Creative Stellars: Voice of Student

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 26

CREATIVE STELLARS

VOICE OF STUDENT

TEAM MEMBERS
 P. DINESH KUMAR 15F61A0528
 C. HARI KRISHNA 15F61A0540
 K. MANOJ 15F61A0572

Under the esteemed guidance of


Prof. Dr. P RAMESH BABU
Department of cse, SIETK,Puttur
CONTENTS
 Introduction
 Abstract
 Literature Survey
 Existing system
 Proposed System
 System Requirements
 Architecture
 Modules
 Implementation
 Screen shots
 Conclusion
 Future Enhancements
 References
INTRODUCTION

• Democratic voting is a crucial and serious event in any


country. Digital voting is the use of electronic devices,
such as voting machines or an internet browser, to cast
votes. Security of digital voting is always the biggest
concern when considering to implement a digital voting
system. One way the security issues can be potentially
solved is through the technology of blockchains. With the
use of blockchains a secure and robust system for
digital voting can be devised.
ABSTRACT
• Creative tellars is a one stop blog for B.Tech students. It is a
place where student can find Study Material’s, Previous year
Question papers which make them easy to prepare for the
Examinations. Students can share and discuss their views
about the things that happen inside the campus by logging in
the Chat Rooms. Doubts of a student in Academics/about
career may get cleared by the discussions that take place in the
Discussion Forum. The better way to test a student’s
knowledge to conduct Quizzes and encouraging them by
displaying the Leader board for each Quiz.
LITERATURE SURVEY
• The first work on a cryptographically secured chain of blocks
was described in 1991 by Stuart Haber and W. Scott Stornetta.
They wanted to implement a system where document
timestamps could not be tampered.
• Block chain was invented by a person using the name Satoshi
Nakamoto in 2008 to serve as the public transaction ledger of
the cryptocurrency.
• The key persons Sujatha Rangarajan T. N. Swamy were behind
the development of the Electronic Voting Machine.
• The Indian EVMs are purposely designed as stand-alone units to
prevent any intrusion during electronic transmission of results.
EXISTING SYSTEMS
The same system which is implemented in
blogspot which is Google product and free of cost.

It is implemented in
www.creativestellars.blogspot.in. We also have
JNTUA world for the study material’s and
previous year question papers ,but not in depth .

 There is only the web pages for In that website


but no Stuff of material’s
DRAWBACKS OF EXISTING
SYSTEM
• We can find less amount of study materials in that
website
• When we click on a subject’s link it redirects to the
same page
• No discussion forums are available in that JNTUA
website
• Chat rooms is also not available
• Quizzes are also not there to take part
PROPOSED SYSTEM

• To overcome the difficulties faced by students in the


websites which are maintained by the JNTUA , we
thought and proposed a new idea where the problem
for getting the study material’s is solved and students
doubts are also get solved . To overcome all the
problems CREATIVESTELLARS is the best choice
for the students. As it was a student maintained
website , he knows better than them(JNTUA) “what
actually a student needs” .
ADVANTAGES OF PROPOSED
SYSTEM

• Study materials include detailed notes/text books/2


marks/unit wise pdfs/PPT
• Conducting Quizzes on student point of interest
• Discussion forums available in the site to discuss
on various topics which they are interested
• Chat Room are there for study to chat on the things
which happen inside the campus
SYSTEM REQUIREMENTS
Hardware Requirements:
• System : I3 processor
• Hard Disk : 500 GB
• Ram : 4 GB

Software Requirements:
• Operating system : Windows 8.1
• Coding Language : Java Script, CSS, HTML5,
• Data Base : Go daddy Web Host
AUDIT TRAIL ARCHITECTURE
BLOCK CHAIN WORKING
• A blockchain is designed to be accessed across a peer-to-
peer network.
Once connected to the network, peers start sending
messages about other peers on the network.
DATA FLOW
DIAGRAM

1. Requesting to vote
2. Casting a vote
3. Encrypting votes
4. Adding the vote to
the Blockchain
SHA
ALGORITHM

Each block in the stack is


identified by a hash placed
on the header. This hash is
generated using the Secure
Hash Algorithm to generate
almost fixed size 256-bit
hash.
CREATION OF
NEW BLOCK

Each header contains


information that links a
block to its previous
block in the chain, which
creates a chain linked to
the very first block ever
created, which is referred
to as the foundation
MODULES
• Registration module
• The registration module presents the login form for the
voter to sign in. Initially, User has to register with their
unique identity(Aadhar id). After the registration the voter
can sign in and enter into the Online creation module if the
details are given correct.
• Online election creation module
• The online election creation module generates voters
particulars such as religious leader, the party symbols and
the start and end periods of the voting. The user can vote on
their preferred leader and click on submit button to place
the vote.
Results module
• The results module provide the voter with summary
numbers of the voters who voted as well as. Here the admin
has the authority to view the votes that was voted by the
user and can evaluate them.
Blockchain module
• To compromise the votes, hackers would need to hack most
of the blocks before new blocks were introduced. The
blockchain’s audit trail ensures that no vote has been
changed or removed and that no fraudulent and illegitimate
votes have been added.
IMPLEMENTATION
HOME PAGE
REGISTRATION
ONLINE ELECTION CREATION
ADMIN
CONCLUSION

• The idea of adaption of digital voting systems is to make


the public electoral process cheaper, faster and easier, is a
compelling one in modern society.
• For e-voting to become more open, transparent, and
independently auditable, a potential solution would be base
on blockchain technology.
• This paper explores the potential of the blockchain
technology and its usefulness in the e-voting scheme.
FUTURE ENHANCEMENTS

• However, in its current state it might not reach its full


potential.
• It should be made dynamic when implemented in real time.
Few more modules to be added in future to make it still
more effective.
• More details of voter to be added to make it effective. It
should be taken to the government to make them know
about the reliability of the project.
REFERENCES
• Priyanka S. Kedar, Vrunda Bhusari, “Using PBKDF2 Pair & Hybrid
technique for Authentication”, International Journal of Emerging
Research in Management & Technology (ISSN) 2278-9359, Volume-3,
Issue-5, May 2014.
• M Shashi, M Anirudh, MD Sultan Ahamer, V Manoj Kumar,
“Authentication Schemes for Session Password using colors and
Images”, International Journal of Network Security & Its Applications
(IJNSA), Vol.3, No.3, May 2011.
• Priti Jadhao, Lalit Dole, “Survey on Authentication Password
Techniques”, International Journal of Soft Computing and Engineering
(IJSCE) ISSN: 2231-2307, Volume-3, Issue-2, May 2013.

You might also like