An Integrated Approach to Design an EAF for the CCS of ICDSin India
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: E-government is getting a positive thrust in view of `Digital India Project` initiatives by the currentgovernment in India. At present, information and communication technology (ICT) has become an essentialprerequisite in all government`s service delivery mechanisms and the idea of governance becomes 24x7phenomenon. E-governance tools facilitate citizens an efficient, transparent, flexible and comprehensive servicedelivery platform. The success of any CCS (Citizen Centric System) is now largely dependent on theimplementation of an integrated EAF or web based service delivery model specifically. New technologiesinfluenced the innovations in governance at large scale. The ICDS (Integrated Child DevelopmentServices/Schemes) is a very diverse program implemented throughout the country with some specified goalsregarding child/woman welfare. At present almost every state of India implements the different programs ofICDS.There are two important instigations of this research paper, first is to study and analyze all short comingsof the current and previous works regarding e-governance initiatives taken in implementation of servicedelivery process in CCS of ICDS throughout the country and second is to explore and outline/design an effectiveintegrated EAF or a web based service delivery model (WBSDM) for the CCS of ICDS in India
Authors and Affiliations
Sarvesh Kumar Swarnakar , Rajesh Tripathi
Fast Remote data access for control of TCP/IP network using android Mobile device
Abstract: In today’s world most of the mobile have the use more than its basic functionality. As mobile becomes more advance to be have same architecture same as desktop system. Hence this feature should be used as...
Storage Data Security of Data in Cloud Computing
Abstract: Cloud Computing refers to the many different types of services and applications being delivered in the internet cloud, and the fact that, in many cases, the devices used to access these services and appli...
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
Wireless network is the latest and popular technology nowadays. Due to its ample advantage in various fields, it has always been the prime target for hackers and attackers to break through its security and the...
Face Recognition Using Convolution Based Dwt and CLBP Feature Vectors
Abstract: The face recognition is an essential criteria to identify a person in recent advanced security systems. In this paper, we propose efficient Face Recognition using Convolution based DWT and CLBP Feature Vectors....
Effects Of Wormhole Attack On AODV And DSR Routing Protocol Through The Using NS2 Simulator
Abstract : Mobile Adhoc Networks (MANET) are self organizing, decentralized networks and possess dynamic topology, which make them attractive for routing attacks. Attacks on ad hoc networks can be classified as pas...