SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
DOI:10.5121/ijcax.2017.4201 1
ADVANCED E-VOTING APPLICATION USING
ANDROID PLATFORM
Ganaraj K
PG Scholar, Computer Science Department,
Bearys Institute of technology and Engineering
Mangalore, Karnataka, India
ABSTRACT
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an e-
voting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed e-
voting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
KEYWORDS
Electronic voting, e-mail Network
1. INTRODUCTION
The proper execution of democratic rights has become linked to the availability and reliable
functioning of advanced information and communication technology (ICT). While modern
societies fully rely on ICT for business, work and leisure time activities, the use of ICT for
democratic decision making is still in its infancy. In fact, the out date technological concepts for
voting have been blamed in part for lost and uncounted votes and could therefore be responsible
for biased political decisions making [2]. Countries all over the world are examining e-voting [3],
for it has some striking advantages over traditional paper voting, including security for casting
votes, accuracy of counting and analyzing votes, options to conduct voting in a centralized and
decentralized manner, etc. The reasons why the e-voting technology has not matured to
equivalent levels as known for business and leisure time activities lies mostly in an inherent lack
of trust and fear of electronic threats. While most countries are still conceptualizing or testing e-
voting systems, three cantons in Switzerland have pioneered the development of e-voting to its
full technological maturity. The world is always in improvement and growth in technology, that's
why we should go parallel with it, to be able as much as we can get benefit from these
improvements.
International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
2
The advanced e-voting technique makes use of main two phases- the registration and login phase.
During the registration phase the user need to provide required information and can get a secured
password in order to login the application for voting. In the second phase using the user-id and
password provided the user can login and can cast the vote from home or office or anywhere
securely. The votes are properly encrypted so that any third person cannot able to find voting
information of any others. The whole operation is managed by an administrator. The admin can
monitor the process and finally announces the result soon after voting session is completed. Even
the vote counts are stored in the encrypted form while getting stored in the database maintained
and managed by administrator. Hence the overall voting process will be safe and secure.
2. COMPARISON WITH THE EXISTING SYSTEMS
The current system which is present now is a machine and paper based voting system which
needs much man power and requires lot of resources. The present voting system finds difficulty
during the counting also because it is counted manually. To overcome this as we said earlier the e
voting system provides an efficient way to complete the whole voting system. The e voting
system is an android application which enables user to vote in his smart phone. This is more
advanced compared to the present system because it doesn't need any man power. And voter
doesn’t need to visit the polling booth. The application also reduces the complexity of counting
since it is automatic.
3. PROPOSED SYSTEM
The application can be installed in the android phones and voting will be enabled by the
administrator on the polling day. If there are different stages of polling then application will
enable the user only on the polling day. The user can enter into the application by giving his voter
id/Aadhar number (unique number) and a secret password which is provided to the user. As soon
as the user enters into the application he selects his constituency and his booth number or place
then the user can cast his vote and logout from the application. The vote should be kept secret and
it should be available on the voting day in the counting center. To keep the vote secret an
encryption and a decryption algorithm is used. So as soon as the user casts his vote the vote is
encrypted so that it is secret and the same is encrypted on the polling day.
4. REQUIREMENTS OF THE E-VOTING SYSTEM
The proposed project contain following modules:
Administrator
User
Account
ADMINISTRATOR:
• User Information: Consists of all information of the user those who are eligible for
voting.
• User Verification: Verify the user during registration and user Login.
• Voting Information: Storage for storing the vote information casted by the user.
International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
3
USER:
• Registration: Registers with administrator to obtain a password for voting.
• Login: Initiates voting using the password provided by the administrator.
• Encryption: Encrypting the vote after the vote casted by the user
ACCOUNT:
• Registration: The user should register before using the application.
• Login: Logging into the application using user name and password.
5. E-VOTING SYSTEM DESIGN
Like most of the systems in the world, the security consideration is very important. We are taken
into account this part through sending password to users email account. Further encrypting the
vote while sending it to the admin. It is clear that the user information should be stored in the
database, so that the valid users can register themselves to get the password. It also stores the
password once it is sent to the user until the user cast s the vote. It is also possible to get
information of user who doesn't participated in voting process. The application should be secure
because it should not reveal vote information. So the vote should be encrypted once user confirms
the vote. Also the password is sent to users e-mail account in order to avoid the misuse of
password . Since the e-mail account is confidential we used that feature to avoid the misuse of our
applications password.
Figure 1: Sequence diagram of registration
The registration process is illustrated as in the figure1 shown above. When user chooses
registration option and provides required details those details are compared with the information
maintained by the admin. If user provided data is found to be correct a password is generated and
given to the user through mail service in order to make it safe and secure.
International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
4
Figure 2: The Voting Process
6. E-VOTING SYSTEM WORKING
Android e-Voting application on smart phone user gives user to vote]. Admin can see the voting
results according to vote options[3].System can maintain the data about the voter like Name, ID
number and other relevant data. Even though the system enables voters to poll their vote from
anywhere, initially the voters should register themselves to get a password for voting purpose.
This constraint is imposed to ensure that only the genuine person is allowed to vote in the
elections. The aim of this work is to design and implement an electronic voting application for the
Android platform that will enable people to vote securely from anywhere. The application as a
whole is aimed at being compatible with devices from many manufacturers and running different
versions of the operating system. The application is also aimed at being localized [4]. Figure
Below shows the overall voting process.
Electronic voting refers to the use of computers or computerized voting equipment to cast ballots
in an election. Electronic systems can be used to register voters, tally ballots, and record votes
[5].The Caltech/MIT Voting Technology Project [6] came into being in order to develop a new
voting technology in order to prevent a recurrence of the problems that threatened the 2000 U. S.
Presidential Elections. The report assesses the magnitude of the problems, their root causes and
how technology can reduce them. They address a wide range of “What is” issues including voting
procedures, voting equipment, voter registration, polling places, absentee and early voting, ballot
security, cost and public finance of elections, etc
International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
5
Figure 3: Overall voting process
.
The overall flow of the application is as depicted in the Figure4. It is clear that the user should
register in the beginning and obtain a password. The obtained password need to be used for login
and cast the vote.
International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
6
Figure 4: Flowchart of Overall voting process
6.1 REGISTRATION PHASE
In the home page registration category will ask you to enter the following details.
• Name
• E-mail id
• Voter id
• Aadhar id
International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
7
Figure 5: User Registration example
The Figure5 illustrates the registration procedure example when the application is developed and
installed in a smart phone for testing. It is clear that in the registration form the user need to
provide valid details. Whenever the valid details are matching the registration procedure becomes
successful. Else the user does not allowed for registration. After you submit the details asked by
the registration the application will give you a toast message whether your registration is
successful or not. At the same time if your registration is successful the application will send you
a mail which contains the password which is needed later for logging in.
6.2 LOGIN AND VOTING PROCESS
You need to login for voting by giving the the below details
• Aadhar id
• Voter id
• Password
Figure 6: Login Example
International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
8
Once user submits the details the application checks the details given by the user in database at
the server side. If the details provided are proper then login successful status is shown as a toast
message. After this the user can choose voting option to cast the vote. A list of candidates
contesting in the election along with their details is displayed in users Smartphone. The candidate
list is updated from the server. Now it’s the right time to select a candidate from the available list.
When user taps against a candidate the application asks for confirming the vote. When user
confirms the candidate selected the information is sent to the server. Now vote count against the
selected candidate is updated which is stored in an encrypted form. Also a flag field maintained in
the database is enabled against the user once user casts the vote so that if the same user tries to
vote again then the application should not allow for it. All these processes are done at the server
side to make voting process safe and secured.
7. E-VOTING SYSTEM SECURITY LEVELS
For the security, we use e-mail service to provide the secured password to the user. When the
password is generated it will be sent to the users e-mail id which is linked to the aadhar-id stored
in the database. The e-mail account is self managed and none of the other user can access the e-
mail and get the password to login.
The most security part lies on securing the vote casted by the user. So the vote is encrypted using
Java Cryptology Extension algorithm and sent to admin [7]. However only the admin has the
permission to access the database. Even while storing the vote count it is stored in the encrypted
form hence it becomes a secured data. At any moment the admin only have the permission for
accessing and updating data in the server. To avoid fraud voters the aadhar-id which unique
number uniquely identifies the user. The possibility is that any user may try to revote again once
after voting. Some flag indicating that the user status (voted or not) is maintained at the server.
Whenever user casts the vote the flag field is updated and can be referred for future analysis. This
flag field also helpful to collect information about percentage of voting and will act as a reference
data.
8. CONCLUSION
This research paper proposed a real time e-voting system based on android phones. The usability
of this system is very high if it will be used in real life election process. It will definitely helpful
for the users who wish to vote and the voting process will be made very easy by using this
application. Advantages of the proposed e-voting system: e-voting minimizes the risk of
ambiguities as the voter makes his choice by touching the screen. E-voting could also minimize
the need for recounts as everything is tabulated by the computer. Also the user can cast vote
without visiting the polling booth. It saves a lot of time and many resources. Usually the people
wait eagerly for vote counting day to know the results. By using this system no need to wait to
know the results. The admin can announce the results soon after the voting session closes. The
results show that system is very efficient and easy to use.
REFERENCES
[1] Dr.Aree Ali Mohammed and Ramyar Adbolrahman Timour,Efficient E-voting Android Based
System, IJARCSSE,vol.3,Issue 11,2013
[2] A.S. Belenky and R.C. Larson, “To Queue or not to Queue?,” OR/MS 27, October 2013, pp. 30-34.
[3] “An Electronic Polling Service to Support Public Awareness Using Web Technologies”, Christos
Bouras, Nikolaos Katris, Vassilis Triantafillou.
International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017
9
[4] “E-voting on Android System” paper (International Journal of Emerging Technology and Advanced
Engineering) prepared by : Kirti Autade, Pallavi Ghadge, Sarika Kale ,Co-authors- Prof. N. J.
Kulkarni, Prof. S. S. Mujgond, February 2012.
[5] “Electronic Voting,” Encyclopedia of Computers and Computer History, prepared by Lorrie Faith
Cranor and edited by Raul Rojas, published by Fitzroy Dearborn, 2001.
[6] “Voting – What is, What Could be,” Caltech/MIT Voting Technology Project (VTP) Report,
July 2001.
[7] Java Cryptography an e-book by Jonathan B. Knudsen, First edition May 1998, ISBN:1-56592-402-9
AUTHOR
Ganaraj K PG Scholar, Computer Science and Engineering Department, Bearys
Institute of technology and Engineering, Mangalore, Karnataka, India.

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Online Voting System using Fingerprint Scanner
IRJET-  	  Online Voting System using Fingerprint ScannerIRJET-  	  Online Voting System using Fingerprint Scanner
IRJET- Online Voting System using Fingerprint ScannerIRJET Journal
 
Report on online voting system
Report on online voting systemReport on online voting system
Report on online voting systemRajatMohanty12
 
Report online voting system
Report online voting systemReport online voting system
Report online voting systemDeepak tandan
 
IRJET- Biometric Voting Machine using Aadhar Authentication
IRJET-  	  Biometric Voting Machine using Aadhar AuthenticationIRJET-  	  Biometric Voting Machine using Aadhar Authentication
IRJET- Biometric Voting Machine using Aadhar AuthenticationIRJET Journal
 
IRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting SystemIRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting SystemIRJET Journal
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...IRJET Journal
 
E voting(online voting system)
E voting(online voting system)E voting(online voting system)
E voting(online voting system)Saurabh Kheni
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIAchandu namani
 
Online voting system full thesis project by jahir
Online voting system full thesis project by jahirOnline voting system full thesis project by jahir
Online voting system full thesis project by jahirJahir Khan
 
A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureDr. Michael Agbaje
 
online national polling
online national pollingonline national polling
online national pollingKasi Annapurna
 
Online Voting System project proposal report.doc
Online Voting System project proposal report.docOnline Voting System project proposal report.doc
Online Voting System project proposal report.docKhondokerAbuNaim
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerIOSR Journals
 

Was ist angesagt? (18)

Feasibility Study on e-Voting System
Feasibility Study on e-Voting SystemFeasibility Study on e-Voting System
Feasibility Study on e-Voting System
 
IRJET- Online Voting System using Fingerprint Scanner
IRJET-  	  Online Voting System using Fingerprint ScannerIRJET-  	  Online Voting System using Fingerprint Scanner
IRJET- Online Voting System using Fingerprint Scanner
 
E voting app
E voting appE voting app
E voting app
 
New e voting
New e votingNew e voting
New e voting
 
Report on online voting system
Report on online voting systemReport on online voting system
Report on online voting system
 
Report online voting system
Report online voting systemReport online voting system
Report online voting system
 
IRJET- Biometric Voting Machine using Aadhar Authentication
IRJET-  	  Biometric Voting Machine using Aadhar AuthenticationIRJET-  	  Biometric Voting Machine using Aadhar Authentication
IRJET- Biometric Voting Machine using Aadhar Authentication
 
IRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting SystemIRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting System
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...
 
E voting(online voting system)
E voting(online voting system)E voting(online voting system)
E voting(online voting system)
 
F1802024245
F1802024245F1802024245
F1802024245
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
Online voting system full thesis project by jahir
Online voting system full thesis project by jahirOnline voting system full thesis project by jahir
Online voting system full thesis project by jahir
 
A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System Architecture
 
online national polling
online national pollingonline national polling
online national polling
 
Online Voting System project proposal report.doc
Online Voting System project proposal report.docOnline Voting System project proposal report.doc
Online Voting System project proposal report.doc
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
 

Ähnlich wie ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM

Online Voting System
Online Voting SystemOnline Voting System
Online Voting SystemIRJET Journal
 
ONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEMONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEMIRJET Journal
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainIRJET Journal
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Networkijbuiiir1
 
Student Voting Application for Election – Using SMS (1).pptx
Student Voting Application for Election – Using SMS (1).pptxStudent Voting Application for Election – Using SMS (1).pptx
Student Voting Application for Election – Using SMS (1).pptxShivareddyGangam
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java ServletsIRJET Journal
 
IRJET- E-Voting System for Election using Fingerprint and Aadhar Number
IRJET-  	  E-Voting System for Election using Fingerprint and Aadhar NumberIRJET-  	  E-Voting System for Election using Fingerprint and Aadhar Number
IRJET- E-Voting System for Election using Fingerprint and Aadhar NumberIRJET Journal
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET Journal
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technologyijsrd.com
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET Journal
 
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET Journal
 
Online Voting System - Project
Online Voting System - ProjectOnline Voting System - Project
Online Voting System - ProjectSubhashis Das
 
kgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdfkgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdfShubhamGour29
 
IRJET- Digital Voting System
IRJET-  	  Digital Voting SystemIRJET-  	  Digital Voting System
IRJET- Digital Voting SystemIRJET Journal
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET Journal
 
IRJET - Block Chain Enabled E-Voting System
IRJET -  	  Block Chain Enabled E-Voting SystemIRJET -  	  Block Chain Enabled E-Voting System
IRJET - Block Chain Enabled E-Voting SystemIRJET Journal
 
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTIRJET Journal
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting SystemIRJET Journal
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGIRJET Journal
 

Ähnlich wie ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM (20)

eVoting.pptx
eVoting.pptxeVoting.pptx
eVoting.pptx
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
ONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEMONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEM
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Network
 
Student Voting Application for Election – Using SMS (1).pptx
Student Voting Application for Election – Using SMS (1).pptxStudent Voting Application for Election – Using SMS (1).pptx
Student Voting Application for Election – Using SMS (1).pptx
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java Servlets
 
IRJET- E-Voting System for Election using Fingerprint and Aadhar Number
IRJET-  	  E-Voting System for Election using Fingerprint and Aadhar NumberIRJET-  	  E-Voting System for Election using Fingerprint and Aadhar Number
IRJET- E-Voting System for Election using Fingerprint and Aadhar Number
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technology
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
 
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
 
Online Voting System - Project
Online Voting System - ProjectOnline Voting System - Project
Online Voting System - Project
 
kgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdfkgec-projectnew-150802134711-lva1-app6892.pdf
kgec-projectnew-150802134711-lva1-app6892.pdf
 
IRJET- Digital Voting System
IRJET-  	  Digital Voting SystemIRJET-  	  Digital Voting System
IRJET- Digital Voting System
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting System
 
IRJET - Block Chain Enabled E-Voting System
IRJET -  	  Block Chain Enabled E-Voting SystemIRJET -  	  Block Chain Enabled E-Voting System
IRJET - Block Chain Enabled E-Voting System
 
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
 

Mehr von ijcax

NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESNEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESijcax
 
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMTHE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMijcax
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
 
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation ijcax
 
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING ijcax
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR ijcax
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDijcax
 
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...ijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
TRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBSTRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBSijcax
 
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...ijcax
 
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...ijcax
 
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...ijcax
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR ijcax
 
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...ijcax
 
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...ijcax
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDijcax
 
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION ijcax
 

Mehr von ijcax (20)

NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESNEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
 
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMTHE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
 
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
 
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLIND
 
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
TRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBSTRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBS
 
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
 
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
 
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
 
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
 
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLIND
 
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
 

Kürzlich hochgeladen

Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
ADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studyADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studydhruvamdhruvil123
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxLina Kadam
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHbirinder2
 
Detection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackingDetection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackinghadarpinhas1
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfalokitpathak01
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 

Kürzlich hochgeladen (20)

Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
ADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studyADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain study
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptx
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRH
 
Detection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackingDetection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and tracking
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdf
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 

ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM

  • 1. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 DOI:10.5121/ijcax.2017.4201 1 ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM Ganaraj K PG Scholar, Computer Science Department, Bearys Institute of technology and Engineering Mangalore, Karnataka, India ABSTRACT The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The E-voting promises the possibility of convenient, easy and safe way to capture and count the votes in an election[1]. This research project provides the specification and requirements for E-Voting using an Android platform. The e-voting means the voting process in election by using electronic device. The android platform is used to develop an e- voting application. At first, an introduction about the system is presented. Sections II and III describe all the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed e- voting system will be presented. This technology helps the user to cast the vote without visiting the polling booth. The application follows proper authentication measures in order to avoid fraud voters using the system. Once the voting session is completed the results can be available within a fraction of seconds. All the candidates vote count is encrypted and stored in the database in order to avoid any attacks and disclosure of results by third person other than the administrator. Once the session is completed the admin can decrypt the vote count and publish results and can complete the voting process. KEYWORDS Electronic voting, e-mail Network 1. INTRODUCTION The proper execution of democratic rights has become linked to the availability and reliable functioning of advanced information and communication technology (ICT). While modern societies fully rely on ICT for business, work and leisure time activities, the use of ICT for democratic decision making is still in its infancy. In fact, the out date technological concepts for voting have been blamed in part for lost and uncounted votes and could therefore be responsible for biased political decisions making [2]. Countries all over the world are examining e-voting [3], for it has some striking advantages over traditional paper voting, including security for casting votes, accuracy of counting and analyzing votes, options to conduct voting in a centralized and decentralized manner, etc. The reasons why the e-voting technology has not matured to equivalent levels as known for business and leisure time activities lies mostly in an inherent lack of trust and fear of electronic threats. While most countries are still conceptualizing or testing e- voting systems, three cantons in Switzerland have pioneered the development of e-voting to its full technological maturity. The world is always in improvement and growth in technology, that's why we should go parallel with it, to be able as much as we can get benefit from these improvements.
  • 2. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 2 The advanced e-voting technique makes use of main two phases- the registration and login phase. During the registration phase the user need to provide required information and can get a secured password in order to login the application for voting. In the second phase using the user-id and password provided the user can login and can cast the vote from home or office or anywhere securely. The votes are properly encrypted so that any third person cannot able to find voting information of any others. The whole operation is managed by an administrator. The admin can monitor the process and finally announces the result soon after voting session is completed. Even the vote counts are stored in the encrypted form while getting stored in the database maintained and managed by administrator. Hence the overall voting process will be safe and secure. 2. COMPARISON WITH THE EXISTING SYSTEMS The current system which is present now is a machine and paper based voting system which needs much man power and requires lot of resources. The present voting system finds difficulty during the counting also because it is counted manually. To overcome this as we said earlier the e voting system provides an efficient way to complete the whole voting system. The e voting system is an android application which enables user to vote in his smart phone. This is more advanced compared to the present system because it doesn't need any man power. And voter doesn’t need to visit the polling booth. The application also reduces the complexity of counting since it is automatic. 3. PROPOSED SYSTEM The application can be installed in the android phones and voting will be enabled by the administrator on the polling day. If there are different stages of polling then application will enable the user only on the polling day. The user can enter into the application by giving his voter id/Aadhar number (unique number) and a secret password which is provided to the user. As soon as the user enters into the application he selects his constituency and his booth number or place then the user can cast his vote and logout from the application. The vote should be kept secret and it should be available on the voting day in the counting center. To keep the vote secret an encryption and a decryption algorithm is used. So as soon as the user casts his vote the vote is encrypted so that it is secret and the same is encrypted on the polling day. 4. REQUIREMENTS OF THE E-VOTING SYSTEM The proposed project contain following modules: Administrator User Account ADMINISTRATOR: • User Information: Consists of all information of the user those who are eligible for voting. • User Verification: Verify the user during registration and user Login. • Voting Information: Storage for storing the vote information casted by the user.
  • 3. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 3 USER: • Registration: Registers with administrator to obtain a password for voting. • Login: Initiates voting using the password provided by the administrator. • Encryption: Encrypting the vote after the vote casted by the user ACCOUNT: • Registration: The user should register before using the application. • Login: Logging into the application using user name and password. 5. E-VOTING SYSTEM DESIGN Like most of the systems in the world, the security consideration is very important. We are taken into account this part through sending password to users email account. Further encrypting the vote while sending it to the admin. It is clear that the user information should be stored in the database, so that the valid users can register themselves to get the password. It also stores the password once it is sent to the user until the user cast s the vote. It is also possible to get information of user who doesn't participated in voting process. The application should be secure because it should not reveal vote information. So the vote should be encrypted once user confirms the vote. Also the password is sent to users e-mail account in order to avoid the misuse of password . Since the e-mail account is confidential we used that feature to avoid the misuse of our applications password. Figure 1: Sequence diagram of registration The registration process is illustrated as in the figure1 shown above. When user chooses registration option and provides required details those details are compared with the information maintained by the admin. If user provided data is found to be correct a password is generated and given to the user through mail service in order to make it safe and secure.
  • 4. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 4 Figure 2: The Voting Process 6. E-VOTING SYSTEM WORKING Android e-Voting application on smart phone user gives user to vote]. Admin can see the voting results according to vote options[3].System can maintain the data about the voter like Name, ID number and other relevant data. Even though the system enables voters to poll their vote from anywhere, initially the voters should register themselves to get a password for voting purpose. This constraint is imposed to ensure that only the genuine person is allowed to vote in the elections. The aim of this work is to design and implement an electronic voting application for the Android platform that will enable people to vote securely from anywhere. The application as a whole is aimed at being compatible with devices from many manufacturers and running different versions of the operating system. The application is also aimed at being localized [4]. Figure Below shows the overall voting process. Electronic voting refers to the use of computers or computerized voting equipment to cast ballots in an election. Electronic systems can be used to register voters, tally ballots, and record votes [5].The Caltech/MIT Voting Technology Project [6] came into being in order to develop a new voting technology in order to prevent a recurrence of the problems that threatened the 2000 U. S. Presidential Elections. The report assesses the magnitude of the problems, their root causes and how technology can reduce them. They address a wide range of “What is” issues including voting procedures, voting equipment, voter registration, polling places, absentee and early voting, ballot security, cost and public finance of elections, etc
  • 5. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 5 Figure 3: Overall voting process . The overall flow of the application is as depicted in the Figure4. It is clear that the user should register in the beginning and obtain a password. The obtained password need to be used for login and cast the vote.
  • 6. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 6 Figure 4: Flowchart of Overall voting process 6.1 REGISTRATION PHASE In the home page registration category will ask you to enter the following details. • Name • E-mail id • Voter id • Aadhar id
  • 7. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 7 Figure 5: User Registration example The Figure5 illustrates the registration procedure example when the application is developed and installed in a smart phone for testing. It is clear that in the registration form the user need to provide valid details. Whenever the valid details are matching the registration procedure becomes successful. Else the user does not allowed for registration. After you submit the details asked by the registration the application will give you a toast message whether your registration is successful or not. At the same time if your registration is successful the application will send you a mail which contains the password which is needed later for logging in. 6.2 LOGIN AND VOTING PROCESS You need to login for voting by giving the the below details • Aadhar id • Voter id • Password Figure 6: Login Example
  • 8. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 8 Once user submits the details the application checks the details given by the user in database at the server side. If the details provided are proper then login successful status is shown as a toast message. After this the user can choose voting option to cast the vote. A list of candidates contesting in the election along with their details is displayed in users Smartphone. The candidate list is updated from the server. Now it’s the right time to select a candidate from the available list. When user taps against a candidate the application asks for confirming the vote. When user confirms the candidate selected the information is sent to the server. Now vote count against the selected candidate is updated which is stored in an encrypted form. Also a flag field maintained in the database is enabled against the user once user casts the vote so that if the same user tries to vote again then the application should not allow for it. All these processes are done at the server side to make voting process safe and secured. 7. E-VOTING SYSTEM SECURITY LEVELS For the security, we use e-mail service to provide the secured password to the user. When the password is generated it will be sent to the users e-mail id which is linked to the aadhar-id stored in the database. The e-mail account is self managed and none of the other user can access the e- mail and get the password to login. The most security part lies on securing the vote casted by the user. So the vote is encrypted using Java Cryptology Extension algorithm and sent to admin [7]. However only the admin has the permission to access the database. Even while storing the vote count it is stored in the encrypted form hence it becomes a secured data. At any moment the admin only have the permission for accessing and updating data in the server. To avoid fraud voters the aadhar-id which unique number uniquely identifies the user. The possibility is that any user may try to revote again once after voting. Some flag indicating that the user status (voted or not) is maintained at the server. Whenever user casts the vote the flag field is updated and can be referred for future analysis. This flag field also helpful to collect information about percentage of voting and will act as a reference data. 8. CONCLUSION This research paper proposed a real time e-voting system based on android phones. The usability of this system is very high if it will be used in real life election process. It will definitely helpful for the users who wish to vote and the voting process will be made very easy by using this application. Advantages of the proposed e-voting system: e-voting minimizes the risk of ambiguities as the voter makes his choice by touching the screen. E-voting could also minimize the need for recounts as everything is tabulated by the computer. Also the user can cast vote without visiting the polling booth. It saves a lot of time and many resources. Usually the people wait eagerly for vote counting day to know the results. By using this system no need to wait to know the results. The admin can announce the results soon after the voting session closes. The results show that system is very efficient and easy to use. REFERENCES [1] Dr.Aree Ali Mohammed and Ramyar Adbolrahman Timour,Efficient E-voting Android Based System, IJARCSSE,vol.3,Issue 11,2013 [2] A.S. Belenky and R.C. Larson, “To Queue or not to Queue?,” OR/MS 27, October 2013, pp. 30-34. [3] “An Electronic Polling Service to Support Public Awareness Using Web Technologies”, Christos Bouras, Nikolaos Katris, Vassilis Triantafillou.
  • 9. International Journal of Computer- Aided Technologies (IJCAx) Vol.4, No.1/2, April 2017 9 [4] “E-voting on Android System” paper (International Journal of Emerging Technology and Advanced Engineering) prepared by : Kirti Autade, Pallavi Ghadge, Sarika Kale ,Co-authors- Prof. N. J. Kulkarni, Prof. S. S. Mujgond, February 2012. [5] “Electronic Voting,” Encyclopedia of Computers and Computer History, prepared by Lorrie Faith Cranor and edited by Raul Rojas, published by Fitzroy Dearborn, 2001. [6] “Voting – What is, What Could be,” Caltech/MIT Voting Technology Project (VTP) Report, July 2001. [7] Java Cryptography an e-book by Jonathan B. Knudsen, First edition May 1998, ISBN:1-56592-402-9 AUTHOR Ganaraj K PG Scholar, Computer Science and Engineering Department, Bearys Institute of technology and Engineering, Mangalore, Karnataka, India.