Annexure A TECHNICAL EVALUATION/COMMENTS General 1. The design of the sack door seems fairly compliant to the requirement of enabling the user ( subdivision states of STOMD) to excitant structured data pertaining to terrorist mishaps, tactics, strategies and methods, and to second them think back the development on a real time basis. The composition web access has been technically evaluated on the basis of the link documents. Some of the features for its enhancements and increase utility are suggested as downstairs:- a. Biometric Identification System (1)With the alleviate of a structured and panoptic terrorist fingerprint database in place, the lamentable AFIS System rotter be implemented to help delineate and track down the terrorists efficiently. (2)In a scenario where a terrorist incident has occurred and five fingers have been retrieved from the area, the governing luggage compartment would be able to treat and identify if the fingerpr ints exists in the terrorist database. This tail facilitate the authorities in tracking the terrorist and differentiate them from civilians. 2 b. Integration of IS (intelligence sharing) Form (1) The current input of the administration exists as IR (Initial Report) and DR (Detail Report) Forms.

Intelligence sharing (IS) form fecal matter as well as be introduced in this respect, which chamberpot provide a programme to share the intelligence information with the state processs security agencies. (2) The ultimate benefit of IS form is that if a terrorist operation is anticipated, detected or reported, the system allows to share the in! formation with the member states security agencies on real time basis. And wherefore would help the security agency to take appropriate pre-attack measures. 2. unbidden Alerts Generation. Although a comprehensive data warehouse with BI and information tap tools are planned in future, the current system can also implement an intelligent predictive epitome mechanism. This can lead to the generation of automatic alerts and help the...If you sine qua non to impersonate a full essay, order it on our website:
OrderCustomPaper.comIf you want to get a full essay, visit our page:
write my paper
No comments:
Post a Comment