global wireless e_voting(jayesh j)

Post on 07-May-2015

5.199 Views

Category:

Education

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

Global Wireless E-Voting is an intelligent system which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it is store in the remote server by converting it into radio waves. . The machine provides high level of security, authentication, reliability, and corruption -free mechanism. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. Results of election can be found out within minutes of completion of the election. Minimum manpower Utilization, hence mechanism is error free.

TRANSCRIPT

Under the guidance ofDr. Sheena Mathew

GLOBAL WIRELESS E-VOTING SYSYTEM

PRESENTED By,JAYESH J12110031S7 CS-ASOE,CUSAT

CONTENTSINTRODUCTION

PRESENT SYSTEM

PROPOSED SYDTEM

VOTING MACHINE

EYE RETINA SCANNING

INTERFACE DEVICE

CONTENTS

WORKING OF WHOLE SYSTEM

HURDLES IN PATH OF

IMPLEMENTATION

FUTURE ENHANCEMENT

CONCLUSION

REFERENCES

INTRODUCTION

“Global Wireless E-Voting” is an intelligent voting system which can determine the eligibility of the voter by scanning the eye pattern .

Vote count is not kept into the same machine itself instead of it is stored in the remote server .

More secure than conventional voting system

PRESENT SYSTEM

In present system each and every booth is given an electronic machine which stores the votes of the people.

Control of present system is given to the incharge officer who checks the eligibility of the candidates for voting.

Finally incharge collect all the voting machine at a place and go for counting.

G.L ABHISHEK RGIT,BANGALORE

DISADVANTAGES OF PRESENT SYSTEM

The machine is not able to recognize the eligibility of a candidate, so the corrupted officers may misguide the people

The corrupted officers may increase the count of the voting.

After voting if any technical problems or damage occurs with the machines it may leads to the re election

CONTINUED…

During transportation of the machines, the person in charge can change the status of machines and even may destroy.

This system is not a cost effective one. Since we need security, in charge officers, secured place for counting and election place.

The voting take place where the machine is located.

PROPOSED SYSTEM

In this system we trying to keep counting of votes in to a remote secured system.

Our machine can check the eligibility of the candidate by itself, so there is no question of corruption.

In this system we are using an electronic circuit which enable the voter to vote and transfer this vote to the remote system using mobile tower.

CONTINUED..

A error in a vote does not affect the remaining system, there by reducing the risk of re-election.

Cost for an election is comparatively less than current system

 A person even can vote from a mobile system and also from Internet

EXPLANATION

1. Radio waves representing scanned retina pattern and vote to Mobile tower.

2. Radio waves representing scanned retina pattern and vote to remote server.

3. Acknowledgement (+ve or –ve) from the server to mobile tower.

CONTINUED..

4. Acknowledgement (+ve or –ve) from mobile tower to Interface device.

5. Ready signal if retina is scanned properly to voting machine. And if –ve signal then alert alarm will be activated.

6. Accepted vote is made to flow to the interface device.

VOTING MACHINE

The voting machine is actually a device which generates the different voltages for different votes.

These voltages are fed to the (ADC) which is then converted to digital bits then can be converted to radio waves.

BLOCK DIAGRAM OF CLIENT SIDE CIRCUIT

EYE RETINA SCANNING

A biometric identifier known as a retinal scan is used to map the unique patterns of a person's retina.

These eye retina machine can be a high quality web cam or device which can capture the images effectively.

A retinal scan is performed by casting an unperceived beam of low-energy infrared light into a person’s eye as they look through the scanner's eyepiece.

CONTINUED…

This beam of light traces a standardized path on the retina. Because retinal blood vessels are more absorbent of this light than the rest of the eye, the amount of reflection varies during the scan. The pattern of variations is converted to computer code and stored in a database

INTERFACE DEVICE

This is an electronic kit which converts the input digital signals such as (retina pattern + votes+ secure bits) to radio waves.

WORKING OF THE WHOLE SYSTEMWhenever voters enter to voting booth then he will be

instructed to directly look at retina scanning machine and the machine scans the retina.

Once retina scanning properly confirmed then voter is made to vote

Now the whole data including the retina pattern is sent to interfacing device which converts it into radio waves and these radio waves are sent to mobile tower

And then to the remote server, where the authentication and voters identification is stored into a secured database.

CONTINUED…The received data is first converted into digital

format from the radio waves through the interface device kept at the server side, and from the encrypted data retina pattern and vote separated.

Next the retina pattern is matched against the existing database .

If match is found then flag is checked which indicates its voting status i.e. +ve ack.

This ack is recognized by the receiver kept at the voter side and machine is made to scan next retina pattern and vote, otherwise if –ve ack then alert alarm is made to ring

HURDLES IN THE PATH OF IMPLEMENTATION

Security

Efficiency

Geographical problem

SECURITYUses Key Complex Encryption algorithm

First it finds the length of the string

Generate the random numbers equal to the length of the string

Add the corresponding Characters from the given string and random values

EXPLANATION

E.g. KSHITIJ 8 12 34 4 11 9 26

The ASCII value for KSHITIJ are 75 83 72 73 84 73 74

Add corresponding A) and B) values as8+75 12+83 34+72 4+73 11+84 9+73

26+74

CONTINUED….The corresponding ASCII characters for

these are S _ j M _ R

d

The corresponding characters for random values

À J q © ¨ « y

Finally encrypted data asSÀ _J jq M© _ ¨ R«

dy

EFFICIENCY

Applying compression Algorithms

Using distributed Operating system environment with multiple servers.

CDMA technique

CONTINUED..

Example of CDMA

GEOGRAPHICAL PROBLEMS

It occurs where the technical facilities like mobile tower or Internet service is not present.

In this case will have to store the vote and retina pattern in a external memory location

And pass it when we reach the area where the technical facilities like internet or mobile tower is available.

Here the eye scanner will be web cam.

FUTURE ENHANCEMENTS

CONCLUSION

Provides high level of security, authentication, reliability, and corruption-free mechanism.

By this we can get result with in minute after the completion of voting.

Minimum manpower Utilization, hence mechanism is error free.

REFERENCEBoylestead “Electronic Devices and

Circuit Theory” 10/e Pearson Education, June 2012

Herbert Taub and Donald Schilling “Digital Integrated Electronics” McGraw-Hill Internatinoal Editions, 01-Jan-1977

top related