Professional Documents
Culture Documents
Development of Android/ IOS Based Application To Access Aadhar Database For Utilization in General Elections - Aadhar Based Electoral Application
Development of Android/ IOS Based Application To Access Aadhar Database For Utilization in General Elections - Aadhar Based Electoral Application
Development of Android/ IOS Based Application To Access Aadhar Database For Utilization in General Elections - Aadhar Based Electoral Application
# Dept. of Electronics and Physics, GIS, GITAM University, Visakhapatnam, INDIA, 530 045
! Research scholar, Dept. of Electronics and Physics, GIS, GITAM University, Visakhapatnam,
INDIA, 530 045
Abstract:
Based on the latest technology called - IoT (Internet of Things), now a days, IoT
becomes an essential and emerging technology. And by utilizing the aadhar database, we would
like to propose an android/iOS based application named as Aadhar Based Electoral
Application. This application is proposed to be base on aadhar database to elect the contestant
in a particular constitution. Since aadhar is fulfilled with all the requirements and having
complete database of each and every person. A prototype application was developed and tested.
And this application with some modifications can also be useful for surveys and for online
process.
Keywords: IoT, Aadhar database, Voter ID card, Finger print scanner and 3G/4G connected
smart phone
Introduction:
Hardware construction:
Functional Procedure:
1. Install the above said Aadhar Based Electoral application in the smart phone
3. Then the application starts authenticating the user by asking the following details
c. Constituency
d. Voter ID
e. Aadhar card number
4. Once the application found that the above details are matched with aadhar database and
those are correct, then it will ask for the finger print option for further verification [9]
5. Once the finger print was matched then the application will fetch the contestants details
along with their details
7. If the entered OTP was correct, the vote has been registered, it will be added to count
application in the server
8. After the election time was elapsed, the counting team can be able to retrieve the database
from the server for counting purpose
By using this application we can declare the results within one hour of time, after voting
completed.
Step 7: access granted for vote Step 8: access denined for vote
Conclusions:
Based on IoT and by utilizing the aadhar database, here we proposed an android/iOS
based application named as Aadhar Based Electoral Application. This application is proposed
to be base on aadhar database to elect the contestant in a particular constitution. Since aadhar is
fulfilled with all the requirements and having complete database of each and every person. A
prototype mobile phone application was developed and tested. Above screenshots from step 1
through step 8 are the evidences for the proper functionality of the application, and this
application with some modifications can also be useful for surveys and for any other online
processed is also a low-cost process [11].
[1] Tech Target (2014) What is Internet of Things (IoT)?Definition from WhatIs.com.
http://whatis.techtarget.com/definition/Internet-of-Things
[2] OReilly Radar (2014) #IoTH: The Internet of Things and Humans.
http://radar.oreilly.com/2014/04/ioth-the-internet-of-things-and-humans.html
[3] Studio Science (2015) Interaction Design within the Internet of Things.
http://studioscience.com/interaction-design-within-the-internet-of-things/
[4] Siorpaes, S., Broll, G., Paolucci, M., Rukzio, E., Hamard, J., Wagner, M. and Schmidt, A.
(2006) Mobile Interaction with the Internet of Things. Adjunct Proceeding of Pervasive 2006
Late Breaking Results
[5] K. Ashton, "That Internet of Things Thing," RFiD Journal, vol. 22, pp. 97-114, 2009
[6] J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, "Internet of Things (IoT): A vision,
architectural elements, and future directions," Future Generation Comput. Syst., vol. 29, pp.
1645-1660, 9, 2013
[7] H. Ning and H. Liu, "Cyber-Physical-Social Based Security Architecture for Future Internet
of Things," Advanced in Internet of Things, vol. 2, pp. 1-7, 2012.
[8] I. J. L. Encarnao. (28-29 November 2012). Mobile Empowerment for the socio-
economic development [ONLINE]. Available: http://euroafrica-ict.org/wp-
content/plugins/alcyonis-event-agenda//files/Mobile_Empowerment_for_socio
conomic_development.pdf.
[9] P. Henry, J. Williams and B. Wright. The SANS survey of digital forensics and incident
response: A SANS whitepaper. 2013 Available: https://blogs.sans.org/computer-
forensics/files/2013/07/sans_dfir_survey_2013.pdf.
Palma, D., Agudo, J.E., Snchez, H. and Macas, M.M. (2014) An Internet of Things Example:
[10] Kulkarni, S.S. and Padgilwar, R.S. (2014) Automation over Internet & Android App Using
RTOS. International Journal of Computer and Electronics Research, 3, 43-48.
[11] Fisher, D.K. and Gould, P.J. (2012) Open-Source Hardware is a Low-Cost Alternative for
Scientific Instrumentation and Research. Modern Instrumentation, 1, 8-20.
http://dx.doi.org/10.4236/mi.2012.12002