Three Tire Security System for Electronic Voting Machine
DOI:
https://doi.org/10.61841/cf458d51Keywords:
Raspberry Pi Board (ARM11),X-bee wireless communication, RFID Technology, Biometric Module, GPRS, Sensor data acquisition, LINUX OSAbstract
India is the great hegemonic part planet, the choices that make up our nation's founding. Among the unquestionable guides, representative is running country and searching and checking for general community issues, bits authority and sacred updates. The bulk of the effort is to be straightforward in optional technology and to make validity options reasonable and to withstand any sound. Craze free races are important problem in current conditions 1, it likes finding needles in package that requires an eye and money is being spent to ensure that races are correct and unbiased. Security is also fundamental to defending voters, intimidating and settling on reasonable options for survey announcements. Regardless, nowadays, various awkward energy is involved in duplicate voting, and late launching has been blamed for choice abnormalities, leading to ambiguity between study results actual choice given by entire community. Building overview site voting systems that are close to various other PC-based voting systems to address challenges such as cost, voter error and vote checking. This project proposes another best class electronic voting machine diagram test for selective reliability, which relies on practical biometric construction using special fingerprint receipt close to idea near distance communication, to give a simple action
Downloads
References
[1] J. Long and J. Wiles, No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder
Surfing. Boston, MA, USA: Congress, 2008.
[2] V. Roth, Kevin. Richter, and HR. "A Pin-Passage Technique Flexible Against Surfing" in Freedinger, Proc.
ACM ComputCommun. Security, 2004, pp. 236– 245.
[3] T. Kwon, S. The role of the. Shin, and S. Me, "Secret Attentional Surfing: Enemies Are More Effective Than
Ated," IEEE Trans. Syst., Man, Cybern., Syst., Vol. 44, no. 6, pp. 716– 727, June 2014.
[4] T. Kwon and J. Hong, "Testing and Modification Multifunctional Pin Passage Strategy for Surveying and
Recording Attacks," IEEE Trans. Infantry. Crime Scene Investigation Security, Vol. 10, no. 2, pp. 278– 292,
February 2015
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Author
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.