SlideShare a Scribd company logo
1 of 23
Public   Safety, Security and  Disaster Management  by  MP Police Presentation by  Purushottam Sharma,IPS IGP, Madhya Pradesh, Bhopal
Challenges to Law Enforcing Agency ,[object Object],[object Object]
Government ‘s  Plan To Overcome Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CCTNS ,[object Object],[object Object]
AFIS ,[object Object],[object Object],[object Object]
AFIS STRUCTURE IN MP ,[object Object],[object Object],[object Object],[object Object],[object Object]
Architecture of AFIS Control Server Comm. Server   IND BPL JBP DWS KWA HBD BTL BHD GWL SHR Matcher Server
AMBIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Multi-modal Biometrics ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Multi-modal Biometrics- Empowerment ,[object Object],[object Object],[object Object],[object Object],[object Object]
Power of Multi-modal Biometrics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GIS/GPS based AVLS Project ,[object Object]
Advantage to Police Department ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Advantage to Public  ,[object Object],[object Object],[object Object],[object Object],[object Object]
MP Police Website
New Services in Website ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prominent Features “Services” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Risk to Database & Network ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Security Risk to Database & Network Continue
Security Policies Adopted by MP Police at Central Data Center ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Firewall Policy at Data Center ,[object Object],[object Object],[object Object],[object Object],[object Object]
Services Provided By Firewall ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THANK  YOU

More Related Content

What's hot

A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureDr. Michael Agbaje
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportAbdul Rehman
 
KawalPilpres2019: a highly secured real count voting escort architecture
KawalPilpres2019: a highly secured real count voting escort architectureKawalPilpres2019: a highly secured real count voting escort architecture
KawalPilpres2019: a highly secured real count voting escort architectureTELKOMNIKA JOURNAL
 
Ict for lawyers april 2019
Ict for lawyers april 2019Ict for lawyers april 2019
Ict for lawyers april 2019zulfi799
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technologyijsrd.com
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)Mark Milburn
 
Intelligent Helmet for Road Safety
Intelligent Helmet for Road SafetyIntelligent Helmet for Road Safety
Intelligent Helmet for Road Safetydbpublications
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowBenjamin Ang
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crimefiza209
 
NetScope network traffic monitoring
NetScope network traffic monitoringNetScope network traffic monitoring
NetScope network traffic monitoringHeath Snoek
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
Design of a gsm based biometric access control system
Design of a gsm based biometric access control systemDesign of a gsm based biometric access control system
Design of a gsm based biometric access control systemAlexander Decker
 

What's hot (19)

J017555559
J017555559J017555559
J017555559
 
A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System Architecture
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Survillance description
Survillance descriptionSurvillance description
Survillance description
 
KawalPilpres2019: a highly secured real count voting escort architecture
KawalPilpres2019: a highly secured real count voting escort architectureKawalPilpres2019: a highly secured real count voting escort architecture
KawalPilpres2019: a highly secured real count voting escort architecture
 
Ict for lawyers april 2019
Ict for lawyers april 2019Ict for lawyers april 2019
Ict for lawyers april 2019
 
Mobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC TechnologyMobile Voting System Using Advanced NFC Technology
Mobile Voting System Using Advanced NFC Technology
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)
 
Rajan Raj Pant
Rajan Raj PantRajan Raj Pant
Rajan Raj Pant
 
Intelligent Helmet for Road Safety
Intelligent Helmet for Road SafetyIntelligent Helmet for Road Safety
Intelligent Helmet for Road Safety
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must know
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
NetScope network traffic monitoring
NetScope network traffic monitoringNetScope network traffic monitoring
NetScope network traffic monitoring
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Design of a gsm based biometric access control system
Design of a gsm based biometric access control systemDesign of a gsm based biometric access control system
Design of a gsm based biometric access control system
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 

Viewers also liked

Fingerprints basics for scouts
Fingerprints basics for scoutsFingerprints basics for scouts
Fingerprints basics for scoutsRuss Lesco
 
Computer and Internet
Computer and InternetComputer and Internet
Computer and Internetvayalun
 
Kinds of neurons
Kinds of neuronsKinds of neurons
Kinds of neuronsjugafoce
 
The Little Ice Age
The Little Ice AgeThe Little Ice Age
The Little Ice AgeWestBridger
 
Making the Books Balance – Understanding the Financial Context and Efficiency...
Making the Books Balance – Understanding the Financial Context and Efficiency...Making the Books Balance – Understanding the Financial Context and Efficiency...
Making the Books Balance – Understanding the Financial Context and Efficiency...NHSScotlandEvent
 
Curso Livre de Python - Aula 03/11 - Módulo I
Curso Livre de Python - Aula 03/11 - Módulo ICurso Livre de Python - Aula 03/11 - Módulo I
Curso Livre de Python - Aula 03/11 - Módulo IPeslPinguim
 
Cranford Real Estate Market Update - July 2014
Cranford Real Estate Market Update - July 2014Cranford Real Estate Market Update - July 2014
Cranford Real Estate Market Update - July 2014Jean Zuhl
 
Transforming Quality Through the Third Sector: Challenging and Influencing Pr...
Transforming Quality Through the Third Sector: Challenging and Influencing Pr...Transforming Quality Through the Third Sector: Challenging and Influencing Pr...
Transforming Quality Through the Third Sector: Challenging and Influencing Pr...NHSScotlandEvent
 
Loi chuc tet 2013 hay nhat tin.tuyensinh247.com
Loi chuc tet 2013  hay nhat   tin.tuyensinh247.comLoi chuc tet 2013  hay nhat   tin.tuyensinh247.com
Loi chuc tet 2013 hay nhat tin.tuyensinh247.comNtc Pro
 
открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)
открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)
открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)uluana_v
 
федерация за всеобщий мир UPF 12.12.12. Международное волонтерство – новые в...
федерация за всеобщий мир UPF 12.12.12.  Международное волонтерство – новые в...федерация за всеобщий мир UPF 12.12.12.  Международное волонтерство – новые в...
федерация за всеобщий мир UPF 12.12.12. Международное волонтерство – новые в...Dmitry Samko
 
Cell structure function
Cell structure functionCell structure function
Cell structure functionjugafoce
 

Viewers also liked (20)

Fingerprints basics for scouts
Fingerprints basics for scoutsFingerprints basics for scouts
Fingerprints basics for scouts
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
4.1 notes
4.1 notes4.1 notes
4.1 notes
 
Computer and Internet
Computer and InternetComputer and Internet
Computer and Internet
 
Kinds of neurons
Kinds of neuronsKinds of neurons
Kinds of neurons
 
The Little Ice Age
The Little Ice AgeThe Little Ice Age
The Little Ice Age
 
Making the Books Balance – Understanding the Financial Context and Efficiency...
Making the Books Balance – Understanding the Financial Context and Efficiency...Making the Books Balance – Understanding the Financial Context and Efficiency...
Making the Books Balance – Understanding the Financial Context and Efficiency...
 
Mikaela scott
Mikaela scottMikaela scott
Mikaela scott
 
Aula4
Aula4Aula4
Aula4
 
Nery jones
Nery jonesNery jones
Nery jones
 
Curso Livre de Python - Aula 03/11 - Módulo I
Curso Livre de Python - Aula 03/11 - Módulo ICurso Livre de Python - Aula 03/11 - Módulo I
Curso Livre de Python - Aula 03/11 - Módulo I
 
Cranford Real Estate Market Update - July 2014
Cranford Real Estate Market Update - July 2014Cranford Real Estate Market Update - July 2014
Cranford Real Estate Market Update - July 2014
 
Enhancing relationships
Enhancing relationshipsEnhancing relationships
Enhancing relationships
 
Transforming Quality Through the Third Sector: Challenging and Influencing Pr...
Transforming Quality Through the Third Sector: Challenging and Influencing Pr...Transforming Quality Through the Third Sector: Challenging and Influencing Pr...
Transforming Quality Through the Third Sector: Challenging and Influencing Pr...
 
9.2 notes
9.2 notes9.2 notes
9.2 notes
 
Loi chuc tet 2013 hay nhat tin.tuyensinh247.com
Loi chuc tet 2013  hay nhat   tin.tuyensinh247.comLoi chuc tet 2013  hay nhat   tin.tuyensinh247.com
Loi chuc tet 2013 hay nhat tin.tuyensinh247.com
 
7.4 notes
7.4 notes7.4 notes
7.4 notes
 
открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)
открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)
открытие мемориальной доски иванову андерю олеговичу (01 августа 2013 г)
 
федерация за всеобщий мир UPF 12.12.12. Международное волонтерство – новые в...
федерация за всеобщий мир UPF 12.12.12.  Международное волонтерство – новые в...федерация за всеобщий мир UPF 12.12.12.  Международное волонтерство – новые в...
федерация за всеобщий мир UPF 12.12.12. Международное волонтерство – новые в...
 
Cell structure function
Cell structure functionCell structure function
Cell structure function
 

Similar to Purushottam Sharma

Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification systemSameer Telikicherla
 
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveTop 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveManageEngine, Zoho Corporation
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security InfrastructureGAURAV. H .TANDON
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructureShreyas Satpute
 
Tufin white paper v1 dcr final
Tufin white paper v1 dcr final Tufin white paper v1 dcr final
Tufin white paper v1 dcr final Clive Freedman
 
Tufin white paper Network Security Policy Automation and Orchestration for Po...
Tufin white paper Network Security Policy Automation and Orchestration for Po...Tufin white paper Network Security Policy Automation and Orchestration for Po...
Tufin white paper Network Security Policy Automation and Orchestration for Po...Clive Freedman
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochureColin Valencia
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile applicationAlexander Decker
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek chan
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013 Mark Skilton
 
traffic reulation
traffic reulationtraffic reulation
traffic reulationPranav Kale
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...IJCNCJournal
 
CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisPatrick Floto
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesMadhur Gupta
 

Similar to Purushottam Sharma (20)

CCTNS IN KARNATAKA- EXPERIENCE SHARING
CCTNS IN KARNATAKA- EXPERIENCE SHARINGCCTNS IN KARNATAKA- EXPERIENCE SHARING
CCTNS IN KARNATAKA- EXPERIENCE SHARING
 
Ambis
AmbisAmbis
Ambis
 
Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification system
 
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveTop 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Tufin white paper v1 dcr final
Tufin white paper v1 dcr final Tufin white paper v1 dcr final
Tufin white paper v1 dcr final
 
Tufin white paper Network Security Policy Automation and Orchestration for Po...
Tufin white paper Network Security Policy Automation and Orchestration for Po...Tufin white paper Network Security Policy Automation and Orchestration for Po...
Tufin white paper Network Security Policy Automation and Orchestration for Po...
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochure
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 
Challenge Fund Empowered Committee Meeting
Challenge Fund Empowered Committee MeetingChallenge Fund Empowered Committee Meeting
Challenge Fund Empowered Committee Meeting
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 
traffic reulation
traffic reulationtraffic reulation
traffic reulation
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
 
CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_Analysis
 
Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
 

More from eletseditorial

More from eletseditorial (20)

Tele-homeopathy Mind Technologies- eINDIA2011
Tele-homeopathy Mind Technologies- eINDIA2011Tele-homeopathy Mind Technologies- eINDIA2011
Tele-homeopathy Mind Technologies- eINDIA2011
 
3 d technology in education :: Podar International School
3 d technology in education :: Podar International School3 d technology in education :: Podar International School
3 d technology in education :: Podar International School
 
Nalini Chandran, Director
Nalini Chandran, Director Nalini Chandran, Director
Nalini Chandran, Director
 
Rachna Swarup
Rachna Swarup Rachna Swarup
Rachna Swarup
 
Murli K S
Murli K S Murli K S
Murli K S
 
Dr Kuldeep Agarwal,
Dr Kuldeep Agarwal, Dr Kuldeep Agarwal,
Dr Kuldeep Agarwal,
 
Mark Parkinson
Mark Parkinson Mark Parkinson
Mark Parkinson
 
Nagraj G Honnekeri
Nagraj G Honnekeri Nagraj G Honnekeri
Nagraj G Honnekeri
 
Shraman Jha
Shraman Jha Shraman Jha
Shraman Jha
 
Dr Melor Md yunus
Dr Melor Md yunus Dr Melor Md yunus
Dr Melor Md yunus
 
Dinesh Kumar
Dinesh Kumar Dinesh Kumar
Dinesh Kumar
 
Veena Raizada
Veena Raizada Veena Raizada
Veena Raizada
 
Amit Gupta
Amit Gupta Amit Gupta
Amit Gupta
 
Dr Anita Priyadarshini
Dr Anita Priyadarshini Dr Anita Priyadarshini
Dr Anita Priyadarshini
 
Dr Anjalee Prakash
Dr Anjalee Prakash Dr Anjalee Prakash
Dr Anjalee Prakash
 
Son Kuswadi
Son Kuswadi Son Kuswadi
Son Kuswadi
 
Mr. Raj Grover
Mr. Raj Grover Mr. Raj Grover
Mr. Raj Grover
 
Mr. Manish Upadhyay
Mr. Manish Upadhyay Mr. Manish Upadhyay
Mr. Manish Upadhyay
 
Dr Thomas Christie
Dr Thomas Christie Dr Thomas Christie
Dr Thomas Christie
 
Prof K R Srivathsan
Prof K R Srivathsan Prof K R Srivathsan
Prof K R Srivathsan
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Purushottam Sharma

  • 1. Public Safety, Security and Disaster Management by MP Police Presentation by Purushottam Sharma,IPS IGP, Madhya Pradesh, Bhopal
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Architecture of AFIS Control Server Comm. Server IND BPL JBP DWS KWA HBD BTL BHD GWL SHR Matcher Server
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.

Editor's Notes

  1. Thus iris being the most accurate and fastest biometric can be used for very accurate and rapid identification of criminals