01-02-2015, 10:09 AM
i want global wireless e voting ieee base paper plz mail me bitravarshitha[at]gmail.com
01-02-2015, 10:09 AM
i want global wireless e voting ieee base paper plz mail me bitravarshitha[at]gmail.com
02-02-2015, 03:17 PM
To get full information or details of global wireless e voting please have a look on the pages
https://seminarproject.net/Thread-global...8#pid53948 https://seminarproject.net/Thread-global...ull-report https://seminarproject.net/Thread-global...nar-report if you again feel trouble on global wireless e voting please reply in that page and ask specific fields in global wireless e voting
18-02-2017, 11:07 AM
can u plz send to me global wireless e-voting recent ieee papers plz..
its urgent need for me..
20-02-2017, 09:38 AM
Abstract In the age of technology, the voting machine, which is present today, is highly unsafe. Being in the age of computers we are compromising security by opting for the electronic voting machine because in the current electronic voting machine it is not smart that it is that can not determine the person who came for the vote is eligible or not. That means that all control is kept in the hand of the vote in the charge officer. One more risk with the current voting machine is that any body can increase the vote count, since the count is present in the machine itself. In the proposed machine that is "Global Wireless E-Vooting," the machine becomes smart that can determine voter eligibility by scanning the eye pattern and also the vote count is not kept on the same machine instead of Which is store on the remote server by converting it into radio waves. Here there is no possibility of increasing the vote count of the machine. Even in case of damage to the voting machine, there will be no detriment to the continuity of the electoral process. Proposed system: • In our system we try to keep voting counts on a secure remote system • In the Global Wireless E-Vooting system we are using an electronic circuit that allows the voter to vote and transfer this vote to the remote system by converting it to radio waves through the mobile towers. • Global Wireless E-Voting Machine can check the candidate's eligibility by itself, so there is no question of corruption. The machine itself is automated to verify the eligibility of the candidates. • We do not have to go to re-election here, even if the machine is damaged. • A person can even vote from a mobile system and also from the Internet. • We can vote from anywhere even if you are a voter from another region. System-wide work Each time the voters enter the voting booth, they will be instructed to look directly at the retinal scan machine at this point the machine scans the retina. Once the retinal scan successfully confirmed then sent the signal to the voting machine as to accept the vote it will be powered on. Then the voter is made to vote. Now all data including the retinal pattern are sent to the interface device which is converted into radio waves of mobile frequency range and these radio waves are sent to mobile tower and then to the remote server where authentication and identification of Voters are stored in a secure database. The received data is first converted to digital format from the radio waves through the interface device maintained on the server side, and then the retinal pattern and the separate vote. The retinal pattern will then be paired with the existing database. If the match is found, then the flag is a check that indicates your voting status, ie if the voter has not yet been voted, then it is sent to the mobile tower and then to the corresponding voting machine. This ack is recognized by the receiver stored on the voter side and the machine is made to scan the next retina pattern and vote, otherwise if the alarm alarm is triggered then it will be sounded. E-Voting Requirements • A voting system must meet these requirements • Eligibility and authentication - only registered voters must be admitted. • Oneness - no voter can cast his vote more than once. • Accuracy - Voting systems must record votes correctly. • Auditability and audit capability - it should be possible to verify that all votes • have been correctly posted to the final account, and there must be • reliable and verifiable electoral records. • Secret - no one should be able to determine how anyone voted. • Non-coercive: voters should not be able to demonstrate to others how • voted; Otherwise the sale of votes and coercion would be facilitated. • Minimum voter skill requirements • Minimum need for equipment • Minimum time required to vote HURDLES ON THE ROAD OF IMPLEMENTATION: There are several more issues that we need to consider throughout the Implementation, such as Security Efficiency Geographic issues Security The radio waves of a mobile frequency consist of Retina pattern and the vote can be generated by means of an external source. That is why we need to provide some security to avoid this problem. One of the ideas to solve this problem is CDMA (to be explained later) and another technique is to insert security bits at regular intervals of time during radio wave transmission (Ex.2 msec). On the server side After the given interval (2 msec) security bits (ex 1001). In case of positive confirmation we can accept as valid vote, otherwise simply rejected. Another problem is that one can catch the radio waves in the middle and can determine the person and the vote; This may reveal the result of the election before the end of the voting process. To avoid this problem we can go to the application of efficient and complex encryption algorithm so that the transparency of the data can be hidden and the server side of the encrypted data can be decrypted again and the original data can be retrieved this do the Nonsense wave capture Efficiency Each time the data is sent from the voter side (client), it is in the large amount, this somewhat delays a voting system and the data that is received on the server side is in the ccess mode ie , More than one customer is sending the data. To overcome this problem the following 1. Application of compression algorithms on the client and the server side for those who decrease data transfer. Compression technique such as JPEG compression or any other compression. 2. Instead of using a single PC server we will go to the distributed operating system environment with multiple servers. This makes sharing and processing faster leading to faster responses in case of multiple access environment 3. To solve the concurrency problem in the case of the Multiple Access environment we will use the CDMA technique which is the following |
|