The document proposes a mobile phone e-voting system that achieves vote verifiability using Kerberos authentication and cryptographic tags generated independently by each voter. It discusses requirements for electronic voting systems including vote verifiability. The proposed system uses secure symmetric key cryptography and has voters generate cryptographic tags for their votes to allow individual verification while preserving vote secrecy. When fully implemented and tested, it aims to provide a deployable mobile e-voting system that meets requirements like only eligible voters can vote, no one can determine how others voted, and voters can verify their votes were counted.
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
— Short Message Service (SMS) is the text communication service component of phone, web or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices. The usage SMS as data application in the world is enormous, with 2.4 billion active users, or 74% of all mobile phone subscribers. This paper develops an SMS voting system that can be used in conducting a trustworthy and generally acceptable electoral conduct based on the legislation of a particular country. It is base on a level structure and a national SIM card module used for only electoral process. The SIM card can be used for either the Internet voting system or the SMS voting. The method is cheap and fast and guarantees prompt election result.
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET Journal
This document proposes a blockchain-based e-voting system to address issues with traditional and existing electronic voting methods. It discusses challenges with ballot paper systems, electronic voting machines, and e-voting systems. Blockchain technology is presented as a solution because it allows for a decentralized system where the database is owned collectively rather than by a central authority. This could help reduce manipulation of vote counts. The proposed system aims to leverage open-source blockchain technology to create a new e-voting architecture for local or national elections that ensures voter participation and removes doubts about the voting process.
This document discusses the need for blockchain technology in online voting systems. It outlines some common issues with existing electronic and paper voting methods, such as vulnerabilities in electronic voting machines and the potential for fraud and slow results with paper ballots. The document then explains how blockchain could enable end-to-end verifiable voting by authenticating each ballot to a voter, providing verifiable anonymization and decryption processes, and allowing voters and others to validate the voting process through proofs on the blockchain. It also provides an overview of the phases in an online voting system and the front-end and back-end software requirements to build such a system.
Mobile Voting System Using Advanced NFC Technologyijsrd.com
Electronic voting system are becoming popular with wide spread use of computer and embedded system. Security is the main important issue should be considered in such system. Mobile voting system is basically used for collecting and counting votes. In this technology include punch card, optical scan voting system. This paper proposes a new Mobile based voting system using advanced NFC technology, Voting is the process that allows the general public or the people to choose their leaders and articulate views on how they will be governed. This gives a comprehensive analysis of security with respect to NFC. This study deals with the use of information technology to handle electoral processes starting from voters and candidates registration to the actual casting and counting of ballots. Exploring mobile voting from a systems perspective can demonstrate the attributes of the current systems and the possible solutions for the voting process so any one can caste their vote from any place.
This document discusses electronic voting systems and their classification. It analyzes two main models - electronic voting and counting systems (eVACS) and the Mercuri method. eVACS uses PCs, barcode readers, and counting machines for fast tabulation, while the Mercuri method uses voter-verified paper ballots and touchscreens, providing voter verifiability and audit capabilities. Both methods are evaluated based on their pros, benefits, and weaknesses. The document also covers research methodology, analysis of past e-voting issues, and conclusions on key characteristics required for a good electronic voting system.
This document discusses security issues related to electronic voting systems. It examines security threats to direct recording electronic (DRE) voting machines, such as vulnerabilities in the Diebold software and database. Issues with DRE systems include a lack of voter-verified paper audit trails and difficulties with auditing and verifiability. Security threats to internet voting are also analyzed, including denial of service attacks, malware infections, and spoofing attacks. The document proposes solutions such as using open-source software, voter-verified paper audit trails, encryption protocols, and digital signatures to address security problems with electronic voting systems.
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
— Short Message Service (SMS) is the text communication service component of phone, web or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices. The usage SMS as data application in the world is enormous, with 2.4 billion active users, or 74% of all mobile phone subscribers. This paper develops an SMS voting system that can be used in conducting a trustworthy and generally acceptable electoral conduct based on the legislation of a particular country. It is base on a level structure and a national SIM card module used for only electoral process. The SIM card can be used for either the Internet voting system or the SMS voting. The method is cheap and fast and guarantees prompt election result.
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET Journal
This document proposes a blockchain-based e-voting system to address issues with traditional and existing electronic voting methods. It discusses challenges with ballot paper systems, electronic voting machines, and e-voting systems. Blockchain technology is presented as a solution because it allows for a decentralized system where the database is owned collectively rather than by a central authority. This could help reduce manipulation of vote counts. The proposed system aims to leverage open-source blockchain technology to create a new e-voting architecture for local or national elections that ensures voter participation and removes doubts about the voting process.
This document discusses the need for blockchain technology in online voting systems. It outlines some common issues with existing electronic and paper voting methods, such as vulnerabilities in electronic voting machines and the potential for fraud and slow results with paper ballots. The document then explains how blockchain could enable end-to-end verifiable voting by authenticating each ballot to a voter, providing verifiable anonymization and decryption processes, and allowing voters and others to validate the voting process through proofs on the blockchain. It also provides an overview of the phases in an online voting system and the front-end and back-end software requirements to build such a system.
Mobile Voting System Using Advanced NFC Technologyijsrd.com
Electronic voting system are becoming popular with wide spread use of computer and embedded system. Security is the main important issue should be considered in such system. Mobile voting system is basically used for collecting and counting votes. In this technology include punch card, optical scan voting system. This paper proposes a new Mobile based voting system using advanced NFC technology, Voting is the process that allows the general public or the people to choose their leaders and articulate views on how they will be governed. This gives a comprehensive analysis of security with respect to NFC. This study deals with the use of information technology to handle electoral processes starting from voters and candidates registration to the actual casting and counting of ballots. Exploring mobile voting from a systems perspective can demonstrate the attributes of the current systems and the possible solutions for the voting process so any one can caste their vote from any place.
This document discusses electronic voting systems and their classification. It analyzes two main models - electronic voting and counting systems (eVACS) and the Mercuri method. eVACS uses PCs, barcode readers, and counting machines for fast tabulation, while the Mercuri method uses voter-verified paper ballots and touchscreens, providing voter verifiability and audit capabilities. Both methods are evaluated based on their pros, benefits, and weaknesses. The document also covers research methodology, analysis of past e-voting issues, and conclusions on key characteristics required for a good electronic voting system.
This document discusses security issues related to electronic voting systems. It examines security threats to direct recording electronic (DRE) voting machines, such as vulnerabilities in the Diebold software and database. Issues with DRE systems include a lack of voter-verified paper audit trails and difficulties with auditing and verifiability. Security threats to internet voting are also analyzed, including denial of service attacks, malware infections, and spoofing attacks. The document proposes solutions such as using open-source software, voter-verified paper audit trails, encryption protocols, and digital signatures to address security problems with electronic voting systems.
The purpose of this master‘s project is to develop an Online E-Voting prototype system
utilizing the Paillier Threshold Cryptosystem (PTC) web services and applying MESE processes
to it in an attempt to find possible solutions to further improve existing PTC web services.
Online voting (e-voting) would be more convenient, relatively secure and utilize fewer
resources. To be able to access e-voting system from a personal, business or even a public library
computer may be more convenient for many people needing to vote. This could potentially be a
solution for the low voter turnout at the polls. However, it is still questionable whether elections
can be conducted online or over the internet due to the high level of concern over security.
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTIONIJNSA Journal
Electronic voting is an important application for security protocols. Most existing voting schemes are designed for elections in which each voter has only one ballot. However, some elections permit voters to cast multiple ballots. In this paper, we present a new voting scheme in which each voter can have multiple ballots, and can vote for multiple candidates. The proposed scheme allows the voter to simply pick their candidates and post a single encrypted message. Anonymous distribution of secret information is used so that no one knows which information is being passed to whom.
The document proposes a secure mobile-based voting system that allows voters to cast their votes from anywhere using a mobile device. It outlines the existing electronic and ballot-based voting systems and their drawbacks. The proposed system uses speech recognition and a three-tier architecture to authenticate voters and securely collect, count, and store votes. It aims to improve accessibility, participation, and reduce costs compared to traditional voting methods.
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET Journal
This document discusses the design and implementation of an effective in-house voting system using blockchain verification. The system aims to avoid proxy casting and recasting of votes by integrating Aadhar card linked mobile numbers for OTP generation. Voters can only cast their vote after receiving an OTP on their registered mobile number. The vote details are stored as blocks on the blockchain to ensure security and transparency. The system is designed using Solidity for smart contracts on the Ethereum blockchain and uses MySQL as the backend database. The modular design approach reduces complexity and improves maintainability of the voting application.
This document describes an advanced online voting system that allows voters to cast ballots in multiple languages, through televoting using phones or SMS, and absentee voting via email. The system aims to make voting more accessible and convenient. It stores voter data in a database and ensures privacy and security. Key features include supporting various regional languages, televoting to reach rural areas, and absentee voting for those unable to vote in person. The system was developed using technologies like Java, HTML, CSS, JavaScript, and databases like MySQL and Oracle. It aims to evaluate existing and future online voting schemes to improve accessibility and participation.
The document describes a mobile-based voting system that uses biometrics and SMS messages to securely enable remote voting. The system architecture involves a mobile equipment that generates authentication parameters and verifies voter legitimacy before issuing a voting token. The service provider then collects and counts votes to provide the final results. The system has been implemented successfully in Nigerian elections and proved secure, while also improving accessibility, reducing costs and time compared to traditional voting methods. However, it relies on mobile networks and equipment functioning properly.
Electronic voting systems have the potential to improve traditional voting procedures by providing added convenience and flexibility to the voter. Numerous electronic voting schemeshave been proposed in the past, but most of them have failed to provide voter uthentication in an efficient and transparent way. On the other hand, GSM (Global System for Mobile communications) is the most widely used mobile networking standard. There are more than one
billion GSM users worldwide that represent a large user potential not for mobile telephony, but also for other mobile applications that exploit the mature GSM infrastructure. In this paper, theelectronic voting scheme using GSM mobile technology is presented. By integrating anelectronic voting scheme with the GSM infrastructure, we are able to exploit existing GSM authentication mechanisms and provide enhanced voter authentication and mobility while maintaining voter privacy. The objective of this project is to avoid the queue in voting time. Voting machines provide easy access to cast the vote by using mobile phone.
Abstract The dynamic nature of loads, seasonal variation of soil properties, uneven soil strata below footings or inappropriate design of foundation makes differential settlement inevitable. Differential settlement is largely responsible for developing forces or changing the existing forces in the structure and is often considered as the underlying cause of many structural failures. A structural engineer has to take into account these forces while designing the structure. Different structural parameters like stiffness of columns and beams and number of storeys and bays affect the response of the structure to differential settlement. In the present study, a plain portal frame subjected to constant differential settlement of 10 mm is analyzed for different cases using a structural analysis software i.e. STAAD Pro. Different parameters of the frame are varied to understand their influence on frame forces developed due to differential settlement. The parameters taken into account in this study are length of beam, height of column, moment of inertia of beam and column and number of storeys and bays. It is found that the forces in the frame developed due to differential settlement decrease on increasing beam lengths and column heights. Also, decreasing the moment of inertia of beams and columns is effective in reducing these forces. In addition, differential settlement tends to affect forces more in lower storeys as compared to higher storeys. The frame forces are more prominent for bays which are near to the support subjected to settlement. The increase or decrease in frame forces due to differential settlement can be attributed to the change in stiffness of the members. Hence, the study concludes that the stiffer members tend to develop higher forces for constant differential settlement in frames. Key Words: Differential settlement, Portal frame, Structural response, Frame forces, Storey, Bays
IRJET - Decentralized E-Voting System using BlockchainIRJET Journal
This document proposes a decentralized e-voting system using blockchain technology. It aims to improve transparency and flexibility compared to existing voting systems. The proposed system uses biometric validation of voters, dynamic ballot loading based on voter location, and generates transaction IDs as acknowledgement of votes cast on the blockchain network. The system architecture involves election authorities, registration authorities, voters, and candidates. Smart contracts implemented using Solidity manage the election rules on the blockchain. This aims to provide a more secure and reliable electronic voting process.
The document proposes a mobile voting system using iris recognition and cryptography. Voters would register through a website providing identification details. On voting day, authenticated voters would receive an encrypted SMS with candidate lists. Voters would select a candidate and the vote would be encrypted before transmission. The system aims to increase voter participation and security while reducing costs compared to traditional voting methods. However, mobile voting systems also face challenges regarding security, reliability, and preventing multiple votes.
A mobile(Android app ) based election app. A website or app that will help in smart election system. It can be used by the government,and in every sector when election is a major issue.
Project synopsis on online voting systemLhakpa Yangji
This document provides a synopsis for an online voting system project. It describes the objectives of developing an online system to allow citizens over 18 to vote from home. It notes issues with current physical voting systems like long queues and aims to increase voter turnout with a convenient online option. The proposed system would require voters to register with ID and password in order to securely cast anonymous votes online. The project would develop the necessary software tools like a database, website, and security protocols to implement this vision of online democratic participation.
This document proposes an online voting system built as an Android application. It aims to address security issues with traditional and online voting methods. The system uses voter ID and password for login authentication. Voters can request a one-time password via SMS or email which is encrypted using the Playfair cipher technique. This encrypted OTP must be entered for authorization to view candidate lists and cast a vote, preventing multiple votes from the same user. The candidate vote is saved to a database maintained by the Election Commission of India. The system is designed to be secure, reduce fraud, and allow remote mobile voting while maintaining voter authentication and an auditable record.
Mobile voting is a digital system that allows people to see the votes as they are coming in, opposed to other voting systems, which require waiting until all votes can be counted.
Electronic voting system is an effective approach for counting of votes could be faster, more accurate and less labor intensive. In this system we use one effective algorithm called minutiae for Fingerprint. This algorithm can be used to match the Fingerprint images. The Proposed system is used to avoid the vote recasting with help of RFID and Fingerprint. There is way to prohibit the same person from casting multiple ballots using Fingerprint and RFID. In an E-voting system, there is way to prohibit the same person from casting multiple ballots using Fingerprint.
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIAchandu namani
The document describes a proposed electronic voting system using biometric fingerprint identification. Key points:
1) The system uses Aadhar numbers and fingerprint scans to authenticate voters and prevent fraudulent voting. Fingerprint data is stored in a Central Identities Database and matched in real-time.
2) After authentication, voters can cast their vote electronically which is recorded in local databases. These votes are tallied to generate instant results at the end of voting.
3) The system is designed to be secure, transparent and accessible. Administrators can configure voting for local elections, view results, check who hasn't voted, and delete past voting data.
This document discusses the history of voting in India using ballot boxes versus electronic voting machines (EVMs), and proposes developing an online e-voting system. It outlines some common problems with the current in-person system, such as booth capturing and delays in getting poll results. The proposed e-voting system would allow secure online voting through a web browser for more convenience. It provides hardware/software requirements and technological details like using .NET framework and SQL database. Key features would include secure login, viewing candidate profiles, and casting authenticated votes.
This document proposes a decentralized e-voting system using blockchain technology that aims to address issues with existing systems like vote rigging and manipulation. It reviews several existing blockchain-based e-voting systems and identifies advantages like increased security, transparency and accessibility. The proposed system would implement e-voting on the Ethereum blockchain using smart contracts, add biometric authentication to prevent double voting, and support multiple languages and social media integration to encourage voter participation. Hardware requirements include a PC/laptop while software requirements include Solidity, Ethereum, MetaMask, and React JS.
In the EXISTING SYSTEM, Ballot
based Voting is present, but still there is no system to
avoid Proxy Casting and Recasting is implemented.
We do not have an option to see our casted Vote also.
There is no security in this current application. In the
PROPOSED SYSTEM, a novel electronic voting
system based on Blockchain that addresses some of
the limitations in existing systems and evaluates some
of the popular blockchain frameworks for the purpose
of constructing a blockchain-based e-voting system.
In the MODIFICATION part of the project, we
integrate Aadhaar card linked mobile number for
OTP generation, only then the voter can cast the vote,
this system prevents casting and re-casting of proxies.
The purpose of this master‘s project is to develop an Online E-Voting prototype system
utilizing the Paillier Threshold Cryptosystem (PTC) web services and applying MESE processes
to it in an attempt to find possible solutions to further improve existing PTC web services.
Online voting (e-voting) would be more convenient, relatively secure and utilize fewer
resources. To be able to access e-voting system from a personal, business or even a public library
computer may be more convenient for many people needing to vote. This could potentially be a
solution for the low voter turnout at the polls. However, it is still questionable whether elections
can be conducted online or over the internet due to the high level of concern over security.
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTIONIJNSA Journal
Electronic voting is an important application for security protocols. Most existing voting schemes are designed for elections in which each voter has only one ballot. However, some elections permit voters to cast multiple ballots. In this paper, we present a new voting scheme in which each voter can have multiple ballots, and can vote for multiple candidates. The proposed scheme allows the voter to simply pick their candidates and post a single encrypted message. Anonymous distribution of secret information is used so that no one knows which information is being passed to whom.
The document proposes a secure mobile-based voting system that allows voters to cast their votes from anywhere using a mobile device. It outlines the existing electronic and ballot-based voting systems and their drawbacks. The proposed system uses speech recognition and a three-tier architecture to authenticate voters and securely collect, count, and store votes. It aims to improve accessibility, participation, and reduce costs compared to traditional voting methods.
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET Journal
This document discusses the design and implementation of an effective in-house voting system using blockchain verification. The system aims to avoid proxy casting and recasting of votes by integrating Aadhar card linked mobile numbers for OTP generation. Voters can only cast their vote after receiving an OTP on their registered mobile number. The vote details are stored as blocks on the blockchain to ensure security and transparency. The system is designed using Solidity for smart contracts on the Ethereum blockchain and uses MySQL as the backend database. The modular design approach reduces complexity and improves maintainability of the voting application.
This document describes an advanced online voting system that allows voters to cast ballots in multiple languages, through televoting using phones or SMS, and absentee voting via email. The system aims to make voting more accessible and convenient. It stores voter data in a database and ensures privacy and security. Key features include supporting various regional languages, televoting to reach rural areas, and absentee voting for those unable to vote in person. The system was developed using technologies like Java, HTML, CSS, JavaScript, and databases like MySQL and Oracle. It aims to evaluate existing and future online voting schemes to improve accessibility and participation.
The document describes a mobile-based voting system that uses biometrics and SMS messages to securely enable remote voting. The system architecture involves a mobile equipment that generates authentication parameters and verifies voter legitimacy before issuing a voting token. The service provider then collects and counts votes to provide the final results. The system has been implemented successfully in Nigerian elections and proved secure, while also improving accessibility, reducing costs and time compared to traditional voting methods. However, it relies on mobile networks and equipment functioning properly.
Electronic voting systems have the potential to improve traditional voting procedures by providing added convenience and flexibility to the voter. Numerous electronic voting schemeshave been proposed in the past, but most of them have failed to provide voter uthentication in an efficient and transparent way. On the other hand, GSM (Global System for Mobile communications) is the most widely used mobile networking standard. There are more than one
billion GSM users worldwide that represent a large user potential not for mobile telephony, but also for other mobile applications that exploit the mature GSM infrastructure. In this paper, theelectronic voting scheme using GSM mobile technology is presented. By integrating anelectronic voting scheme with the GSM infrastructure, we are able to exploit existing GSM authentication mechanisms and provide enhanced voter authentication and mobility while maintaining voter privacy. The objective of this project is to avoid the queue in voting time. Voting machines provide easy access to cast the vote by using mobile phone.
Abstract The dynamic nature of loads, seasonal variation of soil properties, uneven soil strata below footings or inappropriate design of foundation makes differential settlement inevitable. Differential settlement is largely responsible for developing forces or changing the existing forces in the structure and is often considered as the underlying cause of many structural failures. A structural engineer has to take into account these forces while designing the structure. Different structural parameters like stiffness of columns and beams and number of storeys and bays affect the response of the structure to differential settlement. In the present study, a plain portal frame subjected to constant differential settlement of 10 mm is analyzed for different cases using a structural analysis software i.e. STAAD Pro. Different parameters of the frame are varied to understand their influence on frame forces developed due to differential settlement. The parameters taken into account in this study are length of beam, height of column, moment of inertia of beam and column and number of storeys and bays. It is found that the forces in the frame developed due to differential settlement decrease on increasing beam lengths and column heights. Also, decreasing the moment of inertia of beams and columns is effective in reducing these forces. In addition, differential settlement tends to affect forces more in lower storeys as compared to higher storeys. The frame forces are more prominent for bays which are near to the support subjected to settlement. The increase or decrease in frame forces due to differential settlement can be attributed to the change in stiffness of the members. Hence, the study concludes that the stiffer members tend to develop higher forces for constant differential settlement in frames. Key Words: Differential settlement, Portal frame, Structural response, Frame forces, Storey, Bays
IRJET - Decentralized E-Voting System using BlockchainIRJET Journal
This document proposes a decentralized e-voting system using blockchain technology. It aims to improve transparency and flexibility compared to existing voting systems. The proposed system uses biometric validation of voters, dynamic ballot loading based on voter location, and generates transaction IDs as acknowledgement of votes cast on the blockchain network. The system architecture involves election authorities, registration authorities, voters, and candidates. Smart contracts implemented using Solidity manage the election rules on the blockchain. This aims to provide a more secure and reliable electronic voting process.
The document proposes a mobile voting system using iris recognition and cryptography. Voters would register through a website providing identification details. On voting day, authenticated voters would receive an encrypted SMS with candidate lists. Voters would select a candidate and the vote would be encrypted before transmission. The system aims to increase voter participation and security while reducing costs compared to traditional voting methods. However, mobile voting systems also face challenges regarding security, reliability, and preventing multiple votes.
A mobile(Android app ) based election app. A website or app that will help in smart election system. It can be used by the government,and in every sector when election is a major issue.
Project synopsis on online voting systemLhakpa Yangji
This document provides a synopsis for an online voting system project. It describes the objectives of developing an online system to allow citizens over 18 to vote from home. It notes issues with current physical voting systems like long queues and aims to increase voter turnout with a convenient online option. The proposed system would require voters to register with ID and password in order to securely cast anonymous votes online. The project would develop the necessary software tools like a database, website, and security protocols to implement this vision of online democratic participation.
This document proposes an online voting system built as an Android application. It aims to address security issues with traditional and online voting methods. The system uses voter ID and password for login authentication. Voters can request a one-time password via SMS or email which is encrypted using the Playfair cipher technique. This encrypted OTP must be entered for authorization to view candidate lists and cast a vote, preventing multiple votes from the same user. The candidate vote is saved to a database maintained by the Election Commission of India. The system is designed to be secure, reduce fraud, and allow remote mobile voting while maintaining voter authentication and an auditable record.
Mobile voting is a digital system that allows people to see the votes as they are coming in, opposed to other voting systems, which require waiting until all votes can be counted.
Electronic voting system is an effective approach for counting of votes could be faster, more accurate and less labor intensive. In this system we use one effective algorithm called minutiae for Fingerprint. This algorithm can be used to match the Fingerprint images. The Proposed system is used to avoid the vote recasting with help of RFID and Fingerprint. There is way to prohibit the same person from casting multiple ballots using Fingerprint and RFID. In an E-voting system, there is way to prohibit the same person from casting multiple ballots using Fingerprint.
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIAchandu namani
The document describes a proposed electronic voting system using biometric fingerprint identification. Key points:
1) The system uses Aadhar numbers and fingerprint scans to authenticate voters and prevent fraudulent voting. Fingerprint data is stored in a Central Identities Database and matched in real-time.
2) After authentication, voters can cast their vote electronically which is recorded in local databases. These votes are tallied to generate instant results at the end of voting.
3) The system is designed to be secure, transparent and accessible. Administrators can configure voting for local elections, view results, check who hasn't voted, and delete past voting data.
This document discusses the history of voting in India using ballot boxes versus electronic voting machines (EVMs), and proposes developing an online e-voting system. It outlines some common problems with the current in-person system, such as booth capturing and delays in getting poll results. The proposed e-voting system would allow secure online voting through a web browser for more convenience. It provides hardware/software requirements and technological details like using .NET framework and SQL database. Key features would include secure login, viewing candidate profiles, and casting authenticated votes.
This document proposes a decentralized e-voting system using blockchain technology that aims to address issues with existing systems like vote rigging and manipulation. It reviews several existing blockchain-based e-voting systems and identifies advantages like increased security, transparency and accessibility. The proposed system would implement e-voting on the Ethereum blockchain using smart contracts, add biometric authentication to prevent double voting, and support multiple languages and social media integration to encourage voter participation. Hardware requirements include a PC/laptop while software requirements include Solidity, Ethereum, MetaMask, and React JS.
In the EXISTING SYSTEM, Ballot
based Voting is present, but still there is no system to
avoid Proxy Casting and Recasting is implemented.
We do not have an option to see our casted Vote also.
There is no security in this current application. In the
PROPOSED SYSTEM, a novel electronic voting
system based on Blockchain that addresses some of
the limitations in existing systems and evaluates some
of the popular blockchain frameworks for the purpose
of constructing a blockchain-based e-voting system.
In the MODIFICATION part of the project, we
integrate Aadhaar card linked mobile number for
OTP generation, only then the voter can cast the vote,
this system prevents casting and re-casting of proxies.
The Future of Democracy Secure Online Voting Powered by Blockchain Technology abdallah76803
This document proposes developing a secure online voting system powered by blockchain technology. Blockchain could address issues with traditional voting like fraud, tampering, and lack of transparency. It would provide security, transparency, and efficiency. The project would design a decentralized voting platform using blockchain for secure vote storage and verification. It would include a user-friendly interface for remote voting and confidentiality measures to protect voter identity. The system would enable a transparent, auditable process for stakeholders to monitor elections.
The document proposes an online voting system that uses one time passwords (OTPs) for authentication to improve security. It discusses how existing e-voting systems lack strong security measures. The proposed system would register voters with their voter ID, Aadhaar ID and password. When a voter logs in, they receive an OTP on their registered mobile phone that must be entered to cast a vote. This adds an extra layer of security through pseudorandom OTPs that change each time. The system is evaluated through a prototype and results show it can identify over 90% of voters in under a minute, improving security, trust and efficiency over traditional methods.
This document proposes a blockchain-based e-voting system to address issues with existing digital voting methods. It discusses how blockchain could provide a transparent, secure and verifiable voting process. The key elements of the proposed system include:
1) Organizing elections on a decentralized app where administrators create smart contracts to set up voting districts and candidates.
2) Registering voters by having election authorities define eligible voters and using identity verification to issue voters digital IDs and wallets for casting ballots.
3) Allowing voters to anonymously cast encrypted ballots on the blockchain through their wallet, with votes being decrypted after the election window closes to protect voter privacy.
IRJET- A Decentralized Voting Application using Blockchain TechnologyIRJET Journal
This document proposes a decentralized voting application using blockchain technology. It summarizes the limitations of existing centralized voting systems and outlines how a blockchain-based system could address these issues by ensuring data integrity, transparency, and restricting each voter to one vote while maintaining privacy. The proposed system would use the Ethereum blockchain and smart contracts deployed on the Ethereum Virtual Machine to enable a secure, transparent voting process.
Online Voting System Using Fingerprint sensor and BlockchainIRJET Journal
1) The document proposes an online voting system using fingerprint sensors and blockchain to increase security and integrity.
2) It allows users to cast votes remotely via their fingerprint authentication in a secure, anonymous and tamper-proof manner on the blockchain.
3) The system aims to reduce issues with traditional and EVM systems like lack of privacy, coercion and non-compliance by providing a transparent and distributed voting process.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The document presents a secure electronic voting system. It discusses the objectives of providing a secure, simple and reliable e-voting system. It outlines the disadvantages of traditional paper-based voting. The architecture of the proposed secure e-voting system is then described, which uses a three-tier architecture with an interface layer, application logic layer and database layer. Key aspects include voter authentication using a zero-knowledge proof protocol, homomorphic encryption of votes, and tallying of votes without decryption. The document provides details of the various phases and requirements of the secure e-voting system.
Traditionally, in paper based election,voters cast their vote to select right candidate, where they simply put their vote in voting box and at the end of the voting day the votes are going to be count manually. This process was much time consuming as well as was erroneous. To overcome this drawback Electronic Voting Machine (EVM) was introduced. In EVM, Voter cast their vote by pressing the voting button which was on EVM. The Major advantage of EVM system is , the votes are counted automatically instead of manually. But the drawback of EVM machine was, the votes may get manipulated and was not secure. So to overcome all these drawbacks, research on biometric based voting system is going on. This Paper focuses on survey of different voting system using Fingerprint biometric through different algorithms and methods.
Internet – Voting System Using Blockchain TechnologyIRJET Journal
This document proposes a blockchain-based internet voting system to ensure data security and privacy in electronic voting. It discusses modeling the entire e-voting process, determining blockchain technology as the platform to ensure privacy and security, and developing and integrating the system. The paper outlines voter authentication methods and the electronic voting process. It examines using a consortium blockchain and discusses hashing algorithms like SHA-256 and block formation, sealing and linking. The paper argues that existing blockchain consensus mechanisms like proof of work are not suitable for e-voting and proposes a customized consensus algorithm to address the limitations.
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET Journal
This document proposes a new online voting system for India that uses optical cryptology and QR codes to securely authenticate voters and prevent election tampering. The existing paper-based system has problems like voter fraud and errors in counting votes. The proposed system would allow voters to cast their ballots online conveniently using their mobile phones by scanning QR codes linked to their credentials. This could help modernize India's elections and reduce issues like those seen in recent paper-based elections. The system aims to be accessible for voters while also increasing security through the use of optical cryptology techniques to encrypt voter authentication codes.
1) The document proposes a blockchain-based online voting system that uses Ethereum blockchain and smart contracts to enable secure and transparent voting.
2) Voters would create wallets using their credentials and receive private keys to anonymously cast votes by transferring tokens to candidate wallets. This allows votes to be cast from any location.
3) The blockchain records all transactions immutably while maintaining voter anonymity. Test results showed voters could successfully cast anonymous votes for candidates.
Smart Voting System Using Java ServletsIRJET Journal
This document describes a proposed smart voting system created using Java servlets. The system aims to provide online voting to eliminate issues with traditional paper-based voting methods. It would allow voters to cast their ballots from anywhere using authentication to verify voter eligibility. The system architecture involves roles for administrators to manage voter profiles and ballots, and for voters to register and vote within their constituencies. If implemented, the smart voting system could improve access, efficiency, and transparency in elections.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
DECENTRALIZED VOTING SYSTEM USING BLOCKCHAINIRJET Journal
This document proposes a decentralized voting system using blockchain technology and face recognition to provide a secure, transparent and accessible voting process. The system would use blockchain to create an immutable record of votes and face recognition to verify voter identity. It describes how the system would utilize blockchain and SHA-256 algorithms to securely store and transmit voting data. The document outlines the proposed system architecture, data flow, implementation considerations and concludes the technology has potential to increase voter participation and trust in the democratic process, while further addressing challenges around facial recognition, scalability and privacy.
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter Cardsijcisjournal
This document proposes a novel approach to conducting safe, clean and unbiased elections through the use of encrypted QR codes on voter cards and a Voter Card Processor (VCAP) device. Key aspects include:
1) The election commission would generate an encryption key pair and encrypt voter details before encoding them in a QR code printed on voter cards.
2) A VCAP device at polling stations would scan QR codes, decrypt the voter details, and verify the identity of voters before allowing them to cast ballots. This prevents compromised voting.
3) The VCAP would also check its memory to identify repeat voters attempting to vote twice, enhancing security.
4) The system aims to automate voter verification and
This document summarizes an article that proposes a secure online voting system to avoid phishing attacks. It begins by describing different types of attacks against online voting like ransomware, malware, and phishing. It then discusses different types of voting systems, including paper-based, lever machines, electronic, poll-site electronic, remote, and internet voting. The existing systems use asymmetric key cryptography, which is slower and more complex than symmetric key cryptography. The proposed system uses a hybrid cryptosystem combining symmetric and asymmetric encryption for ballots and keys to provide a faster and more secure online voting system. It concludes that the proposed internet voting system could help more people vote while saving time and resources.
E-Voting Using Blockchain Technology for Securitysmeetramteke
This annual review document from Contoso discusses the company's performance over the last year and goals for the upcoming year. It notes that profits are up and losses are down from last year. The document reviews wins and losses from the prior year and provides an overview of the team's strong work. It outlines quarterly goals for both business priorities like increasing customer satisfaction and maintaining growth, as well as employee opportunities. The review indicates the team finished key projects last year, delivered for customers, and increased customer retention, cementing Contoso as an industry leader. It closes by thanking employees for their commitment and work ethic.
This document summarizes a research paper that proposes a decentralized e-voting system using blockchain technology. It begins with an abstract that outlines the limitations of current centralized electronic voting systems and how blockchain could address issues like proxy voting, re-voting, and lack of verifiability. The paper then reviews relevant literature on blockchain voting protocols. It proposes a novel e-voting system that implements a voting protocol as a smart contract on the Ethereum blockchain. This would create nodes for each user to securely store encrypted votes on the distributed ledger in a transparent and verifiable manner, suitable for medium-sized elections.
Similar to Secure Verifiable Mobile Voting Based On Kerberos Mechanism (20)
This document presents a study that uses linear regression to predict university freshmen's academic performance (GPA) based on their scores on the Joint Matriculation Examination (JME). The study finds a weak positive correlation (R=0.137) between GPA and JME scores, with the regression model only explaining 1.9% of variability in GPA. Statistical tests show no significant relationship between JME score and university GPA (p>0.05). The study concludes that JME score is not a strong predictor of freshmen academic performance.
This document describes a school bus tracking and security system that uses face recognition, GPS, and notification technologies. The system uses a camera to identify students as they board and exit the bus. A GPS module tracks the bus location and uploads coordinates to a database. Parents and school administrators can access this information through a mobile app to track students. When a student's face is recognized, a notification is sent to the parents. The system aims to increase student safety by monitoring their locations and notifying parents when they enter or exit the bus.
BigBasket encashing the Demonetisation: A big opportunityIJSRED
1. BigBasket is India's largest online grocery retailer, launched in 2011 when online grocery shopping was still nascent.
2. During India's 2016 demonetization, when cash was scarce, online grocery saw a major boost as consumers turned to sites like BigBasket for contactless digital payments.
3. However, BigBasket faced challenges in meeting consumer expectations for quick delivery while expanding partnerships with local vendors for fresh produce during this surge in demand.
Quantitative and Qualitative Analysis of Plant Leaf DiseaseIJSRED
This document discusses a technique for detecting plant leaf diseases using image processing. It begins with an introduction to plant pathology and the importance of identifying plant diseases. Common plant leaf diseases like Alternaria Alternata, Anthracnose, Bacterial blight, and Cercospora Leaf Spot are described along with their symptoms. The existing methods of disease identification are discussed. The proposed method uses various image processing techniques like filtering, histogram equalization, k-means clustering, and Gray Level Co-occurrence Matrix (GLCM) feature extraction to detect diseases. Image quality is then assessed to identify the affected regions of the leaf.
DC Fast Charger and Battery Management System for Electric VehiclesIJSRED
This document discusses the development of a DC fast charger and battery management system for electric vehicles. It aims to reduce charging times for EVs by designing an efficient charging mechanism. A PIC microcontroller controls the charging voltage and a battery management system monitors battery temperature, voltage, current and provides notifications. The system uses a step-down transformer, rectifier, voltage regulators and temperature sensor to charge lithium-ion batteries safely and quickly, while the battery management system protects the batteries from overcharging or overheating. Faster charging times through more charging stations could encourage greater adoption of electric vehicles.
France has experienced steady economic growth through policies that develop human capital and innovation. It has a highly organized education system that has increased enrollments over time, particularly in tertiary education. France also invests heavily in research and development, ranking highly in patents and innovative organizations. Infrastructure investment has also increased tangible capital stock. Additionally, factors like political stability, rule of law, and low corruption create an environment conducive to business investment and growth. Major events like the French Revolution helped shape France culturally, legally and technologically in ways that still influence its growth path today.
This document describes an acquisition system designed to make the examination process more efficient. The system uses a Raspberry Pi to control various hardware components including an RFID reader, rack and pinion assembly, and motor. It is intended to reduce the time and effort required of staff to distribute exam materials by automating the process. When examiners scan their RFID tags, the system verifies their identity and allows them to retrieve the appropriate exam bundles via a motorized rack and pinion assembly. The goal is to minimize manual labor and speed up exam distribution using an automated hardware and software solution controlled by a Raspberry Pi microcontroller.
Parallelization of Graceful Labeling Using Open MPIJSRED
This document summarizes research on parallelizing the graceful graph labeling problem using OpenMP on multi-core processors. It introduces the concepts of parallelization, multi-core architecture, and OpenMP. An algorithm is designed to parallelize graceful labeling by distributing graph vertices across processor cores. Execution time and speedup are measured for graphs of increasing size, showing improved speedup and reduced time with parallelization. Results show consistent performance gains as graph size increases due to better utilization of the multi-core architecture.
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. AmaraIJSRED
This study examines the phenotypic plasticity of fruits in the plant Luffa acutangula var. amara across different locations in Sindhudurg district, Maharashtra, India. The study found that the plant exhibited plasticity in growth cycle, flowering season, leaf shape, and fruit size depending on location. Maximum fruit weights and sizes were recorded at Talebazar village, while minimum sizes were found at Dahibav village. The variation in fruit morphology is an adaptation to the different environmental conditions at each site.
Understanding Architecture of Internet of ThingsIJSRED
The document discusses the architecture of the Internet of Things (IoT). It begins by introducing IoT and its key components. It then discusses three traditional IoT architectures: (1) a three-layer architecture consisting of a perception, network and application layer; (2) the TCP/IP four-layer model; and (3) the Telecommunications Management Network's five-layer logical layered architecture. The document proposes a new five-layer IoT architecture combining aspects of these models. The five layers are the business, application, processing, transport and perception layers. The perception layer collects data via sensors while the business layer manages the overall enterprise.
This document describes a project report submitted by three students for their bachelor's degree. The report outlines the development of a smart shopping cart system that utilizes RFID and Zigbee technologies. The smart cart is intended to enhance the shopping experience for customers by automatically billing items as they are added to the cart, providing real-time stock levels, and reducing checkout times. The system aims to benefit both customers through a more personalized shopping experience and retailers by improving stock management and reducing shoplifting. The document includes sections on requirements, system design, implementation, results and discussion, and conclusions.
An Emperical Study of Learning How Soft Skills is Essential for Management St...IJSRED
This document discusses an empirical study on the importance of soft skills for management students' careers. It finds that while hard skills and academic performance were once prioritized by employers, soft skills like communication, teamwork, and emotional intelligence are now essential for success. The study surveyed 50 management students and faculty in Bangalore to understand how well soft skills training is incorporated and its benefits. It determined that soft skills like communication are crucial as they influence interactions and job performance. However, older teaching methods do not sufficiently develop these skills. Integrating soft skills training into courses could better prepare students for today's work challenges.
The document describes a proposed smart canteen management system that uses various technologies like a web application, barcode scanner, and thermal printer to automate the food ordering process. The system aims to reduce wait times for students and avoid food wastage by allowing online ordering and monitoring stock. A barcode scanner will be used to identify students during ordering and payment. Thermal printers will generate receipts. The system is expected to reduce workload for staff and provide detailed sales reports for management.
This document discusses Gandhi's concept of trusteeship as an alternative economic system. It summarizes that Gandhi did not distinguish between economics and ethics, and based trusteeship on religious ideas like non-possession and truth as well as Western ideas like stewardship. Trusteeship aimed to persuade wealthy property owners to hold wealth in trust for the benefit of society rather than personal gain. It was meant as a non-violent alternative to capitalism and communism that eliminated class conflict through cooperation and trust between rich and poor. The document provides background on the philosophical and religious influences on Gandhi's views before explaining the key aspects of his theory of trusteeship.
Impacts of a New Spatial Variable on a Black Hole Metric SolutionIJSRED
This document discusses the impacts of introducing a new spatial variable in black hole metrics. It begins by summarizing Einstein and Rosen's 1935 paper which introduced a variable ρ = r - 2M in the Schwarzschild metric to remove the singularity. The document then introduces a similar new variable p = r - 2√M and analyzes how this impacts the Schwarzschild metric. Specifically, it notes that this new variable allows for negative radii values and multiple asymptotic regions beyond just two, introducing concepts of probability and imaginary spatial coordinates. Overall, the document explores how different mathematical variables can impact theoretical physics concepts like wormholes.
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...IJSRED
This document summarizes a study that assessed the effectiveness of a planned teaching program on mothers' knowledge of preventing acute respiratory infections in children under 5. 50 mothers were surveyed before and after the program. Before, 36% had moderate knowledge, 62% had inadequate knowledge, and 2% had adequate knowledge. After, 34% had moderate knowledge, 0% had inadequate knowledge, and 66% had adequate knowledge, showing the program improved mothers' knowledge. The study found no significant association between mothers' knowledge and factors like age, education, or family type.
This document describes a proposed ingenuous Trafalgar contrivition system to improve traffic flow and emergency vehicle access. The system uses embedded technologies like a Raspberry Pi, RF transmitter and receiver, and an Android app. When an emergency vehicle is detected approaching a traffic light, the system will open the lights on its path without disrupting other signals. The app will also help identify hit-and-run vehicles through a brief tracking period. The goal is to reduce traffic congestion and response times to save lives.
This document discusses a proposed system called the Farmer's Analytical Assistant, which aims to help farmers in India maximize crop yields through predictive analysis and recommendations. It analyzes agricultural data on factors like soil properties, rainfall, and past crop performance using machine learning techniques to predict optimal crops for different regions based on the environmental conditions. The proposed system would allow farmers to input local data, receive personalized yield predictions and crop suggestions, and get advice from experts online. The methodology section describes how climate/rainfall and soil data is collected and analyzed using machine learning models to provide crop recommendations. The goal is to improve upon traditional crop selection methods and help increase farmers' incomes.
Functions of Forensic Engineering Investigator in IndiaIJSRED
Forensic engineering involves applying engineering principles and methodologies to answer legal questions, especially regarding accidents and failures. A forensic engineer investigates failures through failure analysis and root cause analysis to determine how and why something failed. The engineer must be familiar with relevant codes and standards, understand eyewitness testimony, apply the scientific method to reconstruct events, and report findings clearly to assist courts. A forensic engineering investigation follows the scientific method to methodically analyze evidence and test hypotheses to determine the cause and circumstances of a failure or accident.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.