Friday, June 24, 2016

Transforming Governance in India

Why startups hold the key for transforming governance in India
As a country, India is perhaps at the right inflection point. The government of India is aggressively promoting digital India with the ultimate objective of powering India into a digital powerhouse backed by the foundation of technology. At the same time, there is another massive wave that is sweeping India. The startup wave has reached unprecedented heights, and India now is one among the first five largest startup communities in the world with the number of start-ups crossing 4,200 (according to a recent Nasscom-Zinnov report). The Prime Minister too has been pitching actively for startups, and has publicly quoted that startups are key for India’s transformation.
Nine Pillers of Digital India

Given the fact that the Government wants transformation enabled by technology, and wants to quickly move with speed to solve some of India’s biggest problems, startups may hold the key for transforming India, as they can look at traditional problems with new solutions.

Take an area like agriculture, which is now plagued by serious issues of farmer suicides and lower yields? Can startups make a difference? Bangalore-based startup, CropIn Technology, has a mobile and cloud-based solution that aims to empower the Indian farmer by making every crop traceable. By using a mobile app, 600 acres can be covered in one man day vis-à-vis the 90 man day period that is typically required. The result – farm productivity has been raised by a minimum of 10-15 percent.

Another big problem that India faces today is the lack of electricity. India has always been a power deficit country, and has consistently suffered grid failures and power blackouts. While the government is looking at technologies such as smart grids to curb thefts and leakages in transmission and distribution, the answer may lie in a solution by Delhi-based startup Zenatix. The startup uses sensors and smart meters to monitor real-time power consumption and advises firms on how they can cut down their energy consumption with minimum effort. For example, for the Indraprastha Institute of Information Technology (IIIT-Delhi ), the firm has been able to save more than Rs 18 lakh per annum, which is roughly equivalent to one month’s energy consumption. Similarly, Mumbai-based startup 2020 Imaging, is looking at using video analytics to prevent stampedes, detect terrorist attacks and aid traffic management.

Armed with a disruptive and frugal mindset, startups can completely change the way traditional problems can be conquered. Unlike traditional firms, startups are not bothered about legacy technologies – they are only concerned about providing value – as it is the key for their existence and future competitiveness.


As more and more Indian startups enter the fray, they will start challenging the way traditional technologies are deployed and implemented. While not every startup will be a success, their rapid rise will ensure that traditional giants will be forced to think innovatively and push the bar for excellence.
India Independence day will be come

Saturday, June 11, 2016

Common Problems and Solution for IP Cameras

IP camera or network camera is a new product which combined with analog and network video streaming technologies, in addition to its image capturing functions like the conventional analog camera, IP camera has built-in video compression processor with web server function, to compress raw video footage, then broadcast over Internet. The authorized users can access the data from anywhere with internet connection. 
What's the common problem of IP camera?

1. Can't find IP camera when you use search software

Foremost, rechecking whether power supply and Ethernet cables are connected correctly. If the problem still exists, checking the network setting for IP camera and your computer/Laptop/tester. Go to network connection, configure IP address to same IP segments, Subnet mask and default gateway must be same for both IP camera and computer. Ensuring IP camera and computer are in the same router.

2. Can't visit IP camera from Internet (WAN)

For this problem, there are two possible factors. Firstly, there is no port mapping for IP camera. As we know, IP camera requires port mapping for remotely access from Internet (WAN). Without port mapping, IP camera is only accessible from local network (e.g 192.168.1.20). To solve this problem, you just need to log in your local router, and enable port mapping for IP camera in virtual server menu. Secondly, if you use domain or DDNS service, making sure the domain point to correct IP address with correct port number.

3. Connect 4 IP cameras, but only one IP camera displays images

This problem occurs when you didn't change the default IP address of IP cameras. After you bought the IP cameras, all of them were configured with a same IP address. With reason of IP conflict, when several IP cameras connect to router, one camera can work, but the rest of cameras can't connect to network. To solve this problem, you need to set an unique IP address for each of cameras.

How to change IP address for the IP Camera ?

Accessing the camera with default IP address (e.g 192.168.1.20), then login with default account information. Go to "Device Config", then choose "Network", you can change the IP address for the camera.

4. PoE IP camera can't see at night (dark images)

Insufficient power supply, which caused the PoE IP camera can't turn on Infrared illuminators, thus images are black at night. PoE (Power over Ethernet) is useful technology which greatly reduced the cost on IP camera installation. But it also has drawbacks; the voltage will drop when PoE IP camera connects to a PoE Switch or NVR. Typically, IEEE802.3af standard PoE only can transmit 20-30 meters. To solve this, user should use high quality Ethernet cable, or shortening the connection distance.

5. Video delay (video latency) when watch live video

Since network camera need to compress the video, before broadcast over Internet, every IP cameras encounter video latency, which is a common problem in IP video surveillance system. To minimize the video latency time, you can increase the bandwidth through upgrading your network infrastructure, also you can lower the bit-rate of streaming. Lowering the image resolution also helps to reduce the video delay time. Increasing the fps can allow IP camera output smooth video.
Do you experience any of these problems? Please make comments if these information is useful to you. If you experienced other problems which are related to IP camera, please write it down in below comment section.

6. IP camera can't display images

If your IP camera can't display images, also you are not be able to access the IP camera, likely the IP camera doesn't boot correctly. Almost IP cameras work with DC12V power supply, power requirements are different. You can estimate the power requirements on the basis of IR range.
·        No IR, or IR range within 20 meters: Required Power Supply DC12V 1A
·        IR range is within 20-30 meters: Required Power supply DC12V 1A
·        IR range is within 30-50 meters: Required Power Supply DC12V 1.5A

Please note: A regular PoE switch, supports IEEE802.3af, this standard only provides maximum 15.4W power, which means the provided current is 1.25 ampere. In conclusion, the regular PoE switch only can work with IP cameras which require no more than 15.4W power.

7. How to upgrade NVR firmware

If your IP camera connects to NVR, not all problems are caused by IP camera. Sometimes, the problem was caused by NVR. You may solve the problem through upgrading or updating NVR's firmware.
To update the firmware, you need to get the firmware file in a USB stick, which then has to connect USB port of NVR for upgrading.
Step 1. Go to "System Setting", choose "System" > "Upgrade"
Step 2. Select the firmware file, then click "Upgrade".
Step 3. When upgrading succeed, the NVR will reboot.

8. NVR can find IP camera but can't display image

If IP camera can be found through automatically search on NVR, this means the IP camera works properly, NVR detected and received correct video streaming parameters from IP camera. If your NVR shows video abnormal, you need to check the video resolution setting for both IP camera and NVR. The video resolution should be same as the NVR's recording resolution. If you use our IP camera and NVR, you need to choose the system's recording resolution as in below picture:
Choosing appropriate main stream and sub-stream resolution

Friday, June 3, 2016

Attendance System based on Biometrics

Attendance System based on Biometrics

If you are still using paper and calculator to prepare the salary of the employees then you are wasting your valuable time and missing the benefits of biometric attendance systems. In this era of modern technology, monitoring attendance of each employee to payroll activity has become seamless.
What is Biometrics Technology?
The Biometrics technologies used to measure and analyze personal characteristics, both physiological and behavioral. These characteristics include fingerprints, voice patterns, hand measurements, irises and others, all used to identify human characteristics and to verify identity. These biometrics or characteristics are tightly connected to an individual and cannot be forgotten, shared, stolen or easily hacked. These characteristics can uniquely identify a person, replacing or supplementing traditional security methods by providing two major improvements: personal biometrics cannot be easily stolen and an individual does not need to memorize passwords or codes. Since biometrics can better solve the problems of access control, fraud and theft, more and more organizations are considering biometrics a solution to their security problems. Biometrics gives you an alternative and higher security compared to passwords or pin identification due to the fact that passwords and pin #s can easily be compromised.

Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics and point of sale (POS) applications. In addition to security, the driving force behind biometric verification has been convenience. Biometric devices, such as fingerscanners, consist of:
Ø A reader or scanning device
Ø Software that converts the scanned information into digital form and compares match points
Ø A database that stores the biometric data for comparison

To prevent identity theft, biometric data is usually encrypted when it's gathered. Here's how biometric verification works on the back end: To convert the biometric input, a software application is used to identify specific points of data as match points. The match points in the database are processed using an algorithm that translates that information into a numeric value. The database value is compared with the biometric input the end user has entered into the scanner and authentication is either approved or denied.

What is Biometric Attendance System?
Biometric time attendance system used to track each and every person coming to your place is actually who he claims to be or not with its time and other details. It uses finger and face recognition system to verify person's identity and record its time-in and time-out with all required details.

Benefits of Biometric System
Ø It has many advantages over conventional time tracking used at organizations. Typically such organizations maintain a register book, where people entry their name, time-in, time-out and other required details but the problem with this manual system is inaccuracy, time consuming, unreliable and most important is less secure.
Ø Biometric time attendance is very user friendly and easy to use; any person can use it very easily. It is very fast also, user has to see once in front of system and all details including its time will be recorded automatically. In this way it saves lot of time and still record details very accurately. One can avoid early punching, late punching and buddy punching very easily.
Ø Many schools, college used Biometric Time Attendance to track their student's attendance. The Biggest advantage of Biometric Time Attendance over manual tracking is better security. Many shops and shopping mall use biometric time attendance for security purpose and it really works a lot.
Ø If someone wants to use it for business or organization, then they can easily integrate it to payroll systems, account systems and billing systems. So in that way it is very flexible also and it also shows that time attendance system can be used for all type of business and organizations with great flexibility.
Ø In a nutshell biometric time attendance solution permits you to focus on your core business by giving quickest and easiest way to overcome your time tracking issues.

Return on Investment in Biometric System Installations..

Biometric time clocks, which are used to record employee start and end times, are popular in organizations where security is an issue, or where employees may falsely record their time worked. Because biometric technology is more expensive than other forms of time clock identification, such as magnetic badges or personal identification numbers, it is important to evaluate the potential return on investment should biometric devices be installed. In service environments where employees punch in and out to work, return on investment can be considerable because biometric devices virtually eliminate the ability of employees to “buddy punch.” 


In buddy punching, an employee either types a tardy employee’s PIN or swipes the tardy employee’s badge earlier than he arrives to work or after he leaves work. The organizational costs of this kind of time theft can be enormous. The company loses money a few minutes at a time compounded across departments and locations. Biometrics makes it almost impossible for employees to defraud a time and attendance system. 



Other returns on investment can be gained through the use of the biometric system as a security access monitor, as well. In this case, the biometric system is used to grant or deny access to restricted areas. The cost of purchasing and maintaining magnetic or proximity identification cards, which do not prevent fraudulent access, can be eliminated.