Broad scan comprises on how the research was being carried out. This steps comprises of activities that too place every day of the research and the comment on the same. It also comprises of the materials that assisted the research process.
Day |
Task |
Action |
Comment |
11/8 |
Literature reading |
Read two journals that talks about biometric systems that have been used in several countries around the world. |
The books had several examples of the systems and how to implement the system. |
12/8 |
Consulting the tutors |
Take the record book on the research and listen to the course adviser on the automated system and how to maximize the outcome of the research |
The tutors were so resourceful with positive comments about the research. |
13/8 |
Field work |
Move from one IT company to another to consult them on the resources that are required to implemented the biometric system of voter registration. |
The day was prosperous but faced some difficulties such as some companies could allow people to get into their premises. |
14/8 |
Searching for the available data online to establish on how to implement the system. |
The online platform had maximum amount of data including journals and videos that could explain more about the system. |
Gained a lot of knowledge concerning the research question. |
15/8 |
Analyzing the data |
The large amount of data was much disorganized and there calls the need of arranging them to get the most important facts out of them. |
The information had been filtered to manageable size. |
16/8 |
Critical analysis |
On all the journals, there were some that had negative impacts on the research. Therefore this day was to do critical analysis on the available resources |
At this point some sources seemed much less important on the research. |
17/8 |
summarizing |
After the analysis it was important to come up with the final document about the research topic citing risks and how to manage the risks |
The process gave much understanding about the topic on the research. |
Source |
Keyword used |
No.Returned literature |
No. Collected Literature |
VU Library |
1. Bioetric system 2. Automated voter registration 3. Voting system |
265 422 124 |
23 25 23 |
Digital databases |
1. Online voting system 2. Biometric voter registration 3. Automatic vote count system 4. Tallying system for votes |
362 34 21 12 |
12 34 14 1 |
Search engine |
1. Voting system 2. Automatic voter registration 3. Online voting system |
342 276 312 |
1 4 45 |
After critical reviewing the literature collected above, biometric voting system assist in preventing several crises that comes during the election time. An example of a stalemate is the delay in the providing the results that had been collected on a polling station (Saini, Verma, and Sharma, 2017). Another important problem that is solved through the use of the online voting system is double entry of results due to the repeated counting of the similar data. This leads to errors in the final result. However, there things that the country should put in place before implementing the biometric system. Examples of the resources include the hardware requirements which must be secure and strategically arranged. Apart from the above benefits, there may exist challenges with this system. Like for instance, lack of skilled personnel to run the system, network errors in the remote areas among other factor. Other literature materials did not contribute much to the above information therefore the necessary to filter them out during the research.
Source |
Keyword used |
No.Returned literature |
No. Collected Literature |
VU Library |
4. Biometric system 5. Automated voter registration 6. Voting system |
265 422 124 |
1 1 1 |
Digital databases |
5. Online voting system 6. Biometric voter registration 7. Automatic vote count system 8. Tallying system for votes |
362 34 21 12 |
1 1 1 1 |
Search engine |
4. Voting system 5. Automatic voter registration 6. Online voting system |
342 276 312 |
1 1 1 |
Reddy, B.M.M. and Srihari, D., 2015. RFID Based Biometric Voting Machine Linked To Aadhaar For Safe And Secure Voting. International Journal of Science, Engineering and Technology Research (IJSETR) Volume, 4.
Kumar, R.S., Anusha, S., Ashwini, J., Darshana, A. and Dharani, E., 2018. Bio-Metric Voting System Using Aadhaar Card Irrespective of Location. International Journal of Creative Research Thoughts (IJCRT), 6(1), pp.1356-1360.
In this section, the approach of the author on the implementation of the information technology system should be designed as elaborated on the sections.
In this section, (Reddy and Srihari, 2015), suggest that before implementing the online voting system, it is important to establish why that system is necessary. At this moment, it elaborates on the challenges the country might have been facing to make them recommend the automated system use.
An example illustrated here is where the American use the automated system to vote in the new leaders. The system has been very fast in delivering the results and in most cases there are no continuous errors in the results (Reddy and Srihari, 2015).
The automatic voting system have various functionalities that assist it in achieving the goal of a free and fair election. The system has databases that store a very large amount of data. The following are the architecture as prosed in book.
The automated system has a cloud database that assist in storing data for security (Reddy and Srihari, 2015). The cloud dataset would give the users the confident that it is the best way to conduct an election in any country. The details of the citizens are protected and therefore it can be difficult to hack it.
This the second architecture that this system make use of in implementing the security issues. In layering some things are hidden from the ordinary users (Reddy and Srihari, 2015).
Another interesting solution for the investigated problem is the voting system adopted in USA (Kumar, Anusha, Ashwini, Darshana and Dharani, 2018: p.1358), it is an automated system that is less prone to the errors. In many years, the system has been providing quick result after the process of voting is complete.
The network design architecture is what the illustration in this literature proposes while implementing this system. In the network design, the modules of the system
There are several instances where the system has been tested and is working effectively. The examples here are schools, small offices and other religious institutions.
The result of the test is that the system has been working well (Kumar et la.,2018). However, there are some issues such as power, hackers among other challenges that the organization should look into while implementing the system.
The first paper differs on the second in some ways. For instance, (Kumar et al.2018) seems to be more details on the functionalities that the system requires to work efficiently. However, the first paper, (Reddy and Srihari, 2015), seems to use figures and tables to explain on how the system is going to interact with the users.
The two selected journals in the previous sections has more data concerning on how to implement the biometric voter system. The two journals have some common procedures that guides one while implementing the system. For an example all the journals illustrate that thorough analysis is important before having the system in place. There are other issues for instance the security measures that the country should have before having the system in place. However, the two journals differ on the type of the architectures that one can use. One journal emphasizes on the network design while one focus on the hierarchical system.
The aim of the system is to solved the loses that the country undergoes when the other opponents are not satisfied with the outcome of the election. The manual system allows people to change date without the consent of the authority, however, the online system will ensure that there is only one point of authorization and the decision would be final.
The examples that are cited here are the university student leadership voting system where when a student is registered in the system, he or she just log in and elect leader of the choice then admin can review the result on the other end.
The automated voting machine would require constant improvement because of the upcoming IT issue every day. For instance, the automated teller machine in the bank always undergo maintenance services to ensure that the system is working correctly. However, the users would require training to ensure they do the required things. Despite all the benefits, the system can end up in some challenges and therefore expert should be ready to work on the same.
The best way to have the system is to implement all the types of architectures such layering, components and services that the system will give the best feedback to the users (Alim, Baig, Mehboob and Naseem,2017: p.103H).
The general experiment from the two literatures is that the challenges are inevitable while implementing the system. However, it is cost effective because the country will income more only at the initial stage but save more resources in the subsequent implementation of the system (Alim, Baig, Mehboob and Naseem,2017: p.103H).
The above literature that have been analyzed above have divergent views on how to implement the online system of voting system. All the proposals aim at making the system better. On the other hand, it is important to analyses all the necessary literature come up with sound decision in making the system.
Conclusion
In conclusion, online system is an effective way of managing elective. However, it can be messy when one has not followed the steps in coming up with the system. Therefore, analysis is necessary in implementing the system.
After analyzing all the above literature books, it is now with confident that all the resources available to implement an online voting system the best system to use in conducting an election (Awan, Ijaz, Qureshi, Zahid, Ali and Tariq, 2016). However, there are risk that may be associated with the system. The country should be ready with expertise that can handle the challenges.
References
Alim, M.A., Baig, M.M., Mehboob, S. and Naseem, I., 2017, June. Method for secure electronic voting system: face recognition based approach. In Second International Workshop on Pattern Recognition (Vol. 10443, p. 104430H). International Society for Optics and Photonics.
Awan, F.G., Ijaz, M.F., Qureshi, S.A., Zahid, A., Ali, M.Z. and Tariq, A., 2016. AN AUTOMATED DRE BIOMETRIC VOTING SYSTEM WITH VVPAT FEATURE. Science International, 28(3).
Chakraborty, S., Mukherjee, S., Sadhukhan, B. and Yasmin, K.T., 2016. Biometric voting system using Aadhaar card in India. Int J Innov Res Comput Commun Eng, 4(4).
Karim, M.M., Khan, N.S., Zavin, A., Kundu, S., Islam, A. and Nayak, B., 2017, December. A proposed framework for biometrie electronic voting system. In Telecommunications and Photonics (ICTP), 2017 IEEE International Conference on(pp. 52-56). IEEE.
Kumar, R.S., Anusha, S., Ashwini, J., Darshana, A. and Dharani, E., 2018. Bio-Metric Voting System Using Aadhaar Card Irrespective of Location. International Journal of Creative Research Thoughts (IJCRT), 6(1), pp.1356-1360.
Ranjitha, K., Sundaram, S.S., Sethuraman, S., Sowndrya, V. and Sivaraj, K., 2016. Biometric Based Secured Electronic Voting System. Biometrics and Bioinformatics, 8(5), pp.107-112.
Reddy, B.M.M. and Srihari, D., 2015. RFID Based Biometric Voting Machine Linked To Aadhaar For Safe And Secure Voting. International Journal of Science, Engineering and Technology Research (IJSETR) Volume, 4.
Saini, N., Verma, H. and Sharma, M.P., 2017. An Analytical study of E-voting System.
Stephen, M.S.G.M., 2017. Aadhar based electronic voting system using biometric authentication and iot. International Journal of Recent Trends in Engineering Research (IJRTER).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download