Preview

E Voting

Powerful Essays
Open Document
Open Document
4091 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
E Voting
CHAPTER I
THE PROBLEM
Purpose and Background of the Study
Computer is indeed one of great technological inventions that trigger future change. Computers nowadays have infiltrated every aspect of the society. In the Philippines, the students use the technology easily by using the computer or any gadgets. The election system is modern. By using a system, many people find it easily to vote because they will no longer vote manually. Computerized election system is the best way to use rather than the manual election. Among the different biometric techniques, facial recognition may not be the most reliable and efficient. However, one key advantage is that it does not require aid (or consent) from the test subject. Properly designed systems installed in airports, multiplexes, and other public places can identify individuals among the crowd. Other biometrics like fingerprints, iris scans, and speech recognition cannot perform this kind of mass identification. However, questions have been raised on the effectiveness of facial recognition software in cases of railway and airport security. Facial recognition systems are also beginning to be incorporated into unlocking mobile devices. The android market is working with facial recognition and integrating it into their cell phones. Face recognition has created an application called Visidon Applock. This application allows you to put a facial recognition lock on any applications. This allows increasing the safety of the private applications and content. Facial recognition technology is already implemented in the iPhoto application for Macintosh. Also, in addition to biometric usages, modern digital cameras often incorporate a facial detection system that allows the camera to focus and measure exposure on the face of the subject; thus, guaranteeing a focused portrait of the person being photographed. Some cameras, in addition, incorporate a smile shutter, or take automatically a second picture if someone closes his/her eyes

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and with new hairstyles (Allensmith).…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There is a massive disagreement in the present day concerning the biometric identification technology which is used to boost the security through travel. The research inside these technologies has been used to extend ways in how the individuals identify faces for detection and develop the similar strategy in a replicated mechanical system that will scan faces and conclude their likeness with those in a database.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The new technologies of future policing provide a number of invaluable uses. Facial recognition would allow law enforcement to identify criminals in real time through facial recognition matched criminal databases, wanted posters,…

    • 673 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Approval Voting

    • 287 Words
    • 2 Pages

    Yes, I believe that the United States ought to switch to a different method of voting. In my opinion, the current method is imbalanced since the Electoral College votes decide the final candidate for the presidency. However, I would prefer the Approval Voting method, which I consider better than the current method (plurality method). A method in which the candidate with the most first place votes wins (Math in our word by Sobecki & Bluman, p. 788). Looking back at the campaign in 2000, many people believe that Nader siphoned votes from Gore and likely threw the election to Bush. Something that has being seem repeatedly in American election history. Just to name a few, 1848, 1884, and 1912. Permitting the second most popular candidate to…

    • 287 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The design makes use of a finger print scanner, a face scanner and a motion capture suit. Users are enrolled using the three sensors, face scanner, finger print scanners and motion capture. When users are to be identified, a threshold is set for all the biometric devices during testing and training, the database searches for a match based on the three sensors and a decision to accept or reject is…

    • 553 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    A second form of technology that has been around is Facial Recognition technology. Facial recognition has been around for three decades. But mobile and social revolutions are rapidly driving the field forward, as digital photos proliferate, cloud computing powers accelerate and software capabilities advance. Tech giants including Google, Apple, Microsoft, and Yahoo also employ facial recognition technology in photo, video and gaming products, as do a handful of lesser known mobile application companies. Facial recognition is a computer application for automatically identifying of verifying a person from digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features rom the image and a facial database.…

    • 1280 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    E Voting System Abstract

    • 295 Words
    • 2 Pages

    1. Voter will be able to vote only if he is authenticated. He should give his ID and password.…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When a business like Hong Leong group relies mainly on mobile devices, it must consider insisting its employees as well as customers to install mobile security software programs in their devices. Installing of security software like Antivirus and firewall can prove to be of great help. These programs detect and prevent any malicious software from entering the systems. Also software regarding visual notification and Biometric identifications can be used. Visual Notifications tend to warn the user of any unauthorized action that is happening on his device. Biometric Identification is a far superior technique of user identification and access to the device than password protection. It relies on identification of a person and granting him access to the device based on his morphology like fingerprint, eye retina images etc. As morphology of ever person is unique it provides a very…

    • 856 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Automated Election

    • 5647 Words
    • 23 Pages

    The Precinct Count Optical Scan (PCOS) or Optical Mark Reader (OMR) technology system adopted by the Commission on Elections (Comelec) under the present political conditions and capability of the nation’s election manager, the Comelec, will make the whole electoral process bereft of credibility, transparency, or voter participation. With no electronic technology being invented that is safe from human intervention such as hacking and other types of computer attacks, the system will most likely lead to wholesale electronic cheating. Unbeknownst to the public and media, it will trigger a scramble for control of the key to the hardware and software technology among the moneyed and powerful. The May 2010 synchronized national and local elections where full automation or full electronic voting will be used for the first time is a major political event that should not be measured or prepared for solely on their installation of technology. It should be seen rather as one political exercise that remains dominated by the elite under the Arroyo government and where electronic technology may be manipulated to allow the oligarchs to remain in power. Such possibility has become stronger with the entrenchment of powerful fraud machineries, with the Comelec yet to solve its credibility problem and the overarching concern of election fraud is yet to be decisively addressed. The new technology system will be in the hands of these powers but the winning bidder which will most likely be a multinational company also shares this power. Under these conditions, the technology preferred by the Comelec will all the more reinforce the manipulative character of the traditional electoral process. The overall electoral struggle that seeks to bring progressive, non-traditional minds with a strong voice in Congress and in other elective positions has always included the campaign to make the Comelec independent and to have an open, transparent, and credible elections. The…

    • 5647 Words
    • 23 Pages
    Good Essays
  • Powerful Essays

    Voting System

    • 2581 Words
    • 11 Pages

    The Student Council elections have always been a perennial activity for every school. It is an activity wherein each student is required to choose from a set of candidates who will represent each position in the Student Council. In order for the student to accomplish this, the student must go through several processes. First the student must go to the Administration Office if he is a registered voter, then goes to the voting area and chooses the candidates he likes. After that, the student submits the filled-up ballot form to the voting administrator in order for his votes to be cast. Then the student is marked with an indelible ink to signify that he has already voted.…

    • 2581 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Mandatory Voting

    • 537 Words
    • 3 Pages

    Using the internet, find at least two articles on your topic. You can pay to print in the library, e-mail the articles to yourself, or write down the websites and look them up again at home. Every group member must find two articles, so that a group of 3 will have 6 total and a group of 4 will have 8 total.…

    • 537 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Voting System

    • 1483 Words
    • 6 Pages

    Proposed Title: Computerized Supreme Student Council S Voting System of Isabela National High School-Ilagan Campus…

    • 1483 Words
    • 6 Pages
    Good Essays