Driven by the enormous challenge of reducing oil dependence in India for transportation and also curbing environmental pollution from vehicle emissions in metropolitan cities, rapid adoption of alternate green technologies for vehicles on road is now seen as inevitable. The government’s vision for complete conversion to electric vehicles (EV) by 2030 has provided entrepreneurship opportunities to innovate affordable ways for converting existing petrol and diesel cars into electric cars. The conversion of old vehicles into electric vehicles through retrofitting has already been allowed by the Central Government through official notification. Since an EV has no internal combustion engine, the conversion process involves removal of majority of the vehicle parts related to the fuel combustion system and installing suitable electric powertrain and other systems for better efficiency and reduced travel cost. The challenge is to develop intellectual property (software and hardware) and off the shelf components to create high performance and high efficiency retro-fit kits for existing vehicle models on Indian roads. Advancements in systems integration engineering, controls, battery, electric motor and power electronics technologies have created an opportunity for small and medium scale technology companies and start-ups to design solutions to these problems. With cost of technology, batteries and renewable energy coming down, the solutions can become viable for even mini- and mid-segment car owners. Affordable retro-fit solutions along with their low maintenance costs could trigger mass adoption by both private and commercial vehicle owners in the country.
Smart India Hackathon 2018
It has been observed that critical piece of information desired by leadership is scattered across various Groups /Divisions /Organisation of MeitY. Manual collection, compilation and consolidation are time consuming exercise. As the above process is manual and it requires huge amount of man hours for mechanical tasks such as circulation, follow-ups & reminders, compilation, consolidation, submission for approvals, and responding back to outside Ministry. These huge man hours could have been utilised for better productivity. In view of above, it is felt that an automated system for Information Collection may be designed to address the above challenge. i. Coordination Division of Ministry looks after the task of collecting, consolidating, and responding the critical piece of scattered information lies with various Groups/Divisions/Organisation of MeitY solicited by other Ministries/State Government. In order to ensure smooth flow and availability of information, Coordination Division ensures synergy and coordination among various Groups/Divisions/Organisations of MeitY. ii. The existing process is more of manual process which requires a letter to be circulated to all concerned either through email or through hardcopy seeking information available with them w.r.t. their functions. Based on the responses received from various Divisions, Coordination Division consolidates information, submit for approval and communicate back to external Ministry/Department who sought information. iii. As the above process is manual and it requires huge amount of man hours for mechanical tasks such as circulation, follow-ups & reminders, compilation, consolidation, submission for approvals, and responding back to outside Ministry. This huge man hours could have been utilised for better productivity. iv. Details of AICS is given as under – 3. Why AICS (forms)? i. The need for speed – In the recent cases it has been observed that critical piece of information desired by leadership is scattered across various Groups/Divisions/Organisation of MeitY. Manual collection, compilation and consolidation are usually a time consuming exercise. ii. Increasing Productivity – Having a process in place will help in increasing productivity and with existing manpower. iii. Reduced paper work – Forms help in eliminating the emails and the mess of files and provide secure storage, access, track, and share of information quickly and easily within organisation. iv. Forms can exchange data within organisation, which allows for merging the data with an existing record or using the data to create a new record and automatically alert you to what needs to be captured for all users. v. Forms can be traced. The current state of a form that is being processed can be determined and accordingly reminders to expedite can be sent quickly. vi. By utilizing forms, PUCs, scanned documents and electronic documents will automatically route to the appropriate Groups for review and approval. This accelerates processing, improves visibility and accountability and streamlines manual and time consuming process. vii. Information pertaining to MeitY can be effectively managed in forms repository within the system where it can be accessed securely at various level of top leadership for strategic use. System Architecture 4. Forms 4.1 Admin (Coordination Division) Forms i. Dynamic forms may be created based on the nature of information (could be a table, a text write-up, ppt etc) solicited from different Groups/Divisions/Organisations ii. Admin (Coordination Division) should have facility to design the form in the specific format in which information is sought. Possibly in word, excel or in paragraphs with predetermined document structure. iii. Admin should have facility to upload the letter/PUC (PUC – Paper under consideration) online. A text box to write the context of the information. iv. System should be capable of generating unique form no and shooting emails to officers concerned of MeitY upon submission of the form by Admin. Email ids can be pre-loaded/modified/updated. v. Admin should have facility to accept/send back the inputs received from various Groups/Divisions/Organisations 4.2 User (Groups/Divisions of MeitY) Forms i. User should be able to log into forms based on the Form No. which was sent to them through a notification email by Admin. ii. Users are allowed to fill the information as per the prescribed format designed by Admin. iii. Users should also be given option to upload (based on the design of form by Admin.) iv. User should be given facility to send NIL information also with one click. v. Users should be able to modify their inputs later on before the due date (as specified by Admin) vi. Users should be submitting their forms to their respective Authroity, separate access controls will be provided to GCs and HoDs of every Group and Divisions. vii. Authority (GCs) to approve the forms and the same will be reflected to Admin (Coordination Division) 5. Workflow i. Admin to upload the form based on the nature and quantum of information sought from users. ii. Upon receiving email alert from system, user will need to fill the information in the form generated from Admin. iii. Upon completion of form, user should submit the form to Admin. Further, Admin to accept/send back, generate report and submit for further approval to approving authority. iv. The system should send alerts at all levels including user, admin and approving authority, eliminating the need for any reminders and follow-up with personal meetings. v. The completed e-forms once approved are then stored in the form repository in the system for retrieval when necessary. 6. Access Control 6.1 Admin i. Admin should be able to create new forms based on the requirements. ii. Admin access may be designed for Coordination Division who will have rights to upload, and download the consolidated information from specific forms.
i. A large number of Job Seekers have to apply for various posts and appear for examinations at specified locations on a particular date and time. ii. Job Seekers have to spend considerable funds, time and efforts to reach the examination centers and personally appear in examinations. iii. Many a times, job seekers are not in position to travel due to various reasons like non-availability of railway tickets, examination centers are far off or are not able to afford the expanses towards appearing in exam. iv. Due to socio-political situations like Bandhs, Strikes, Road block or riots etcs, the job seeker is unable to reach the examination centers Uses Of Proposed system are Many Fold : i. Looking at various difficulties faced by Job Seekers and availability of Internet connectivity a web based centrally controlled SW solution with a mobile app can provide a better, cost effective and easy solution to both job seekers as well as recruiting agencies. ii. Similarly, the recruiting departments have to spend lot of money and efforts to process large number of applications, arrangement examination centers, supervisors, invigilators and so-on to carry out the activity. By having web based solution lot of time, efforts and money can be saved. Technology To Be Used: i. Open Source Technology can be used to create a web portal wherein the job seekers can apply for a particular Job and a application Id is assigned to the applicant with on-line verification carried out using Aadhar number and registered mobile number. ii. Various alerts and e-mails are sent to applicant by system based on activity performed. iii. Smart Phone based mobile app be created where the applicant registers with assigned id as well as Aadhar Number for the purpose of authentication. ICT Based Solution: i. A strong MCQ ( Multiple- Choice Questions) data bank related to proposed job is created on central data base by experts and answers are also stored in data base tables in encrypted format. Each MCQ should be stored in matrix with defined time to solve each question. ii. During the period of examination the mobile app should be connected to central data base. iii. Android base app should be developed to enable job seekers appear in examination from anywhere and any time (During the period lines are open). iv. Number of users , no of web pages and transactions volumes can be assessed and scaled based on type of job and expected number of applicants. v. A well-defined, configurable application can help in fully ICT based solution and productize the same.
The vulnerability scanner should automatically parse through the APIs to identify which ones may be exposing the system to danger. A vulnerability database is the list of known vulnerabilities the scanner will use to spot potential problems the more information the scanner has, the more accurate its performance. Once a team has a report of the vulnerabilities, developers can use penetration testing as a means to see where the weaknesses are, so the problem can be fixed and future mistakes can be avoided. When employing frequent and consistent scanning, one will start to see common threads between the vulnerabilities for a better understanding of the full system.
While applying for different recruitments through online application softcopy uploading of documents like educational qualification, D.O.B proof, category certificate etc. of candidate is required. This result in unnecessary utilization of server space as each application requires approx. 2MB storage space and thousands of applications are received. If credentials are verified then & there at the time of application receiving (uploading), it will be beneficial for all stakeholders. Integration solution with generic interface is needed.
After successful completion of ESDM examination, training partner raises bills in physical claim format along with hardcopy SC/ST/EWS certificate and also hardcopy ESDM certificates. All these hardcopy documents are manually scrutinized and verified by consultants and a file is prepared for payment which is highly time-taking and cumbersome process. This payment file passes through different touch-points for verification which ultimately delays payment process. Need process reengineering, followed by automation of workflow.
General Problem Statement : The disabled (blind) persons currently need support to start the PC , login their user id and passwords and then the access to certain browsers to do browsing. We must try to resolve this problem. Users: Disabled (Blind) persons for reading / browsing / performing word documentation. Technical Solution : Create the service in windows that listens to the finger print sensors and if the sensors match to the PC owner, allow the person to login and immediately start listening to commands as the blind person will not be able to see the next window / or won’t be able to open something. Desired Solution : i. The app must begin as a service that shall run in the background. Allow to register the disabled person with one time help from non-disabled person. ii. The service must be integrated with figerprint sensors and must be able to validate the fingerprint of the disabled person and allow the access of this person to the app. iii. The service upon successful logon immediately allows you to start sending the commands that allow the blind person to perform web browsing iv. The service must allow to start accepting the commands to perform ms-word document. v. The service must be generic to accept new interfaces like using read out loud feature in pdf to open and read a pdf and integrate / operate the other windows applications
The primary concern from a corporate governance perspective is that personnel conducting work in these non-production environments are not always security cleared to operate with the information contained in the production data. This practice represents a security hole where data can be copied by unauthorised personnel and security measures associated with standard production level controls can be easily bypassed. This represents an access point for a data security breach. To protect data that is classified as personal identifiable data, personal sensitive data or commercially sensitive data, however the data must remain usable for the purposes of undertaking valid test cycles. It must also look real and appear consistent.