Abstract
The impressive smart card based electronic voting system is introduced to ensure apposite voting procedures and voting counts. This idea prevents the illegal acts against the voting system and provides the voter authentication in an effective manner. This proposal plans to provide a fortification for each and every votes. It entirely changes the status of the election process and ensures the integrity of electoral system. The primary idea of this paper is to make the voters as to have a trust in election through the methods of taking fingerprint and providing a smart card to each user to promise their uniqueness in the voting system and reduces the work of election committee. At the same time the result of the election process will be automatically declared to the public. With the help of this method, the person can vote from any election booth easily.
Keywords- Electronic voting system, authentication, biometric fingerprinting method, smart card
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
This paper describes an online electoral system for Indian election is proposed for the first time. The voting system is managed in a easier way as all the users should login by Aadhar card number and password and click on his/her favorable candidates to cast the vote. This features a larger security in the sense that voter high security password is confirmed before the vote is accepted in the main database of ECI. The extra feature of the model is that the voter will ensure if his/her vote has gone to correct candidate/party. The votes are going to be done automatically, therefore saving an enormous time and facultative ECI to announce the result at intervals a very short period.
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
This paper describes an online electoral system for Indian election is proposed for the first time. The voting system is managed in a easier way as all the users should login by Aadhar card number and password and click on his/her favorable candidates to cast the vote. This features a larger security in the sense that voter high security password is confirmed before the vote is accepted in the main database of ECI. The extra feature of the model is that the voter will ensure if his/her vote has gone to correct candidate/party. The votes are going to be done automatically, therefore saving an enormous time and facultative ECI to announce the result at intervals a very short period.
Voting is the opportunity given to the people it is one of the political process, and the system is created to work best with everyone’s participation. Electronic Voting Machines (EVM) are being used by Indian election commission to conduct elections for the past decade. In Aadhar based electronic voting machine voters have to register their fingerprint. Based on the features of fingerprint it gets matched with the person who will cast the vote. Finger print matching will be done using the Aadhar card data base. The efficiency of a fingerprint is based on biometric system and is relatively high in comparison to other biometric based authentication systems like iris recognition, face readers, retina scanning, voice recognitions or hand geometry. With the help of keypad matrix voter can select the candidate to whom they wish to cast their vote and a message is displayed in LCD confirming the vote casted.
Aadhar based Digital election system of indiaVikash Singh
it is a new technique of voting which can minimize the cost of election from the Indian economy and increase the voting ratio and eliminate vocus voting and other problems.
Electronic Voting: Challenges and Prospects in Nigeria’s Democracytheijes
One basic feature of democracy is that it cuts across all divides of people in the act of election. It also encourages individual freedom according to the rule of law; hence people may behave and express themselves as they choose. This paper examines the development and implementation of and Electronic Voting System (EVS) that enables voters to cast their votes online and also enables the officials to register voters and print out the results of the votes casted. It equally provides security such that voters can only vote once with their identification details. The system therefore eliminates common fraud, speed up the processing of results, increase accessibility and make voting more convenient for the citizenry.
E-Voting system is a system which allow all citizens of country to cast their vote online is to increase the overall voting percentage across the country, as in the recent scenario people have to visit the booth to cast their vote and those people who live out of their native place are not able to cast vote during the elections. So due to this the voting percentage across the country is very less. Through this software those people who live out of their home town will also be able to cast their votes as this system is online. The main objective of this software is to increase the overall voting percentage and create and manage polling and election details like general user details, nominated users, and election and result details efficiently.
The purpose of this master‘s project is to develop an Online E-Voting prototype system
utilizing the Paillier Threshold Cryptosystem (PTC) web services and applying MESE processes
to it in an attempt to find possible solutions to further improve existing PTC web services.
Online voting (e-voting) would be more convenient, relatively secure and utilize fewer
resources. To be able to access e-voting system from a personal, business or even a public library
computer may be more convenient for many people needing to vote. This could potentially be a
solution for the low voter turnout at the polls. However, it is still questionable whether elections
can be conducted online or over the internet due to the high level of concern over security.
Main objective of this paper is to improve the existing Indian voting system. In the present voting system, one can easily poll the fake vote by various wrong methods. This may lead to a big democratic problem. By implementing some changes in the previous systems, we can make the polling process more secured and counting process fast and efficient. By using biometric in voting systems, the process of polling will be more secured than the existing system. In this system, no one can vote instead of the legit voter. All voter information is stored in this system. Here, we are using the fingerprint for the verification purpose. Every individual has a unique fingerprint. So, there will not be any kind of misconduct done while using this system. At the time of counting, the process can be done by connecting the system to the computer making the process faster. Thakurendra Singh | Chirag Sharma | Rahul Sharma | Avadh Pratap Sharma | Yogesh Kumar Upadhayay "Biometric Electronic Voting Machine" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30597.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30597/biometric-electronic-voting-machine/thakurendra-singh
The purpose of this paper is to examine the main security problems in electronic voting systems, particularly security threats to DRE voting systems and security threats to the Internet voting systems. It will focus on how security problems can be addressed. The paper is divided into four parts. The first part will pinpoint the criteria of using electronic voting systems while focusing on the main security problems in DRE and Internet based voting systems and will suggest their solutions. The second and third parts will propose secure reference architecture for electronic and internet based voting systems while the last part will be the conclusion.
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The system uses smart card technology to identify the authorized personnel and then process all the passport details pertaining to him/her, for necessary verification by authorities concerned.
For more details: http://www.edgefxkits.com/
Voting is the opportunity given to the people it is one of the political process, and the system is created to work best with everyone’s participation. Electronic Voting Machines (EVM) are being used by Indian election commission to conduct elections for the past decade. In Aadhar based electronic voting machine voters have to register their fingerprint. Based on the features of fingerprint it gets matched with the person who will cast the vote. Finger print matching will be done using the Aadhar card data base. The efficiency of a fingerprint is based on biometric system and is relatively high in comparison to other biometric based authentication systems like iris recognition, face readers, retina scanning, voice recognitions or hand geometry. With the help of keypad matrix voter can select the candidate to whom they wish to cast their vote and a message is displayed in LCD confirming the vote casted.
Aadhar based Digital election system of indiaVikash Singh
it is a new technique of voting which can minimize the cost of election from the Indian economy and increase the voting ratio and eliminate vocus voting and other problems.
Electronic Voting: Challenges and Prospects in Nigeria’s Democracytheijes
One basic feature of democracy is that it cuts across all divides of people in the act of election. It also encourages individual freedom according to the rule of law; hence people may behave and express themselves as they choose. This paper examines the development and implementation of and Electronic Voting System (EVS) that enables voters to cast their votes online and also enables the officials to register voters and print out the results of the votes casted. It equally provides security such that voters can only vote once with their identification details. The system therefore eliminates common fraud, speed up the processing of results, increase accessibility and make voting more convenient for the citizenry.
E-Voting system is a system which allow all citizens of country to cast their vote online is to increase the overall voting percentage across the country, as in the recent scenario people have to visit the booth to cast their vote and those people who live out of their native place are not able to cast vote during the elections. So due to this the voting percentage across the country is very less. Through this software those people who live out of their home town will also be able to cast their votes as this system is online. The main objective of this software is to increase the overall voting percentage and create and manage polling and election details like general user details, nominated users, and election and result details efficiently.
The purpose of this master‘s project is to develop an Online E-Voting prototype system
utilizing the Paillier Threshold Cryptosystem (PTC) web services and applying MESE processes
to it in an attempt to find possible solutions to further improve existing PTC web services.
Online voting (e-voting) would be more convenient, relatively secure and utilize fewer
resources. To be able to access e-voting system from a personal, business or even a public library
computer may be more convenient for many people needing to vote. This could potentially be a
solution for the low voter turnout at the polls. However, it is still questionable whether elections
can be conducted online or over the internet due to the high level of concern over security.
Main objective of this paper is to improve the existing Indian voting system. In the present voting system, one can easily poll the fake vote by various wrong methods. This may lead to a big democratic problem. By implementing some changes in the previous systems, we can make the polling process more secured and counting process fast and efficient. By using biometric in voting systems, the process of polling will be more secured than the existing system. In this system, no one can vote instead of the legit voter. All voter information is stored in this system. Here, we are using the fingerprint for the verification purpose. Every individual has a unique fingerprint. So, there will not be any kind of misconduct done while using this system. At the time of counting, the process can be done by connecting the system to the computer making the process faster. Thakurendra Singh | Chirag Sharma | Rahul Sharma | Avadh Pratap Sharma | Yogesh Kumar Upadhayay "Biometric Electronic Voting Machine" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30597.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30597/biometric-electronic-voting-machine/thakurendra-singh
The purpose of this paper is to examine the main security problems in electronic voting systems, particularly security threats to DRE voting systems and security threats to the Internet voting systems. It will focus on how security problems can be addressed. The paper is divided into four parts. The first part will pinpoint the criteria of using electronic voting systems while focusing on the main security problems in DRE and Internet based voting systems and will suggest their solutions. The second and third parts will propose secure reference architecture for electronic and internet based voting systems while the last part will be the conclusion.
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The system uses smart card technology to identify the authorized personnel and then process all the passport details pertaining to him/her, for necessary verification by authorities concerned.
For more details: http://www.edgefxkits.com/
Die Ameisen-Roboter BionicAnts sollen in Zukunft die Arbeit in Fabriken erleichtern. Durch Funk-Kommunikation werden selbst schwerste Lasten schnell und koordiniert transportiert.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The E-voting promises the possibility of convenient, easy and safe way to capture and count the votes in an election[1]. This research project provides the specification and requirements for E-Voting using an Android platform. The e-voting means the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All the candidates vote count is encrypted and stored in the database in order to avoid any attacks and disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project provides the specification and requirements for E-Voting using an Android platform. The e-voting means the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling booth. The application follows proper authentication measures in order to avoid fraud voters using the system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and disclosure of results by third person other than the administrator. Once the session is completed the admin can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
Traditionally, in paper based election,voters cast their vote to select right candidate, where they simply put their vote in voting box and at the end of the voting day the votes are going to be count manually. This process was much time consuming as well as was erroneous. To overcome this drawback Electronic Voting Machine (EVM) was introduced. In EVM, Voter cast their vote by pressing the voting button which was on EVM. The Major advantage of EVM system is , the votes are counted automatically instead of manually. But the drawback of EVM machine was, the votes may get manipulated and was not secure. So to overcome all these drawbacks, research on biometric based voting system is going on. This Paper focuses on survey of different voting system using Fingerprint biometric through different algorithms and methods.
Highly Secured Online Voting System (OVS) Over Networkijbuiiir1
Internet voting systems have gained popularity and have been used for government elections and referendums in the United Kingdom, Estonia and Switzerland as well as municipal elections in Canada and party primary elections in the United States. Voting system can involve transmission of ballots and votes via private computer networks or the Internet. Electronic voting technology can speed the counting of ballots and can provide improved accessibility for disabled voters. The aim of this paper is to people who have citizenship of India and whose age is above 18 years and of any sex can give their vote through online without going to any physical polling station. Election Commission Officer (Election Commission Officer who will verify whether registered user and candidates are authentic or not) to participate in online voting. This online voting system is highly secured, and its design is very simple, ease of use and also reliable. The proposed software is developed and tested to work on Ethernet and allows online voting. It also creates and manages voting and an election detail as all the users must login by user name and password and click on his favorable candidates to register vote. This will increase the voting percentage in India. By applying high security it will reduce false votes.
The proposal of giving two receipts for voters to increase the security of el...csandit
Holding an election with aim of selecting only one person or approval / rejection of a state law,
is a special kind of election which every few years in the different countries going to happen.
Given the pervasiveness of this election, we must take special measures to provide high security
for the referendum. Using two receipts for each voter which one is named barcode receipt, a
secret indicator of vote and another is named key receipt that is a key to acknowledged the
voters information box, including: voter’s National Code, the candidate code which is voted by
this voter, code of election station and barcode information. In this paper is proposed to enable
people and social networks using data on bar code’s receipts without Intrusion into the privacy
of other voters, so they will put together their personal information from monitoring the election
process on a social network which can help to prevent any violation in election. The security of
the proposed scheme is based on the turnout in recount of votes
Similar to Impressive smart card based electronic voting system (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Impressive smart card based electronic voting system
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 284
IMPRESSIVE SMART CARD BASED ELECTRONIC VOTING SYSTEM
G.Keerthana1
, P.Priyanka2
, K.Alise Jenifer3
, R.Rajadharashini4
, Aruna Devi.P5
1
ECE, Sasurie College of Engineering, Tamil Nadu
2
ECE, Sasurie College of Engineering, Tamil Nadu
3
ECE, Sasurie College of Engineering, Tamil Nadu
4
ECE, Sasurie College of Engineering, Tamil Nadu
5
Assistent Professor/ECE, Sasurie College of Engineering, Tamil Nadu
Abstract
The impressive smart card based electronic voting system is introduced to ensure apposite voting procedures and voting counts.
This idea prevents the illegal acts against the voting system and provides the voter authentication in an effective manner. This
proposal plans to provide a fortification for each and every votes. It entirely changes the status of the election process and
ensures the integrity of electoral system. The primary idea of this paper is to make the voters as to have a trust in election through
the methods of taking fingerprint and providing a smart card to each user to promise their uniqueness in the voting system and
reduces the work of election committee. At the same time the result of the election process will be automatically declared to the
public. With the help of this method, the person can vote from any election booth easily.
Keywords- Electronic voting system, authentication, biometric fingerprinting method, smart card
----------------------------------------------------------------------***-------------------------------------------------------------------
1. INTRODUCTION
E-voting has been a very controversial topic ever since the
presidential elections in the U.S. in 2000.Many security
flaws were found. The standards for the implementation of
e-voting systems were shown to be too weak and many
(scientific) experts expressed their negative opinions on e-
voting.
Nevertheless, efforts are still made to introduce e-voting in
countries that use traditional paper ballots. E-voting is an
election method in which the votes are cast or collected
electronically. A computer system whose main element is
an software component that maps the voting procedure
electronically is called an e-voting system.
A direct recording electronic (DRE) machine is a special
case of such a system as it implements all steps in the
voting process, from start to declaration of results. There
are two different forms of voting: distance and presence
voting. In present, the person can cast in the election booth
under the direction of the election's organization.
The present voting are conventional elections in polling
stations or voting with e-voting machines. In distance
voting, the voter acts without the supervision of the
electoral commission and they can poll their votes from a
place other than a polling booth, such as casting absentee
ballots via mail or internet voting.
The finger print sensor gets the finger print of the voters
and it passes it to the computer. In computer the finger print
image is compared with the image in database. If it
matches, the computer informs the command the person is
valid to the micro controller and displayed. If anyone try to
poll their vote beyond the time limit, system will be
blocked.
It reduces the time in both casting a vote and declaring the
results compared to the old paper ballot system. However,
they have been under the suspicion over their alleged
tamping arability and security problems during elections
(especially after the 2009). After reign of Delhi High Court
,and other courts and demands from various political issues
,the Election Commission determined to introduce
electronic voting with Voter-verified paper audit trail
(VVPAT) system. The Voter-verified paper audit trail
system is introduced in 8 of 543 parliamentary
constituencies as a pilot project.
2. OVERVIEW OF ELECTRONIC VOTING
SYSTEM
2.1 Electronic Voting Machine
Electronic voting machine is a device that has the
programmed to conduct a campaign of election in a fair and
quick a manner. The idea of electronic voting machines
(EVM) started by the chief election commissioner in 1977.
This was a technical development of the Electronics
Corporation of India Limited (ECIR), Hyderabad and with
Bharat Electronics Limited (BEL), Bangalore. The full
control of the machine is with the presiding officer or the
chief polling officer of the area as the control unit while the
other unit called balloting unit is placed inside the
compartment. Electronic Voting Machine (EVM) retains all
the characteristics of voting by papers, while making
polling a lot more convenient and absolutely consistent.
And, also it, helps maintain total voting privacy without the
use of ballot papers.
An Electronic Voting Machine consists of two Units – a
Control Unit and a Balloting Unit – joined by a five-meter
cable. The balloting unit enables the voters to provide their
votes. Each balloting unit can accommodate more than 10
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 285
candidates. Such units can be connected to a single control
unit. EVMs are powered by an ordinary 6 volt alkaline
battery. This design helps the use of EVMs throughout the
country without interruptions because several parts of India
do not have power supply and/or erratic power supply.
Due to the low voltage, there is absolutely no risk of any
voter getting a shock. presently, it can record a maximum
of nearly 4000 votes, which is equally for a election booth
as they typically have no more than 1400 voters assigned.
At present, an EVM can furnish to a maximum of
candidates. There is specialty for sixteen candidates in a
polling Unit. If the total number exceeds, a second Unit can
be linked equivalent to the first Balloting Unit and so on till
a maximum of 4 units. The conventional method of polling
is used if the number of candidates exceeds 64.
Fig 1: Electronic Voting Machine
In this paper it is not possible to vote more than once by
pressing the button repeatedly. Suddenly a particular button
on the Balloting Unit is pressed, the vote is recorded for
that correct candidate and the machine gets sheltered. Even
if the button is pressed again or any other button, no vote
will be polled. This manner the machine gives the principle
of "one person, one vote". Simple to operate and can be
made in a short time, Preserves voting concealment. No
scope for false votes. Helps in fast and perfect vote counts
– possible to declare results on spot. Recycled by simply
erasing votes recorded in.
2.2 Voter Identification Card
In August, 1993, the Election Commission of India ordered
the making of photo identity cards for all voters of the
country in an attempt to improve the accuracy of the
electoral rolls and prevent electoral fraud. To take
advantage of the latest technical inventions, the
Commission provided guidelines for the Electors Photo
Identity Card (EPIC) Program. More than million identity
cards have been supplied across India till now.
The voter ID card or EPIC is an identification card issued
by the Election Commission to all eligible voters (Indian
citizens who are above 18 years of age) to enable voter
identification on the Day of election. Those who are in the
voter's list are eligible to receive an Identification card.
These carry personal details and a distinct serial
identification number.
The EPIC proves to be a unique identity document for all
Indians. It also acts as an identity proof for getting other
provisions also. In fact today, almost all government
organizations, they ask for a voter id number. A voter ID
card is also essential for listing in the electoral roll in case a
person migrates to a place other than the place of his/her
domicile.
To get a voter ID card or EPIC, first of all you have to get
registered as a voter by filling and submitting the form
6/8/8A to the electoral Register officer (ERO) and then
submit the form 001A to apply for a voter individuality
Card. If the persons are previously registered i.e. your
details are already in the collective database, you can
suggest the Form to the ERO.
Fig 2: Voter Identification Cards
The technique in this paper replaces the voter id card with
the RFID card such that the manual checking of the voter id
card is reduced hence the time gets reduced.
3. TECHNIQUES OF PROPOSING SYSTEM
Electronic voting (also known as e-voting) is a term
encompassing several different types of voting, embracing
both electronic means of casting a vote and electronic
means of counting votes.
It can also involve transmission of ballots and votes by way
of telephones, secretive computer networks. The idea of
providing smart card like swipe card to each people in the
constitution area and implementing the system access on
the basis of biometric finger printing method
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 286
3.1 Procedure in the Proposed Voting System
16F877A
The procedure in the working of Impressive smart card
based election voting system is understood from the block
diagram as below.
The block diagram consisting of following blocks,
EEPROM
FINGER PRINT MODULE
KEYBOARD
BUZZER
LCD DISPLAY
RFID MODULE WITH RFID CARD
PIC MICROCONTROLLER (16F877A)
This paper has the above module which is the combined
method of RFID and the Fingerprint interface which is the
main idea in providing security to the system. Using this
combined process the malpractice with irrelevant materials
is avoided.
Fig 3 Block Diagram
The procedure in this paper is to implement the voting
procedure is followed by checking the voter ID card prior
to the main electoral process and then only the person is
allowed to move inside the polling booth. This verification
is done by the officers inside the polling area and hence this
ids manual. There the smart card which the person has is
swiped and then his fingerprint is placed in the module kept
nearby.
Finally if both the smart id number and the fingerprint
impressed matches with the database the person can cast
their vote for the candidate they specify. The lists of the
parties in that constitution who are competing are displayed
in the screen. From that the person can choose the
candidate and then can vote.
The interface of the pic microcontroller and the RFID
module is done by the MICRO C tool which controlls the
reading and operation of the RFID portion. The databases
of the voting candidates are done and stored in the VB.NET
programming with the MS ACCESS specializations.the
registration of the candidates, the start and end of voting
process is done by the official person and it is done in the
server system. This is protected by the password which is
confidential. Only the voting client system is placed inside
the voting compartment and controlled by the server.
The highest RFID range can be achieved by,
The power available within the RFID tag is to
respond
The power available within the reader to
communicate
The environmental conditions and structures are
significant to SNR (signal to noise ratio)
In an RFID system the transponder that contains the data to
be transmitted is known as RF tag. These are either active
or passive.
The pin functions of RFID are denoted in the table below,
Table 1 RFID Pin specification
1 VCC 5V
2 GN GND
3 BEE BEEP AND LED
4 ANT NO USE
5 ANT NO USE
6 SEL HIGH IS RS232,LOW IS
WEIGNAND
7 RS232 RS232
8 D1 WEIGNAND DATA1
9 D0 WEIGNAND DATA0
It is a short range communication technology. This term
(RFID) is used to indicate various technologies which use
radio frequency waves used to customarily sort out people
or objects. This technology is similar to the bar code
identification systems but the only difference is that RFID
does not rely on the line-of-sight reading.
Fig 4 RFID Reader module
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 287
The electromagnetic or the electrostatic coupling in the RF
portion of the electromagnetic spectrum is used to transmit
signals. This system consist of an antenna and a transceiver,
which read the RF and transfer the information to the
device(reader) and a transponder or RF tag, which contains
the RF circuitry and information to be transmitted.
.
It transmits information to the reader that converts the radio
waves reflected back from the RFID tag into digital
information and it can be passed onto the computer to
examine the data. It also consists of databases, readers and
networks. It is also used in some hospitals to track patient’s
location, and to provide real time tracking of the location of
doctors and nurses in the hospital. It is a frontrunner
technology in future for automatic identification.
3.2 Fingerprint Module
A Fingerprint is an impression of the friction ridges of all
or any part of finger. The method of fingerprinting is a type
of biometric recognition mainly used for identifying the
applications of internet. This method is leading one of low
cost and unique, can’t be changed easily and the stealing
and losses are not possible.
Fig 5 Fingerprint
Fingerprinting is a mean of hardware intellectual property
protection (IP) focus on low design effort and less attention
on the integration of IP. The authorship is detected through
different data of fingerprints without continuous separation
of IP owner’s signature in the instant of fingerprinting. The
fingerprinting challenges considerate IP voter marking and
creditability of low design overheads and transparency of
flow specifications.
This paper gives the pattern of fingerprint matching and its
accuracy in identification procedures compared to other
authentication processes. The uniqueness is main thing that
even the identical twin doesn’t have the same pattern of
fingerprint. The fingerprinting is now a day’s taken for all
fingers in a hand for the sake of occupational workers who
have a lot of works which are manual, prone to get injuries
in hands (e.g. cuts and bruises).
Modern fingerprint methodology, aided by central
processing unit and laser machinery, these methods can
speed the process of matching, and it gives an mammoth
comparative specimens with database. The method of
digital fingerprint reading and its techniques are explained
above
Fig 6 Digital reading of fingerprint
Fig 7 Digital scanning of fingerprint
4. PERFORMANCE ANALYSIS
The performance of the system is based on the database
which we are going to implement in the version of
VISUAL BASIC (VB.NET) and the related accessing
methods using PIC microcontroller and other modules in
the system. The security of the information and the voting
procedures are made secure such that there will be rigging
free election process.
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 288
5. CONCULSION
This paper focuses on the voting technologies that provides
assurance to the people who really have right to vote in
their constitution and ensures secured riggless voting using
the methods of fingerprinting and the uniqueness in the
voting procedures are promised by on spot declaration of
results of that election.
REFERENCES
[1]. Schurmann, C.; IT Univ. of Copenhagen, Copenhagen,
Denmark . ―Electronic Elections: Trust Through
Engineering‖, First international workshop Requirements
Engineering for e-Voting Systems (RE-VOTE), 2009.
[2]. Lin Hong. "Automatic Personal Identification Using
Fingerprints", Ph.D. Thesis, 1998.
[3]. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar,
Handbook of Fingerprint Recognition. New York:
Springer-Verlag, 2003.
[4]. Anil K. Jain and David maltoni. , Handbook of
Fingerprint Recognition, Springer-verlag New York, Inc.,
Secaucus, NJ, USA, 2003.
[5]. Tadayoshikohno_ Adamstubblefield Avield
Rubidans.Wallach ―Analysis of an Electronic Voting
system‖, IEEE symposium on Security and Privacy 2004.
[6]. Y. A. Zuev and S. Ivanon, ―The voting as a way to
increase the decision reliability,‖ in Proc. Foundations of
Information/Decision Fusion with Applications to
Engineering Problems,Washington, DC, Aug. 1996,
pp.206–210.
[7]. Davide Maltoni, Anil K.Jain, Dario Maio, S.Prabhak,
Handbook of fingerprint Recognition 2nd
Ed, London ,
British : SpringerVerlag, 2009.
[8]. Dhruv Batra, Girish Sanghal, “Gabor Filter based
Fingerprint Classification using Support Vector Machines”
in proc. IEEE India annual conference, 2004, p. 256.