Académique Documents
Professionnel Documents
Culture Documents
To,
Akula Gopayya College of engineering and Technology
Thadepalligudam,
By,
M.N.S.S.Kranthi Sarika Jeevani
III, E.C.E III, E.C.E
Chaitanya Institute of Science & Technology.
Madavpatnam, Kakinada. (EG .Dist)
ABSTRACT As a pre-poll procedure, a database
for the election commission to conduct all the eligible voters in a constituency is
free and fair polls in our country, the created. During elections, the thumb
of rupees have been spent on this to to the system. This is then compared
make sure that the elections are riot free. with the available records in the
common for some forces to indulge in matches with any one in the available
rigging which may eventually lead to a record, access to cast a vote is granted.
result contrary to the actual verdict given But in case the pattern doesn’t match
new voting system employing biometrics denied or the vote gets rejected. Also the
in order to avoid rigging and to enhance police station nearby to the election poll
the accuracy and speed of the process. booth is informed about the identity of
The system uses thumb impression for the imposter. All the voting machines are
thumb impression of every human being data transfer takes place to the main
has a unique pattern. Thus it would have host. The result is instantaneous and
an edge over the present day voting counting is done finally at the main host
INTRODUCTION
3. Networking- all the election
Biometrics is the term given to booths are connected in a
the use of biological traits or behavioral network
characteristics to identify an individual. 4. Data transfer– using telephone
The traits may be fingerprints, hand lines..
geometry, facial geometry, retina The only pre-requisite for the use of this
patterns, voice recognition, and finger print scanner is a personal
handwriting recognition. identification card. We hope that this
In this paper we have used thumb system proves to be efficient and enables
impression for the purpose of voter the people to be smarter in choosing
identification or authentication. As the their leaders.
thumb impression of every individual is
unique, it helps in maximizing the SUMMARY OF DESIGN
accuracy. A database is created The main aim in designing this
containing the thumb impressions of all product is to provide the concept of the
the voters in the constituency. Illegal personal identity for each individual.
votes and repetition of votes is checked This is extended to a special case of
for in this system. Hence if this system is electronic voting machine concept. The
employed the elections would be fair and summary of the design can be briefly
free from rigging. Thanks to this system explained diagrammatically as follows.
that conducting elections would no
I
longer be a tedious and expensive job. m
a
g
e
DESIGN
The design of the system consists of
the following important parameters
Opti
1. Scanning- using DSP Processor on
DATAB
ASE
REJECTION OF VOTER
REPETITION
After we have emerged out with a
solution to check voter’s identity in a
constituency, our next task is to see that a
particular person cannot vote more than
once i.e. to avoid multiple votes. This
task can be accomplished by simple
software technique employed. It consists
of two folders namely searched and
There is a flash ROM in which these
CHECKING FOR details can be stored.
MULTIPLE VOTES
OR ACCESSING THE
GIVEN VOTE FORMATION OF THE NETWORK
LIVE SCAN OF
FINGER PRINTS The voting machines present in a
town are interlinked in the form of a
VERIFICATION
highly secure LAN. This network is
OF
ACCEPTIBILITY formed with the help of the telephone
N
CHECK IF THE lines. All the data collected in the voting
O
VOTE IS REPEATED
system is first stored in the voting
ACCEPT Y
machine itself. Then it is sent to the
THE E
VOTE S HOST which will be located at
REJECT AND STORE
IDENTITY OF VOTERS headquarters of the town. All the data is
collected there and it is transferred to the
NOTIFICATION
main HOST. The purpose of saving the
OF VOTERS
NAME TO data in the voting machine at first is that
POLICE STATION
even if there is loss of data by some
means then it can be easily retrieved
The scanned vote is first checked with from the machine again. In this way all
the acceptability of the voter as the things are bought into a network.
explained in the first flow chart. If the
finger print is accessible then the data of
the specified person is taken into
account. The voter’s thumb impression is
verified with the previously cast votes. If
there is no match then the vote is
accepted and the count is increased by
one. If the vote matches with any of the
previous votes then the vote is rejected
and the person’s identity is stored and it
is given to the police for further enquiry.
These hosts are again grouped into
network through radio waves or again
telephone lines. Host is a device which
consists of a PROCESSOR and a RAM.
It will accept the data from all the voting
machines through telephone lines and it
will store the data in RAM (count of all
parties). Then it will add the count of
similar parties and store the count in
ascending or descending order and
display the result whenever it is
necessary.
Thus all the voting machines in
the state can be formed into a network.
The network can make use of RADIO
waves or TELEPHONE lines for the data
transfer.
ADVANTAGES: CONCLUSION:
less when compared to the like rigging. The citizens can be sure that