IOT Based E-Voting System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
The Election Commission of India, which oversees the country’s elections, is still sticking to its position that the machines are “perfect” and “fully tamperproof”. Everyone must be to recognize the vulnerabilities of EVMs. Like paper ballots, the ballots stored in an EVM are subject to tampering during and after the election, unless they are monitored carefully. But EVMs, unlike paper ballots, are also subject to tampering before the election, perhaps months or years in advance. Indeed, for many EVMs these pre-election vulnerabilities are the most serious problem. So which voting system should India use? For this question an idea came in our mind that let us make a system which will be Simple to use, Faster in operations, Flexible, Highly Secure, Cheap and Latest. In this project we made a demo model of a technology which can be a future of our India’s Voting System. We use small server made up of RaspberryPi, controller based voting machine, data collection and verification unit, one web server for display of result. Once this system is get implemented we need not to worry about our voting as one of the main purpose of this system is a person can vote from any place in India to his/her native region in India. This will reduce time consuming factors, various travelling issues, fake voting, and displaying of result will be easy and fast.
Authors and Affiliations
Prof. Swati Gawhale, Vishal Mulik, Pooja Patil, Nilisha Raut
Architecture of Windows NT Operating System
The architecture of Windows NT, a line of operating systems produced and sold by Microsoft, is a layered design that consists of two main components, user mode and kernel mode. It is a preemptive, reentrant operating sy...
Implementing user-defined Integrity Constraint in MYSQL
The methods with which we can maintain correctness of any specific table in data base management system are Integrity constraints. The general idea of this paper is to investigate and observe user-defined integrity cons...
“Marker-Controlled Watershed Transform in Digital Mammogram Segmentation”
Breast cancer is one of the major causes of death among women thus; to detect the breast cancer in digital mammogram, firstly we have to segment it properly. Segmentation refers to the process of partitioning a digital...
Design & Analysis of 5th Order DC-DC Converter
A new two-input DC-DC converter suitable to draw power from two different dc sources feeding a common dc-bus is presented in this paper. This is a two-switch converter belongs to fifth-order family and performs bucking...
Analysis of Security Features Offered by Firewall
In this period where most Internet users have dissimilar intent and with the unfasten, threatening scenery of the Internet world, the security of information consequently, becomes a top concern to all. Internet security...