Three Tire Security System for Electronic Voting Machine

Authors

  • Dr.D.R.V.A. Sharath Kumar Professor & HoD, Malla Reddy Institute of Technology, Telangana, India Author
  • N. Soumya Assistant Professor, Department of ECE, Malla Reddy Institute of Technology, Telangana, India Author
  • Bhukya Ramesh Assistant Professor, Department of ECE, Malla Reddy Institute of Technology, Telangana, India Author
  • Thatikayala Sandeep Assistant Professor, Department of ECE, Malla Reddy Institute of Technology, Telangana, India Author

DOI:

https://doi.org/10.61841/cf458d51

Keywords:

Raspberry Pi Board (ARM11),X-bee wireless communication, RFID Technology, Biometric Module, GPRS, Sensor data acquisition, LINUX OS

Abstract

 India is the great hegemonic part planet, the choices that make up our nation's founding. Among the unquestionable guides, representative is running country and searching and checking for general community issues, bits authority and sacred updates. The bulk of the effort is to be straightforward in optional technology and to make validity options reasonable and to withstand any sound. Craze free races are important problem in current conditions 1, it likes finding needles in package that requires an eye and money is being spent to ensure that races are correct and unbiased. Security is also fundamental to defending voters, intimidating and settling on reasonable options for survey announcements. Regardless, nowadays, various awkward energy is involved in duplicate voting, and late launching has been blamed for choice abnormalities, leading to ambiguity between study results actual choice given by entire community. Building overview site voting systems that are close to various other PC-based voting systems to address challenges such as cost, voter error and vote checking. This project proposes another best class electronic voting machine diagram test for selective reliability, which relies on practical biometric construction using special fingerprint receipt close to idea near distance communication, to give a simple action 

Downloads

Download data is not yet available.

References

[1] J. Long and J. Wiles, No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder

Surfing. Boston, MA, USA: Congress, 2008.

[2] V. Roth, Kevin. Richter, and HR. "A Pin-Passage Technique Flexible Against Surfing" in Freedinger, Proc.

ACM ComputCommun. Security, 2004, pp. 236– 245.

[3] T. Kwon, S. The role of the. Shin, and S. Me, "Secret Attentional Surfing: Enemies Are More Effective Than

Ated," IEEE Trans. Syst., Man, Cybern., Syst., Vol. 44, no. 6, pp. 716– 727, June 2014.

[4] T. Kwon and J. Hong, "Testing and Modification Multifunctional Pin Passage Strategy for Surveying and

Recording Attacks," IEEE Trans. Infantry. Crime Scene Investigation Security, Vol. 10, no. 2, pp. 278– 292,

February 2015

Downloads

Published

18.09.2024

How to Cite

Three Tire Security System for Electronic Voting Machine. (2024). International Journal of Psychosocial Rehabilitation, 23(1), 449-454. https://doi.org/10.61841/cf458d51