SlideShare a Scribd company logo
Use of biometrics in Disaster Management
Use of biometrics has been speeding up disaster response and
helped in identifying the victims via fingerprints or facial tracking in
the last couple of years observed Bahaa Abdul Hadi.
Biometrics-based technology has a long history with events of mass
fatality and has been used extensively in DVI or disaster victim
identification.
They have made a huge difference in disaster recovery for everything
from Hurricane Katrina, Super Typhoon Haiyan and the latest Turkey
earthquakes to explosions in Ukraine and the crash of Malaysian
airplane MH17. The appeal of biometrics lies in its ability to combine
ease of tracking with immediacy in data retrieval, sometimes even
making the difference between life and death.
Edge over conventional verification processes
The use of biometrics in calamity response has proven to be highly
efficient as it saves time and effort in identifying the victims.
Traditionally, the manual verification process may take 1-2 days but
with biometrics-based tech, we can instantly conjure up the data of
the persons. Even with cases of fingerprint erasure on the body,
fingerprint sensors have been able to precisely verify the identity in
just minutes.
Mitigation time and information recovery
In the era of smartphones and biometrics readers, it has become
easier than ever to provide first response to any catastrophe.
Relatives of victims no longer have to anxiously wait and the police,
fire and healthcare services can also react quickly with the help of
this life-saving data. Visual detection and fingerprint sensing in the
event of explosions, accidents or terrorist attacks have proven to be
valuable in alerting all the pertinent individuals.
Rescuing minors
Another avenue of importance where biometrics emerges as the
winner is for saving the children during a crisis. When kids are unable
to give accurate information about their family, biometrics tech comes
in handy for verifying their identities. A simple search through the
national database or missing children reports will match the
fingerprints and find their identities.
Digital response mechanism
The use of biometrics at the scene of the accident works seamlessly
with digitalized processes used by the government to send relief
services. Relief measures that operate at the centre can all be
streamlined and rendered quickly once the vital information about
victims’ identities is handed to the government. Every stage of
response is benefited by the initial employment of fingerprint and
facial detection. For these reasons, biometrics has been prominently
employed in recent times and is hailed as the future of both
man-made and natural disaster response.
Thank you for your interest in Bahaa Abdul Hadi blogs. For more
information, please stay tuned to www.bahaaabdulhadi.com

More Related Content

Similar to Use of biometrics in Disaster Management.pdf

New Revolution in Healthcare Digital Health.pdf
New Revolution in Healthcare Digital Health.pdfNew Revolution in Healthcare Digital Health.pdf
New Revolution in Healthcare Digital Health.pdf
insightscare
 
Biometric1
Biometric1Biometric1
Healthcare in a Digital World
Healthcare in a Digital WorldHealthcare in a Digital World
Healthcare in a Digital World
Mark Stanley, PMP
 
_How do Biometrics Improve the Hospital Performance_ - Bahaa Abdul Hadi.pdf
_How do Biometrics Improve the Hospital Performance_ - Bahaa Abdul Hadi.pdf_How do Biometrics Improve the Hospital Performance_ - Bahaa Abdul Hadi.pdf
_How do Biometrics Improve the Hospital Performance_ - Bahaa Abdul Hadi.pdf
Bahaa Abdulhadi
 
Smart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of thingsSmart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of things
nooriasukmaningtyas
 
Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law Enforcement
Bahaa Abdulhadi
 
COVID-19 Impact: Emerging Trends in Digital Health
COVID-19 Impact: Emerging Trends in Digital HealthCOVID-19 Impact: Emerging Trends in Digital Health
COVID-19 Impact: Emerging Trends in Digital Health
ExpertsConsult
 
The Rise of AI: Technology Trends in Healthcare
The Rise of AI: Technology Trends in HealthcareThe Rise of AI: Technology Trends in Healthcare
The Rise of AI: Technology Trends in Healthcare
DashTechnologiesInc
 
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...
YogeshIJTSRD
 
covid19 solution public mobility monitoring
covid19 solution  public mobility monitoringcovid19 solution  public mobility monitoring
covid19 solution public mobility monitoring
Adhiguna Mahendra
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric Patterns
Bahaa Abdulhadi
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
Lanate Drummond
 
Biometrics and Law Enforcement.pdf
Biometrics and Law Enforcement.pdfBiometrics and Law Enforcement.pdf
Biometrics and Law Enforcement.pdf
Bahaa Abdulhadi
 
Evolution of virtualized healthcare models.pdf
Evolution of virtualized healthcare models.pdfEvolution of virtualized healthcare models.pdf
Evolution of virtualized healthcare models.pdf
Mindfire LLC
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
Dr Lendy Spires
 
Information Technology in Pandemic
Information Technology in PandemicInformation Technology in Pandemic
Information Technology in Pandemic
Swati Karn
 
Evolution of virtualized healthcare models.pdf
Evolution of virtualized healthcare models.pdfEvolution of virtualized healthcare models.pdf
Evolution of virtualized healthcare models.pdf
Mindfire LLC
 
Selv Demo - A Digital Health Passport
Selv Demo - A Digital Health PassportSelv Demo - A Digital Health Passport
Selv Demo - A Digital Health Passport
Jelle Femmo Millenaar
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
IRJET Journal
 
The World of Migrants and Human Rights Using Biometrics - Bahaa Abdul Hadi.pdf
The World of Migrants and Human Rights Using Biometrics - Bahaa Abdul Hadi.pdfThe World of Migrants and Human Rights Using Biometrics - Bahaa Abdul Hadi.pdf
The World of Migrants and Human Rights Using Biometrics - Bahaa Abdul Hadi.pdf
Bahaa Abdulhadi
 

Similar to Use of biometrics in Disaster Management.pdf (20)

New Revolution in Healthcare Digital Health.pdf
New Revolution in Healthcare Digital Health.pdfNew Revolution in Healthcare Digital Health.pdf
New Revolution in Healthcare Digital Health.pdf
 
Biometric1
Biometric1Biometric1
Biometric1
 
Healthcare in a Digital World
Healthcare in a Digital WorldHealthcare in a Digital World
Healthcare in a Digital World
 
_How do Biometrics Improve the Hospital Performance_ - Bahaa Abdul Hadi.pdf
_How do Biometrics Improve the Hospital Performance_ - Bahaa Abdul Hadi.pdf_How do Biometrics Improve the Hospital Performance_ - Bahaa Abdul Hadi.pdf
_How do Biometrics Improve the Hospital Performance_ - Bahaa Abdul Hadi.pdf
 
Smart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of thingsSmart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of things
 
Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law Enforcement
 
COVID-19 Impact: Emerging Trends in Digital Health
COVID-19 Impact: Emerging Trends in Digital HealthCOVID-19 Impact: Emerging Trends in Digital Health
COVID-19 Impact: Emerging Trends in Digital Health
 
The Rise of AI: Technology Trends in Healthcare
The Rise of AI: Technology Trends in HealthcareThe Rise of AI: Technology Trends in Healthcare
The Rise of AI: Technology Trends in Healthcare
 
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...
 
covid19 solution public mobility monitoring
covid19 solution  public mobility monitoringcovid19 solution  public mobility monitoring
covid19 solution public mobility monitoring
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric Patterns
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometrics and Law Enforcement.pdf
Biometrics and Law Enforcement.pdfBiometrics and Law Enforcement.pdf
Biometrics and Law Enforcement.pdf
 
Evolution of virtualized healthcare models.pdf
Evolution of virtualized healthcare models.pdfEvolution of virtualized healthcare models.pdf
Evolution of virtualized healthcare models.pdf
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
 
Information Technology in Pandemic
Information Technology in PandemicInformation Technology in Pandemic
Information Technology in Pandemic
 
Evolution of virtualized healthcare models.pdf
Evolution of virtualized healthcare models.pdfEvolution of virtualized healthcare models.pdf
Evolution of virtualized healthcare models.pdf
 
Selv Demo - A Digital Health Passport
Selv Demo - A Digital Health PassportSelv Demo - A Digital Health Passport
Selv Demo - A Digital Health Passport
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
The World of Migrants and Human Rights Using Biometrics - Bahaa Abdul Hadi.pdf
The World of Migrants and Human Rights Using Biometrics - Bahaa Abdul Hadi.pdfThe World of Migrants and Human Rights Using Biometrics - Bahaa Abdul Hadi.pdf
The World of Migrants and Human Rights Using Biometrics - Bahaa Abdul Hadi.pdf
 

More from Bahaa Abdulhadi

Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
Bahaa Abdulhadi
 
Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Biometric Analytics for Border Control..
Biometric Analytics for Border Control..
Bahaa Abdulhadi
 
Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.
Bahaa Abdulhadi
 
Biometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare DomainBiometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare Domain
Bahaa Abdulhadi
 
Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.
Bahaa Abdulhadi
 
Impact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI VerticalImpact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI Vertical
Bahaa Abdulhadi
 
Biometric Analytics & Workplace Security
Biometric Analytics & Workplace SecurityBiometric Analytics & Workplace Security
Biometric Analytics & Workplace Security
Bahaa Abdulhadi
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
Bahaa Abdulhadi
 
Biometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBiometric Analytics: The Future of Security
Biometric Analytics: The Future of Security
Bahaa Abdulhadi
 
Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?
Bahaa Abdulhadi
 
Neural Biometrics for Healthcare
Neural Biometrics for HealthcareNeural Biometrics for Healthcare
Neural Biometrics for Healthcare
Bahaa Abdulhadi
 
Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?
Bahaa Abdulhadi
 
The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram)
Bahaa Abdulhadi
 
Next chapter in biometrics
Next chapter in biometrics Next chapter in biometrics
Next chapter in biometrics
Bahaa Abdulhadi
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric Patterns
Bahaa Abdulhadi
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in Healthcare
Bahaa Abdulhadi
 
Biometric Patterns & Security
Biometric Patterns & SecurityBiometric Patterns & Security
Biometric Patterns & Security
Bahaa Abdulhadi
 
Privacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsPrivacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric Patterns
Bahaa Abdulhadi
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric Patterns
Bahaa Abdulhadi
 
BAHADI - AUG06.pdf
BAHADI - AUG06.pdfBAHADI - AUG06.pdf
BAHADI - AUG06.pdf
Bahaa Abdulhadi
 

More from Bahaa Abdulhadi (20)

Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
 
Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Biometric Analytics for Border Control..
Biometric Analytics for Border Control..
 
Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.
 
Biometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare DomainBiometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare Domain
 
Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.
 
Impact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI VerticalImpact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI Vertical
 
Biometric Analytics & Workplace Security
Biometric Analytics & Workplace SecurityBiometric Analytics & Workplace Security
Biometric Analytics & Workplace Security
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
 
Biometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBiometric Analytics: The Future of Security
Biometric Analytics: The Future of Security
 
Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?
 
Neural Biometrics for Healthcare
Neural Biometrics for HealthcareNeural Biometrics for Healthcare
Neural Biometrics for Healthcare
 
Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?
 
The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram)
 
Next chapter in biometrics
Next chapter in biometrics Next chapter in biometrics
Next chapter in biometrics
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric Patterns
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in Healthcare
 
Biometric Patterns & Security
Biometric Patterns & SecurityBiometric Patterns & Security
Biometric Patterns & Security
 
Privacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsPrivacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric Patterns
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric Patterns
 
BAHADI - AUG06.pdf
BAHADI - AUG06.pdfBAHADI - AUG06.pdf
BAHADI - AUG06.pdf
 

Recently uploaded

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 

Recently uploaded (20)

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 

Use of biometrics in Disaster Management.pdf

  • 1. Use of biometrics in Disaster Management Use of biometrics has been speeding up disaster response and helped in identifying the victims via fingerprints or facial tracking in the last couple of years observed Bahaa Abdul Hadi. Biometrics-based technology has a long history with events of mass fatality and has been used extensively in DVI or disaster victim identification. They have made a huge difference in disaster recovery for everything from Hurricane Katrina, Super Typhoon Haiyan and the latest Turkey earthquakes to explosions in Ukraine and the crash of Malaysian airplane MH17. The appeal of biometrics lies in its ability to combine ease of tracking with immediacy in data retrieval, sometimes even making the difference between life and death. Edge over conventional verification processes The use of biometrics in calamity response has proven to be highly efficient as it saves time and effort in identifying the victims. Traditionally, the manual verification process may take 1-2 days but with biometrics-based tech, we can instantly conjure up the data of the persons. Even with cases of fingerprint erasure on the body, fingerprint sensors have been able to precisely verify the identity in just minutes. Mitigation time and information recovery In the era of smartphones and biometrics readers, it has become easier than ever to provide first response to any catastrophe. Relatives of victims no longer have to anxiously wait and the police, fire and healthcare services can also react quickly with the help of this life-saving data. Visual detection and fingerprint sensing in the event of explosions, accidents or terrorist attacks have proven to be valuable in alerting all the pertinent individuals.
  • 2. Rescuing minors Another avenue of importance where biometrics emerges as the winner is for saving the children during a crisis. When kids are unable to give accurate information about their family, biometrics tech comes in handy for verifying their identities. A simple search through the national database or missing children reports will match the fingerprints and find their identities. Digital response mechanism The use of biometrics at the scene of the accident works seamlessly with digitalized processes used by the government to send relief services. Relief measures that operate at the centre can all be streamlined and rendered quickly once the vital information about victims’ identities is handed to the government. Every stage of response is benefited by the initial employment of fingerprint and facial detection. For these reasons, biometrics has been prominently employed in recent times and is hailed as the future of both man-made and natural disaster response. Thank you for your interest in Bahaa Abdul Hadi blogs. For more information, please stay tuned to www.bahaaabdulhadi.com