SlideShare a Scribd company logo
1 of 41
Creating A Unique Identity For Every Resident
Under The Guidance
Dr. T. Nambirajan
Professor
Department of Management Studies
School of Management
BY
GROUP 8
BASIL JOHN
PANCHAMI
SARITHA
GIRIDHARAN
KABILAN
JOEL JOSEPH
2
• Collection of interrelated data
• Set of programs to access the data
• DBMS contains information about a
particular enterprise
• DBMS provides an environment that it both
convenient and efficient to use.
•Database management systems were developed to
handle the following difficulties of typical file-
processing systems supported by conventional
operating systems
3
The Unique ID initiative
4
Principles of Aadhaar
One-time standardized Aadhaar enrollment establishes uniqueness of resident via
‘biometric de-duplication’
• Only one Aadhaar number per eligible individual
Online Authentication is provided by UIDAI
• Demographic Data (Name, Address, DOB, Gender)
• Biometric Data (Fingerprint)
Aadhaar :Subject to online authentication is proof of ID
Aadhaar enrollment / Update =
KYC
Aadhaar No. Issued,
stored in Auth. Server
“Verification” of KYC
(Authentication)
5
Features of Aadhaar
Aadhaar is a 12 digit number – No Cards
Random Number – No Intelligence
Standard Attributes – No Profiling or Application Information
All Residents including Children get Numbers
Introducer System
Partnership Model
Flexibile Authentication Interface to Partners
1
2
3
4
5
6
7
6
Benefits of Aadhaar (I)
• No fakes
• No duplicates
• To all with special focus on the marginalised and the
excluded
• Enable connectivity among databases
• Enable consolidation
Reduces
Leakages
Provides
Identities
Breaks
Silos
7
Benefits of Aadhaar (II)
• Financial inclusion
• Electronic transfer of benefits
• Security of transactions
• Access to services
• Mobility in various application
• Building up of applications
Enables
Enhances
Ensures
8
Registrar On-boarding Process
1. MoU with the State Government
2. Empowered Committee and Implementation Committee
3. Nodal Department and Registrar
4. KYR+ Fields
5. Vendor Selection
6. Enrolment Plan
7. IEC Activity
8. 13th
FC Funds
9. Monitoring the enrolment process
10.ICT Infrastructure
11.Aligning UID number to Databases & Government
Programmes
9
Enrolment Station
10
Enrolment Station
11
11
Demographic data fields captured during Aadhaar enrolment
Field Name Comments
Name PoI documents required
Date of Birth Approximate/ Declared/ Verified
Gender M/F/T
Address PoA documents required
Parent/Spouse/Guardian Name Optional (mandatory in case of child
below 5 years)
Introducer UID Where PoI/PoA not provided
12
Capture Demographic & Biometric Data
Optional data:
• Introducer data for verification
and/or
• Data of a relative who has a UID
number or an enrolment number
• Phone no., email address
Biometric Data
12
Resident’s Photograph
Resident’s
Finger Prints
Resident’s Iris
13
Aadhaar Letter
14
UID ecosystem –
A symbiotic network
Oil Ministry
States
LIC & Banks
Income TaxOil Cos.
LPG agencies
Branches
Field agencies
Food &
Supplies
Rural
Development
Social welfare
Ration shops
Registrar
Sub-registrar
Enrolling
agency
Continuous
monitoring and
feedback
15
UID Agencies
16
16
1
2
3
4
5
6
Enrollment Agencies
Registrars
KYR, Biometrics, KYR+
Resident
UIDAI
Banks / POSB
KYR, Biometrics
Aadhaar
Aadhaar, KYR,
Photo
Aadhaar Bank A/c
Financial Inclusion - Aadhaar enabled bank account
17
Process Workflow
Preparation
Activities
Enrolment
Activities
Ongoing
Activities
Verificatio
n
procedure
s
Demographic
& biometric
data capture
Data
transfer to
CIDR
CIDR
Rejections
identified
Biometric
De-
duplication
UID
Assignmen
t
Data Updation
Authenticatio
n
Certifications
Devices
Operators
Registrar
Readiness
MoU, committees etc
Process & Technology
Alignment
Prep Enrolments
Introducers
Operators, supervisors
Letter
Printing &
Delivery
Setup Enrolment
Centers
Devices, hardware,
software, connectivity
People, admin support,
logistics etc.
1
2
1
3
4
5
6
7
8
9
18
UID System
19
UID Architecture
20
ER Diagram Flowchart
21
Enrolment Data
• 600 to 800 million UIDs in 4 years
• 1 million a day with transaction, durability guarantees
• 350+ trillion matches every day
• ~5MB per resident
• Maps to about 10-15 PB of raw data (2048-bit PKI encrypted)
• About 30 TB I/O every day
• Replication and backup across DCs of about 5+ TB of incremental
data every day
• Lifecycle updates and new enrolments will continue for ever
• Enrolment data moves from very hot to cold, needing
multi-layered storage architecture
• Additional process data
• Several million events on an average moving through async
channels (some persistent and some transient)
• Needing insert and update guarantees across data stores
22
Authentication Data
• 100+ million authentications per day (10 hrs)
• Possible high variance on peak and average
• Sub second response
• Guaranteed audits
• Multi-DC architecture
• All changes needs to be propagated from enrolment data stores to
all authentication sites
• Authentication request is about 4 K
• 100 million authentications a day
• 1 billion audit records in 10 days (30+ billion a year)
• 4 TB encrypted audit logs in 10 days
• Audit write must be guaranteed
23
Aadhaar Data Stores
Mongo cluster
(all enrolment records/documents
– demographics + photo)
Shard
1
Shard
4
Shard
5
Shard
2
Shard
3 Low latency indexed read (Documents per sec),
High latency random search (seconds per read)
MySQL
(all UID generated records - demographics only,
track & trace, enrolment status )
Low latency indexed read (milli-
seconds per read),
High latency random search (seconds
per read)
UID master
(sharded)
Enrolment
DB
Solr cluster
(all enrolment records/documents
– selected demographics only)
Low latency indexed read (Documents per sec),
Low latency random search (Documents per sec)
Shard
0
Shard
2
Shard
6
Shard
9
Shard
a
Shard
d
Shard
f
HDFS
(all raw packets)
Data
Node 1
Data
Node 10
Data
Node ..
High read throughput (MB per sec),
High latency read (seconds per read)
Data
Node 20
HBase
(all enrolment
biometric templates)
Region
Ser. 1
Region
Ser. 10
Region
Ser. ..
High read throughput (MB per sec),
Low-to-Medium latency read (milli-seconds per read)Region
Ser. 20
NFS
(all archived raw packets)
Moderate read throughput,
High latency read (seconds per read)
LUN 1 LUN 2 LUN 3 LUN 4
24
Systems Architecture
•
Work distribution
using SEDA &
Messaging
•
Ability to scale within
JVM and across
•
Recovery through
check-pointing
•
Sync Http based Auth
gateway
•
Protocol Buffers &
XML payloads
•
Sharded clusters
•
Near Real-time data delivery to warehouse
•
Nightly data-sets used to build dashboards,
data marts and reports
•
Real-time monitoring using Events
25
Enrolment Biometric Middleware
• Distribute, Reconcile biometric data extraction and
de-dup requests across multiple vendors (ABISs)
• Biometric data de-referencing/read service(Http) over
sharded HDFS and NFS
• Serves bulk of the HDFS read requests (25TB per day)
• Locate data from multiple HDFS clusters
– Sharded by read/write patterns : New, Archive, Purge
• Calculates and maintains Volume allocation, SLA
breach thresholds of ABISs
• Thresholds stored in ZK and pushed to middleware
nodes
26
Event Streams & Sinks
• Event framework supporting different interaction/data
durability patterns
• P2P, Pub-Sub
• Intra-JVM and Queue destinations - Durable / Non-Durable
• Fire & Forget, Ack. after processing
• Event Sinks
• Ephemeral data consumed by counters, metrics (dashboard)
• Rolling file appenders that push data to HDFS
– Primary mechanism for delivering raw fact data from
transactional systems to the warehouse staging area
27
Data Analysis
• Statistical analysis from millions of events
• View into quality of enrolments – e.g. Enrolment
Agencies, Operators
• Feature introduction – e.g. Based on avg. time taken for
biometric capture, demographic data input
• Enrolment volumes – e.g. By Registrar, Agency,
Operator etc
– Useful in fraud detection
• Goal to share anonymized data sets for use by
industry and academia – information transparency
• Various reports – Self-serve, Canned, Operational
and/or Aggregates
28
UID BI Platform
Data Analysis architecture
Data Access Framework
UIDAI Systems Events
(Rabbit MQ)
Server DB
(MySQL)
Hadoop HDFS
Data Warehouse (HDFS/Hive)
Event CSV
Fact DataDimension Data
Datasets
On-Demand Datasets
Datamarts
(MySQL)
Raw Data
Dimension Data
(MySQL)
Pig
Pentaho Kettle
Hive
Pentaho Kettle
Canned Reports Dashboard
Self-service
Analytics
Pentaho BI
FusionCharts
E-mail/Portal/Others
29
FIELD NAME DATA TYPE KEY
NAME VARCHAR CONSTRAINT
MARITAL
STATUS
VARCHAR CONSTRAINTS
ADDRESS VARCHAR CONSTRAINTS
PHONE
NUMBER
NUMBER CONSTRAINTS
PINCODE NUMBER CONSTRAINTS
REGISTER NO NUMBER PRIMARY KEY
PERSONAL DETAILS 1
30
FIELD NAME DATATYPE KEY
NAME VARCHAR CONSTRAINTS
Y.O.B DATE CONSTRAINTS
GENDER VARCHAR CONSTRAINTS
REGISTER NO NUMBER FOREGIN KEY
PERSONAL DETAILS 2
31
• Data Query language
• Retrieve
• update
• Data Manipulation Language
• update
• delete
• Data Definition Language
• Create
• insert
• Transaction Language
• Commit
• Revoke
• savepoint
FUNCTION USED IN THE DATABASE CREATION
32
• CREATION:
Create table tablename(columnname datatype(size),columnname datatype(size))
Create table person details(name varchar(10),marital status varchar(12),address
varchar(20),phone number number(10),pincode number(7),register no number(17));
PROCESS OF DATABASE
33
INSERTION:
Insert into tablename[(columnname,columnname)]
Values (expression,expression);
Insert into table person details(name , maritalstatus, address, phone number ,pincode ,
register number)values(“xxx”, “w/o yyy “,”no:14,nehru street kamaraj nagar
puducherry”,”9123456789”,”605011”,”3560 2513 1913”);
34
• UPDATION:
• Update tablename set columnname=expression, columnname=expression…. Where
columnname=expression;
– Update personal details set name=“www”
– Where pincode=“605011”;
35
• RETRIVAL
• SELECT columnname,columname from tablename;
– Select name , register no from personal details;
– Select name and register no from personal details where phone number=“9123456789”
DELETION:
DELETE FROM tablename;
DELETE from personal details;
36
• AVG - avg({distinct all}n)
• MIN - min({distinct all}expr)
• COUNT(expr) - count({distinct all}expr)
• COUNT(*) - COUNT(*)
• MAX - max({distinct all}expr)
• SUM - sum({distinct all}n)
• INITCAP - INITCAP(char)
• LTRIM - LTRIM(char[,set])
ORACLE FUNCTIONS
37
Challenges in India Identity Card
38
References
• Aadhaar Portal :
https://portal.uidai.gov.in/uidwebportal/dashboard.do
• Data Portal :
https://data.uidai.gov.in/uiddatacatalog/dataCatalogH
ome.do
• Analytics whitepaper :
http://uidai.gov.in/images/FrontPageUpdates/uid_doc
_30012012.pdf
39
40
41

More Related Content

What's hot

Selecting Data Management Tools - A practical approach
Selecting Data Management Tools - A practical approachSelecting Data Management Tools - A practical approach
Selecting Data Management Tools - A practical approachChristopher Bradley
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Face detection and recognition report
Face detection and recognition reportFace detection and recognition report
Face detection and recognition reporthetvi naik
 
Face recognization
Face recognizationFace recognization
Face recognizationleenak770
 
Big Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesBig Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesAshraf Uddin
 
Project Presentation on Data WareHouse
Project Presentation on Data WareHouseProject Presentation on Data WareHouse
Project Presentation on Data WareHouseAbhi Bhardwaj
 
Tableau PPT Intro, Features, Advantages, Disadvantages
Tableau PPT Intro, Features, Advantages, DisadvantagesTableau PPT Intro, Features, Advantages, Disadvantages
Tableau PPT Intro, Features, Advantages, DisadvantagesBurn & Born
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Enterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureEnterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureDATAVERSITY
 
Visual Analytics in Big Data
Visual Analytics in Big DataVisual Analytics in Big Data
Visual Analytics in Big DataSaurabh Shanbhag
 

What's hot (20)

Selecting Data Management Tools - A practical approach
Selecting Data Management Tools - A practical approachSelecting Data Management Tools - A practical approach
Selecting Data Management Tools - A practical approach
 
Big data
Big dataBig data
Big data
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Data analytics
Data analyticsData analytics
Data analytics
 
Data Science
Data ScienceData Science
Data Science
 
Face detection and recognition report
Face detection and recognition reportFace detection and recognition report
Face detection and recognition report
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Introduction to Data Engineering
Introduction to Data EngineeringIntroduction to Data Engineering
Introduction to Data Engineering
 
Big Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesBig Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture Capabilities
 
Project Presentation on Data WareHouse
Project Presentation on Data WareHouseProject Presentation on Data WareHouse
Project Presentation on Data WareHouse
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
Rain project
Rain project Rain project
Rain project
 
Business intelligence
Business intelligenceBusiness intelligence
Business intelligence
 
Tableau PPT Intro, Features, Advantages, Disadvantages
Tableau PPT Intro, Features, Advantages, DisadvantagesTableau PPT Intro, Features, Advantages, Disadvantages
Tableau PPT Intro, Features, Advantages, Disadvantages
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Enterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureEnterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data Architecture
 
Visual Analytics in Big Data
Visual Analytics in Big DataVisual Analytics in Big Data
Visual Analytics in Big Data
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Big data analysis
Big data analysisBig data analysis
Big data analysis
 

Similar to AADHAR Card- Database Creation

Li charles biometrics analytics & big data 122013a for release
Li charles    biometrics analytics & big data 122013a for releaseLi charles    biometrics analytics & big data 122013a for release
Li charles biometrics analytics & big data 122013a for releaseCharles Li
 
Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010Yahoo Developer Network
 
Practical pseudonymisationv4
Practical pseudonymisationv4Practical pseudonymisationv4
Practical pseudonymisationv4davidjohnhill
 
Transforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyTransforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyDatabricks
 
The Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsThe Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsBharath Rao
 
Necessity of Data Lakes in the Financial Services Sector
Necessity of Data Lakes in the Financial Services SectorNecessity of Data Lakes in the Financial Services Sector
Necessity of Data Lakes in the Financial Services SectorDataWorks Summit
 
Top Financial Use Cases for Intelligent Document Processing | Use Cases of ID...
Top Financial Use Cases for Intelligent Document Processing | Use Cases of ID...Top Financial Use Cases for Intelligent Document Processing | Use Cases of ID...
Top Financial Use Cases for Intelligent Document Processing | Use Cases of ID...Emagia
 
MIS: Business Intelligence
MIS: Business IntelligenceMIS: Business Intelligence
MIS: Business IntelligenceJonathan Coleman
 
Clinicaldatamanagementindiaasahub 130313225150-phpapp01
Clinicaldatamanagementindiaasahub 130313225150-phpapp01Clinicaldatamanagementindiaasahub 130313225150-phpapp01
Clinicaldatamanagementindiaasahub 130313225150-phpapp01Upendra Agarwal
 
IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)stelligence
 
Use of monitoring data for evidence-based decision making: A factor analysis
Use of monitoring data for evidence-based decision making: A factor analysisUse of monitoring data for evidence-based decision making: A factor analysis
Use of monitoring data for evidence-based decision making: A factor analysisIRC
 
RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...
RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...
RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...Redis Labs
 
Intro to Data Science Big Data
Intro to Data Science Big DataIntro to Data Science Big Data
Intro to Data Science Big DataIndu Khemchandani
 
Demystify big data data science
Demystify big data  data scienceDemystify big data  data science
Demystify big data data scienceMahesh Kumar CV
 
International Journal of Database Management Systems (IJDBMS)
International Journal of Database Management Systems (IJDBMS)International Journal of Database Management Systems (IJDBMS)
International Journal of Database Management Systems (IJDBMS)ijfcst journal
 

Similar to AADHAR Card- Database Creation (20)

Uid security
Uid securityUid security
Uid security
 
Li charles biometrics analytics & big data 122013a for release
Li charles    biometrics analytics & big data 122013a for releaseLi charles    biometrics analytics & big data 122013a for release
Li charles biometrics analytics & big data 122013a for release
 
Big Data + PeopleSoft = BIG WIN!
Big Data + PeopleSoft = BIG WIN!Big Data + PeopleSoft = BIG WIN!
Big Data + PeopleSoft = BIG WIN!
 
Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010
 
Practical pseudonymisationv4
Practical pseudonymisationv4Practical pseudonymisationv4
Practical pseudonymisationv4
 
Transforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyTransforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform Strategy
 
The Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsThe Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptions
 
BCM & IT Resilience in Aadhaar
BCM  &  IT Resilience in AadhaarBCM  &  IT Resilience in Aadhaar
BCM & IT Resilience in Aadhaar
 
Big Data Forum - Phoenix
Big Data Forum - PhoenixBig Data Forum - Phoenix
Big Data Forum - Phoenix
 
Necessity of Data Lakes in the Financial Services Sector
Necessity of Data Lakes in the Financial Services SectorNecessity of Data Lakes in the Financial Services Sector
Necessity of Data Lakes in the Financial Services Sector
 
Top Financial Use Cases for Intelligent Document Processing | Use Cases of ID...
Top Financial Use Cases for Intelligent Document Processing | Use Cases of ID...Top Financial Use Cases for Intelligent Document Processing | Use Cases of ID...
Top Financial Use Cases for Intelligent Document Processing | Use Cases of ID...
 
MIS: Business Intelligence
MIS: Business IntelligenceMIS: Business Intelligence
MIS: Business Intelligence
 
Clinicaldatamanagementindiaasahub 130313225150-phpapp01
Clinicaldatamanagementindiaasahub 130313225150-phpapp01Clinicaldatamanagementindiaasahub 130313225150-phpapp01
Clinicaldatamanagementindiaasahub 130313225150-phpapp01
 
IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)
 
Use of monitoring data for evidence-based decision making: A factor analysis
Use of monitoring data for evidence-based decision making: A factor analysisUse of monitoring data for evidence-based decision making: A factor analysis
Use of monitoring data for evidence-based decision making: A factor analysis
 
RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...
RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...
RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...
 
CAAT_Outa_Bag
CAAT_Outa_BagCAAT_Outa_Bag
CAAT_Outa_Bag
 
Intro to Data Science Big Data
Intro to Data Science Big DataIntro to Data Science Big Data
Intro to Data Science Big Data
 
Demystify big data data science
Demystify big data  data scienceDemystify big data  data science
Demystify big data data science
 
International Journal of Database Management Systems (IJDBMS)
International Journal of Database Management Systems (IJDBMS)International Journal of Database Management Systems (IJDBMS)
International Journal of Database Management Systems (IJDBMS)
 

More from Basil John

Class 5 ipr trips - trims
Class 5 ipr trips - trimsClass 5 ipr trips - trims
Class 5 ipr trips - trimsBasil John
 
Basil john mm field assignment jan2016
Basil john mm field assignment jan2016Basil john mm field assignment jan2016
Basil john mm field assignment jan2016Basil John
 
Overcoming communication Barriers
Overcoming communication BarriersOvercoming communication Barriers
Overcoming communication BarriersBasil John
 
Interworking of wi_max_and_3gpp_networks_-slides
Interworking of wi_max_and_3gpp_networks_-slidesInterworking of wi_max_and_3gpp_networks_-slides
Interworking of wi_max_and_3gpp_networks_-slidesBasil John
 
Cloud computing
Cloud computingCloud computing
Cloud computingBasil John
 
Wcdma systems 003
Wcdma systems 003Wcdma systems 003
Wcdma systems 003Basil John
 
Fuzzy logic - copy
Fuzzy logic - copyFuzzy logic - copy
Fuzzy logic - copyBasil John
 
An advanced handoff algoritm in mobile communication network using fuzzy deci...
An advanced handoff algoritm in mobile communication network using fuzzy deci...An advanced handoff algoritm in mobile communication network using fuzzy deci...
An advanced handoff algoritm in mobile communication network using fuzzy deci...Basil John
 
Handoff survey
Handoff surveyHandoff survey
Handoff surveyBasil John
 
Neural networks
Neural networksNeural networks
Neural networksBasil John
 
An efficient vertical handoff mechanism
An efficient vertical handoff mechanismAn efficient vertical handoff mechanism
An efficient vertical handoff mechanismBasil John
 

More from Basil John (20)

Mm case 2 ref
Mm case 2 refMm case 2 ref
Mm case 2 ref
 
Class7
Class7Class7
Class7
 
Class 5 ipr trips - trims
Class 5 ipr trips - trimsClass 5 ipr trips - trims
Class 5 ipr trips - trims
 
Business Law
Business LawBusiness Law
Business Law
 
Hrm1
Hrm1Hrm1
Hrm1
 
Basil john mm field assignment jan2016
Basil john mm field assignment jan2016Basil john mm field assignment jan2016
Basil john mm field assignment jan2016
 
Overcoming communication Barriers
Overcoming communication BarriersOvercoming communication Barriers
Overcoming communication Barriers
 
Luxottica
LuxotticaLuxottica
Luxottica
 
Walmart f500
Walmart f500Walmart f500
Walmart f500
 
Umts
UmtsUmts
Umts
 
Wi max
Wi maxWi max
Wi max
 
Interworking of wi_max_and_3gpp_networks_-slides
Interworking of wi_max_and_3gpp_networks_-slidesInterworking of wi_max_and_3gpp_networks_-slides
Interworking of wi_max_and_3gpp_networks_-slides
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Wcdma systems 003
Wcdma systems 003Wcdma systems 003
Wcdma systems 003
 
Fuzzy logic - copy
Fuzzy logic - copyFuzzy logic - copy
Fuzzy logic - copy
 
Fuzzy logic
Fuzzy logicFuzzy logic
Fuzzy logic
 
An advanced handoff algoritm in mobile communication network using fuzzy deci...
An advanced handoff algoritm in mobile communication network using fuzzy deci...An advanced handoff algoritm in mobile communication network using fuzzy deci...
An advanced handoff algoritm in mobile communication network using fuzzy deci...
 
Handoff survey
Handoff surveyHandoff survey
Handoff survey
 
Neural networks
Neural networksNeural networks
Neural networks
 
An efficient vertical handoff mechanism
An efficient vertical handoff mechanismAn efficient vertical handoff mechanism
An efficient vertical handoff mechanism
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 

AADHAR Card- Database Creation

  • 1. Creating A Unique Identity For Every Resident Under The Guidance Dr. T. Nambirajan Professor Department of Management Studies School of Management BY GROUP 8 BASIL JOHN PANCHAMI SARITHA GIRIDHARAN KABILAN JOEL JOSEPH
  • 2. 2 • Collection of interrelated data • Set of programs to access the data • DBMS contains information about a particular enterprise • DBMS provides an environment that it both convenient and efficient to use. •Database management systems were developed to handle the following difficulties of typical file- processing systems supported by conventional operating systems
  • 3. 3 The Unique ID initiative
  • 4. 4 Principles of Aadhaar One-time standardized Aadhaar enrollment establishes uniqueness of resident via ‘biometric de-duplication’ • Only one Aadhaar number per eligible individual Online Authentication is provided by UIDAI • Demographic Data (Name, Address, DOB, Gender) • Biometric Data (Fingerprint) Aadhaar :Subject to online authentication is proof of ID Aadhaar enrollment / Update = KYC Aadhaar No. Issued, stored in Auth. Server “Verification” of KYC (Authentication)
  • 5. 5 Features of Aadhaar Aadhaar is a 12 digit number – No Cards Random Number – No Intelligence Standard Attributes – No Profiling or Application Information All Residents including Children get Numbers Introducer System Partnership Model Flexibile Authentication Interface to Partners 1 2 3 4 5 6 7
  • 6. 6 Benefits of Aadhaar (I) • No fakes • No duplicates • To all with special focus on the marginalised and the excluded • Enable connectivity among databases • Enable consolidation Reduces Leakages Provides Identities Breaks Silos
  • 7. 7 Benefits of Aadhaar (II) • Financial inclusion • Electronic transfer of benefits • Security of transactions • Access to services • Mobility in various application • Building up of applications Enables Enhances Ensures
  • 8. 8 Registrar On-boarding Process 1. MoU with the State Government 2. Empowered Committee and Implementation Committee 3. Nodal Department and Registrar 4. KYR+ Fields 5. Vendor Selection 6. Enrolment Plan 7. IEC Activity 8. 13th FC Funds 9. Monitoring the enrolment process 10.ICT Infrastructure 11.Aligning UID number to Databases & Government Programmes
  • 11. 11 11 Demographic data fields captured during Aadhaar enrolment Field Name Comments Name PoI documents required Date of Birth Approximate/ Declared/ Verified Gender M/F/T Address PoA documents required Parent/Spouse/Guardian Name Optional (mandatory in case of child below 5 years) Introducer UID Where PoI/PoA not provided
  • 12. 12 Capture Demographic & Biometric Data Optional data: • Introducer data for verification and/or • Data of a relative who has a UID number or an enrolment number • Phone no., email address Biometric Data 12 Resident’s Photograph Resident’s Finger Prints Resident’s Iris
  • 14. 14 UID ecosystem – A symbiotic network Oil Ministry States LIC & Banks Income TaxOil Cos. LPG agencies Branches Field agencies Food & Supplies Rural Development Social welfare Ration shops Registrar Sub-registrar Enrolling agency Continuous monitoring and feedback
  • 16. 16 16 1 2 3 4 5 6 Enrollment Agencies Registrars KYR, Biometrics, KYR+ Resident UIDAI Banks / POSB KYR, Biometrics Aadhaar Aadhaar, KYR, Photo Aadhaar Bank A/c Financial Inclusion - Aadhaar enabled bank account
  • 17. 17 Process Workflow Preparation Activities Enrolment Activities Ongoing Activities Verificatio n procedure s Demographic & biometric data capture Data transfer to CIDR CIDR Rejections identified Biometric De- duplication UID Assignmen t Data Updation Authenticatio n Certifications Devices Operators Registrar Readiness MoU, committees etc Process & Technology Alignment Prep Enrolments Introducers Operators, supervisors Letter Printing & Delivery Setup Enrolment Centers Devices, hardware, software, connectivity People, admin support, logistics etc. 1 2 1 3 4 5 6 7 8 9
  • 21. 21 Enrolment Data • 600 to 800 million UIDs in 4 years • 1 million a day with transaction, durability guarantees • 350+ trillion matches every day • ~5MB per resident • Maps to about 10-15 PB of raw data (2048-bit PKI encrypted) • About 30 TB I/O every day • Replication and backup across DCs of about 5+ TB of incremental data every day • Lifecycle updates and new enrolments will continue for ever • Enrolment data moves from very hot to cold, needing multi-layered storage architecture • Additional process data • Several million events on an average moving through async channels (some persistent and some transient) • Needing insert and update guarantees across data stores
  • 22. 22 Authentication Data • 100+ million authentications per day (10 hrs) • Possible high variance on peak and average • Sub second response • Guaranteed audits • Multi-DC architecture • All changes needs to be propagated from enrolment data stores to all authentication sites • Authentication request is about 4 K • 100 million authentications a day • 1 billion audit records in 10 days (30+ billion a year) • 4 TB encrypted audit logs in 10 days • Audit write must be guaranteed
  • 23. 23 Aadhaar Data Stores Mongo cluster (all enrolment records/documents – demographics + photo) Shard 1 Shard 4 Shard 5 Shard 2 Shard 3 Low latency indexed read (Documents per sec), High latency random search (seconds per read) MySQL (all UID generated records - demographics only, track & trace, enrolment status ) Low latency indexed read (milli- seconds per read), High latency random search (seconds per read) UID master (sharded) Enrolment DB Solr cluster (all enrolment records/documents – selected demographics only) Low latency indexed read (Documents per sec), Low latency random search (Documents per sec) Shard 0 Shard 2 Shard 6 Shard 9 Shard a Shard d Shard f HDFS (all raw packets) Data Node 1 Data Node 10 Data Node .. High read throughput (MB per sec), High latency read (seconds per read) Data Node 20 HBase (all enrolment biometric templates) Region Ser. 1 Region Ser. 10 Region Ser. .. High read throughput (MB per sec), Low-to-Medium latency read (milli-seconds per read)Region Ser. 20 NFS (all archived raw packets) Moderate read throughput, High latency read (seconds per read) LUN 1 LUN 2 LUN 3 LUN 4
  • 24. 24 Systems Architecture • Work distribution using SEDA & Messaging • Ability to scale within JVM and across • Recovery through check-pointing • Sync Http based Auth gateway • Protocol Buffers & XML payloads • Sharded clusters • Near Real-time data delivery to warehouse • Nightly data-sets used to build dashboards, data marts and reports • Real-time monitoring using Events
  • 25. 25 Enrolment Biometric Middleware • Distribute, Reconcile biometric data extraction and de-dup requests across multiple vendors (ABISs) • Biometric data de-referencing/read service(Http) over sharded HDFS and NFS • Serves bulk of the HDFS read requests (25TB per day) • Locate data from multiple HDFS clusters – Sharded by read/write patterns : New, Archive, Purge • Calculates and maintains Volume allocation, SLA breach thresholds of ABISs • Thresholds stored in ZK and pushed to middleware nodes
  • 26. 26 Event Streams & Sinks • Event framework supporting different interaction/data durability patterns • P2P, Pub-Sub • Intra-JVM and Queue destinations - Durable / Non-Durable • Fire & Forget, Ack. after processing • Event Sinks • Ephemeral data consumed by counters, metrics (dashboard) • Rolling file appenders that push data to HDFS – Primary mechanism for delivering raw fact data from transactional systems to the warehouse staging area
  • 27. 27 Data Analysis • Statistical analysis from millions of events • View into quality of enrolments – e.g. Enrolment Agencies, Operators • Feature introduction – e.g. Based on avg. time taken for biometric capture, demographic data input • Enrolment volumes – e.g. By Registrar, Agency, Operator etc – Useful in fraud detection • Goal to share anonymized data sets for use by industry and academia – information transparency • Various reports – Self-serve, Canned, Operational and/or Aggregates
  • 28. 28 UID BI Platform Data Analysis architecture Data Access Framework UIDAI Systems Events (Rabbit MQ) Server DB (MySQL) Hadoop HDFS Data Warehouse (HDFS/Hive) Event CSV Fact DataDimension Data Datasets On-Demand Datasets Datamarts (MySQL) Raw Data Dimension Data (MySQL) Pig Pentaho Kettle Hive Pentaho Kettle Canned Reports Dashboard Self-service Analytics Pentaho BI FusionCharts E-mail/Portal/Others
  • 29. 29 FIELD NAME DATA TYPE KEY NAME VARCHAR CONSTRAINT MARITAL STATUS VARCHAR CONSTRAINTS ADDRESS VARCHAR CONSTRAINTS PHONE NUMBER NUMBER CONSTRAINTS PINCODE NUMBER CONSTRAINTS REGISTER NO NUMBER PRIMARY KEY PERSONAL DETAILS 1
  • 30. 30 FIELD NAME DATATYPE KEY NAME VARCHAR CONSTRAINTS Y.O.B DATE CONSTRAINTS GENDER VARCHAR CONSTRAINTS REGISTER NO NUMBER FOREGIN KEY PERSONAL DETAILS 2
  • 31. 31 • Data Query language • Retrieve • update • Data Manipulation Language • update • delete • Data Definition Language • Create • insert • Transaction Language • Commit • Revoke • savepoint FUNCTION USED IN THE DATABASE CREATION
  • 32. 32 • CREATION: Create table tablename(columnname datatype(size),columnname datatype(size)) Create table person details(name varchar(10),marital status varchar(12),address varchar(20),phone number number(10),pincode number(7),register no number(17)); PROCESS OF DATABASE
  • 33. 33 INSERTION: Insert into tablename[(columnname,columnname)] Values (expression,expression); Insert into table person details(name , maritalstatus, address, phone number ,pincode , register number)values(“xxx”, “w/o yyy “,”no:14,nehru street kamaraj nagar puducherry”,”9123456789”,”605011”,”3560 2513 1913”);
  • 34. 34 • UPDATION: • Update tablename set columnname=expression, columnname=expression…. Where columnname=expression; – Update personal details set name=“www” – Where pincode=“605011”;
  • 35. 35 • RETRIVAL • SELECT columnname,columname from tablename; – Select name , register no from personal details; – Select name and register no from personal details where phone number=“9123456789” DELETION: DELETE FROM tablename; DELETE from personal details;
  • 36. 36 • AVG - avg({distinct all}n) • MIN - min({distinct all}expr) • COUNT(expr) - count({distinct all}expr) • COUNT(*) - COUNT(*) • MAX - max({distinct all}expr) • SUM - sum({distinct all}n) • INITCAP - INITCAP(char) • LTRIM - LTRIM(char[,set]) ORACLE FUNCTIONS
  • 37. 37 Challenges in India Identity Card
  • 38. 38 References • Aadhaar Portal : https://portal.uidai.gov.in/uidwebportal/dashboard.do • Data Portal : https://data.uidai.gov.in/uiddatacatalog/dataCatalogH ome.do • Analytics whitepaper : http://uidai.gov.in/images/FrontPageUpdates/uid_doc _30012012.pdf
  • 39. 39
  • 40. 40
  • 41. 41