Abstract: The Voting System of a country consists of certain regulations which define how the preference of people is collected and how outcome of the polling process is indicating the will of people. To implement such a system in the largest democracy in the world is a cumbersome task. An indigenous Electronic Voting Machine was introduced by the Election Commission of India to overcome the issues with manual voting which was slower and inefficient. In this paper the Indian Electronic Voting Machine’s Protocol for voting is implemented on a field programmable gate array. The ASIC based design is known to be faster than a microcontroller based design. Furthermore the use of an ASIC based design will make the Electronic Voting Machine a more reliable and tamper resistant machine. The new Voter-verified paper audit trail (VVPAT) system could also be interfaced with the ASIC based design. The protocol of Indian Electronic Voting Machine has been successfully implemented on a Basys 2 board using Verilog HDL. The FPGA based implementation gets half the job done for ASIC based EVM. The tool used for simulation and implementation is Xilinx ISE Design Suite with ISim as a Simulator
This document is a seminar report on GSM architecture submitted by a student, G. Koteswararao, to partially fulfill requirements for a Bachelor of Technology degree in Electronics and Communication Engineering. It includes an abstract, introduction, and sections on the history of GSM technology, GSM system architecture including mobile stations, base station subsystems, network and switching subsystems, and operating subsystems. It also discusses mobility management, traffic and control channels, cell selection, authentication, and call control in GSM networks.
1. The 8254 contains three independent 16-bit counters/timers that can be programmed to operate in different modes.
2. Each counter can be programmed to count from 1 to 65535 and has a programmable control word to select the operating mode.
3. The 8254 supports various timer modes like one-shot, continuous square wave, event counter, and software/hardware triggered one-shot for applications like timing, delay generation, and pulse width modulation.
This document discusses embedded computing systems and their design. It defines embedded systems as devices containing programmable computers optimized for specific applications rather than general-purpose use. Examples include cell phones, printers, vehicle components, appliances and more. The document outlines challenges in embedded system design like meeting deadlines and minimizing power. It describes using a methodology of requirements, specification, architecture, component design, and integration to manage the design process.
The document discusses various input/output interfacing components used with microprocessors, including parallel and serial communication interfaces, analog to digital and digital to analog converters, timers, and interrupt controllers. It describes the 8255 parallel interface chip, 8251 serial interface chip, and programming of ports and modes. Memory interfacing is also covered briefly. Application examples discussed include traffic light control, LED displays, and keyboard/display interfaces.
Interest Assignments
Partnership Assignments
Percentages Assignment
Profit and Loss
Assignments
Proportion Assignments
Set Theory Assignments
Time and Distance Assignments
Time and Work Assignments
Permutation Assignments
Allegation Assignments
AP,GP Assignments
1. Electronic textiles (e-textiles) integrate computing and electronics into fabrics to enable wearable technology like smart clothing.
2. E-textiles offer advantages like flexibility, large surface area for sensing, and concealment of technology.
3. Current applications of e-textiles include medical monitoring garments, military uniforms, and assistive clothing for conditions like stroke rehabilitation.
My new upload !!! --> http://www.slideshare.net/choleraparth91/smart-vehicle-ensuring-safe-ride-using-accerolometer-laser-sensor-co-sensor-and-also-with-use-of-gsm-modem-and-solar-panel
Contact & follow me to get PDF & PPT file - https://www.linkedin.com/in/parthcholera/
Email me directly if you want these file !!
choleraparth91@yahoo.com
or
contact me on fb - https://www.facebook.com/choleraparth91
or
https://www.facebook.com/Textivity
or
message me on - 08097508067
I suggest to go for these project !!! :D :D
This document is a seminar report on GSM architecture submitted by a student, G. Koteswararao, to partially fulfill requirements for a Bachelor of Technology degree in Electronics and Communication Engineering. It includes an abstract, introduction, and sections on the history of GSM technology, GSM system architecture including mobile stations, base station subsystems, network and switching subsystems, and operating subsystems. It also discusses mobility management, traffic and control channels, cell selection, authentication, and call control in GSM networks.
1. The 8254 contains three independent 16-bit counters/timers that can be programmed to operate in different modes.
2. Each counter can be programmed to count from 1 to 65535 and has a programmable control word to select the operating mode.
3. The 8254 supports various timer modes like one-shot, continuous square wave, event counter, and software/hardware triggered one-shot for applications like timing, delay generation, and pulse width modulation.
This document discusses embedded computing systems and their design. It defines embedded systems as devices containing programmable computers optimized for specific applications rather than general-purpose use. Examples include cell phones, printers, vehicle components, appliances and more. The document outlines challenges in embedded system design like meeting deadlines and minimizing power. It describes using a methodology of requirements, specification, architecture, component design, and integration to manage the design process.
The document discusses various input/output interfacing components used with microprocessors, including parallel and serial communication interfaces, analog to digital and digital to analog converters, timers, and interrupt controllers. It describes the 8255 parallel interface chip, 8251 serial interface chip, and programming of ports and modes. Memory interfacing is also covered briefly. Application examples discussed include traffic light control, LED displays, and keyboard/display interfaces.
Interest Assignments
Partnership Assignments
Percentages Assignment
Profit and Loss
Assignments
Proportion Assignments
Set Theory Assignments
Time and Distance Assignments
Time and Work Assignments
Permutation Assignments
Allegation Assignments
AP,GP Assignments
1. Electronic textiles (e-textiles) integrate computing and electronics into fabrics to enable wearable technology like smart clothing.
2. E-textiles offer advantages like flexibility, large surface area for sensing, and concealment of technology.
3. Current applications of e-textiles include medical monitoring garments, military uniforms, and assistive clothing for conditions like stroke rehabilitation.
My new upload !!! --> http://www.slideshare.net/choleraparth91/smart-vehicle-ensuring-safe-ride-using-accerolometer-laser-sensor-co-sensor-and-also-with-use-of-gsm-modem-and-solar-panel
Contact & follow me to get PDF & PPT file - https://www.linkedin.com/in/parthcholera/
Email me directly if you want these file !!
choleraparth91@yahoo.com
or
contact me on fb - https://www.facebook.com/choleraparth91
or
https://www.facebook.com/Textivity
or
message me on - 08097508067
I suggest to go for these project !!! :D :D
Demultiplexing of buses of 8085 microprocessor Rajal Patel
1) The document discusses demultiplexing address and data bus lines (AD0-AD7) that serve dual purposes on a microprocessor. These lines carry address bits during instruction execution and then carry data bits.
2) To separate the address and data, a latch saves the address value before the bus lines switch to carrying data. The ALE signal controls the latch, enabling it to capture the address when ALE pulses during the address phase.
3) The document then covers generating a control signal to properly latch the address bits and allow the bus lines to carry data. Truth tables are provided to illustrate the control signal logic.
Module 2 ARM CORTEX M3 Instruction Set and ProgrammingAmogha Bandrikalli
This document provides an overview of the ARM Cortex M3 instruction sets and assembly programming. It begins by explaining why assembly is commonly used, including the need for detailed control flow and efficiency. The outline presented covers assembly basics, instructions, useful instructions, and assembly and C language programming. It then discusses the various instruction sets of the Cortex M3 with examples. Specific instructions covered include data processing, branch, load/store, and 32-bit instructions. It also notes instructions not supported by the Cortex M3 such as coprocessor, state change, and hint instructions.
This document discusses programming the 8255 programmable peripheral interface chip. It provides 5 programs with steps to interface keys and displays, read inputs and write outputs, and set and clear bits on Port C. It explains calculating port addresses, initializing control words, and using read and write instructions. It also describes using a delay loop subroutine and calculating time delays for milliseconds. The document reviews important concepts and asks additional practice questions.
The document discusses various topics related to mobile communication systems:
1. Different categories of antennas and examples of each including wire antennas, microstrip antennas, reflector antennas, travelling wave antennas, and aperture antennas.
2. Types of handover in mobile networks - hard handoff and soft handoff.
3. Ionospheric bending which is the phenomenon of radio wave refraction in the ionospheric layer causing the waves to bend.
The 8051 microcontroller has 128 bytes of internal RAM and 4Kbytes of internal ROM memory. It uses the same addresses for code and data but accesses the correct memory based on whether an operation is for code or data. The 128 bytes of internal RAM are organized into 4 banks of 32 bytes each. External memory can be added if more memory is needed for program code or variable data storage. The document also provides information on interfacing external program and data memory with the 8051 microcontroller.
The 8085 microprocessor is an 8-bit CPU with 40 pins that can address up to 64KB of memory and operate at speeds up to 3MHz. It has various internal registers like the accumulator, flag register, instruction register and program counter. It uses an ALU to perform arithmetic and logical operations. The 8085 has an 8-bit data bus and 16-bit address bus to interface with external memory and I/O devices. It uses control signals like ALE, RD, WR and I/O/M to control data transfers. The pinout includes power, clock, interrupt pins and reset signals.
Remote sensing and control of an irrigation system using a distributed wirele...nithinreddykaithi
This document describes the design of a remote irrigation system using a wireless sensor network. Sensors will monitor field conditions like voltage, current, temperature and irradiance. The sensor data will be transmitted periodically to a base station. A digital controller will regulate the power point using a DC-DC converter to identify the maximum power point based on a neural network model. A low-cost RF module wireless network will transmit communication data for remote monitoring and distributed control. Web-based software will provide remote access to field conditions and real-time control of power points in the smart photovoltaic system. The system uses a PIC microcontroller and sensors to monitor the field and an RF transmitter to send data to the receiver and base station
UML is used to model a model train controller system. The system includes a console to control up to 8 trains and receive input from knobs. It formats and transmits messages to a receiver on each train. The trains interpret the messages to control speed using pulse width modulation of the motor. Classes are defined for the console components like the knobs, transmitter, and formatter. Classes are also defined for the train components like the receiver, detector, motor interface and controller. Sequence diagrams show transmitting a control from the console and receiving a set speed command on the train.
The document discusses Arduino, an open-source electronics prototyping platform. It describes Arduino Uno, including its processor, memory, input/output pins, and operating voltage. It provides steps for getting started with Arduino, including downloading the IDE, connecting the board, selecting options in the IDE, and uploading a basic blink program. The document also covers some key Arduino concepts like variables, conditional statements, loops, and functions.
This document presents an automatic penalty system for traffic rule violations. The system uses RFID tags on vehicles to detect and charge penalties for infractions like crossing on a zebra crossing or running a red light. Information is sent wirelessly to traffic authorities to help enforce rules and reduce corruption. The system includes units attached to vehicles, traffic signals, and RTO offices to monitor violations and block ignition if penalties are not paid. It aims to improve traffic management and reduce congestion.
This document discusses memory interfacing with the 8085 microprocessor. It begins by describing the different types of computer memory, including primary/volatile memory (RAM and ROM) and secondary/non-volatile memory (magnetic tapes, disks, optical disks). It then discusses how the 8085 microprocessor interfaces with memory chips through an interface circuit. The interface circuit matches the memory chip signals to the microprocessor address and control signals. Memory interfacing involves selecting the appropriate memory chip, identifying the correct register using address lines, and enabling read/write buffers using control signals.
This document describes a home automation project that allows controlling home appliances like a TV, refrigerator, and lights using a personal computer. A PC is interfaced with a microcontroller via an RS232 cable. The microcontroller is connected to relays that switch appliances on and off. Home automation provides network connectivity between computers, appliances, and subsystems like HVAC and security. The project allows remote control and monitoring of appliances for convenience and energy savings.
The document discusses several challenges in embedded systems design. It notes that current scientific foundations separate hardware and software design paradigms in ways that make integrating computation and physical constraints difficult. Engineering practices also separate critical and best-effort design methods. The document argues that a successful approach to embedded systems design needs a mathematical basis that integrates abstract-machine and transfer-function models, allows combining critical and best-effort engineering, and encompasses heterogeneous components through constructs like compositionality and non-interference rules.
This document describes a student project to create a traffic light controller using an AT89C51 microcontroller. It provides background on the history of traffic lights, descriptions of red, yellow, and green light meanings. The project components include an AT89C51 microcontroller, LED lights, resistors, capacitors, and a crystal oscillator. The microcontroller is programmed to automatically change the LED light signals after a time interval by setting the corresponding port pins high and low. The motivation is that it is a basic microcontroller application. There is opportunity to enhance it to control signals automatically based on sensor detection of traffic density.
This document describes a project to develop an Arduino-based automatic phase selector and IoT metering system for real-time energy monitoring. The system uses a Bluetooth module to allow users to select from available power sources like the electric utility, solar, and inverter. A Wi-Fi module is used to generate a webpage displaying source in use and power consumption data collected from the energy meter. The microcontroller interfaces the Bluetooth and Wi-Fi modules to update the information. The system aims to make electricity usage more user-friendly by providing selection options and consumption insights.
vlsi projects using verilog code 2014-2015E2MATRIX
E2MATRIX Research Lab
Are you scratching your head to write your M Tech thesis?
Don’t know where to start and where to find the relevant matter on the topic?
We Provide Complete Thesis Help For M.Tech / Phd Studnets.
E2MATRIX deals with Thesis guidance and research work for M.Tech, PhD Students.
If you are looking for professional thesis guidance then of course you are at the right place. We have a best team of Technical Developers and professionals who specialize in developing and delivering best and authenticated work with an assurance of on time delivery.
Contact : +91 9041262727, 9779363902.
Email : support@e2matrix.com
Web : www.e2matrix.com
This document lists 54 microcontroller 8051 projects including automatic control of a three phase induction motor, an automatic college bell, and automatic plant irrigation. The projects utilize various microcontrollers like the AT89S52, AT89C2051, and AT89S8252. They cover areas such as biomedicial monitoring, Bluetooth device control, digital calendars and timers, fingerprint security, and remote control via internet among others.
This document outlines a proposed traffic control system project consisting of 4 group members. It discusses the current issues with traffic management in Dhaka, including traffic equilibrium, parking, and speeding. The proposed solutions involve using drones to monitor traffic, restricting parking, and using digital signage to control speeds. The project goals are traffic management, traveler information, and commercial vehicle tracking. The objectives, estimated budget, timeline, advantages, and future plans are also outlined. References are provided at the end.
An electronic voting machine (EVM) is used for electronic voting. It consists of two units - a control unit and a balloting unit, which are connected by a cable. The control unit is kept with the presiding officer. The EVM was developed in 1989 by the Election Commission of India in collaboration with Bharat Electronics Limited and Electronics Corporation of India Limited. One of the main advantages of the EVM is that it eliminates the need to print and distribute millions of paper ballots.
Traditionally, in paper based election,voters cast their vote to select right candidate, where they simply put their vote in voting box and at the end of the voting day the votes are going to be count manually. This process was much time consuming as well as was erroneous. To overcome this drawback Electronic Voting Machine (EVM) was introduced. In EVM, Voter cast their vote by pressing the voting button which was on EVM. The Major advantage of EVM system is , the votes are counted automatically instead of manually. But the drawback of EVM machine was, the votes may get manipulated and was not secure. So to overcome all these drawbacks, research on biometric based voting system is going on. This Paper focuses on survey of different voting system using Fingerprint biometric through different algorithms and methods.
Demultiplexing of buses of 8085 microprocessor Rajal Patel
1) The document discusses demultiplexing address and data bus lines (AD0-AD7) that serve dual purposes on a microprocessor. These lines carry address bits during instruction execution and then carry data bits.
2) To separate the address and data, a latch saves the address value before the bus lines switch to carrying data. The ALE signal controls the latch, enabling it to capture the address when ALE pulses during the address phase.
3) The document then covers generating a control signal to properly latch the address bits and allow the bus lines to carry data. Truth tables are provided to illustrate the control signal logic.
Module 2 ARM CORTEX M3 Instruction Set and ProgrammingAmogha Bandrikalli
This document provides an overview of the ARM Cortex M3 instruction sets and assembly programming. It begins by explaining why assembly is commonly used, including the need for detailed control flow and efficiency. The outline presented covers assembly basics, instructions, useful instructions, and assembly and C language programming. It then discusses the various instruction sets of the Cortex M3 with examples. Specific instructions covered include data processing, branch, load/store, and 32-bit instructions. It also notes instructions not supported by the Cortex M3 such as coprocessor, state change, and hint instructions.
This document discusses programming the 8255 programmable peripheral interface chip. It provides 5 programs with steps to interface keys and displays, read inputs and write outputs, and set and clear bits on Port C. It explains calculating port addresses, initializing control words, and using read and write instructions. It also describes using a delay loop subroutine and calculating time delays for milliseconds. The document reviews important concepts and asks additional practice questions.
The document discusses various topics related to mobile communication systems:
1. Different categories of antennas and examples of each including wire antennas, microstrip antennas, reflector antennas, travelling wave antennas, and aperture antennas.
2. Types of handover in mobile networks - hard handoff and soft handoff.
3. Ionospheric bending which is the phenomenon of radio wave refraction in the ionospheric layer causing the waves to bend.
The 8051 microcontroller has 128 bytes of internal RAM and 4Kbytes of internal ROM memory. It uses the same addresses for code and data but accesses the correct memory based on whether an operation is for code or data. The 128 bytes of internal RAM are organized into 4 banks of 32 bytes each. External memory can be added if more memory is needed for program code or variable data storage. The document also provides information on interfacing external program and data memory with the 8051 microcontroller.
The 8085 microprocessor is an 8-bit CPU with 40 pins that can address up to 64KB of memory and operate at speeds up to 3MHz. It has various internal registers like the accumulator, flag register, instruction register and program counter. It uses an ALU to perform arithmetic and logical operations. The 8085 has an 8-bit data bus and 16-bit address bus to interface with external memory and I/O devices. It uses control signals like ALE, RD, WR and I/O/M to control data transfers. The pinout includes power, clock, interrupt pins and reset signals.
Remote sensing and control of an irrigation system using a distributed wirele...nithinreddykaithi
This document describes the design of a remote irrigation system using a wireless sensor network. Sensors will monitor field conditions like voltage, current, temperature and irradiance. The sensor data will be transmitted periodically to a base station. A digital controller will regulate the power point using a DC-DC converter to identify the maximum power point based on a neural network model. A low-cost RF module wireless network will transmit communication data for remote monitoring and distributed control. Web-based software will provide remote access to field conditions and real-time control of power points in the smart photovoltaic system. The system uses a PIC microcontroller and sensors to monitor the field and an RF transmitter to send data to the receiver and base station
UML is used to model a model train controller system. The system includes a console to control up to 8 trains and receive input from knobs. It formats and transmits messages to a receiver on each train. The trains interpret the messages to control speed using pulse width modulation of the motor. Classes are defined for the console components like the knobs, transmitter, and formatter. Classes are also defined for the train components like the receiver, detector, motor interface and controller. Sequence diagrams show transmitting a control from the console and receiving a set speed command on the train.
The document discusses Arduino, an open-source electronics prototyping platform. It describes Arduino Uno, including its processor, memory, input/output pins, and operating voltage. It provides steps for getting started with Arduino, including downloading the IDE, connecting the board, selecting options in the IDE, and uploading a basic blink program. The document also covers some key Arduino concepts like variables, conditional statements, loops, and functions.
This document presents an automatic penalty system for traffic rule violations. The system uses RFID tags on vehicles to detect and charge penalties for infractions like crossing on a zebra crossing or running a red light. Information is sent wirelessly to traffic authorities to help enforce rules and reduce corruption. The system includes units attached to vehicles, traffic signals, and RTO offices to monitor violations and block ignition if penalties are not paid. It aims to improve traffic management and reduce congestion.
This document discusses memory interfacing with the 8085 microprocessor. It begins by describing the different types of computer memory, including primary/volatile memory (RAM and ROM) and secondary/non-volatile memory (magnetic tapes, disks, optical disks). It then discusses how the 8085 microprocessor interfaces with memory chips through an interface circuit. The interface circuit matches the memory chip signals to the microprocessor address and control signals. Memory interfacing involves selecting the appropriate memory chip, identifying the correct register using address lines, and enabling read/write buffers using control signals.
This document describes a home automation project that allows controlling home appliances like a TV, refrigerator, and lights using a personal computer. A PC is interfaced with a microcontroller via an RS232 cable. The microcontroller is connected to relays that switch appliances on and off. Home automation provides network connectivity between computers, appliances, and subsystems like HVAC and security. The project allows remote control and monitoring of appliances for convenience and energy savings.
The document discusses several challenges in embedded systems design. It notes that current scientific foundations separate hardware and software design paradigms in ways that make integrating computation and physical constraints difficult. Engineering practices also separate critical and best-effort design methods. The document argues that a successful approach to embedded systems design needs a mathematical basis that integrates abstract-machine and transfer-function models, allows combining critical and best-effort engineering, and encompasses heterogeneous components through constructs like compositionality and non-interference rules.
This document describes a student project to create a traffic light controller using an AT89C51 microcontroller. It provides background on the history of traffic lights, descriptions of red, yellow, and green light meanings. The project components include an AT89C51 microcontroller, LED lights, resistors, capacitors, and a crystal oscillator. The microcontroller is programmed to automatically change the LED light signals after a time interval by setting the corresponding port pins high and low. The motivation is that it is a basic microcontroller application. There is opportunity to enhance it to control signals automatically based on sensor detection of traffic density.
This document describes a project to develop an Arduino-based automatic phase selector and IoT metering system for real-time energy monitoring. The system uses a Bluetooth module to allow users to select from available power sources like the electric utility, solar, and inverter. A Wi-Fi module is used to generate a webpage displaying source in use and power consumption data collected from the energy meter. The microcontroller interfaces the Bluetooth and Wi-Fi modules to update the information. The system aims to make electricity usage more user-friendly by providing selection options and consumption insights.
vlsi projects using verilog code 2014-2015E2MATRIX
E2MATRIX Research Lab
Are you scratching your head to write your M Tech thesis?
Don’t know where to start and where to find the relevant matter on the topic?
We Provide Complete Thesis Help For M.Tech / Phd Studnets.
E2MATRIX deals with Thesis guidance and research work for M.Tech, PhD Students.
If you are looking for professional thesis guidance then of course you are at the right place. We have a best team of Technical Developers and professionals who specialize in developing and delivering best and authenticated work with an assurance of on time delivery.
Contact : +91 9041262727, 9779363902.
Email : support@e2matrix.com
Web : www.e2matrix.com
This document lists 54 microcontroller 8051 projects including automatic control of a three phase induction motor, an automatic college bell, and automatic plant irrigation. The projects utilize various microcontrollers like the AT89S52, AT89C2051, and AT89S8252. They cover areas such as biomedicial monitoring, Bluetooth device control, digital calendars and timers, fingerprint security, and remote control via internet among others.
This document outlines a proposed traffic control system project consisting of 4 group members. It discusses the current issues with traffic management in Dhaka, including traffic equilibrium, parking, and speeding. The proposed solutions involve using drones to monitor traffic, restricting parking, and using digital signage to control speeds. The project goals are traffic management, traveler information, and commercial vehicle tracking. The objectives, estimated budget, timeline, advantages, and future plans are also outlined. References are provided at the end.
An electronic voting machine (EVM) is used for electronic voting. It consists of two units - a control unit and a balloting unit, which are connected by a cable. The control unit is kept with the presiding officer. The EVM was developed in 1989 by the Election Commission of India in collaboration with Bharat Electronics Limited and Electronics Corporation of India Limited. One of the main advantages of the EVM is that it eliminates the need to print and distribute millions of paper ballots.
Traditionally, in paper based election,voters cast their vote to select right candidate, where they simply put their vote in voting box and at the end of the voting day the votes are going to be count manually. This process was much time consuming as well as was erroneous. To overcome this drawback Electronic Voting Machine (EVM) was introduced. In EVM, Voter cast their vote by pressing the voting button which was on EVM. The Major advantage of EVM system is , the votes are counted automatically instead of manually. But the drawback of EVM machine was, the votes may get manipulated and was not secure. So to overcome all these drawbacks, research on biometric based voting system is going on. This Paper focuses on survey of different voting system using Fingerprint biometric through different algorithms and methods.
ELECTRONIC VOTING MACHINE(EVM) HACKABLE OR NOTSHUBHAM SAHU
This document discusses electronic voting machines (EVMs) in India and whether they can be hacked. It begins by describing what an EVM is and how it works. It then addresses whether EVMs can be hacked, explaining that while direct hacking is not possible, tampering with hardware is. The document outlines two attacks involving replacing EVM parts or using devices to change stored vote records. It notes that current safeguards are inadequate and that the lack of transparency in the EVM system means problems cannot be easily fixed. Frequently asked questions and sources are provided at the end.
This document proposes an Internet of Things (IoT)-based electronic voting machine (EVM) to address vulnerabilities in existing EVMs. The proposed EVM uses biometrics and a QR code scanner to authenticate voters. It transmits votes via WiFi to a cloud server using a new protocol called Random Code Transmission Protocol (RCTP) for security. The cloud server stores votes using blockchain technology and provides results analysis. A prototype was built to demonstrate the proposed architecture and RCTP protocol. The proposed EVM aims to increase voting transparency, prevent bogus voting through biometrics, and reduce post-election workload through cloud-based results.
Electronic voting machine project using 8051 microcontroller is used to develop a electronic machine for
several advantages like security, accuracy etc.
IRJET- Biometric based Electronic Voting Machine (EVM) using Arduino IDEIRJET Journal
This document describes a biometric-based electronic voting machine that uses fingerprint authentication via an Arduino system. It aims to improve security and provide convenient voting access using fingerprint identification. The system captures voters' fingerprints using a sensor and matches them to a database of registered voters. It then allows voters to cast their encrypted votes, which are transmitted to a PC. This aims to prevent fraud and ensure each voter only votes once. It provides a 3-sentence summary of the document.
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerIOSR Journals
This document describes a proposed biometric system for an electronic voting machine that uses fingerprint authentication with an ARM9 microcontroller. The system aims to enhance security over existing EVMs by identifying voters through fingerprint matching instead of manual verification of ID cards. It discusses the components used, including an ARM9 microcontroller, KY-M6 fingerprint sensor module, and MAX232 for serial communication. The proposed system stores voter fingerprints during enrollment and matches them during voting to authenticate voters and prevent multiple votes. If validated, the voter can then cast their vote which is displayed and results can be viewed later through the centralized server.
This document describes a proposed biometric system for an electronic voting machine that uses fingerprint authentication with an ARM9 microcontroller. The system aims to enhance security over existing EVMs by identifying voters through fingerprint matching instead of manual verification of ID cards. It discusses the components used, including an ARM9 microcontroller, KY-M6 fingerprint sensor module, and MAX232 for serial communication. The proposed system stores voter fingerprints during enrollment and matches them during voting to authenticate voters and prevent multiple votes. If validated, the voter can then cast their vote which is displayed and results can be viewed later through the central server.
India is one of the countries which has the electronic voting machine for parliamentary and assembly polls. But in every poll election commission is facing so much of troubles and various types of issues through the election. The most familiar issue which is faced by the election commission is, no proper acknowledgement regarding the confirmation of casting the votes, duplication or illegal casting of votes. In this project all these issues has been handled and overcome with the perfect solution. The main advantage of this project is handling of data by using biometric system such as finger print and face recognition (is done by masking technique). This is used to ensure the security to avoid fake and repeating voting. It also enhances the accuracy and speed of the process. The system performs with perfect recognition on a face and thumb impression of all the eligible voters in a constituency, which is done as pre-polled procedure. During election, thumb impression and face templates of voters is given as an input to the system. This is then compared with the already stored database and available records. If the particular pattern matches with the record then the voters are allowed to vote but incase if it doesn’t match or in case of repetition, voters vote are denied or gets rejected. The result is instant and counting is done.
e-Voting Application using Internal VtokenBowo Prasetyo
This document summarizes an e-voting application that was created to comply with European and Indonesian e-voting standards. It describes the components of the application, including client and server side systems. It then outlines the e-voting process, including voter verification, voting sessions, vote sealing and collection, and result management. Key aspects like vtoken generation and paper audit trails are also summarized.
This document describes a minor project presentation for an online voting system created by a team of 4 students. The proposed system aims to allow Indian citizens over 18 to vote online through a centralized database maintained by the Election Commission of India. It authenticates users by matching their information to the database. Users can register online and then login to vote using a username and password. The system is intended to overcome limitations of existing online and electronic voting systems like physical security and vote tampering. It uses fingerprint verification for identification and provides administrators and users modules to manage the system and voting process. It also includes a vote counting module to calculate and display results.
This document discusses the design of a SMS-based voting machine system using an Atmega32 microcontroller and GSM technology. It aims to develop a more efficient and secure alternative to traditional paper-based and electronic voting methods. The key components of the system include an Atmega32 microcontroller, GSM module, LCD display, and keypad. Voters would be able to cast their votes via SMS on their registered mobile phones. The system is designed to address issues with prior methods such as wasted resources, security vulnerabilities, and limited accessibility. It also outlines the technologies used, including GSM for cellular connectivity and Atmega32 for microcontroller functions.
IRJET- Design and Development of Security based Voting SystemIRJET Journal
This document summarizes a research paper that proposes a secure biometric-based voting system using fingerprint recognition. The proposed system aims to address issues with existing electronic voting machines, such as the possibility of false votes or votes being changed. It involves validating voters using fingerprint matching with Aadhaar data, allowing an authenticated voter to cast a vote, and preventing the same voter from voting again through alerts. The system is designed to provide secure, fast voting and ensure the principle of one person, one vote. The document outlines the existing voting system issues, proposed biometric system design and implementation steps, and concludes noting potential security and implementation challenges.
According to Election Data Services the percentage of electronic voting machines per country is increasing, yet a full replacement of the traditional voting procedure is very unlikely. In it essence, an electronic voting ma-chine(EVM)is a computer assisted self-interviewing(CASI) device giving the voter the opportunity to review and change his/her vote before submitting it. The different types of voting machines allow for different kinds of interaction, such as using a touch screen technology, using a dial wheel, touching a paper panel or pressing a button on a LCD screen. Each machine provide feedback for blank ballots and under-voting and prevents selecting more choices than the maximum allowed. Our work presents an overview of the voting machines based on established theories and result from CASI and Fault tolerance of the voting machine with respect to different types of analysis
This document summarizes a research paper that proposes an electronic voting system using biometrics for voter authentication. The system would use fingerprint matching to verify that each voter is who they say they are before allowing them to cast a vote. Fingerprints would be collected during voter registration and stored in a database. At voting time, the voter's fingerprint would be scanned and matched against the stored fingerprint to authenticate them. If verified, the voter could select their candidate on an electronic voting machine. This aims to prevent fraudulent or duplicate voting while streamlining the voting process. Flow diagrams depict the proposed workflow for voter check-in and casting a ballot. The system is meant to address security and efficiency issues with traditional paper-based voting.
This document describes a proposed biometric voting machine that uses fingerprint recognition for voter authentication. The system uses an Arduino microcontroller with an ATmega328 chip for processing. A fingerprint sensor module is connected to authenticate voters based on their fingerprint. If a match is found, the voter can cast a single vote for one candidate. Results are displayed after polling ends when an administrator enters a password. The system aims to provide a more secure and reliable alternative to traditional electronic voting machines.
Electronic voting machines (EVMs) are used in Indian elections to record votes. The EVM displays candidates' names and party symbols. Voters cast their vote by pressing the button next to their chosen candidate. After polling ends, the EVMs are sealed and stored securely until counting begins on the announced date. The candidate who receives the most votes in a constituency is declared the winner. EVMs were first used in 50 polling stations in Kerala in 1982 but required a law change before nationwide adoption, which occurred in the late 1980s and early 1990s. EVMs save paper, are cost-effective, and reduce vote counting and result declaration times. However, some argue they have security and software issues and lack voter-verified
IRJET- EVM Monitoring and Security over IoTIRJET Journal
The document proposes a design for an advanced Aadhaar and server-based electoral voting system for Indian elections that allows all voters to cast their votes via biometric Aadhaar authentication on an electronic voting machine. It aims to provide higher security during voting by creating a simultaneous backup on state/central level servers. The system seeks to replace traditional voter ID cards and voter lists by using only Aadhaar-based biometric authentication for voter verification.
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET Journal
1) This document describes a smart e-voting system that uses fingerprint authentication with an Arduino microcontroller to prevent fraudulent voting.
2) The system architecture includes voter registration using fingerprint scanning, fingerprint verification when casting a vote, recording the vote selection, alerting if a wrong or double vote is tried, and generating a final vote result.
3) The goal is to provide a secure, accurate and efficient electronic voting system as an alternative to traditional manual voting methods. Fingerprint authentication is used to ensure one person, one vote.
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET Journal
This document describes a proposed electronic voting system that uses RFID and face recognition for authentication. The system uses a two-step verification process: 1) RFID number verification and 2) face recognition using Haar cascade algorithms. If both authentications are successful, the voter can cast their vote for their desired candidate. The system aims to increase security over current voting methods by preventing counterfeit votes through multi-factor authentication. It also allows for faster vote counting than paper-based systems. The document provides details on implementation, the face detection methodology, and discusses results and limitations.
Similar to Prototyping of Indian Electronic Voting Machine (20)
Predictive Data Mining with Normalized Adaptive Training Method for Neural Ne...IJERDJOURNAL
Abstract:- Predictive data mining is an upcoming and fast-growing field and offers a competitive edge for the benefit of organization. In recent decades, researchers have developed new techniques and intelligent algorithms for predictive data mining. In this research paper, we have proposed a novel training algorithm for optimizing neural networks for prediction purpose and to utilize it for the development of prediction models. Models developed in MATLAB Neural Network Toolbox have been tested for insurance datasets taken from a live data warehouse. A comparative study of the proposed algorithm with other popular first and second order algorithms has been presented to judge the predictive accuracy of the suggested technique. Various graphs have been presented to analyse the convergence behaviour of different algorithms towards point of minimum error.
The development of the Islamic Heritage in Southeast Asia tradition and futur...IJERDJOURNAL
ABSTRACT: This research explores the historical development of Islamic architecture in Southeast Asia from the first idea to design a mosque by the Prophet Mohammad until the development at these days with the various purism passages And as developed up these days with the passages of the development of the traditional type to the postmodern, finally to modern Southeast Asia. The Islamic architecture has been developed in six traditional typologies of types of mosques is renowned throughout the world. Southeast Asia mosques are divided into various types according to the regional culture as Arabic type, Turkish type, the Iranian type, the Indian type, the Chinese type and South East Asian type. This research describes the main characteristics of these types. The main purpose of this research is to draw a correlation between the descriptions of the mosques in Malaysia as presented in the traditional typology that contains in its features in main types, relations in common throughout the Islamic world, however, distinguishes itself with the architectural form according to the local tradition.
An Iot Based Smart Manifold Attendance SystemIJERDJOURNAL
ABSTRACT:- Attendance has been an age old procedure employed in different disciplines of educational institutions. While attendance systems have witnessed growth right from manual techniques to biometrics, plight of taking attendance is undeniable. In fingerprint based attendance monitoring, if fingers get roughed / scratched, it leads to misreading. Also for face recognition, students will have to make a queue and each one will have to wait until their face gets recognised. Our proposed system is employing “manifold attendance” that means employing passive attendance, where at a time, the attendance of multiple people can get captured. We have eliminated the need of queue system / paper-pen system of attendance, and just with a single click the attendance is not only captured, but monitored as well, that too without any human intervention. In the proposed system, creation of database and face detection is done by using the concepts of bounding box, whereas for face recognition we employ histogram equalization and matching technique.
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
Human Resource Competencies: An Empirical AssessmentIJERDJOURNAL
ABSTRACT: Human beings are the essential part of the process. Today, technology and machines are taking over the human resource, as claimed by many people; but technology and machines can never replace human resource entirely. Humans are required for operating and maintaining these machines. Human resource is extremely important for developing or bringing about new and required changes to these machines and technologies. The study of the history and the current Human Resource Management trends points out some important facts
Prospects and Problems of Non-Governmental Organizations in Poverty Alleviati...IJERDJOURNAL
ABSTRACT: The World Bank sponsored Millennium Development Goals (MDGs), launched in 1990 envisaged a world free of poverty by the year 2015. The North-East (where Gombe State is centrally located) is experiencing significantly higher poverty and lack of progress in poverty reduction efforts. With coming to end of 2015, much still need to be done to attain the MDGs. With over 62.6% Nigerian population still very poor, there is need for a continuous search for alternative planning & development options that would help ameliorate poverty and sustained our dream for a world free of poverty and wants. This study examines the prospects and investigates the constraints of Non-Governmental Organizations (NGOs) in poverty alleviation and community development. Literature review, questionnaire and interview methods were used for the study. The findings revealed that: finance, continuity of projects/programmes, conflicts and insecurity were the major problems confronting the NGOs. An interesting revelation is that majority of the respondents indicated that they wait for the NGOs or Government to initiate poverty alleviation programmes/projects. The implication is that the community dwellers need attitudinal change necessary for self reliance. The prospect of NGOs in poverty alleviation and community development in the study area is very bright due to rapid population growth & increasing poverty levels with the attendant positive effects on urban planning and regional development. The study recommends that NGOs should (1) form an association to enable them work together, and utilize social capital in their operation/services. (2) seek to explore avenues for funding from donor agencies. Finally, the Government needs to address some of its short comings.
Development of Regression Model Using Lasso And Optimisation of Process Param...IJERDJOURNAL
ABSTRACT:- Metal Spinning is a concept of describing the forming of metal into seamless, axisymmetric shapes by a combination of rotational motion and force. Sheet metal spinning is one of the metal forming processes, which a flat metal blank is rotated at a high speed and formed into an axisymmetric part by a roller which gradually forces the blank on to a mandrel, bearing the final shape of the spun part. Over the last few decades, sheet metal spinning has developed significantly and spun products have been used in various industries. Nowadays the process has been expanded to new horizons in industries, since tendency to use minimum tool and equipment costs and also using lower forces with the output of excellent surface quality and good mechanical properties. The automation of the process is of greater importance, due to its wider applications like decorative household‟s goods, rocket nose cones, gas cylinders etc. The objective of the current work is to develop the mathematical model for the spinning process with surface roughness as response and the input parameters as Mandrel speed (rpm), geometry of the Roller and Thickness of sheet (mm). Type of mandrel (EN8 Material) considered in the spinning process has the geometrical profile of parabola and single roller and double roller tools (EN8 Material) are used to deform the Al2024-T3 sheet metal paper aims to understand the process parameters that affect the surface finish of the spun component. Full factorial Design of Experiments technique is used to find the minimum number of experimental trials that are required to develop the regression model. A regression model using Least Absolute Shrinkage and Selection Operator (Lasso) is developed to further deepen the understanding between the input parameters and the surface roughness. The model was optimised using Sequential Quadratic Programming.
Use of Satellite Data for Feasibility Study And Preliminary Design Project Re...IJERDJOURNAL
ABSTRACT: In the developing countries like India, need of infrastructure is very high as compared to the available resources. The various organizations put their demands to state and center government for sanction of their project, government depends upon its various department to provide an approximate cost so that priorities can be assigned. The conventional procedure depends upon the land surveying, collection of data from various departments resulting in delay in necessary decision making or some time shelving due to unreasonable cost estimate due to field data being very old. Survey of India, The National Survey and Mapping Organization single handily taking this responsibility thus up gradation of data is far behind the actual development. From the satellite data, which is available in the form of images and terrains (even in 3d LiDAR points for some areas) is very useful for Feasibility Study, and Preliminary Project Report. In the present study natural drain named „Chai Nala‟ meanders through the prime property of Greater Mohali Area Development Authority (GMADA) thus making a big chunk of commercial land inoperative. It was proposed to straighten and channelize to reclaim the land from drain regime. Being the precious land department wanted the most economical and technically sound design without taking any risk. It was decided to counter check the hydraulic data, ground profile, acquired from the Punjab Irrigation Department with the satellite data and Differential Global Positioning System (DGPS). The data from the Google Earth was acquired using Cad Earth software and water shed analysis was carried out using Autodesk Civil 3D software. Comparison of results shows that this technique is quite useful and can be for preliminary feasibility and project preparation. Thus saving huge money and time.
Microwave Assisted Sol Gel Synthesis of Magnesium Oxide(Mgo)IJERDJOURNAL
ABSTRACT: Magnesium oxide (MgO) nanoparticles have been synthesized by Microwave assisted Sol gel synthesis method by using the precursors citric acid (C2O4H2) and magnesium chloride (Mgcl2.6H2O). It is a simple, novel and cost effective method. The structure, morphology and crystalline phase of the magnesium oxide nanocrystals have been investigated by scanning electron microscopy (SEM), transmission electron microscopy (TEM), X-ray diffraction (XRD).Presence of functional groups and optical characters are analyzed by using FTIR and UV- visible techniques
Development of Enhanced Frequency Drive for 3-Phase Induction Motors Submitte...IJERDJOURNAL
ABSTRACT: Three-phase induction motors produce mechanical power by electromagnetic induction and run on a 3-phase ac supply. They require efficient speed control, to enable them do variable speed operations, save power consumption and reduce machine noise. In this dissertation, a new switching device called MosControlled Thyristor (MCT) for frequency drive is introduced. Based on the new switching device and AT89C52 microcontroller, an enhanced frequency drive for controlling the speed and torque of 3-phase 15kW squirrel cage induction motor is modeled. Different voltages ranging from 342V to 415V and frequencies ranging from 50Hz to 60Hz are used in a systematic manner to simulate the system based on the new switching device. The simulation program is written in C language and tested with Proteus 7.6 simulation software. Voltage and frequency have significant impact on the actual speed and torque of the motor. Simulation results show that with the new model, the torque (56.66Nm) developed by the motor which is constant throughout each speed range is directly proportional to the ratio (6.7:1) of the applied voltage and the frequency of the supply and the selected speeds (1450, 1510, 1570, 1630, 1690 and 1750 rpm) are locked irrespective of change in load. This is unlike other models where magnetic saturation and conduction drop of IGBT lead to voltage/frequency imbalance resulting in excessive drawing of current by the motor and overheating. This new control method has a speed regulation of ±2 to 3% of maximum frequency, speed response of 3Hz, speed control range of 1: 40 and efficiency of 88%, as further advantages. Comparison of the system with other speed control techniques shows improved energy-saving, cost effectiveness and safety in operation. The contributions of this research aim to make Volts per Hertz speed control method based on MCT a reliable better alternative to other well known methods in speed control of three-phase induction motors
Short-Term Load Forecasting Using ARIMA Model For Karnataka State Electrical ...IJERDJOURNAL
ABSTRACT: Short-term load forecasting is a key issue for reliable and economic operation of power systems. This paper aims to develop short-term electric load forecasting ARIMA Model for Karnataka Electrical Load pattern based on Stochastic Time Series Analysis. The logical and organised procedures for model development using Autocorrelation Function and Partial Autocorrelation Function make ARIMA Model particularly attractive. The methodology involves Initial Model Development Phase, Parameter Estimation Phase and Forecasting Phase. To confirm the effectiveness, the proposed model is developed and tested using the historical data of Karnataka Electrical Load pattern (2016). The forecasting error of ARIMA Model is computed and results have shown favourable forecasting accuracy.
Optimal Pricing Policy for a Manufacturing Inventory Model with Two Productio...IJERDJOURNAL
ABSTRACT: When a new product is launched, a manufacturer applies the strategy of offering a quantity incentive initially for some time to boost up the demand of the product. The present paper describes a manufacturing inventory model with price sensitive demand enhanced by a quantity incentive. Later on demand becomes time increasing also. Inventory cycle starts with low production rate which is followed by higher production rate when demand is boosted up. Shortages are not allowed in this model. Presentation of numerical examples, tables, graphs and sensitivity analysis describes the model very well. Lastly case without incentive illustrates that usually the quantity incentive offered initially is beneficial.
Analysis of failure behavior of shear connection in push-out specimen by thre...IJERDJOURNAL
ABSTRACT:- This study analyzes the failure mechanism of shear connection by three-dimensional finite element analysis (FEA) of push-out specimens that was practically unaffordable experimentally or by twodimensional FEA. For the analysis of the failure behavior of the compression strut formed in the loaded concrete member, the three-dimensional principal stress space is transformed into two-dimensional space by means of the relation between the hydrostatic stress and the deviatoric stress. The analysis of the stress state in the compression strut revealed that the deviatoric stress increases with larger load particularly in the concrete surrounding the lower part of the shear stud. Accordingly, bearing failure of concrete occurred locally within a limited region in the slab. The steep increase of the deviatoric stress accompanying the increase of the load resulted in the failure of concrete around the lower part of the shear stud, which in turn provoked the deformation and the development of bending moment of the shear stud. Finally, plastic hinge formed in the shear stud leading it to reach its limit state. The proposed finite element model can also be used to model the shear connection of the composite beam and, the proposed stress analysis method can be applied to analyze its composite action behavior.
Discrete Time Batch Arrival Queue with Multiple VacationsIJERDJOURNAL
ABSTRACT:- In this paper we consider a discrete time batch arrival queueing system with multiple vacations. It is assume that the service of customers arrived in the system between a fixed intervals of time after which the service goes on vacations after completion of one service of cycle is taken up at the boundaries of the fixed duration of time. This is the case of late arrival. In case of early arrival i.e. arrival before the start of next cycles of service. If the customer finds the system empty, it is served immediately. We prove the Stochastic decomposition property for queue length and waiting time distribution for both the models.
Regional Rainfall Frequency Analysis By L-Moments Approach For Madina Region,...IJERDJOURNAL
ABSTRACT:- In arid regions, extreme rainfall event frequency predictions are still a challenging problem, because of the rain gauge stations scarcity and the record length limitation, which are usually short to insure reliable quantile estimates. Regional frequency analysis is one of the popular approaches used to compensate the data limitation. In this paper, regional frequency analysis of maximum daily rainfall is investigated for Madinah province in the Western Kingdom of Saudi Arabia (KSA). The observed maximum daily rainfall records of 20 rainfall stations are selected from 1968 to 2015. The rainfall data is evaluated using four tests, namely, Discordance test (Di), Homogeneity test (H), Goodness of fit test (Zdist) and L-moment ratios diagram (LMRD). The Di of L-moments shows that all the sites belong to one group (Di <3.0).><1). Finally, the Zdist is used to evaluate five probability distribution functions (PDFs) including generalized logistic (GLO), generalized extreme value (GEV), generalized normal (GNO), generalized Pareto (GPA), and Pearson Type III (PE3). Zdist and LMRD both showed that PE3 distribution is the best among the other PDFs. The regional parameters of the candidate PDF are computed using L-moments approach and accordingly the regional dimensionless growth curve is developed. The results enhance the accuracy of extreme rainfall prediction at-sites and also they can be used for ungauged catchment in the region.
Implementing Oracle Utility-Meter Data Management For Power ConsumptionIJERDJOURNAL
ABSTRACT: In this digital mobile world, it‟s need of time to streamline and increase efficiency in business processes like effective data collection, measurement, automatic validation, editing and estimation of measurement data, analysis and dashboard for forecasting and ease in end user accessibility with Just in Time. This paper is following two methodology in this process. CEMLI is an extensive framework for developing and implementing for Oracle whereas OUM is business process and use case driven process which supports products, tool, technologies and documentation. This paper have focused on analytical data, system automation functionality along with prototype designing. For this, analysts and administrators will collect and define calculation rule for data collection and measurement, deployment methods, dashboards and security features. This paper gives measure understanding of cloud technologies and their features like services (SaaS), deployment methods, security and ability to reduce overhead cost, downtime, and automate business processes with 360 degree review and analysis. It consolidates data in one system with volumes of analog and interval data which facilitates new customer with offering and effective program. Also it maximizes return on investments and protects revenue through comprehensive exception management.
Business Intelligence - A Gift for Decision Maker for the Effective Decision ...IJERDJOURNAL
ABSTRACT: Business Intelligence is a socio-technical concept emerged to help managers especially in their decision making tasks. A manager with different decision making styles has been started to make use of business intelligence in their own ways. Are the all managers taking benefits of Business intelligence in the same way? Does Business intelligence give each category what they want in the decision making process? If the answer to these questions is – No, then what is the expectation of managers from BI having different decision making style? Will BI could satisfy their needs? If yes, then how? By using well-formed theory in different styles of decision making and taking BI capabilities into consideration this paper highlights the framework which defines appropriate BI capabilities with each decision making style. Study shows in order to serve each style of decision in which BI capabilities changes with respect to style. It is believed that by making BI customized based on decision making styles; BI would be the much more successful in serving all the categories of managers
Effect of Water And Ethyl Alcohol Mixed Solvent System on the Stability of Be...IJERDJOURNAL
This document discusses the effect of water and ethyl alcohol mixed solvent systems on the stability of metal complexes formed between beta-hydroxy ketone and benzotriazole ligands. The study examines ternary complexes of copper, nickel, zinc, and cobalt ions with different beta-hydroxy ketone and benzotriazole derivatives. The stabilities of the complexes were determined using pH metric titration and found to vary with the solvent composition. Intramolecular interactions between the ligands were found to contribute significantly to complex stability. Copper formed the most stable complexes while cobalt formed the least stable.
Design of Synthesizable Asynchronous FIFO And Implementation on FPGAIJERDJOURNAL
ABSTRACT: This paper presents a design of asynchronous FIFO which, along with the regular status signals, consists of some extra status signals for more user-friendly design and added safety. Gray code pointers are used in the design. For synchronisation purpose, two synchroniser modules are used which contain two D-flip-flops each. The design is implemented and synthesised at register transfer level (RTL) using Verilog HDL. Simulation and implementation is done using Xilinx ISE Design Suite. Further, the design is implemented on Basys 2 Spartan-3E FPGA Board. Asynchronous FIFO is used to carry out steady data transmission at high speeds between two asynchronous clock domains.
Prospect and Challenges of Renewable Energy Resources Exploration, Exploitati...IJERDJOURNAL
ABSTRACT: This paper enumerates the status and challenges of exploration, exploitation and development of renewable energy resources and its roles in sustainable development in Africa. A brief review of energy and renewable energy resources in Africa was succinctly done. The concept of sustainable development as it borders on the Renewable Energy Technologies and their roles were also discussed. The challenges facing the acceptance, deployment and promotion of Renewable Energy Technologies in Africa were also highlighted. The barriers were classified as; policy, regulation and institutional; information and technical capacity and financial. Recommendations were made towards solving problems peculiar to exploration, exploitation and development of Renewable Energy in entirety in Africa.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Prototyping of Indian Electronic Voting Machine
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 13, Issue 5 (May 2017), PP.44-51
44
Prototyping of Indian Electronic Voting Machine
-A step towards ASIC in voting
Tushar Puri1
Jaspreet Singh2
Hemant Kaushal 3
1
Student, School Of Electronics, M.Tech VLSI (2015-17), CDAC – Noida, Tshr.Pr@Gmail.Com
2
Student,School Of Electronics, M.Tech VLSI (2015-17),CDAC–Noida,Jaspreetece042@gmail.com
3
Student, School Of Electronics, M.Tech VLSI (2015-17), CDAC – Noida, Hemantkaushal76@Gmail.Com
Abstract: The Voting System of a country consists of certain regulations which define how the preference of
people is collected and how outcome of the polling process is indicating the will of people. To implement such a
system in the largest democracy in the world is a cumbersome task. An indigenous Electronic Voting Machine
was introduced by the Election Commission of India to overcome the issues with manual voting which was
slower and inefficient. In this paper the Indian Electronic Voting Machine’s Protocol for voting is implemented
on a field programmable gate array. The ASIC based design is known to be faster than a microcontroller based
design. Furthermore the use of an ASIC based design will make the Electronic Voting Machine a more reliable
and tamper resistant machine. The new Voter-verified paper audit trail (VVPAT) system could also be
interfaced with the ASIC based design. The protocol of Indian Electronic Voting Machine has been successfully
implemented on a Basys 2 board using Verilog HDL. The FPGA based implementation gets half the job done for
ASIC based EVM. The tool used for simulation and implementation is Xilinx ISE Design Suite with ISim as a
Simulator.
Keywords:- Prototyping, Indian Electronic Voting Machine, Verilog HDL, FPGA, Application Specific
Integrated Circuit .
I. INTRODUCTION
Electronic Voting Machine (“EVM”) is being used in Indian elections for House of the People (Lok
Sabha) and State Assembly Elections (Vidhan Sabha) in the whole country since 2004. It increases voting
efficiency by reducing the time in casting and counting of vote. Earlier, there were issues regarding EVM’s
security which have not been proved [3] . The claim of tampering the EVM was only relevant if and only if
prolonged access to the EVM is provided by the responsible authorities or forced access is staged. However
such misfortunate event is highly unlikely. Moreover tampering the machines on such a high scale is a very
difficult task. The Voter-verified paper audit trail (VVPAT) system was introduced in some constituencies in
Indian General Election, 2014. The Election Commission of India originated the Indian EVM with the help of
two companies, the Electronics Corporation of India (ECIL) and Bharat Electronics Limited (BEL)[1]. The
Indian EVM consists of two units – Control Unit and Balloting Unit. Control Unit: Control Unit contains the
main circuit board which consists of a Renesas H8/3644-series microcontroller driven by an 8.8672 MHz crystal
oscillator, buttons for input, a buzzer, two redundant EEPROM chips and a Seven Segment Display Board and
connector for the Balloting Unit [3]. The Election Software is permanently fused in an Internal Mask ROM in
order to preserve the EVM’s software from alteration.
Ballot Unit: Ballot Unit consists of sixteen buttons for respective candidates. It uses two electronically
programmable logic devices to communicate with the Control Unit Board. Control Unit and Ballot Unit are
connected with a 5 m long cable.
Fig. 1 Control Unit (right) and Ballot Unit (left) in the Indian EVM [3].
2. Prototyping Of Indian Electronic Voting Machine
45
The protocol of the aforesaid EVM is implemented using Verilog HDL. The protocol necessarily means the
Input-Output responses, capabilities and procedure to use. However the ASIC based design presented here can
differ in many aspects as input names, data representation during operation, memory type and Input Output
Methods.
Some key features of ASIC based EVM are:
1. The machine can take up to 2048 votes for a single candidate and in total 8192 votes.
2. Built in self testing mechanism which checks the machine for any tampering or malicious behavior before
start of voting process.
3. Candidate set switches sets the number of push buttons to be activated for the voting process.
4. The EVM makes sure that a voter has a chance to cast only one vote. No person can cast multiple votes.
This is done by the blocking mechanism (10s) which is provided in the machine.
5. The EVM waits for mode and control input to be appropriately set before any vote to be casted.
6. The machine will not respond to multiple inputs to the push button for any type of malicious effort. The
machine will only receive input if only one push button is pressed.
7. After the completion of voting, the mode button is turned down (output mode) and the EVM cannot reverse
back to input state in any condition after that.
The Control Unit and Ballot Unit are implemented on a single FPGA board. However, proper hardware
implementation of the design can result into a similar operation as that of the Indian EVM. The rest of the paper
is organized as follows. Section II presents the analogy between the Indian EVM and ASIC based EVM. Section
III describes the implementation and module description. Section IV shows the RTL Schematic and Waveform
of the implementation. Section V describes the procedure to use. Section VI gives the future scope for the ASIC
based EVM. Section VII and VIII presents the conclusion and references of the paper. In this paper the Indian
Electronic Voting Machine is referred as Indian EVM.
II. Analogy Between Indian EVM And ASIC Based EVM
Fig.2 Analogy between the Indian EVM and ASIC based EVM.
This paper proposes the use of an ASIC based EVM instead of a microcontroller based design in the
Indian EVM. The ASIC based design provides better security features, lighter weight and a more compact
design of EVM. The idea of using an ASIC based design is also supported by the fact that the original design for
the EVM which was presented in 1980 by M. B. Haneefa was by using Integrated Circuits[7]. The design
created in this paper reflects the protocol of Indian EVM. The design when implemented on FPGA will work as
a prototype for testing the ASIC based design. The hardware description language used for behavioural
description of the design is Verilog HDL. The approach used for designing the EVM is a combination of top-
down and bottom-up. The functionality of Indian EVM is represented by several modules in its behavioural
description. The proposed EVM has a single common synchronous reset which has been well defined in all the
modules. There is a single common clock which is used in all the modules. The clock frequency used from the
FPGA board is 50 Mhz.All the modules are described below
3. Prototyping Of Indian Electronic Voting Machine
46
1. TOP EVM:
TOP Evm is the top module of the design. All other modules are instantiated inside the top module.
This top module is synthesized, implemented and then converted into the bit file required for implementation of
the design on FPGA. This bit file is then dumped on the FPGA to make it work like a prototype of the Indian
EVM.
Fig.3 Top level block diagram of ASIC based EVM
2. FSM EVM:
The FSM is the heart of the ASIC based EVM. The FSM is implemented using the two block method. One
always block in the FSM is sequential in nature while the other one is purely combinational.
It has the following features:
a. Takes appropriate input; that is the machine will increment only one vote even if the push button is pressed
several times or the push button is pressed for too long.
b. Masks the vote counting states that are not required for voting according to candidate select inputs.
c. The FSM will not take any value for input if more than one push button is pressed. There is no priority
given to any push button during multiple inputs. The FSM will simply wait for the casting of a legitimate
vote and will not count any vote.
d. Controls the ready and busy signals.
e. Provides the response corresponding to the respective input for a particular vote. This part could also be
used to interface devices like VVPAT in future.
f. Checks if the mode and control of the EVM are appropriate for casting a vote, if not, the machine will
remain in a blocked state.
g. It also controls the permission required for casting a vote that is the Control input. If the control input is not
high the FSM will not be ready to take the vote. FSM will wait for the control to be high so that the vote
could be casted.
h. If the mode is toggled once from input to output the machine will automatically seal and will not allow any
further input in the respective session. The machine can renew its voting capabilities when the machine is
reset.
i. The security features of the EVM are also incorporated in the FSM. The functionality of the Control and
Mode input are also defined in the FSM_Evm module.
j. The increment of votes after casting of a regular vote is also handled by FSM.
k. After a vote has been successfully casted the machine enters into a seal state for 10s and the voter who has
voted cannot do anything else on the ballot. FSM will preserve the value of the count for all the candidates
for those 10s. The seal state for 10s is also administered by FSM.
l. The feature of preserving the value of all count for 10s also acts as a rate limiting feature for the EVM. This
property of EVM can also help to reduce the damage done by malicious events like Booth Capturing.
4. Prototyping Of Indian Electronic Voting Machine
47
All in all, the module FSM_Evm provides EVM the characteristics of a secure, robust, reliable, democratic and
accurate machine.
3. Mem countsel:
This module is also comprised of two always blocks. Both of which are sequential in nature. The module
provides the following functions. It contains memory and other selection features :
a. Initializing the memory so that it contains no erroneous or unknown value.
b. Puts the data coming from the FSM involuntarily in the memory which has been initialized.
c. Checks the mode and control values, so that data could be sent only when the EVM is in output mode,
otherwise the data resides inside the memory.
d. Works as multiplexer to filter the data provided to the next module. As only a single value is sent to the
next module depending on the value of select lines selected after the machine is put in output mode.
Fig.6 RTL block schematic of module mem_countsel. (Inputs on the left Output on the right)
5. Prototyping Of Indian Electronic Voting Machine
48
4. Bin2SS :
The features of this module are:
a. The module as the name suggests converts the input decimal value from the previous modules into data
suitable for the seven segment display.
b. Secondly, it keeps the seven segment display off when the mode is input mode.
c. Gives four values for the four seven segments on the FPGA board.
5. Sevensegment(CC) :
This module is very important for displaying the data on seven segments. There are four different seven
segment values coming from the previous modules. But FPGA board has only a single common data bus
connected to all the Seven Segment displays. So in order to time multiplex the data bus different segments are
switched at such a high rate that it a human eye cannot perceive that. It gives an illusion that all of the seven
segments are working simultaneously. But in reality only one seven segment is ON at a time. The rate at which
all the displays are switched is 4ms. It changes the value in all the segments after an interval of 4 ms which
creates the appropriate illusion.
IV. PROCEDURE TO USE
1. Initialize the machine by setting the reset switch to low. At this point all the switches of the prototype are
low position.
2. Now set the reset switch to high. The seven segment of the machine will glow showing that there are zero
votes inside the memory of machine. This is according to BIST approach used for testing of machine.(See
figure 8)
Fig 7 Illustration of Step 2
3. The mode switch of the machine has functionality as follow:
a. Input mode – When the mode switch is at high position.
b. Output mode – When the mode switch is at low position.
As the machine has just started it have to be in Input Mode. Therefore the mode switch is set high.
4. The control switch is the switch which is controlled by the Presiding Officer when the voting is carried on.
When a vote is casted, the machine generates a buzzer sound (busy led in the case of FPGA) which signals
the Polling Officer to disable the machine using the control switch (low). When the next voter enters the
voting area the control switch is set to high position by the Polling Officer so that the vote can be casted.
Therefore the ctrl switch is set to high so as to make the machine ready for voting.
Now, the ready led will illuminate indicating that the machine is ready to capture a vote.
5. Now, a vote is casted by a voter. As soon as the push button is pressed the machine enters into a sealed state
in which the machine is blocked to take any input from anywhere in the machine. The machine will
illuminate the busy led for 10s. The machine will be blocked for 10s which is ample time for the Polling
Officer to set the control switch to low position. This low position on the control switch further ensures that
the machine cannot take any input from the ballot even after the seal state has ended.
6. The control switch is toggled by the Polling Officer throughout the Vote casting period.(Figure 8)
6. Prototyping Of Indian Electronic Voting Machine
49
Fig. 8 Illustration of step 6
7. Now, after the voting has been completed the mode switch is set to low position (output mode). This is a
onetime step. Machine when once entered in the output mode cannot switch back to the input mode. The
machine will not accept any vote in any case whatsoever.
8. Select the appropriate select lines in the form of switches that are provided for select lines. The seven
segments will show the votes according to the selected candidate in the select lines or total votes. (Figure 9)
Fig. 9 Illustration of step 8
V. FUTURE SCOPE
The replacement of microcontroller based design with an ASIC based design for better features is definitely the
best future role this idea can anchor.
1. The authentication could be extended to another level (first level with VOTER ID) using biometric security,
so that one can reduce the number of polling agents required and prevent casting vote by unauthorized
voters(Kumar & Begum, 2012).
2. The addition of network capabilities in the EVM could facilitate the voting process for the voters. Voters
could vote from any place having internet connectivity. But such a feature should only be added if there is
complete assurance regarding the network security.
3. The EVM has to be designed for larger population so that elections in the entire country could be held in a
single day(Kumar & Begum, 2012).
VI. CONCLUSION
The protocol of Indian EVM has been successfully implemented on FPGA. The prototype is working
as per specifications. Some additional features are also added in the original design. The prototype has been
thoroughly tested and can be used in a real Indian election if required. Dissimilarity from the Indian EVM is that
the control unit and ballot are two different components in the Indian EVM but in the prototype of ASIC based
EVM both units are implemented on a single FPGA board.
Rather than these dissimilarities, the ASIC based EVM works very efficiently and could easily mould to be used
in a Real Indian Election.
The advantages of an ASIC based EVM are:
1. More secure than Indian EVM. Difficult to crack.
2. Compact design.
3. More economical.
4. Lighter weight than Indian EVM.
7. Prototyping Of Indian Electronic Voting Machine
50
VII. RTL SCHEMATIC AND WAVEFORM
Fig. 10 RTLschematic of the ASIC based EVM
Fig. 11 Simulation Waveforms showing vote casted by candidate 1.
8. Prototyping Of Indian Electronic Voting Machine
51
REFRENCES
[1]. Public Notice :PN/ECI/41/2009 INDIA, Election Commission of India(2009). Electronic Voting Machines-regarding.
[2]. D. Ashok Kumar and T. Ummal Sariba Begum “Electronic voting machine — A review” Pattern Recognition, Informatics and
Medical Engineering (PRIME), 2012,IEEE Conference 21-23 March 2012
[3]. Hari K. Prasad , J. Alex Halderman , Rop Gonggrijp , “Security Analysis of India’s Electronic Voting Machines” appeared in
Proc. 17th ACM Conference on Computer and Communications Security , July 2010
[4]. Sahibzada Muhammad Ali, Chaudhary Arshad Mehmood,Ahsan Khawja, “Micro-Controller Based Smart Electronic Voting
Machine System” IEEE Conference 21-22 March 2013
[5]. Davide Balzarotti, Greg Banks, Marco Cova,”An Experience in Testing the Security of Real-World Electronic Voting Systems”
IEEE Transactions On Software Engineering, Vol. 36, No. 4, July/August 2010
[6]. Handbook for presiding officers, 2008.
[7]. http://eci.nic.in/eci_main/ElectoralLaws/HandBooks/Handbook_for_Presiding_Officers.pdf
[8]. From Wikipedia, the free encyclopedia, the web page on Indian EVM https://en.wikipedia.org/wiki/Electronic_voting_in_India