Search

Advanced Search

Paper presented by Dr. L.R. Yadav, STD at EAIT International Conference 2012 held in Kolkata.

Anshu Rohatgi, Uttar Pradesh anshu[dot]rohatgi[at]nic[dot]in
  |   Dec 21, 2012
Dr. Yadav preseting the paper at EAIT 2012
Dr. Yadav preseting the paper at EAIT 2012

Dr L. R Yadav, Senior Technical Director, NIC, U.P. State Unit Lucknow presented a paper on “Strengthening Government Decision Making Process Through Integrated SPIDER and e-MANCHITRA Online Portals” during third International Conference on ‘Emerging Applications of Information Technology (EAIT) 2012’ held at  ISI, Kolkata between 30thNovember and 1st December 2012. The conference was organised by Computer Society of India Kolkata Chapter to recognize the tremendous growth in the application areas of Information Technology and to provide a forum to the technologists, application developers, researchers from the industry and academic institutions to exchange their ideas on the emerging areas of ICT.

SPIDER is an internet based data entry and retrieval system that facilitates decentralized, online data entry and updating on more than 4000 parameters thereby providing local level information in digital form for decision making.  This project is meant to identify the inter village panchayat, inter block and inter district disparities so that gaps can be found in developed and under developed areas. The eMANCHITRA (Map Based Analytical Charting and Reporting Application) aims at eliminating inter regional disparities that persist as a problem in decentralisation process, by generating grass root level thematic atlases based on SPIDER indicators.

Recent Issues

Highlights

Apr. ‘ 25 Issue


Decoding Data Governance & Strategy: Strategies for Data Protection, Compliance, and Optimization

In today digital era, data is the cornerstone of innovation, business growth, and governance. As India witnesses an ...


AI-Based Face Search: Transforming Archives with Facial Search Intelligence

Face search technology uses AI to identify and match faces across large photo collections. It extracts unique facial ...


Puduvai Kalal: Strengthening Governance Through Digital Transformation

The State Excise Department of Puducherry is a key government agency responsible for regulating excise activities within ...

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks: A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...