Saturday, April 6, 2019

Biometrics Voting System Essay Example for Free

Biometrics Voting System EssayBiometrics is the barrier given to the use of biological traits or behavioral characteristics to identify an individual. The traits may be fingerprints, hand geometry, seventh cranial nerve geometry, retina patterns, voice recognition, and handwriting recognition. In this paper we have used tack icon for the purpose of voter identification or authencetication. As the thumb mould of every individual is unique, it helps in maximizing the accuracy. A informationbase is created containing the thumb impressions of alone the voters in the constituency. Illegal votes and repetition of votes is checked for in this system of rules. Hence if this system is employ the elections would be fair and free from rigging. Thanks to this system that conducting elections would no longer be a obtuse and expensive job. formula The design of the system consists of the following important parameters. 1. S rearning- using DSP Processor 2. Searching- based on the p rinciple of GOOGLE SEARCH 3. Networking- all the election booths ar machine-accessible in a network 4. information transfer using telephone lines.. The only pre-requisite for the use of this finger print s shadowner is a ad hominem identification card.We hope that this system proves to be efficient and enables the people to be smarter in choosing their leaders. SUMMARY OF DESIGN The of import aim in designing this product is to provide the concept of the personal individuation for separately individual. This is extended to a special case of electronic suffrage machine concept. The summary of the design foot be briefly explained diagrammatically as follows. digit-1. 1 Block Diagram of Design As ab initio at time of distributing voting cards. At the time of voting, the option of the voter is interpreted along with the finger print.The finger print taken by the scanner is sent to the DSP chip through an in-built A/D converter. The processed figure is transferred to hard disk with biasing of SDRAM. The option entered by the voter is transferred to chip through DEMUX and is stored in the memory. If the transferred image is ascertained with whatever of the records in the selective information base, then the interrupt is given by the HARD harrow to DSP chip. Then the option is considered in the count. After the acquisition of the count this is transmitted to the troops computer or central server using telephone lines.As the count of each party is transmitted to the HOST from all the VOTING MACHINES present in the constituency, the HOST bequeath add parallel count of peculiar(a) party and makes the final count of each party in ascending order. The final count is transferred to the main HOST (head quarters) using either telephone lines or receiving set waves. DESCRIPTION OF THE VOTING MACHINE flesh1. 2- Description of voting machine BLOCK DIAGRAM FOR THE WHOLE PROCESS IN BRIEF Fig1. 3-Block diagram of the process. VOTING SYSTEM The detailed desc ription of each and every internal unit in the VOTING SYSTEM is given below.It can be divided in to the following main categories. leaf PRINT SCANNER The finger print scanner consists of the following parts 1. FINGER PRINT detector This is used to scan the thumb impression. The information obtained from this is analog in nature. This is transferred to the A/D converter for hike processing. 2. A/D CONVERTER This is used to convert the analog data from the SENSOR into the digital data and transfer it to the processor. 3. FLASH ROM This is for the storage of the data temporarily in the DSP processor. This leave alone work until the data is transferred to the main memory of the HOST. 4.DSP CHIP This is used to receive the data and process it. This is connected to the USB port for supercharge transfer of the data. 5. USB PORT The sole purpose of the USB port is to establish a communication link between the DSP processor and the MEMORY (DATABASE). Fig2. 1-Scanning Process EXTRACTION OF THUMB IMPRESSION Fig2. 2-Extraction of thumb impression The next step in the process is the extraction of the thumb impression from the memory. The features of the finger print are stored in the form of pixels. This is bring forward sent for pattern matching where the finger print is then compared with the records in the database.If the pattern matches with all one of he records then the vote is accepted. If the feature doesnt match with any one of the finger prints stored in the data base then the vote is rejected. Fig2. 3- Storage of Database lineament EXTRACTION AND COMPARISON SCANNING AND PROCESSING The biometric sensor scans the image. This so scanned data is in the analog form. This is reborn into digital form by using an A/D converter. Since the image is to be transferred quickly to the converter, it is interfaced in parallel with the DSP chip. The data received from the parallel in ports is further processed in the chip.Parallel interfacing is through to have a quick performance. TRANSFER OF PROCESSED DATA TO THE HARD harrow The data which is processed in the DSP chip (finger print) is transferred in parallel to the HARD DISK for searching process. The BIOS language of the HARD DISK is stored in SDRAM which is also interfaced in parallel with the chip. This helps the chip to transfer the image to the HARD DISK for further process. The image transferred to the HARD DISK is compared with that of the DATA BASE. The circuit connections for the process explained are as shown below.A DE-MULTIPLEXER is connected to the scuttlebutts in parallel to the chip. The option which is given is transferred to the chip in binary form. Fig2. 4-DE-MUX used in the process. E. g. 1. Party one, 2. Party two, 3. Party three, 4. Party four. Suppose if the option is two then the binary data transfer to the ports is 0010. DE-MULTIPLEXER is designed according to the number of parties present in the constituency. The transferred data is stored in a 16-bit archives acco rding to their option. After counting takes place the count of each party is transferred to the transmitter.A transmitter is interfaced serially to the DSP chip. The transmitter data is transferred through the telephone lines to the HOST. The counts of similar parties are added at the host and the data is transferred to the sound out HEAD QUARTERS (main HOST) to display the result of the particular constituency. VERIFICATION VERIFICATION OF VOTERS Fig3. 1-Verification of Voters Here the identity of a person is checked whether heshe belongs to the particular constituency or not. The machine which takes the finger print of the person checks it with the data base already stored in it.If the finger print matches it will give access to the person to coil his vote and if it doesnt match any of the finger prints stored in the data base then it will reject the voter. Thus his method will enable the members of that particular constituency only to vote. This can be taken as the first step t o avoid rigging. To have a faster performance the searching proficiency is implemented on the basis of GOOGLE SEARCH. The process in the form of a flow chart is as given below. PROCESSING AND COUNTING Fig3. 2-Counting Process.After the person gets the PROCEED symbol from the voting machine, at that place appears a harbour on which all the parties names along with the symbols are present. The person should select any one of the party by giving the number allotted to that particular party as input through the keypad. After the option is selected the voter is prompted for a confirmation. In case the voter enters an invalid number, the screen reappears and heshe is prompted to cast the vote again. Then according to the option selected, the vote count of the particular party gets incremented by one.Finally, at the end of the day, the position of the parties in terms of the total votes cast can be known. A very simple flow chart for the above process is as shown below REJECTION OF VOTER repeating Fig3. 3-Rejection cylinder block diagram After we have emerged out with a solution to check voters identity in a constituency, our next task is to see that a particular person cannot vote more than once i. e. to avoid multiple votes. This task can be accomplished by simple software technique employed. It consists of two folders namely searched and unsearched. Initially the searched folder consists of no images.The thumb impression images of all the voters of a constituency will be present in the unsearched folder. As and when a vote is cast, the image of the particular voter gets transferred to the searched folder. The searched folder is programmed such that an image cannot be present more than once in this folder. So when a voter casts multiple votes the exception is generated and an alarm is raised and even the police can be informed about the identity of the intruder indulging in this illegal activity. This is shown in the block diagram given belowThe scanned vote is first checked with he acceptability of the voter as explained in the first flow chart. If the finger print is accessible then the data of the specified person is taken into account. The voters thumb impression is verified with the previously cast votes. If there is no match then the vote is accepted and the count is increased by one. If the vote matches with any of the previous votes then the vote is rejected and the persons identity is stored and it is given to the police for further enquiry. There is a flash ROM in which these details can be stored. NETWORK FORMATION OF THE NETWORKThe voting machines present in a town are interlinked in the form of a highly effective LAN. This network is formed with the help of the telephone lines. All the data collected in the voting system is first stored in the voting machine itself. Then it is sent to the HOST which will be placed at headquarters of the town. All the data is collected there and it is transferred to the main HOST. The purpos e of saving the data in the voting machine at first is that even if there is loss of data by some means then it can be easily retrieved from the machine again. In this way all the things are bought into a network.Fig4. 1-Formation of the network These hosts are again grouped into network through radio waves or again telephone lines. Host is a device which consists of a PROCESSOR and a RAM. It will accept the data from all the voting machines through telephone lines and it will store the data in RAM (count of all parties). Then it will add the count of similar parties and store the count in ascending or descending order and display the result whenever it is necessary. Thus all the voting machines in the state can be formed into a network. The network can make use of receiving set waves or TELEPHONE lines for the data transfer.CONCLUSION ADVANTAGES 1. The system is highly reliable and secure. 2. In the long tie the maintenance cost is very less when compared to the present systems. 3. Illegal practices manage rigging in elections can be checked for. 4. It is possible to get instantaneous results and with high accuracy. CONCLUSION Thus the advent of this biometric thumb impression voting system would enable hosting of fair elections in India. This will preclude the illegal practices like rigging. The citizens can be sure that they alone can choose their leaders, thus exercising their right in the democracy.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.