Development of Antirigging Voting System Using Finger Print
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 2
Abstract
Now a days voting process is exercised by using EVM(Electronic voting machine). In this paper we present and use implementation is to implement the development of anti rigging voting system using finger print .The purpose of the project and implementation is to provide a secured and reliable environment to the customers is to electing the candidates by using the intelligent electronic voting machine by providing a unique identity to every user using the FINGER PRINT identification technology. Here in this project and implementation we are going provide the at most security since it is taking the FINGER PRINTS as the authentication for EVM. Intelligent EVM is an Embedded based project and implementation. It involves microcontroller and interfaces. Intelligent EVM has been specially designed to collect, record, store, count and display cent percent accurately. It has got two units control unit and ballot unit. It has “DISPLAY” section that will display the number of votes to respective candidate at the end of the poll.
Authors and Affiliations
M Venkata Rao, Ramya Krishna Rebba, Afzal Muneer Shaik, Durga Mahesh Murakonda
Reliable Algorithm for Extracting Web Data
Web usage mining is a process of extracting useful information from server logs i.e. users history. Web usage mining is the process of finding out what users are looking for on the Internet. Some users might be look...
Multi Credential Routing a New Event Dissemination Strategy Which Strengthens The Weak Subscription Confidentiality
The provisioning of basic safety devices such as authentication and confidentiality is extremely challenging in a content based publish/subscribe system. Authentication of publishers and subscribers is not easy to ge...
Improving GDOP inPseudolite only Navigation System using Genetic Algorithm
Position fix accuracy of Pseudolite only navigation system [1] mainly depends upon minimum achievable GDOP (Geometrical Dilution of precision) by suitable placement of Transmitters. The suitable placement of transmi...
Privacy Preserving Audit Of Data Storage In Cloud
Cloud computing is the deliverance of computing as a service rather than a product. It gives shared resources, information to computers, softwares and other devices over a set of connections. Cloud computing is the e...
Confidentiality Access Manipulate Procedure Intended for Relational Data
The paper show on precision obliged security saving access control component for connection information system with multilevel anonymization methods. Access control strategy which characterize choice predicate on tou...