximize voter participation using a centralized database for authentication.
This document discusses enhancing biometric authentication for network security using iris recognition. It proposes using iris biometrics to generate secure authentication keys. The methodology involves preprocessing iris images, extracting minutiae feature points from the iris, generating a secret key from the minutiae, and using the key to encrypt and authenticate network access. Experimental results on two iris image datasets show the method effectively provides network security through iris-based encryption and authentication.
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
This document summarizes an research paper on offline handwritten signature verification using local binary pattern features and K-nearest neighbors classification. It describes preprocessing signatures using Otsu thresholding, extracting local binary pattern features, and classifying signatures with KNN. 40 signature recognition approaches were reviewed before designing this system. The system achieved an accuracy of 85% on a dataset of bank cheque signatures during testing.
This document summarizes a study on iris recognition. It discusses how iris recognition works by capturing high-resolution images of a person's iris and extracting distinguishing features to create biometric templates for identification. The key steps described are iris localization to isolate the iris region, feature extraction using filters to encode patterns into binary codes, and template matching using Hamming distance to compare templates and identify matches. Advantages of iris recognition include very high accuracy and verification time under 5 seconds. Disadvantages include its intrusive nature and high memory requirements. Applications discussed include security for ATMs, computers, buildings, and airports.
IRJET- Library Management System with Facial Biometric AuthenticationIRJET Journal
This document proposes a library management system using facial recognition for biometric authentication. It would automate the entry and exit logging of users and reduce wait times. The system involves two phases: 1) enrolling images of authorized users in a dataset during initial setup and 2) verifying users in real-time by comparing their images to those in the stored dataset. If a match is found, the user is granted access, and if not, they are denied entry. The system aims to eliminate manual logging and prevent unauthorized access to library resources.
Smart Voting System with Face RecognitionNikhil Katte
This document proposes a smart voting system using face recognition to allow people to vote digitally using their smartphones. The system would have a server, registration center application, and voter android application. It works by capturing a live image of the voter's face on their phone, sending it to the server for authentication using face recognition algorithms, and allowing them to vote if authorized. The system aims to modernize voting and make it more convenient using digital technologies while maintaining security.
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET Journal
This document discusses using biometrics like fingerprints for banking security in India. It aims to overcome security problems faced by Indian banks and ensure 100% security by developing a system that uses human fingerprints to verify users and grant access to lockers. The system would work as a mini banking assistant for users. The document reviews biometrics research and discusses fingerprint identification and verification methods like ACE-V. It analyzes the advantages of identification vs verification modes and positive vs negative recognition in biometric systems. The goal is to develop an enhanced security approach for Indian banks using fingerprint biometrics.
The document discusses biometrics and biometric systems. It defines biometrics as measurable biological characteristics that can be used to identify individuals. It then describes the main components of a biometric system, including sensors, feature extraction, matching, and databases. The document discusses verification and identification modes of biometric systems. It also explains the different types of errors that can occur in biometric systems, including false accepts and false rejects, and how performance is evaluated using metrics like FMR, FNMR, FTE, and FTC rates.
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person’s identity. Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi biometric systems are used to overcome this issue by providing multiple pieces of indication of the same identity. This system provides effective fusion structure that combines information provided by the multiple field experts based on decision-level and score-level fusion method, thereby increasing the efficiency which is not conceivable in uni-modal system.Multi-modal biometrics can be attained through a fusion of two or more images, where the subsequent fused image will be more protected. This paper discusses various fusion techniques, architecture of multi-modal biometric authentication and working of biometric fusion i.e. Iris and Fingerprint recognition that are used in multi-modal biometrics
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
This document discusses using watermarking and visual cryptography for secure identity-based authentication. It proposes embedding an iris image using a watermarking algorithm and visual cryptography techniques for protection. Feature extraction and binomial distribution analysis are used to evaluate false acceptance and rejection rates to validate two algorithms, MASEK and Ma, for iris recognition on noisy images. The document also discusses discrete cosine transform (DCT) and discrete wavelet transform (DWT) techniques for image processing and compression in iris recognition systems.
Role of fuzzy in multimodal biometrics systemKishor Singh
This document summarizes a research paper on using fuzzy logic in a multimodal biometrics system combining face, ear, and foot recognition. It discusses how unimodal biometric systems have limitations that multimodal systems aim to overcome through data fusion. The methodology uses eigenfaces for face recognition, eigenimages for ear recognition, and sequential modified Haar transform for foot recognition. Scores are normalized and fused using fuzzy logic rules. Highest matching was found when fusing face and ear, lowest when fusing ear and foot. The fuzzy multimodal system enhanced identification accuracy over unimodal systems.
Wireless Student Attendance System using Fingerprint Sensorijtsrd
Nowadays accurate personal identification is becoming more and more important. Usual means smart cards, passwords… have shown their limits. Currently fingerprint recognition is the most widely used technique for personal identification. The development of an attendance management system using biometrics is proposed. As the manual method of attendance system produced errors and taking lot of time during lecture period, an efficient and organized biometrics system for students attendance is purposed. The electronic system not only used to take attendance for the students, but a database is also mentioned to store all the information which can be manipulated further in future. Optical fingerprint sensor will make adding fingerprint detection and verification super simple.This type of verification is widely used in various aspects of life for different purposes, like in security, police identification, etc. Node MCU is used which provides the wireless communication. It also send the attendance report to PC. In this system, there are two parts, one is transmitter and another is receiver. In transmitter module, there is a Liquid Crystal Display LCD , Arduino UNO, transmitter. In receiver module, Node MCU is mainly used. The resultant message will show on LCD. Yu Maw Win | Saw Aung Nyein Oo ""Wireless Student Attendance System using Fingerprint Sensor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25157.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25157/wireless-student-attendance-system-using-fingerprint-sensor/yu-maw-win
The document provides an overview of biometric security systems. It defines biometrics as measuring unique human characteristics and discusses various physiological and behavioral biometric traits used for identification, including fingerprints, facial recognition, voice recognition, hand geometry, retina and iris scanning. It covers classification of biometric traits, factors for determining their effectiveness, functions of biometric systems, and concerns regarding privacy, standardization and overreliance. The document concludes by discussing potential future applications of biometric technologies in hospitals, forensics and membership programs.
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTIRJET Journal
The document proposes a secure electronic voting machine (EVM) system that uses biometrics, Aadhar ID, and IoT. The key aspects are:
1. Voters are authenticated using fingerprint and face recognition for security.
2. Aadhar ID provides a unique identification number for each individual.
3. An IoT system is used to accurately count and transmit votes electronically.
4. The proposed system aims to provide secure voting, automatic vote counting, and secure data handling to address issues with existing EVM systems.
Fingerprint Based Voting Project is an application where the user is recognized by his finger pattern. Since the finger pattern of each human being is different, the voter can be easily authenticated. The system allows the voter to vote through his fingerprint. Finger print is used to uniquely identify the user. The finger print minutiae features are different for each human being. Finger print is used as an authentication of the voters. Voter can vote the candidate only once the system will not allow the candidate to vote for the second time. The system will allow admin to add the candidate’s name and candidate photo who are nominated for the election. Admin only has the right to add candidate name and photo who are nominated. Admin will register the voters name by verifying voter. Admin will authenticate the user by verifying the user’s identity proof and then admin will register the voter. The number of candidates added to the system by the admin will be automatically deleted after the completion of the election. Admin has to add the date when the election going to end. Once the user has got the user id and password from the admin the user can login and vote for the candidate who are nominated. The system will allow the user to vote for only one candidate. The system will allow the user to vote for one time for a particular election. Admin can add any number of candidates when the new election will be announced. Admin can view the election result by using the election id. Even user can view the election result. Rajashree Mahesh Hande | Rohini Nanasaheb Hirade | Puja Jyotiram Khamkar | Priyanka Suryakant Khatavkar | Sachin Hirnawale "Fingerprint Based E-Voting System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-4 , June 2022, URL: https://www.ijtsrd.com/papers/ijtsrd50061.pdf Paper URL: https://www.ijtsrd.com/computer-science/bioinformatics/50061/fingerprint-based-evoting-system/rajashree-mahesh-hande
This document proposes a fingerprint-based online voting system to address issues with India's election process like rigging and fake voting. It involves developing a biometric voting machine prototype that uses fingerprint authentication to verify each voter's identity and ensure one person casts only one vote. The system would link to India's Aadhaar biometric database for automatic voter registration. It aims to make the voting process more secure, accurate and reduce the potential for invalid votes by leveraging fingerprint biometrics and remote online voting capabilities. The proposed system seeks to modernize India's elections and strengthen its democratic process.
1. The document describes a proposed biometric voting machine that uses fingerprint scanning and iris recognition to identify voters and prevent fraudulent voting.
2. It aims to develop a tamper-proof voting system through valid biometric recognition, using either a fingerprint scanner or iris scanner. Fingerprints and irises are unique to each individual.
3. The system would enroll voters by collecting their fingerprint or iris data, then allow voting by scanning fingerprints or irises and only permitting a vote if the biometric data matches a registered voter's profile in the database.
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICIJERA Editor
The problem of voting is still critical in terms of safety and security. This paper is about the
design and development of a voting system using fingerprint to provide a high performance with high security
to the voting system. Fingerprint biometrics is widely used for identification. Biometrics identifiers cannot be
misplaced and they represent any individual identity. The integration of biometric with electronic voting
machine requires less manpower, save much time of voters and personal, ensure accuracy,transparency and fast
result in election. In this paper a framework for electronic voting machine based on biometric verification is
proposed and implemented. The proposed framework provides secured identification and authentication
processes for the voters and candidates through the use of fingerprint biometric
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET Journal
This document proposes a new biometric voting system using iris recognition to address issues with existing voting systems like duplicate voting. It involves collecting iris images from citizens and candidates' details to create a database. The proposed system uses iris segmentation, normalization, feature extraction and matching techniques for identification. Segmentation involves edge detection and Hough transformation to find iris boundaries. Feature extraction uses 1D log-Gabor wavelets to create iris templates. Matching compares templates using hamming distance. The system is evaluated on the CASIA iris database and aims to provide more secure authentication compared to traditional systems.
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...IRJET Journal
This document presents a novel method for implementing a facial recognition-based smart voting system using machine learning techniques. The proposed method uses a facial recognition algorithm called FaceNet that is trained on voter images to authenticate voters by matching their faces. Additional security measures like biometric data and one-time passwords are also used. An evaluation of the system achieved 98% accuracy in recognizing registered voter faces. The proposed system aims to improve voting accuracy, security and speed compared to traditional methods.
Smart Voting System Using Java ServletsIRJET Journal
This document describes a proposed smart voting system created using Java servlets. The system aims to provide online voting to eliminate issues with traditional paper-based voting methods. It would allow voters to cast their ballots from anywhere using authentication to verify voter eligibility. The system architecture involves roles for administrators to manage voter profiles and ballots, and for voters to register and vote within their constituencies. If implemented, the smart voting system could improve access, efficiency, and transparency in elections.
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET Journal
1) This document describes a smart e-voting system that uses fingerprint authentication with an Arduino microcontroller to prevent fraudulent voting.
2) The system architecture includes voter registration using fingerprint scanning, fingerprint verification when casting a vote, recording the vote selection, alerting if a wrong or double vote is tried, and generating a final vote result.
3) The goal is to provide a secure, accurate and efficient electronic voting system as an alternative to traditional manual voting methods. Fingerprint authentication is used to ensure one person, one vote.
Online Voting System using Aadhaar Card and BiometricIRJET Journal
The document proposes an online voting system that uses Aadhaar (India's biometric ID system) for voter authentication. It aims to increase voter turnout and security by allowing people to vote online after authenticating via their Aadhaar number. The system would match the Aadhaar number to voter records retrieved from the Aadhaar database. It analyzes related work on e-voting systems and their security requirements. The proposed system architecture involves voters logging in with their Aadhaar number and casting their vote online, which would then update the database on the server. It aims to reduce issues like fake votes and make the voting process more convenient and transparent.
An in-depth review on Contactless Fingerprint Identification using Deep LearningIRJET Journal
This document provides an overview of contactless fingerprint identification using deep learning. It discusses previous works that have used 3D fingerprint detection and projection, as well as recurrent convolutional networks to improve compatibility between contactless and contact-based fingerprint systems. The document also outlines the methodology of gathering requirements, designing the system, and implementing necessary modules to effectively identify fingerprints without physical contact.
This document describes an iris recognition system implemented using National Instruments LabVIEW for secure voting. The system has four main stages: 1) image acquisition using an infrared camera, 2) iris localization by detecting circles in the iris image, 3) pattern matching to extract an iris code, and 4) authentication by matching the iris code to a database. The database stores voter information and iris codes in an encrypted format. On voting day, the system matches the voter's ID and captured iris image to the database to verify their identity before allowing them to vote. The system aims to provide more secure identity verification than traditional password or ID systems.
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPIRJET Journal
1. The document proposes a virtual voting system using face recognition and one-time passwords (OTPs) for authentication.
2. The system has three security phases: face recognition for identity verification, verification of an election ID number, and OTP verification sent to the user's registered mobile number.
3. The system aims to improve security over current voting methods by adding multiple authentication factors and preventing fraudulent or duplicate voting. However, it also discusses potential privacy and accuracy concerns with face recognition that would need to be addressed in an actual system.
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...ijtsrd
Exeat is a primary term generally used to describe a period of nonattendance from a centre of learning either for the entire day or parts of a day for appointments and interviews in a secured academic environment. The current method of monitoring students movement is inefficient. It brings difficulty to the University Halls management by checking students into the halls of residence and impersonation during exams. For this reason, a Biometric Based Human Recognition System for Institutions is needed to use Exeat Monitoring System. The motive of the study is to develop a user friendly online interface embedded with a fingerprint biometric authentication system through which the school portal can monitor students who exit from school premises or a school campus. Nexus combination techniques were adopted. The results showed that exeat monitoring systems are less prone to forgery since they can prevent impersonation among students, and its purely digital since it is a GSM based devices. Issa Lukman Oluwadare | Ogunsanya Mobolaji Mojisola | Ojenomo Paul Ozabereme | Makinde Kayode | Sunday David "Biometric-Based Human Recognition Systems for Institutions using Exeat Monitoring System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52436.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/52436/biometricbased-human-recognition-systems-for-institutions-using-exeat-monitoring-system/issa-lukman-oluwadare
novel method of identifying fingerprint using minutiae matching in biometric ...INFOGAIN PUBLICATION
Fingerprint is one of the best apparatus to identify human because of its uniqueness, details information, hard to change and long-term indicators of human identity where there are several biometric feature that can be recycled to endorse the individuality. Identification of fingerprint is very important in forensic science, trace any part of human, collection of crime part and proof from a crime. This paper presents a new method of identifying fingerprint in biometrics security system. Fingerprint is one of the best example in biometric security because it can identify personal information and it is much secure than any other biometric identification system. The experimental result exhibits the performance of the proposed method.
PREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGYIRJET Journal
The document proposes a blockchain-based electronic voting system to prevent voter fraud. It discusses issues with existing paper-based and electronic voting methods. The proposed system would allow voters to cast votes electronically from anywhere using a blockchain to record and securely store votes. This would make the voting process more accessible while also making it tamper-proof through the immutable nature of blockchain technology.
Design of biometric electronic voting machineIJARIIT
It has always been an arduous task for the election commission to conduct free and fair polls in our country, the
largest democracy in the world. Crores of rupees have been spent on this to make sure that the elections are riot free. But, now-adays
it has become common for some forces to indulge in rigging which may eventually lead to a result contrary to the actual
verdict given by the people. This paper aims to present a new voting system employing biometrics in order to avoid rigging and to
enhance the accuracy and speed of the process. The system uses thumb impression for voter identification as we know that the
thumb impression of every human being has a unique pattern. Thus it would have an edge over the present day voting systems.
As a pre-poll procedure, a database consisting of the thumb impressions of all the eligible voters in a constituency is created.
During elections, the thumb impression of a voter
is enteredas input to the system. This is then compared with the available records in the database.
If the particular pattern matches with anyone in the available record, access to cast a vote is granted. But in case the pattern
doesn’t match with the records of the database or in case of repetition, access to cast a vote is denied or the vote gets rejected.
All the voting machines are connected in a network, through which data transfer takes place to the main host.
The result is instantaneous and counting is done finally at the main host itself. The overall cost for conducting elections gets
reduced and so does the maintenance cost of the systems.
This document summarizes a research study that investigated using fingerprint biometrics to improve security for automated teller machines (ATMs). The study proposed embedding a fingerprint authentication scheme into ATMs to supplement the existing personal identification number (PIN) security. A survey was conducted with bank customers and students in Nigeria to examine perceptions of ATM reliability and the reliability of fingerprint biometrics. The results indicated support for using fingerprints to authenticate ATM users as a way to address security issues with PINs, such as PINs being stolen or easily guessed. The document reviewed related work on biometric identifiers for security and discussed materials and methods used in the study.
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting SystemIRJET Journal
1. The document proposes an Aadhar-based dual authentication secured e-voting system that uses both Aadhar numbers and biometric fingerprints for voter identification and authentication.
2. The system aims to provide better security than traditional voting methods by verifying voters' identities against their Aadhar database records and fingerprints before allowing them to cast votes.
3. Key features include validating that voters are over 18 years old, preventing the same voter from voting multiple times, and sending vote casting acknowledgement messages to voters. This helps avoid issues like fake voting in previous systems.
This paper proposes the need of authenticated voting system in our election due to the increase in illegal voting or bogus voting in Loksabha and Rajyasabha election. Here the authentication of an individual is done using biometric and eligibility of the voter is verified using the Aadhar card. In this project, the database stored in the Aadhar card provides the reference data. Moreover, added tier of security is enforced as biometrics. The key functions of this paper are enrolment and matching. Initially, the voters’ fingerprints are enrolled and stored. Once the fingerprints are stored it can be retrieved at any time for authentication. During election, when the voter keeps his/her fingerprint the already stored Aadhar card details will be displayed from the database. An individual’s details can be deleted from the database if not required. The use of biometric requires less man power, save much time for voters and personnel, ensures accuracy, transparency and avoids bogus voting.
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
2. An Enhanced Voters Registration and Authentication Application Using Iris Recognition
Technology
http://www.iaeme.com/IJCIET/index.asp 58 editor@iaeme.com
1. INTRODUCTION
Political elections in many developing nations are bedeviled with complaints of unfairness.
Registration to vote is usually done at the local government level and voters’ cards are issued
as proof of registration [1]. Although some form of biometrics may be collected during
enrolment and perhaps even used during the voting process, many elections in developing
nations are still riddled with electoral fraud [2]. Voters’ registration is the most expensive and
complex activity within the framework of elections. This process is so crucial that the
outcome of an election in terms of credibility and smoothness depend largely on it [3].
Voting registration and authentication have not been efficient in developing nations.
Developing nations that have tried to incorporate biometric recognition into their voting
processes are still grappling with the lingering problems of impersonation, rigging and bribery
[4].
This paper suggests the use of iris biometric recognition for voters’ enrolment and
verification. This will improve the credibility of election results in developing nations. The
Iris is a physical biometric trait that is very difficult to spoof. It is also unique to every
individual and remains permanent for a lifetime. Iris biometric technology also has a niche
benefit of being a non-contact biometric recognition system. This makes iris biometric
recognition systems less prone to errors or noise that may arise from inadequate pressure and
small contact area. Iris biometric technology also has the advantage of protecting users from
communicable diseases that can be transferred through contact [5].
The major objective of this paper is to propose a system of enrolling and verifying eligible
voters using iris recognition technology. Microsoft Visual Studio’s integrated development
environment was used to create a voting system software application. The language used to
write the software program was C#. The database was designed using Mini SQL [6]. An iris
scanner was incorporated into the design to complete the enhanced iris recognition voters’
system. During registration, personal details were taken. The iris scanner captured the image
of the iris and embedded algorithms in the scanner localized, segmented, normalized and
performed feature extraction on the iris image. A template of the iris’ unique characteristics
was stored along with the voter’s particulars in the database. The implemented system issued
a pin to the voter at the completion of the registration/enrolment process [7].
To be authenticated, the voter keys the pin issued after the registration process into the
recognition system. The pin was used to call up the voter’s particulars and a 1:1 verification
using the voter’s iris is carried out to confirm the voter’s identity. If authenticated, the voter is
given the permission to vote. A voter may not be authenticated if there is more than one
record of the voter on the database, the voter did not enroll or the iris recognition gives a false
non-match result. The use of iris recognition technology in the voting process of developing
nations is justified by the inevitable improvement it will bring to the credibility of electoral
result in developing nations [8].
2. RELATED WORKS
De and Ghoshal, [9] proposed an electoral process based on a voter’s registration list that was
created purely with human iris recognition technology. The authors concentrated on the
algorithm used to localize, segment, normalize and extract the unique features of the iris
image captured by a scanner. The authors used Canny Edge detection algorithm for localizing
the iris and pupils. Normalization was carried out using the Daughman’s technique.
Segmentation by the Log Gabor filter and matching was done using Euclidean distance. The
authors also elaborated on the software used to efficiently carry out iris recognition. The
authors used MATLAB®
to implement their recognition system.
3. Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba,
Okokpujie Imhade Princess
http://www.iaeme.com/IJCIET/index.asp 59 editor@iaeme.com
The gradient magnitudes used to identify the edges of the iris image (Canning Edge
detection algorithm was:
| | √
Where; G = Gradient Magnitude, Gx = Gradient in the X direction, Gy = Gradient in the Y
direction.
The equation used to change the circular nature of the iris into a rectangular shape was given as:
[ ] [ ] (2)
(3)
(4)
(xi, yi) – The area between the directions of the pupillary and limbic limits in the heading.
- Heading. (xp, yp) – The inside direction of the understudy, Rp – Radius of the pupil, Rl( ) – The separation
between focal point of the understudy and the purpose of limbic limit. The Log Gabor Filter frequency response
was given as:
(
( ( ))
( ( ))
)
fo – Centre frequency, – Bandwidth of the filter
The matching, computed using Euclidean distance. The two points in the Euclidean space,
P and Q to be compared in terms of distance from each other was given as:
√ (6)
Where, X – Measured distance, P and Q – Points on Euclidean plane
In the spring of 2016, researchers from the Department of Government, Democracy and
Governance Studies Program in the University of Georgetown carried out a research on behalf
of the United States Agency for International Development (USAID) on how the introduction
of new technology into electoral processes either boosts or drains voters’ confidence in
electoral processes. The researchers focused on emerging and established sample states to
define how technologies have affected voters’ confidence in the electoral process. The
researchers declared that technology in itself may not completely solve the problem of
electoral fraud or boost looters confidence in the electoral process. The researchers
extensively explored the use of iris recognition in Somaliland’s electoral process and the
success it recorded. The researchers also stressed the need to adequately define the electoral
problems technology seeks to address before implementing any new technology into electoral
processes [10].
Okokpujie et al., [11] extensively analyzed segmentation of the irises using the popular
Daugman Integro-differential approach and the less popular Circular Hough Transform. The
researchers from Covenant University, Ota, Ogun State, Nigeria, declared that Iris
Segmentation, using Circular Hough Transform gave a better result than the more popular
integro-differential approach Daugman developed. The authors also recommended the use of
Circular Hough Transform for iris segmentation in crucial iris recognition technology
applications such as electoral processes to boost the confidence of voters [11].
4. An Enhanced Voters Registration and Authentication Application Using Iris Recognition
Technology
http://www.iaeme.com/IJCIET/index.asp 60 editor@iaeme.com
Schueller and Walls, [12] conducted a research on the voter registration process that took
place in Somaliland from January to September, 2016. The researchers highlighted the fact
that previous voter registration in Somaliland was riddled with multiple applications and little
trust in the electoral process. The researchers also stressed the fact that the government of
Somaliland decided to overcome the problem of multiple applications by using iris
recognition technology. The implementation of iris recognition technology in registering
voters in Somaliland was adjudged successful.
Hobbis and Hobbis, [13] looked closely at voter integrity, trust and the promise of digital
technologies using Solomon Islands as a case study. The researchers tried to answer the
questions of technological peculiarities, strengths and shortcomings of integrating biometrics
into electoral voting processes. They also looked at the way the world is gradually embracing
the use of biometrics in electoral processes due to its ability to uniquely identify every
individual. Lastly, the researchers examined the efforts made by the government of Solomon
Island to show how the use of biometrics in her electoral process has helped to stabilize
governance. This lead to several researchers in this area for economic development tending
towards sustainability of biometrics in automated teller machines for enhanced user
authentication [14-23]
2. METHODOLOGY
The application software that forms the backbone of the designed and implemented iris
recognition based voter registration and authentication system was designed specifically for
the Windows® operating system. The C# language was used to develop the software
application. Mini SQL was used to design the database. Microsoft Visual Studio provided the
integrated development environment for writing, compiling and debugging the software
application. The iris scanner used infra-red light emitting diodes to illuminate the eyes and
thus could capture the iris in all outdoor and indoor conditions. The scanner also has
embedded algorithms that can perform localization, segmentation, normalization, template
formation, storage and matching.
The Waterfall software development model was adopted to create the application software
used in tandem with the iris scanner. The aim and objectives of the application software were
clearly defined at the beginning of the design process. Afterward, the application software
was developed, tested and debugged. This is shown diagrammatically in Figure 1.
Figure 1 Application Software Development Model
5. Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba,
Okokpujie Imhade Princess
http://www.iaeme.com/IJCIET/index.asp 61 editor@iaeme.com
The database was created using Mini SQL (MSQL), a light-weight database management
tool used to create memory-efficient, performance-efficient and portable databases. Mini SQL
can support basic query generation, load and save SQL script files, quick table data lookups,
generation of SQL code and data scripts. The integrated development environment is shown
in Figure 2.
Figure 2 The Integrated Development Environment
Figure 3 The Mini SQL Window
6. An Enhanced Voters Registration and Authentication Application Using Iris Recognition
Technology
http://www.iaeme.com/IJCIET/index.asp 62 editor@iaeme.com
Figure 4 Sample of Relationships between Tables
The Mini SQL program was used to create tables that were linked together with primary
and foreign keys. A sample of the relationship between the tables is shown in Figure 4. Upon
completion of the Windows application software, the key objectives of being able to register,
enroll and authenticate voters were achieved.
Figure 5 Flowchart for Voters’ Registration
7. Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba,
Okokpujie Imhade Princess
http://www.iaeme.com/IJCIET/index.asp 63 editor@iaeme.com
Figure 6 Flowchart for Voters’ Authentication
The Algorithm for the Registration (Iris recognition enrollment) process is shown in
Figure 5
During registration or enrolment, the following data were acquired:
a. Personal details such as age, name, sex etc.
b. Iris image.
Voters particulars are stored in the database alongside the unique iris template created
from the iris image captured. Each unique iris details are stored as templates indexes by the
voter registration particulars it represents. At the end of the enrolment process, a Personal
Identification Number (PIN) is issued to the voter.
Authentication in this context is the process of carrying out a one-to-one verification to
determine if a voter is indeed eligible to vote. The voter keys in the PIN acquired at the point
of registration. The PIN enables the system to pull up the particulars related to the PIN. The
iris scanner captures the voter’s iris image, localizes, segments, normalizes, extracts its
features and forms a template (query template) which is compared with the stored template
indexed by the voter’s particulars for a match. If there is s match, the voter is allowed to vote,
otherwise, the voter is disallowed from voting. The algorithm for the authentication process is
shown in Figure 6.
8. An Enhanced Voters Registration and Authentication Application Using Iris Recognition
Technology
http://www.iaeme.com/IJCIET/index.asp 64 editor@iaeme.com
Contestants Section: All qualified contestants are registered via the contestants’ window.
Voters Section: Represents the portal for voters are registration and authentication.
Iris enrolment Window: The portal was used to acquire and store the unique features of
voters’ iris image.
The application interface has the following windows: they are depicted in Figures 7 to 12.
Post Section: The various posts to be filled are highlighted in this window.
Party Window: Participating political parties are registered here.
Figure 7 The Voters’ Registration Portal
Figure 8 The Application Interface for Contestants and Voter
9. Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba,
Okokpujie Imhade Princess
http://www.iaeme.com/IJCIET/index.asp 65 editor@iaeme.com
Figure 9 The Application Interface for Political Positions
Figure 10 The Application Interface for Political Parties
Figure 11 The Application Interface for Contestants’ Registration
10. An Enhanced Voters Registration and Authentication Application Using Iris Recognition
Technology
http://www.iaeme.com/IJCIET/index.asp 66 editor@iaeme.com
Figure 12 The Iris Image Acquiring Window.
3. CONCLUSIONS
The False Rejection Rate (FRR) which is the probability that the system will not authorize a
duly enrolled applicant and False Acceptance Rate which is the probability that the system
will authorize an unregistered applicant were zero (0). The objective of creating an iris
biometric recognition based voter registration and authentication system was achieved. The
application software worked seamlessly with the iris scanner.
FUTURE WORK
The creation of better and more efficient matching algorithms to lower the time it takes to
make a decision based on the match score. An iris camera with a high image acquiring
distance would be used for future applications.
ACKNOWLEDGMENT
This work is sponsored by Covenant University, Ota, Ogun State, Nigeria.
REFERENCES
[1] A. Evrensel, "Voter Registration in Africa A Comparative Analysis," 2010.
[2] J. Baylis, P. Owens, and S. Smith, The globalization of world politics: An introduction to
international relations: Oxford University Press, 2017.
[3] K. Okokpujie, N.-O. Etinosa, S. John, and E. Joy, "Comparative Analysis of Fingerprint
Preprocessing Algorithms for Electronic Voting Processes," in International Conference on
Information Theoretic Security, 2017, pp. 212-219.
[4] S. John, C. Anele, O. O. Kennedy, F. Olajide, and C. G. Kennedy, "Realtime Fraud Detection
in the Banking Sector Using Data Mining Techniques/Algorithm," in Computational Science
and Computational Intelligence (CSCI), 2016 International Conference on, 2016, pp. 1186-
1191.
11. Kennedy Okokpujie, Samuel Ndueso John, Etinosa Noma-Osaghae, Charles Ndujiuba,
Okokpujie Imhade Princess
http://www.iaeme.com/IJCIET/index.asp 67 editor@iaeme.com
[5] J. A. Badejo, A. A. Atayero, and T. S. Ibiyemi, "A robust preprocessing algorithm for iris
segmentation from low contrast eye images," in Future Technologies Conference (FTC), 2016,
pp. 567-576.
[6] K. Okokpujie, F. Olajide, S. John, and C. G. Kennedy, "Implementation of the Enhanced
Fingerprint Authentication in the ATM System Using ATmega128," in Proceedings of the
International Conference on Security and Management (SAM), 2016, p. 258.
[7] S. A. Daramola, M. A. Adefuminiyi, and T. M. John, "Review and Proposed Methodology for
a Lecture Attendance System using Neural Network," in Proceedings of the World Congress
on Engineering, 2016.
[8] T. O. Majekodunmi and F. E. Idachaba, "A review of the fingerprint, speaker recognition, face
recognition and iris recognition based biometric identification technologies," 2011.
[9] P. De and D. Ghoshal, "Human Iris Recognition for clean Electoral process in India by
creating a fraud free voter registration list," Procedia Computer Science, vol. 89, pp. 850-855,
2016.
[10] S. Araida, S. Herrera, and M. Ping, "Georgetown University Department of Government
Democracy and Governance Studies Program United States Agency for International
Development (USAID) Electoral Policy Study Group Report on Elections, Technology and
Voter Confidence," 2016.
[11] K. Okokpujie, E. Noma-Osaghae, S. John, and A. Ajulibe, "An Improved Iris Segmentation
Technique Using Circular Hough Transform," in International Conference on Information
Theoretic Security, 2017, pp. 203-211.
[12] M.-L. Schueller and M. Walls, "Report by International Observers on the 2016 Voter
Registration Process in Somaliland," Progressio, 2017.
[13] S. K. Hobbis and G. Hobbis, "Voter Integrity, Trust and the Promise of Digital Technologies:
Biometric Voter Registration in Solomon Islands," in Anthropological Forum, 2017, pp. 1-21.
[14] K. Okokpujie, O. Shobayo, E. Noma-Osaghae, O. Imhade, O. Okoyeigbo. Realization of
MPLS-Based VPN Network for Improved Qos Metrics. TELKOMNIKA (Telecommunication
Computing Electronics and Control). 2018;16.
[15] I. Dunmade, M. Udo, T. Akintayo, S. Oyedepo, I. P. Okokpujie. Lifecycle Impact Assessment
of an Engineering Project Management Process–a SLCA Approach. InIOP Conference Series:
Materials Science and Engineering 2018 Sep (Vol. 413, No. 1, p. 012061). IOP Publishing.
[16] I. P. Okokpujie, O. S. Fayomi, R. O. Leramo. The Role of Research in Economic
Development. InIOP Conference Series: Materials Science and Engineering 2018 Sep (Vol.
413, No. 1, p. 012060). IOP Publishing.
[17] O. S. Fayomi, I. P. Okokpujie, M. Udo. The Role of Research in Attaining Sustainable
Development Goals. InIOP Conference Series: Materials Science and Engineering 2018 Sep
(Vol. 413, No. 1, p. 012002). IOP Publishing.
[18] A. Onawumi, M. Udo, E. Awoyemi, I. P. Okokpujie. Alternate Maintainability Evaluation
Technique for Steering System of Used Automobiles. InIOP Conference Series: Materials
Science and Engineering 2018 Sep (Vol. 413, No. 1, p. 012062). IOP Publishing.
12. An Enhanced Voters Registration and Authentication Application Using Iris Recognition
Technology
http://www.iaeme.com/IJCIET/index.asp 68 editor@iaeme.com
[19] K. Okokpujie, E. Noma-Osaghae, O. Okesola, O. Omoruyi, C. Okereke, S. John, I. P.
Okokpujie. Fingerprint Biometric Authentication Based Point of Sale Terminal.
InInternational Conference on Information Science and Applications 2018 Jun 25 (pp. 229-
237). Springer, Singapore.
[20] K. Okokpujie, E. Noma-Osaghae, O. Okesola, O. Omoruyi, C. Okereke, S. John, I. P.
Okokpujie. Integration of Iris Biometrics in Automated Teller Machines for Enhanced User
Authentication. InInternational Conference on Information Science and Applications 2018 Jun
25 (pp. 219-228). Springer, Singapore.
[21] E. Noma-Osaghae, K. O. Okokpujie, C. U. Ndujiuba, O. Olatunji, I. P. Okokpujie. Epidemic
Alert System: A Web-based Grassroots Model. International Journal of Electrical and
Computer Engineering (IJECE). 2018;8(5):3809-28.
[22] K. Okokpujie, E. Noma-Osaghae, S. John, P. C. Jumbo. Automatic home appliance switching
using speech recognition software and embedded system. InComputing Networking and
Informatics (ICCNI), 2017 International Conference on 2017 Oct 29 (pp. 1-4). IEEE.
[23] K. Okokpujie, E. Noma-Osaghae, S. John, K. A. Grace, I. Okokpujie. A face recognition
attendance system with GSM notification. InElectro-Technology for National Development
(NIGERCON), 2017 IEEE 3rd International Conference on 2017 Nov 7 (pp. 239-244). IEEE.
[24] Sayeesh, Dr. Nagaratna P. Hegde, A Comparison Of Multiple Wavelet Algorithms For Iris
Recognition, International Journal of Computer Engineering and Technology (IJCET),
Volume 4,Issue 2, March – April (2013)