The incorporation of the Bio-metric authentication system with the identification of Fingerprint pattern is an upcoming eGovernance Mechanism for Visa is an information validation and Visa processing mechanism using an IT and Communication infrastructure. Issuance of VISA by the consular and embassy is among the top 100 risky jobs. This has a very serious impact on the relationship between countries and among the standard forum of United Nations. The complex process need adequate data input from various sources. The integration of those data is the core value of this paper which needs the global impact for successful implementation. The statistical analyses of UN reports say that there are huge quanta of people who overstay or attempt VISA Run. This could create adverse effects in a nation’s economy and security policies. However, this crisis can be averted through digitization and eGov mechanism in Visa Issuance, this feat can be achieved through the means of Global data and information verification process associated with multilingual data validation system. EU has already adopted VIS a form cross continental information interchange process during their Schengen Visa issuance.
Innovation in the Digital Identity space is crucial for progress. Here’s a fact: a new identity is generated with every birth. Now consider this: by the time you finish your day today, a staggering 360,000 children will be eligible for an identity document.
Cartesian assesses the current state of identity management, and outlines the opportunity for trusted service providers such as MNOs, financial institutions and governments to act as “digital identity authorities”.
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
http://www.gemalto.com/govt/documents/national-identity-schemes
Firstly, the national identity scheme indicates the roles of the sovereign state with regard to digital identity:
Is the state a regulator?
An issuer of sovereign identities or the digital derivatives of these identities?
What are its responsibilities within the chosen ecosystem in terms of organization, data and applications, and infrastructure?
Next, the national identity scheme establishes the underlying principles and operating methods of the digital identity ecosystem. It describes the main systems and flows linked to the use of digital identities to access services, authenticate users, and exchange and verify data linked to the service requested.
Where necessary, it provides useful details on the approved identity types and trust levels supported by the ID ecosystem. For example, commercial or transactional uses for identity may have functionalities distinct from those associated with authentication in the public domain.
It is clear that the deployment of digital identities under different national frameworks represents a dual challenge for nations, which must manage their sovereignty in the digital space while improving services to companies and citizens, in other words the framework for market interactions, and ultimately the healthy operation of the economy.
Yet reconciling market demands and sovereignty is no simple task. It requires constructive negotiation between their respective objectives.
A good example is provided by the European Union. Here, national identity schemes must be viewed in terms of both the actions of individual states, and the implementation of the eIDAS regulation (which may indicate future convergence), as well as the objectives of the European Digital Single Market and European Digital Agenda 2020 strategies.
In the end, these actions surrounding digital identity demonstrate a desire to rekindle economic growth through the more effective use of digital services, and build a single digital space of trust, offering a high level of security, interoperability and data protection.
Innovation in the Digital Identity space is crucial for progress. Here’s a fact: a new identity is generated with every birth. Now consider this: by the time you finish your day today, a staggering 360,000 children will be eligible for an identity document.
Cartesian assesses the current state of identity management, and outlines the opportunity for trusted service providers such as MNOs, financial institutions and governments to act as “digital identity authorities”.
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
http://www.gemalto.com/govt/documents/national-identity-schemes
Firstly, the national identity scheme indicates the roles of the sovereign state with regard to digital identity:
Is the state a regulator?
An issuer of sovereign identities or the digital derivatives of these identities?
What are its responsibilities within the chosen ecosystem in terms of organization, data and applications, and infrastructure?
Next, the national identity scheme establishes the underlying principles and operating methods of the digital identity ecosystem. It describes the main systems and flows linked to the use of digital identities to access services, authenticate users, and exchange and verify data linked to the service requested.
Where necessary, it provides useful details on the approved identity types and trust levels supported by the ID ecosystem. For example, commercial or transactional uses for identity may have functionalities distinct from those associated with authentication in the public domain.
It is clear that the deployment of digital identities under different national frameworks represents a dual challenge for nations, which must manage their sovereignty in the digital space while improving services to companies and citizens, in other words the framework for market interactions, and ultimately the healthy operation of the economy.
Yet reconciling market demands and sovereignty is no simple task. It requires constructive negotiation between their respective objectives.
A good example is provided by the European Union. Here, national identity schemes must be viewed in terms of both the actions of individual states, and the implementation of the eIDAS regulation (which may indicate future convergence), as well as the objectives of the European Digital Single Market and European Digital Agenda 2020 strategies.
In the end, these actions surrounding digital identity demonstrate a desire to rekindle economic growth through the more effective use of digital services, and build a single digital space of trust, offering a high level of security, interoperability and data protection.
Multibiometrics or biometric fusion is a rising mode of biometric-powered tech that leverages multiple types of identification like fingerprint detection, facial verification and iris scanning outlined
The importance of being human-centric instead of techno-centric is now fundamentally assessed in the context of secure digital identity for the financial services landscape.
Forward-looking banks and financial institutions are increasingly responding with resources and investments that deliver NEC’s state-of-the-art authentication methods
to meet consumer expectations. As a result, NEC’s vantage point goes far beyond cutting-edge technologies and solutions, such as integration of multimodal biometrics. Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety
Securing Experiences via Digital Identity by Frost & Sullivan. An Executive Briefing on how Digital Identity helps securing our world from Airport to Critical Infrastructures. Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
What is Social KYC?
We generate large amounts of data about ourselves online every single day. All of this activity, when analysed as a whole, builds up a very deep and unique digital footprint — something that’s exceedingly difficult for someone to steal or fake convincingly.
Social KYC harnesses this data and uses it to establish a person’s identity — on a consent driven basis, of course. Using algorithms to analyse and corroborate various data attributes across multiple online accounts it is possible to quickly establish the likelihood of a person being:
- real
- who they claim to be (including various demographic data related thereto)
- a legitimate potential user (rather than a fraudster trying to access your platform with malicious intent)
We’re all used to Single Sign On – using an existing social media account to sign up to a new service — and Social KYC is an extension of this. As all you’re doing is asking a user to log in to a variety of their online accounts to prove who they are, it makes for a far more fluid sign up experience which in turn will encourage more users onto your platform.
Financial services industry is developing due to the introduction of internet, rapid technological evolutions, deregulation, globalization as well as the impact of changing competitive and regulatory forces. So Financial system plays an important role in the economic development of the country. Because of the advent of information technology there is a change in the banking sector which has paved way for the introduction of retail electronic payment system and has progressed in the recent years in various countries and India has left no way behind. The objective of the paper is to examine and analyze the progress made by the internet banking in India. Bhawna Bhelly | Dr Sunil "Growth of E-Banking in India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25082.pdfPaper URL: https://www.ijtsrd.com/management/accounting-and-finance/25082/growth-of-e-banking-in-india/bhawna-bhelly
Canadian Immigration_ The Role of Biometrics in Simplifying the Process.pdfeducationedge.ca
the journey of immigration to Canada is a significant step, filled with excitement and anticipation. In recent years, the Canadian government has implemented biometrics as part of the immigration process, aiming to enhance security measures and streamline application procedures. In this article, we'll explore what biometrics are, their role in Canada Immigration, and how they contribute to a more efficient and secure process.
Modernizing Immigration with Digital Signatures| DrySign Drysign By Exela
E-signature solutions tend to maintain detailed logs and verify users, making it virtually impossible to trick the system. Ultimately, with digital signatures in place, we may not be able to bring illegal immigration down to zero, but we can certainly reduce it by a significant margin.
Simplification and Ease of User Data Verification: The Regulatory Framework f...AHRP Law Firm
The Facial Verification Technology (FVT) plays a crucial role in Electronic Know Your Customer (E-KYC) processes, improving security and operational efficiency by remotely confirming individuals' identities through several online authentication steps by utilizing users' data registered in population databases. The purpose of FVT itself is to reduce the risks of identity theft and fraud. Recently, the Financial Services Authority (OJK) issued OJK Reg. 3/2024 focusing on the Implementation of Financial Sector Technology Innovations. This regulation outlines the licensing procedure for FVT organizers, aligning with MoHA Reg. 102/2019, which addresses access rights for using population data. Moreover, the implementation of FVT must comply with data protection regulations, in particular, Law 27/2022 and OJK Reg. 3/2024. Find out more about our insights on this topic in our Legal Brief publication.
What is Digital India? How does it help the average Indian citizen? This presentation gives useful details of the government program of connecting Indians to governance through the internet to cut down red tape and increase transparency.
Face Recognition Using ML in Public Transportsijtsrd
Modernization of railways has forever been an issue focused on the development of the fundamental infrastructure of a nation. Since the railways represent one of the most effective modes of transport offered to the people, It is important to keep a check on the security issues that are arising in todays world. According to the need there must be an upgradation in systems we use. One such upgradation is that the role of Artificial Intelligence and e ticketing that is achieved with the assistance of face recognition technology. This technology has been extensively employed as a biometric method and hence can be used for passenger verification. Mangal Kotkar | Shubham Gawade | Shubham Mandavkar | Prathamesh Gujar "Face Recognition Using ML in Public Transports" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47656.pdf Paper URL : https://www.ijtsrd.com/engineering/information-technology/47656/face-recognition-using-ml-in-public-transports/mangal-kotkar
Due to worldwide advancements in computer and telecommunication technologies and the underlying infrastructures, biometric voting systems are expanding throughout the entire world including developed and developing countries in APAC, Middle East, Latin America, and Africa regions. Preventing voter fraud, election rigging, and multiple voter registration, accurate and reliable biometric voter registration systems are now playing an active role in modern electoral infrastructures. Beside a reliable biometric voting system, there is a dire need for international standards to govern the technology, software reliability and accuracy, process and algorithms deployed within the technology, and the verification of all hardware, software and protocols involved. The M2SYS TrueVoter™ system is a scalable and customizable software package that allows you to perform a wide variety of tasks for processing, editing, searching, retrieving, and storing biometric voting templates and voter records. TrueVoter™ can easily collect the biometric data in an industry recognized standard format including ISO/NIST and FBI compliance to ensure a reliable and secured electoral system.
Exploring the Experiences of Gender-Based Violence
and The Associated Psychosocial and Mental Health
Issues of Filipino HIV-Positives: Implications for
Psychological Practice
Evangeline R Castronuevo-Ruga1, Normita A Atrillano2
Abstract: The phenomenon of gender-based violence has generated attention from research practitioners and helping professionals since
the surge of the women’s movement three or so decades ago in the Philippines. At about the same time, the HIV-AIDS gained similar
attention with the disclosure of the first ever case of the country in the mid-80s. Only recently, however, has the intersectionality of these
two phenomena been looked into by the research community in other countries and has yet to see parallel response locally. This research,
therefore, attempts to map out the lived experiences of People Living with Human Immuno Deficiency Virus (PLHIV) who have undergone
gender-based violence (GBV). It specially looks into the consequent psychosocial and mental health issues. Using focus group discussion with
24 purposively sampled participants from the highly vulnerable groups based in three major Philippine cities, thematic analysis reveals that
the participants experienced various forms of gender-based violence, e.g., sexual, emotional/psychological, economic, verbal, physical) and
expressions of stigma and discrimination, which in turn, led to manifestations of different emotional and psychological trauma, depression,
internalized homophobia, greater health risks and risk-taking behaviours, among others. It might be worthwhile to consider the possibility
that the consequent risk-taking and self-injurious tendencies played a role in their eventual contraction of HIV.
Estimation of Storage-Draft Rate Characteristics of
Rivers in Selangor Region
Farah Syazana Abd Latif1, Siti Fatin Mohd Razali2
1,2Faculty of Engineering & Built Environment, Universiti Kebangsaan Malaysia
Abstract: Drought is a phenomenon of extreme water shortage that has significant economic, social, environmental and human life
impact. Streamflow drought characteristics and properties are useful in the design of hydro-technical projects, water resources planning and
management purposes. Information on low flow magnitude, frequency, probability and return period are very crucial in analysing
streamflow drought at the operational level in public water supply. The objectives of this study are to determine the characteristics of low
flow for every streamflow station in the Selangor region. The estimation of minimum storage draft-rate with the probability of low flow
return periods of 2, 5, 10, 20, and 50 years is presented in this paper.
Awwal-Awwal Tampat Budjang Journey Back to
Pre-Islamic Epoch: A Cultural Semiotic
Helen G Juaini1
Abstract: Cultural background plays a significant role in the sphere of semiotics. Semiotics as a discipline is recognized as a useful tool in
gauging cultural background and identifying signs that might represent the message of a certain work. Given the rich cultural context of
Tawi-Tawi oral literature this can be used in studying semiotics. Semiotic tools were employed to interpret the awwal-awwal as provided by
the respondents and to formulate a subsequent understanding of this oral literature in relation to the Sama’s claim of sacredness of Tampat
Budjang.
Politeness and Intimacy in Application Letters of
Three Cultural Groups in Mindanao
Helen G Juaini1
Abstract: 150 application letters from the three cultural groups in Mindano, namely Sinama, Subanen, and Tausug have been analysed
in a mixed-method design. The focus of the study is on the two features of politeness and intimacy. In the quantitative analysis, the model
proposed by Brown & Levinson (1987) and that of Columns (2005) which have drawn upon the features of indirectness in requesting and
the length of letters as the indicators of politeness are used. In the qualitative and descriptive analysis formality in salutation and opening
clause as well as the use of abbreviated forms are taken into account. The result shows that Tausug use the politest style in their application
letters, followed by Sinama and Subanen respectively. On the other hand, Sinama, Subanen, and Tausug use the least intimate style in their
business letters. The findings are hoped to help better inter-cultural understanding, especially with respect to written rhetorical
characteristics.
More Related Content
Similar to eGovernance mechanism with BioMetrics Classification and Authentication for Digital VISA Issuance and Validation
Multibiometrics or biometric fusion is a rising mode of biometric-powered tech that leverages multiple types of identification like fingerprint detection, facial verification and iris scanning outlined
The importance of being human-centric instead of techno-centric is now fundamentally assessed in the context of secure digital identity for the financial services landscape.
Forward-looking banks and financial institutions are increasingly responding with resources and investments that deliver NEC’s state-of-the-art authentication methods
to meet consumer expectations. As a result, NEC’s vantage point goes far beyond cutting-edge technologies and solutions, such as integration of multimodal biometrics. Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety
Securing Experiences via Digital Identity by Frost & Sullivan. An Executive Briefing on how Digital Identity helps securing our world from Airport to Critical Infrastructures. Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
What is Social KYC?
We generate large amounts of data about ourselves online every single day. All of this activity, when analysed as a whole, builds up a very deep and unique digital footprint — something that’s exceedingly difficult for someone to steal or fake convincingly.
Social KYC harnesses this data and uses it to establish a person’s identity — on a consent driven basis, of course. Using algorithms to analyse and corroborate various data attributes across multiple online accounts it is possible to quickly establish the likelihood of a person being:
- real
- who they claim to be (including various demographic data related thereto)
- a legitimate potential user (rather than a fraudster trying to access your platform with malicious intent)
We’re all used to Single Sign On – using an existing social media account to sign up to a new service — and Social KYC is an extension of this. As all you’re doing is asking a user to log in to a variety of their online accounts to prove who they are, it makes for a far more fluid sign up experience which in turn will encourage more users onto your platform.
Financial services industry is developing due to the introduction of internet, rapid technological evolutions, deregulation, globalization as well as the impact of changing competitive and regulatory forces. So Financial system plays an important role in the economic development of the country. Because of the advent of information technology there is a change in the banking sector which has paved way for the introduction of retail electronic payment system and has progressed in the recent years in various countries and India has left no way behind. The objective of the paper is to examine and analyze the progress made by the internet banking in India. Bhawna Bhelly | Dr Sunil "Growth of E-Banking in India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25082.pdfPaper URL: https://www.ijtsrd.com/management/accounting-and-finance/25082/growth-of-e-banking-in-india/bhawna-bhelly
Canadian Immigration_ The Role of Biometrics in Simplifying the Process.pdfeducationedge.ca
the journey of immigration to Canada is a significant step, filled with excitement and anticipation. In recent years, the Canadian government has implemented biometrics as part of the immigration process, aiming to enhance security measures and streamline application procedures. In this article, we'll explore what biometrics are, their role in Canada Immigration, and how they contribute to a more efficient and secure process.
Modernizing Immigration with Digital Signatures| DrySign Drysign By Exela
E-signature solutions tend to maintain detailed logs and verify users, making it virtually impossible to trick the system. Ultimately, with digital signatures in place, we may not be able to bring illegal immigration down to zero, but we can certainly reduce it by a significant margin.
Simplification and Ease of User Data Verification: The Regulatory Framework f...AHRP Law Firm
The Facial Verification Technology (FVT) plays a crucial role in Electronic Know Your Customer (E-KYC) processes, improving security and operational efficiency by remotely confirming individuals' identities through several online authentication steps by utilizing users' data registered in population databases. The purpose of FVT itself is to reduce the risks of identity theft and fraud. Recently, the Financial Services Authority (OJK) issued OJK Reg. 3/2024 focusing on the Implementation of Financial Sector Technology Innovations. This regulation outlines the licensing procedure for FVT organizers, aligning with MoHA Reg. 102/2019, which addresses access rights for using population data. Moreover, the implementation of FVT must comply with data protection regulations, in particular, Law 27/2022 and OJK Reg. 3/2024. Find out more about our insights on this topic in our Legal Brief publication.
What is Digital India? How does it help the average Indian citizen? This presentation gives useful details of the government program of connecting Indians to governance through the internet to cut down red tape and increase transparency.
Face Recognition Using ML in Public Transportsijtsrd
Modernization of railways has forever been an issue focused on the development of the fundamental infrastructure of a nation. Since the railways represent one of the most effective modes of transport offered to the people, It is important to keep a check on the security issues that are arising in todays world. According to the need there must be an upgradation in systems we use. One such upgradation is that the role of Artificial Intelligence and e ticketing that is achieved with the assistance of face recognition technology. This technology has been extensively employed as a biometric method and hence can be used for passenger verification. Mangal Kotkar | Shubham Gawade | Shubham Mandavkar | Prathamesh Gujar "Face Recognition Using ML in Public Transports" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47656.pdf Paper URL : https://www.ijtsrd.com/engineering/information-technology/47656/face-recognition-using-ml-in-public-transports/mangal-kotkar
Due to worldwide advancements in computer and telecommunication technologies and the underlying infrastructures, biometric voting systems are expanding throughout the entire world including developed and developing countries in APAC, Middle East, Latin America, and Africa regions. Preventing voter fraud, election rigging, and multiple voter registration, accurate and reliable biometric voter registration systems are now playing an active role in modern electoral infrastructures. Beside a reliable biometric voting system, there is a dire need for international standards to govern the technology, software reliability and accuracy, process and algorithms deployed within the technology, and the verification of all hardware, software and protocols involved. The M2SYS TrueVoter™ system is a scalable and customizable software package that allows you to perform a wide variety of tasks for processing, editing, searching, retrieving, and storing biometric voting templates and voter records. TrueVoter™ can easily collect the biometric data in an industry recognized standard format including ISO/NIST and FBI compliance to ensure a reliable and secured electoral system.
Exploring the Experiences of Gender-Based Violence
and The Associated Psychosocial and Mental Health
Issues of Filipino HIV-Positives: Implications for
Psychological Practice
Evangeline R Castronuevo-Ruga1, Normita A Atrillano2
Abstract: The phenomenon of gender-based violence has generated attention from research practitioners and helping professionals since
the surge of the women’s movement three or so decades ago in the Philippines. At about the same time, the HIV-AIDS gained similar
attention with the disclosure of the first ever case of the country in the mid-80s. Only recently, however, has the intersectionality of these
two phenomena been looked into by the research community in other countries and has yet to see parallel response locally. This research,
therefore, attempts to map out the lived experiences of People Living with Human Immuno Deficiency Virus (PLHIV) who have undergone
gender-based violence (GBV). It specially looks into the consequent psychosocial and mental health issues. Using focus group discussion with
24 purposively sampled participants from the highly vulnerable groups based in three major Philippine cities, thematic analysis reveals that
the participants experienced various forms of gender-based violence, e.g., sexual, emotional/psychological, economic, verbal, physical) and
expressions of stigma and discrimination, which in turn, led to manifestations of different emotional and psychological trauma, depression,
internalized homophobia, greater health risks and risk-taking behaviours, among others. It might be worthwhile to consider the possibility
that the consequent risk-taking and self-injurious tendencies played a role in their eventual contraction of HIV.
Estimation of Storage-Draft Rate Characteristics of
Rivers in Selangor Region
Farah Syazana Abd Latif1, Siti Fatin Mohd Razali2
1,2Faculty of Engineering & Built Environment, Universiti Kebangsaan Malaysia
Abstract: Drought is a phenomenon of extreme water shortage that has significant economic, social, environmental and human life
impact. Streamflow drought characteristics and properties are useful in the design of hydro-technical projects, water resources planning and
management purposes. Information on low flow magnitude, frequency, probability and return period are very crucial in analysing
streamflow drought at the operational level in public water supply. The objectives of this study are to determine the characteristics of low
flow for every streamflow station in the Selangor region. The estimation of minimum storage draft-rate with the probability of low flow
return periods of 2, 5, 10, 20, and 50 years is presented in this paper.
Awwal-Awwal Tampat Budjang Journey Back to
Pre-Islamic Epoch: A Cultural Semiotic
Helen G Juaini1
Abstract: Cultural background plays a significant role in the sphere of semiotics. Semiotics as a discipline is recognized as a useful tool in
gauging cultural background and identifying signs that might represent the message of a certain work. Given the rich cultural context of
Tawi-Tawi oral literature this can be used in studying semiotics. Semiotic tools were employed to interpret the awwal-awwal as provided by
the respondents and to formulate a subsequent understanding of this oral literature in relation to the Sama’s claim of sacredness of Tampat
Budjang.
Politeness and Intimacy in Application Letters of
Three Cultural Groups in Mindanao
Helen G Juaini1
Abstract: 150 application letters from the three cultural groups in Mindano, namely Sinama, Subanen, and Tausug have been analysed
in a mixed-method design. The focus of the study is on the two features of politeness and intimacy. In the quantitative analysis, the model
proposed by Brown & Levinson (1987) and that of Columns (2005) which have drawn upon the features of indirectness in requesting and
the length of letters as the indicators of politeness are used. In the qualitative and descriptive analysis formality in salutation and opening
clause as well as the use of abbreviated forms are taken into account. The result shows that Tausug use the politest style in their application
letters, followed by Sinama and Subanen respectively. On the other hand, Sinama, Subanen, and Tausug use the least intimate style in their
business letters. The findings are hoped to help better inter-cultural understanding, especially with respect to written rhetorical
characteristics.
New Authentication Algorithm for IoT Environment
based on Non-Commutative Algebra and Its
Implementation
Maki Kihara1, Satoshi Iriyama2
1,2Tokyo University of Science
Abstract: Recently, IoT devices such as robots, speakers, domestic electrical appliances and smart devices are provided everywhere for
everyone. While their authentication request is quite ubiquitously, namely, an authentication for sharing services, the actual
implementations are patchy schemes of variety security policies. In this study, we propose the new authentication scheme for IoT devices
without certificate authority which is fast enough as well as secure. The verification algorithm is based on suitable ciphered metric. We
define a class of such verifiable encryption and give an example for authentication. Moreover, we show the implementation which keeps
perfect secrecy by means of Shannon’s theory.
Developing a Strategic Organisational Learning
Framework to Improve Caribbean Disaster
Management Performance
Joanne Persad1
Abstract: Disasters are social constructs and require an agility and adaptability from national disaster organisations (NDOs). The
environment in which NDOs operate are complex adaptive systems environment, and organisational learning as a key approach is considered
fundamental to strengthening the ability of an NDO to perform at its best. With the potential for loss of lives, the destruction of critical
infrastructure and housing and to the risk of setting back a country’s economic development by many years, learning from the lessons of the
past, to reduce the negative impacts is critical for the onward growth of Caribbean countries which, for the most part, are small island
developing states. The Caribbean Region is the one of the most hazard prone regions in the world (Walbrent College 2012). Lessons from
disaster impacts are identified, gaps are well documented, and failures are sometimes exposed. But learning, in terms of making changes to
improve systems, performance and resilience, is questionable. The lessons must be applied for change to occur, this is part of the knowledge
management process in the context of disaster organisations. The purpose of this study is to explore the apparent inability of national
disaster organizations in the Caribbean to apply the lessons learnt from previous disasters. Three (3) Caribbean countries have been selected
for this research. It is a multiple case study where the unit of analysis is the national disaster organisation. This study is based on an
interpretive paradigm.
Combating Climate Change and Land Degradation in
The West African Sahel: A Multi-Country Study of
Mali, Niger and Senegal
S A Igbatayo1
1Head, Department of Economics & Management Studies, AFE Babalola University, Nigeria
Abstract: The West African Sahel is a vast ecological zone separating the Sahara Desert to the north and Sudanian savannah to the
south; traversing Senegal, Mali, Burkina Faso, Niger, northern Nigeria and Chad. With a population estimated at more than 60 million
people, the region features a multiplicity of development challenges. It is home to some of the world’s most impoverished people, whose
livelihoods are mostly reliant on rain-fed agriculture. Characterized by semi-arid vegetation, the West African Sahel is one of the most
environmentally degraded ecosystems in the world. The region faces severe and recurring bouts of droughts since the 1980s, jeopardizing
environmental sustainability. During the past four decades, the West African Sahel has witnessed below-average annual precipitation, with
two severe drought periods in 1972-1973 and 1983–1984, in a development that undermined agricultural productivity and spawned
severe land degradation. Various studies have predicted even more severe climate variability and change in the region, with drier and more
frequent dry periods expected. The intergovernmental Panel on climate change (IPCC, 2007) revealed a decline in annual rainfall in West
Africa since the end of the 1960s, with a reduction of 20% to 40% observed in the periods 1931-1960 and 1968–1990. Repeated
droughts, fuelled by climate change, have undermined land productivity, turning arable soils into marginal lands, and rendering land
resources vulnerable to such anthropogenic activities as over-grazing, agricultural intensification and deforestation, which are common
practices across the region. The major objective of this paper is to shed light on climate change and land degradation patterns in the West
African Sahel. It employs empirical data to analyse the trends, with particular emphasis on Mali, Niger and Senegal. The study reveals
considerable threats posed by the twin scourges of climate change and land degradation to food security, environmental sustainability and
regional stability.
Combating Climate Change and Land Degradation in
The West African Sahel: A Multi-Country Study of
Mali, Niger and Senegal
S A Igbatayo1
1Head, Department of Economics & Management Studies, AFE Babalola University, Nigeria
Abstract: The West African Sahel is a vast ecological zone separating the Sahara Desert to the north and Sudanian savannah to the
south; traversing Senegal, Mali, Burkina Faso, Niger, northern Nigeria and Chad. With a population estimated at more than 60 million
people, the region features a multiplicity of development challenges. It is home to some of the world’s most impoverished people, whose
livelihoods are mostly reliant on rain-fed agriculture. Characterized by semi-arid vegetation, the West African Sahel is one of the most
environmentally degraded ecosystems in the world. The region faces severe and recurring bouts of droughts since the 1980s, jeopardizing
environmental sustainability. During the past four decades, the West African Sahel has witnessed below-average annual precipitation, with
two severe drought periods in 1972-1973 and 1983–1984, in a development that undermined agricultural productivity and spawned
severe land degradation. Various studies have predicted even more severe climate variability and change in the region, with drier and more
frequent dry periods expected. The intergovernmental Panel on climate change (IPCC, 2007) revealed a decline in annual rainfall in West
Africa since the end of the 1960s, with a reduction of 20% to 40% observed in the periods 1931-1960 and 1968–1990. Repeated
droughts, fuelled by climate change, have undermined land productivity, turning arable soils into marginal lands, and rendering land
resources vulnerable to such anthropogenic activities as over-grazing, agricultural intensification and deforestation, which are common
practices across the region. The major objective of this paper is to shed light on climate change and land degradation patterns in the West
African Sahel. It employs empirical data to analyse the trends, with particular emphasis on Mali, Niger and Senegal. The study reveals
considerable threats posed by the twin scourges of climate change and land degradation to food security, environmental sustainability and
regional stability. It also presents a policy framework underpinned by climate change mitigation and adaptation strategies, formalizing land
rights for farmers, subsidizing farm inputs, creating grazing reserves for pastoralists and deepening poverty reduction strategies.
A Study on Factor Affecting Textile
Entrepreneurship – A Special Emphasis on Tirupur
District
P Anbuoli1
1Assistant Professor, Department of Business Administration, Mannar Thirumalai Naicker College, India
Abstract: Entrepreneurial success depends on various factors associated with the business, the entrepreneurs’ wishes to start. Entrepreneurs
need some sort of inspirations to succeed in their business ventures. Being a versatile industry, textile attracts many entrepreneurs both urban
and rural peoples and requires minimal investment to start. Textile entrepreneurs have to face several challenges and prospects associated
with their business. This study has been commenced with the objectives to check demographic profile, factors affecting textile entrepreneurs,
encouragement of external factors and personal reason behind to become textile business entrepreneurs. This study has been carried out with
100 textile entrepreneurs; the sample has been selected by using simple random sampling. This study is also carried out with non-disguised
and structured questionnaire; which consists of four parts with seeking information on demographic profile, factors affecting textile
entrepreneurs, external encouraging factors and personal reason to become textile entrepreneurs. This study uses percentage analysis, factor
analysis, Garrett score ranking, and t-test to analyse the data collected. It was concluded that textile entrepreneurs have been encouraged by
various factors and moreover several factors significantly affect their business.
Factors Affecting Consumer Purchase Behaviour
towards Online Clothing Products in Bangladesh
T Islam1
1BRAC Business School, BRAC University, Dhaka, Bangladesh
Abstract: The online clothing businesses have seen a considerable rise in recent times, with a high and growing demand. The purpose of
this study is to determine the factors that play significant roles in creating purchase intention towards the online clothing products in
Bangladesh. Secondary research was used to build the model of customer purchase intention. A structured questionnaire was employed to
gather data and test the model. Factor analysis and regression were used to test the model. The regression model suggested that customer
purchase intention was induced most by the online marketing activities of the online retailers, followed by pricing strategy implemented and
sense of security provided (in that order). To understand customer purchase intentions better, it may be important to look at additional
factors or seek better measures of the constructs. The study suggests that online retailers should heavily focus on online promotions and
pricing.
Improvement Measures on Wage System of
Construction Skilled Worker in South Korea
Kun-Hyung Lee1, Byung-Uk Jo2, Kyeoung-Min Han3, Chang-Baek Son4
1,2,3Graduate, School of Architectural Engineering, Semyung University, Jecheon-si, South Korea
4Professor, Department of Architectural Engineering, Semyung University, Jecheon-si, South Korea
Abstract: Unlike other industries, the construction industry is characterized by its heavy dependence on labour force with most work done
by workers. Still, the industry is witnessing the declining influx of young workers and the rising turnover rates of skilled workers due to such
issues as the advancement of 3D industry, negative image and absence of an established wage system. Hence, this paper proposes an
alternative scheme that would help improve the wage system and work environment for skilled construction workers in Korea.
Mastering the Recycling of Masonry while building
Tadao Ando’s Private Gallery in Lincoln Park,
Chicago
Daniel Joseph Whittaker1
Abstract: The notion of a great presence of masonry rarely conjures up the likes of buildings by master architect, Tadao Ando san of
Osaka, Japan, who is better known for his sublime shaping of space with planar forms of site-cast concrete. Perhaps though, one may recall
the ‘historical intervention’ on a grand scale—the now nine-year-old Punta Della Dogan a project (2009) in Venice, Italy, as prima facie
evidence of his dialogue with a vast quantity of ancient masonry in the Laguna. However, a new project by Ando, recently opened in
Chicago, Illinois (October 2018), presents the private-museum-gallery-going public with a new North American delight. Here, the senses
are able to indulge in a hybrid set of experiences shaped by masonry, concrete, and white painted plaster surfaces. This paper explores how
the modern concrete master has expanded his dynamic architectural vocabulary utilizing what is known as Chicago common brick: a soft,
Lake Michigan-sand and clay based fired brick, and incorporated it into his most recent private commission located in Lincoln Park,
Chicago.
RRI Buffer Based Energy and Computation Efficient
Cache Replacement Algorithm
Muhammad Shahid1
1Computer Science Department, National University of Computer and Emerging Sciences, Islamabad
Abstract: Energy consumption is an important factor of com-mutational power these days. Large scale energy consumption results in bad
system performance and high cost. To access frequently used data, we place it in Cache. Cache provides us opportunity to access that data in
a small time. Cache memory helps in retrieving data in minimum time improving the system performance and reducing power consumption.
Due to limited size of Cache, replacement algorithms used to make space for new data. There are many existing cache replacement
algorithms for example LRU, LFU, MRU, FIFO etc. Existing algorithms consume a lot of energy while replacing cold blocks of data.
Replacement algorithms are usually designed to reduce miss rate and increase hit rate. These algorithms replace cold blocks (not going to use
in future) and due to large number of cold blocks, they consume lot of energy. This paper proposes an energy and computation efficient cache
replacement algorithm that put only hot blocks in action instead of removing cold blocks. This paper also discusses different replacement
algorithms proposed in different papers and compare these algorithms on basis of different parameters mainly energy consumption. In our
experiments we have found LRU and FIFO as best replacement algorithms for Increased hit rates and Energy efficiency respectively.
Key Performance Index of Increasing Air Quality
with Construction Schedule Control
Hyoung-Chul Lim1, Dongheon Lee2, Dong-Eun Lee3, Daeyoung Kim4
1Professor, 2Doctorial Course, School of Architectural Engineering, Changwon National University, Korea
3Professor, School of Architecture & Civil Engineering, Kyungpook National University, Korea
4Professor, Department of Architecture, Kyungnam University, Korea
Abstract: Recently, air quality in residential spaces has been major concern. In particular, the indoor air quality of residential facility
before occupancy, which is related to the interior material, is a serious problem. existing research has mainly focused on pollution control
after construction, but this research has derived I key performance index I about increasing air quality and priority of management with a
controlling schedule. That is the objectives of research. The results show the relative priority of the four major items in wall‐based apartment
buildings and in column‐based apartment buildings. An analysis of the parties responsible for improvement based on the IAQ results shows
more efforts to improve IAQ are needed in material factories and engineering/design companies.
Exploring Revitalization Solutions: Engaging
Community through Media Architecture
Behzad Shojaedingivi1
1University of Tehran
Abstract: This paper aims to investigate Media Architecture and its potentials for culturally based revitalization. Media Architecture
presents a new approach based on Augmentation concepts, in which projects are designed and implemented adopting contemporary mediums
in an aesthetic way in order to attract the presence of a more cultural audience and increase the participation of the local residents.
Ultimately this will lead to an increase of interaction between different classes in neglected areas and strengthen their connection to their
built environment. This is an interdisciplinary approach in which architecture and contemporary mediums are combined aesthetically with
the aim of creating revival solutions in neglected areas.
Criteria of Creating Social Interaction for Green
Open Space in Karkh, Iraq
Sarah Abdulkareem Salih1, Sumarni Ismail2
1Master Student, 2Lecturer, Department of Architecture, Universiti Putra Malaysia, Malaysia
Abstract: This paper outlines the issue on open spaces, which led to decrease social interaction among residents in Baghdad city
nowadays. The main objective of the paper is to identify the criteria of green open spaces to achieve sound social interaction in Baghdad city,
Iraq. This paper employed quantitative method, in the form of survey, for data collection. Data were obtained from questionnaires, through
the selection of 270 respondents in a single-stage random procedure from ten specific neighbourhoods in Karkh district. The study findings
confirm that open spaces and parks is essential to enhance social interaction by implementing appropriate criteria in that open spaces or
parks. The results of this study are useful reference for urban and landscape planners, architects, social psychologists, the Municipality of
Baghdad, and researchers in this field.
The CoreConferences 2019 held on 20th – 21st March, 2019, in collaboration with Association of Scientists, Developers and Faculties (ASDF), an International body, at Taipei, Taiwan. CoreConferences 2019 provides a chance for Academic and Industry professionals to discuss the recent progress in the area of Multiple. The outcome of the conference will trigger for the further related research and future technological improvement. This conference highlights the novel concepts and improvements related to the research and technology.
ICCOTWT 2018 will be the most comprehensive conference focused on the various aspects of Cloud of Things and Wearable Technologies. This Conference provides a chance for academic and industry professionals to discuss recent progress in the area of Cloud of Things and Wearable Technologies. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject.
The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Cloud of Things and Wearable Technologies.
The International Conference on Computer, Engineering, Law, Education and Management (ICCELEM 2017)” held on 28 - 29th September 2017, in collaboration with Association of Scientists, Developers and Faculties (ASDF), an International body, at The Westin Chosun Seoul, Seoul, South Korea.
The Third International Conference on “Systems, Science, Control, Communication, Engineering and Technology (ICSSCCET 2017)” held on 16 - 17th February 2017, in collaboration with Association of Scientists, Developers and Faculties (ASDF), an International body, at Teegala Krishna Reddy Engineering College, Hyderabad, India, Asia.
The First International Conference on “Advanced Innovations in Engineering and Technology (ICAIET 2017)” held on 14th - 15th Feb 2017, in collaboration with Association of Scientists, Developers and Faculties (ASDF), an International body, at Rohini College of Engineering and Technology, Tamilnadu, India, Asia.
The First International Conference on “Intelligent Computing and Systems (ICICS 2017)” held on 13th - 14th February 2017, in collaboration with Association of Scientists, Developers and Faculties (ASDF), an International body, at NSN College of Engineering and Technology, Karur, Tamilnadu, India, Asia.
The First International Conference on “Advances & Challenges in Interdisciplinary Engineering and Management 2017 (ICACIEM 2017)” held on 11 – 12th February 2017, in collaboration with Association of Scientists, Developers and Faculties (ASDF), an International body, at Vidyaa Vikas College of Engineering and Technology, Tiruchengode, Tamilnadu, India, Asia.
Wireless sensor networks can provide low cost solution accompanied with limited storage, computational capability and power for verity of real-world problems and become essential factor when sensor nodes are arbitrarily deployed in a hostile environment. The cluster head selection technique is also one of the good approaches to reduce energy consumption in wireless sensor networks. The lifetime of wireless sensor networks is extended by using the uniform cluster head selection and balancing the network loading among the clusters. We have reviewed various energy efficient schemes apply in WSNs of which we concentrated on selection of cluster head approach and proposed an new method called Sleep Scheduling Routing with in clusters for Energy Efficient [SSREE]in which some nodes in clusters are usually put to sleep to conserve energy, and this helps to prolong the network lifetime. EASSR selects a node as a cluster head if its residual energy is more than system average energy and have less energy consumption rate in previous round. Then, an Performance analysis and compared statistic results of SSREE shows of the significant improvement over existing protocol LEACH, SEP and M-GEAR protocol in terms of lifetime of network and data units gathered at BS.
Due to rapid urbanization the manufacturing processes of conventional building materials pollutes air, water and land. Hence in order to fulfil the increasing demand it is required to adopt a cost effective, eco-friendly technologies by improving the traditional techniques with the usage of available local materials. Agro – industrial and other solid waste disposal is another serious issue of concern in most of developing countries. The present paper explores the potential application of agro-waste as an ingredient for alternate sustainable construction materials.
There has been an ever-increasing interest in big data due to its rapid growth and since it covers diverse areas of applications. Hence, there seems to be a need for an analytical review of recent developments in the big data technology. This paper aims to provide a comprehensive review of the big data state of the art, conceptual explorations, major benefits, and research challenging aspects. In addition to that, several future directions for big data research are highlighted.
A correct node operation and power administration are significant issues in the wireless sensor network system. Ultrasonic, dead reckoning, and radio frequency information is obtained by using localization mechanism and worked through a specific filter algorithm. In this paper, a well-organized grid deployment method is applied to split the nodes into multiple individual grids. The tiny grids are used for improved resolution and bigger grids are used to decrease the complexity of processing. The efficiency of each grid is obtained by environmental factors such as redeployed nodes, boundaries, and obstacles. To decrease the power usage, asynchronous power management method is designed. In network communication, power management method is applied by using an asynchronous awakening scheme and n-duplicate coverage algorithm is engineered for the coverage of nodes.
More from Association of Scientists, Developers and Faculties (20)
How To Change Name On Volaris Ticket.pdfnamechange763
How to change name on Volaris ticket? This is one of the most common questions asked by travelers flying with Volaris Airlines. The mentioned details can help you with your name rectification on the airline ticket. If you are still facing difficulties call the consolidation desk at +1-800-865-1848.
4 DAYS MASAI MARA WILDEBEEST MIGRATION SAFARI TOUR PACKAGE KENYABush Troop Safari
Join our 4-day Masai Mara Wildebeest Migration Safari in Kenya. Witness the incredible wildebeest migration, enjoy exciting game drives, and stay in comfortable lodges. Get up close and personal with one of nature's most amazing exhibits! Book Your Safari Today at - https://bushtroop-safaris.com/
The Cherry Blossom season in Hunza begins in the second week of March and lasts until the end of April, varying with altitude. During this enchanting period, tourists from around the world flock to Hunza Valley to witness its transformation into a vibrant tapestry of white, pink, and green. The valley comes alive with cherry blossoms, creating a picturesque and mesmerizing landscape that captivates visitors.
About the Company:
The Cherry Blossom season in Hunza starts in the second week of March and extends until the end of April, depending on the altitude. During this enchanting period, tourists from around the globe travel to Hunza Valley to witness its transformation into a vibrant tapestry of white, pink, and green. The valley comes alive with cherry blossoms, creating a picturesque and mesmerizing landscape that captivates all who visit. For the best experience, join Hunza Adventure Tours, the top tour company in Pakistan, and immerse yourself in this breathtaking seasonal spectacle.
During the coldest months, Italy transforms into a winter wonderland, providing visitors with a very unique experience. From the Settimana Bianca ski event to the lively Carnevale celebrations, Italy's winter festivities provide something for everyone. Enjoy hot cocoa, eat hearty comfort foods, and buy during winter deals. Explore the country's rich cultural past by participating in Settimana Bianca, and Carnevale, sipping hot chocolate, shopping during winter deals, and indulging in winter comfort foods. Visit our website https://timeforsicily.com/ for more information.
MC INTERNATIONALS | TRAVEL COMPANY IN JHANGAshBhatt4
Experience the world with MC Internationals travel and tourism. From foreign getways to cultural concentration, we tailor unforgettable journeys for every traveler. Let us turn your dream into reality and create lasting memories. Explore with us today. #TRAVEL,COMPANY #BEST,TRAVEL,COMPANY #VISIT,VISA #EMPLOYMENT,VISA #STUDY,VISA #HAJJ,AND,UMRAH
Discover the wonders of the Wenatchee River with a variety of river tours in Monitor, WA. Whether you're seeking thrilling whitewater rafting, peaceful kayaking, family-friendly float trips, or scenic sunset cruises, there's something for everyone. Enjoy fishing, wildlife spotting, bird watching, and more in this beautiful natural setting, perfect for outdoor enthusiasts and families alike.
Its running cost is among the diverse vital aspects you must consider before buying an electric scooter. Calculate the cost of getting e-scooter charge for your regular usage to calculate its economic efficiency, similar to people who investigate the mileage of petrol or diesel-driven scooters.
London Country Tours, the foremost travel partner offers customized Stonehenge tours from London coming with private tour guides and direct access to the inner circles. Visit: https://www.londoncountrytours.co.uk/tour/tours-to-stonehenge-oxford/
Exploring Montreal's Artistic Heritage Top Art Galleries and Museums to VisitSpade & Palacio Tours
Montreal boasts a vibrant artistic heritage, showcased in its top art galleries and museums. From the expansive collections at the Montreal Museum of Fine Arts to the cutting-edge exhibits at the Musée d'art contemporain, discover the city's rich cultural landscape. Experience dynamic street art, indigenous works, and contemporary pieces, reflecting Montreal's diverse and innovative art scene.
TRAVEL TO MT. RWENZORI NATIONAL PARK WITH NILE ABENTEUER SAFARIS.docxnileabenteuersafaris
Let’s explore the captivating Rwenzori Mountains National Park in Uganda with Nile Abenteuer Safaris. This UNESCO World Heritage Site, also known as the “Mountains of the Moon,” offers unparalleled beauty and diverse ecosystems. 🌿🏔️
Key Features of Rwenzori Mountains National Park:
Majestic Peaks:
Mount Rwenzori, Africa’s third-highest peak, dominates the landscape. Its snow-capped summits and glacier-draped slopes provide a challenging yet rewarding adventure for trekkers and climbers.
Ascending these peaks allows you to witness breathtaking vistas and experience the thrill of high-altitude trekking.
Biodiversity:
Explore the park’s rich biodiversity, which includes montane forests, alpine meadows, and towering cliffs.
Encounter rare and endemic species such as the Rwenzori turaco, Rwenzori red duiker, and Rwenzori three-horned chameleon.
Trekking Trails:
Embark on immersive trekking experiences along a network of trails. Choose from leisurely walks to multi-day expeditions.
Traverse verdant valleys, moss-draped forests, and marvel at cascading waterfalls as you ascend toward the summit.
Cultural Heritage:
Engage with local communities of the Bakonjo and Bamba people. Gain insight into their traditional way of life and cultural practices.
Discover the rich history and folklore surrounding the Rwenzori Mountains.
Planning Your Visit:
Trekking and Climbing:
Select from various trekking routes tailored to different skill levels and durations.
Experienced guides and porters ensure a safe and enjoyable journey to the summit.
Wildlife Viewing:
Embark on guided nature walks to spot diverse wildlife, including primates, birds, and endemic plant species.
Keep an eye out for the Rwenzori hyrax, blue monkeys, and various bird species.
Accommodation:
Rest and rejuvenate in comfortable lodges, campsites, and guesthouses within and around the park.
Experience warm hospitality amidst the tranquility of nature.
Conservation:
Support conservation efforts by adhering to park regulations and practicing responsible tourism.
Your visit contributes to preserving this pristine wilderness for future generations.
Embark on an Unforgettable Adventure:
Whether you seek the thrill of summiting Africa’s legendary peaks or the serenity of exploring remote landscapes, Mount Rwenzori promises an unforgettable journey into the heart of nature’s majesty. Start planning your expedition today and unlock the secrets of this captivating natural wonder!
Visit
https://nileabenteuer.com/tour_destination/mount-rwenzori-national-park/
https://www.rwenzoriexpeditions.com/treks/rwenzoris-gorilla-trek/
For more information;
WhatsApp: +256 752 397520
Email: info@nileabenteuer.com
Website: www.nileabenteuer.com
Antarctica- Icy wilderness of extremes and wondertahreemzahra82
In this presentation, we delve into the captivating realm of Antarctica, Earth's southernmost continent. This icy wilderness stands as a testament to extremes, with record-breaking cold temperatures and vast expanses of pristine ice. Antarctica's landscape is dominated by towering glaciers, colossal icebergs, and expansive ice shelves. Yet, amidst this frozen expanse, a rich tapestry of unique wildlife thrives, including penguins, seals, and seabirds, all finely attuned to survive in this harsh environment. Beyond its natural wonders, Antarctica also serves as a vital hub for scientific exploration, providing invaluable insights into climate change and the Earth's history
Discover Palmer, Puerto Rico, through an immersive cultural tour that unveils its rich history and vibrant traditions. Experience lively festivals, savor authentic cuisine, and explore local markets. Visit historical landmarks, museums, and stunning colonial architecture. Engage with friendly locals, enjoy live music, and hike scenic nature trails, all while participating in cultural workshops and discovering unique artisan crafts.
2. International Conference on eBusiness, eCommerce, eManagement, eLearning and eGovernance [IC5E] 129
Cite this article as: Kokula Krishna Hari K , Vignesh R . “eGovernance mechanism with BioMetrics
Classification and Authentication for Digital VISA Issuance and Validation.” International Conference on
eBusiness, eCommerce, eManagement, eLearning and eGovernance (2015): 128-133. Print.
RELATED WORKS
For decades the VISA Issuance Process was kept confidential and was a proved complication for many cross nation travelers especially
tourists with inconsequential travel agenda. But the present environment has created a structure that travelling across the borders has
certain acknowledged liberation. The United Nations Migration council in 1982 declared the Justice for the Alien and the adequacy of
the consular establishment enabling the VISA System.
The United Nations Migration Council has declared the Restrictive Employment immigration policies which clearly quote the
effectiveness and implications of sending people from ASEAN Countries. According to the statistics released by the United Nations in
2010, it quotes that 13% of the people who travel in Tourist VISA to other countries fail to return back to their nation post their
validity of VISA. And 6% of the total people who travel in Tourist VISA with criminal backgrounds departing from their home country
to evade the law. Data from which an estimation of the policies is made in this paper consists primarily of government or scholarly
publications that appear occasionally, and newspaper reports compiled by various institutions. Three main sources have been used. The
first one is a compilation of news items by the Center for Immigration Studies (CIS) in Washington, D.C. sent on a weekly basis to
interested recipients. The second is a monthly newsletter published by the University of California at Davis. The third is a bi-monthly
newsletter from the Scalabrini Migration Center in the Philippines on Asian Migration News (AMN).
Globally most nations have already digitized their civilian records, in an highly secured environment integration of these data is feasible
countries with high population and a high global migration like India and China have their own respective digital civilian record
keeping.
India’s big biometric database
India houses the most ambitious biometrics database in the world, Aadhaar, which has so far gathered fingerprints, iris scans and
photos of more than 500 million citizens – many of whom had no prior proof of their identity. Each gets a 12-digit number used for
various services.
China to get facial payments technology
China will see the introduction of an app using facial recognition to authorize payments, meaning that people’s features will become
their PIN for purchases. Once installed and linked to a credit card or bank account, the app will authorize payments in as little as one
second.
Obtaining a suitable environment and integrate these digital information can further take Visa Issuance to next level having minimal
manual interaction to the system, thereby minimizing the possibility of human error
The most used biometric method for data is Finger print verification,
Fingerprints - A fingerprint looks at the patterns found on a fingertip. There are a variety of approaches to fingerprint
verification, such as traditional police method, using pattern-matching devices, and things like moire fringe patterns and ultrasonic.
EXISTING SYSTEM
The European Union has the VIS Program which enables to share almost 97% of the data among the European Countries to avoid VISA
Fraud and VISA Trading. The Visa Information System (VIS) started operating on 11 October 2011. It connects consulates in non-EU
countries and all external border crossing points of Schengen States with a central database. VIS processes data related to applications
for short-stay visas in the Schengen Area. Visa applicants will enjoy faster procedures thanks to the use of biometrics, which will also
facilitate the identification of visa holders. Now, VIS is being used for all Schengen state visas.
Very similarly we have APC (Automated Passport Control) mechanism in the US Passport Control section. This is an initiative by the
CBP Team which stands responsible for Customs and Border Protection. This APC has the ability to handle International Visitors and
expedite the eligibility of Visa Free Entrance and Verification Checks. The usage of APC gives the visitors a faster processing, low
congestion and shortest processing time. This APC not only speeds the processing, but also saves the environment by skipping the
Customs Declaration forms and Arrival Card / Departure cards. Travelers may be prompted to scan their passport, smile for a
photograph and scan the barcode of their flight boarding pass. Need to validate the information displayed in the screen before moving
ahead. This simplifies the process around the manual grounds of checking information by the Passport Control Officer.
VIS WORKING PROCESS
The VIS allows the states of Schengen to share the information and particulars about an individual among the other states. The VIS uses
a centralized IT and communication infrastructure to get connected with other states across the Schengen countries and consulates in
3. International Conference on eBusiness, eCommerce, eManagement, eLearning and eGovernance [IC5E] 130
Cite this article as: Kokula Krishna Hari K , Vignesh R . “eGovernance mechanism with BioMetrics
Classification and Authentication for Digital VISA Issuance and Validation.” International Conference on
eBusiness, eCommerce, eManagement, eLearning and eGovernance (2015): 128-133. Print.
non-EU countries specifically the border crossing points across the Schengen. The system basically uses the Fingerprint identification
system to identify and match the records. These facilities in easiest identification of the rightful holder of the VISA; and accurate
validation of the information provided by the holder. This fights against the VISA Abuses and VISA Trading. And, this protects the
travelers enhancing the security.
The competent authorities at the Border Control and other agencies may consult with the VIS for purpose of examining the
applications and issuing the VISA or entry into the state. The authorities responsible for carrying out checks at external borders and
within the national territories have access to search the VIS for the purpose of verifying the identity of the person, the authenticity of
the visa or whether the person meets the requirements for entering, staying in or residing within the national territories.
Asylum authorities only have access to search the VIS for the purpose of determining the EU State responsible for the examination of
an asylum application. In specific cases, national authorities and Europol may request access to data entered into the VIS for the
purposes of preventing, detecting and investigating terrorist and criminal offences.
PROPOSED SYSTEM
When the EU is able to club the VIS enabling the quicker issuance of VISA validating all the synchronized information, why not the
other countries is going to the right question of the hour. The system is all about creating the IT infrastructure and communication
infrastructure capable of verifying the information globally amongst all the countries with the ability of multilingual information
validation process. Considering global digitization, with an effectual system, the percentage illegal immigrants can be reduced, by
tapping civilian’s other data than those available through passport, this can be achieved through global biometrics data integration.
The applicant may be asked to input few mandate information like the option of choosing the country for his/her studies or
employment or tourist visit. Basic inking about the country and his financial positions could be given with high weightage. For tourist
VISA considering the weightage and risk factors the system needs to be designed such that it offers, 15 days valid VISA, 30 days valid
VISA, 90 days valid VISA and Airline Ticket based VISA and more in the line flexible enough understanding the risk ability of the
destination country.
At the macro level it is similar to the existing system it validates the validity and genuineness of the Passport and other supporting
documents including Financial Reports, social ties, economic ties and other ties in line with the policy of the destination country.
Flow Chart : 1 Process of Decision Making
IN DETAIL
The complex process by each and every embassy is that to check that applicant has been convicted or found guilty of any civil or
criminal activities. The secondary question comes before issuing the VISA would be to check if the applicant has ever overstayed or
violated / breached the decorum of any country over his travel period. And finally the last question would be his ability to cover the
4. International Conference on eBusiness, eCommerce, eManagement, eLearning and eGovernance [IC5E] 131
Cite this article as: Kokula Krishna Hari K , Vignesh R . “eGovernance mechanism with BioMetrics
Classification and Authentication for Digital VISA Issuance and Validation.” International Conference on
eBusiness, eCommerce, eManagement, eLearning and eGovernance (2015): 128-133. Print.
expenses during his travel based on his or her financial positions. Further after receiving the satisfactory responses for all the above
questions a VISA is either granted or rejected.
IMPLEMENTATION TRIAL
The implementation part is underway and the following pictorial moves gives the basic idea about what the system is all about. Figure
1 gives the information for the login process controlled by secure authentication system.
Figure 1- Login System
Post login the embassy or the consul or VISA Officer will key in the passport number and country of issuance. On the validation of
information, the travel history of the applicant will be visible into the asylum’s screen to make the decision quicker and better. The
decision panel application will be HTML5 application which fetches the data records easily over mobile and tablets.
Bio metrics governed Visa consideration system
Finger Print Verification:
The finger print when recognized, taps the integrated database and the file of the corresponding civilian provided by the
particular country is loaded to the system, this file displays civilians, civil, judiciary, financial and criminal records. Based on
the relevant information, a graph for civilian Visa consideration is determined along with a score(Visa Consideration Score),
VSC, pertaining to the VSC system delivers the recommendations for the Visa, for a score below consideration point the
system provides a consideration blocker and it’s in-turn sent to Administrator for approval.
The administrator (Entry clearance officer) can verify the nature of the blocker, its severity and its potential impact to the
particular nation, each nation has its own nature of Financial, Civil or Judicial upkeep inadequacy for VISA, whilst
considering all factors the administrator clear’s/endorses the block for further Visa issuance proposal.
This is then followed by Digital Visa Issuing process.
Figure 2 - Passport Verification Login
When the passport information is inputted, the details pertaining to the issuing country will be displayed. This uses the ISO code of
country representation. The first two letter code represents the Country in which the passport was issued. The last character of the
digital passport is the Check Sum value of the passport holder.
The decision panel displays the particulars of the passport which is connected with the Judicial System of the country which the
passport is associated with. The below screenshot gives the decision panel of the VISA Issuance System which defines the probability of
the best issuance with Frequency of the Travel and Criminal cases associated with him. The age defines the recently passed age as per
the passport. Criminal Records are fetched from the Judicial System of the Government Database. The frequency is based on the
stamp-in and stamp-out of applicant at the airports and border check-points. It calculates all the travel and defines a point based system
to define the Over Stays, Criminal Activity in which applicant has involved in other countries and so on. These factors are internally
managed and travel remarks are updated. The system then generates its decision over the application. Of-course, there is no mandate
for the consul or VISA Officer to act according to the system, with the decision abilities of the self, he or she can have the decision.
Some complex cases like way long back the criminal records might have existed, the RIGHT TO BE FORGOTTEN rule can also be
implemented.
5. International Conference on eBusiness, eCommerce, eManagement, eLearning and eGovernance [IC5E] 132
Cite this article as: Kokula Krishna Hari K , Vignesh R . “eGovernance mechanism with BioMetrics
Classification and Authentication for Digital VISA Issuance and Validation.” International Conference on
eBusiness, eCommerce, eManagement, eLearning and eGovernance (2015): 128-133. Print.
Figure 3 - Application Decision Panel with Travel History
The decision panel also has the ability to display the detailed travel history and detailed criminal activity of the applicant. The above
image displays the last 4 travel VISA issued to the applicant. The VO can even expand this list. If the case, the applicant would have
had some criminal records or passport revoking under the laws, the same will also be displayed here.
CHALLENGES
The implementation phase of this Integrated Mechanism would be a great challenge mainly because of synchronization of data among
various governmental agencies and governments. Every Agency and Government is highly considering the value of data and privacy of
each and every citizen of their fellow country. This is the major and only flaw in all the phases of this Integrated eGov mechanism for
Remote VISA Issuance by the Embassy and Consular article.
FUTURE WORK
The process of integration doesn’t have a limitation. The next process would be integrating the Polis Records including petty offenses
and other civil disputes. The algorithm would be strengthened to explore the vitality of the petty offenses and civil disputes while
making a final decision over the issuance of VISA. Additionally, the financial monitoring would also be incorporated through the
service banks in each and every country which could be eradication of Lodgment of Money into the accounts at the last moment. As of
now the final module which needs to be appended amongst the others quoted above is the tax payer system.
CONCLUSION
In the closing remarks, the implementation of this integrated egovernance mechanism will surely help in limiting the total number of
expatriate illegally overstaying and attempting to perform the VISA RUN. Thus helping to maintain the country’s deliverability and
other opportunities for the legal citizens, globally in all the countries. This could also foster the relationship among the countries.
REFERENCES
[1] Kokula Krishna Hari K, Vignesh R, Muthuprakash Thangaraj, Long CAI. “Integrated eGov mechanism for Remote VISA
Issuance by the Embassy and Consular.” International Conference on Inter Disciplinary Research in Engineering and
Technology (2015): 235-239. Print.
[2] PARK, Sang Hoo. "KYUNC HEE UNIVERSITY."
[3] Quist, Edward B. "Justice for the Alien: The Adequacy of the Consular Visa Issuance System." Okla. City UL Rev. 7 (1982):
461.
[4] Vacca, J. (2007). Biometric technologies and verification systems. Amsterdam: Butterworth-Heinemann/Elsevier.
6. International Conference on eBusiness, eCommerce, eManagement, eLearning and eGovernance [IC5E] 133
Cite this article as: Kokula Krishna Hari K , Vignesh R . “eGovernance mechanism with BioMetrics
Classification and Authentication for Digital VISA Issuance and Validation.” International Conference on
eBusiness, eCommerce, eManagement, eLearning and eGovernance (2015): 128-133. Print.
[5] Shah, Nasra M. "Restrictive labour immigration policies in the oil-rich Gulf: Effectiveness and implications for sending Asian
countries." UN Expert Group Meeting on International Migration and Development in the Arab Region: Challenges and Opportunities,
Beirut. 2006.
[6] Broeders, Dennis. "The new digital borders of Europe EU databases and the surveillance of irregular migrants." International
sociology 22.1 (2007): 71-92.
[7] Peers, Steve. "Legislative Update: EC Immigration and Asylum Law, 2008: Visa Information System." European Journal of
Migration and Law 11.1 (2009): 69.
[8] Sprokkereef, Annemarie, and P. A. U. L. De Hert. "Ethical practice in the use of biometric identifiers within the EU." Law
Science and Policy 3.2 (2007): 177.
[9] Tzanou, Maria. "EU as an Emerging Surveillance Society: The Function Creep Case Study and Challenges to Privacy and
Data Protection, The." Vienna Online J. on Int'l Const. L. 4 (2010): 407.
[10] Gyulai, Gábor. "Statelessness in the EU Framework for International Protection." European Journal of Migration and Law 14.3
(2012): 279-295.
[11] Boehm, Franziska. "Information Sharing in the Area of Freedom, Security and Justice—Towards a Common Standard for
Data Exchange Between Agencies and EU Information Systems." European Data Protection: In Good Health?. Springer
Netherlands, 2012. 143-183.
[12] Mountz, Alison, and Jenna M. Loyd. "Constructing the Mediterranean region: obscuring violence in the bordering of
Europe’s migration “crises.”." ACME: An International E-Journal for Critical Geographies 13.2 (2014).
[13] Gorodnichy, D., S. Yanushkevich, and V. Shmerko. "Automated border control: Problem formalization." Computational
Intelligence in Biometrics and Identity Management (CIBIM), 2014 IEEE Symposium on. IEEE, 2014.
[14] Embassy, U. S. "President Obama Visits Cooperstown to Highlight Travel and Tourism that is Growing our Economy and
Creating Jobs." (2014).
[15] Weber, Leanne. "Visible and Virtual Borders: Saving Lives by ‘Seeing’ Sovereignty." Griffith Law Review 22.3 (2013): 666-
682.