Smart India Hackathon 2018

Ministry : Department of Defence Production, Ministry of Defence
Priority :
Sort :
Problem Statment(s) : 13
Sector : Technology
Category : software
Priority : high

The objective is to develop a digital signature program for authentication and signing of documents for internal use of the organization. Problem scenario – I : Each user will be given his/her own eToken containing a digital signature corresponding to the user. The application should have the following feature: 1. The application will have to authenticate the user using the public key of the user stored in the server. Java Applet or any other code segment which has browser dependability issue cannot be used in the client side, the developer can make use of JavaScript for Client Side Code. 2. The server side code to be written exclusively in C#. 3. The application should make use of the private key stored in the eToken and there should be some encryption through the private key and decryption through the public key happening to authenticate the user. 4. The application should show a False if the logged in user and the inserted eToken DO NOT MATCH and the result to be True if the inserted eToken and the Logged In user is a MATCH. Problem scenario – II : A word/pdf/excel document to be uploaded to the server should get signed on the fly whenever eToken is plugged in. 1. The application has to apply the user’s digital signature on the document being uploaded and the fly. In the server the signed document will only reside. 2. Java Applet or any other code segment which has browser dependability issue cannot be used in the client side, the developer can make use of JavaScript for Client Side Code. 3. The server side code to be written exclusively in C#. 4. The document should be signed using the user’s private key residing in the eToken. The signature on the document to be verified using the users public key residing on the server.2 Users of this system : The users would be Employees of the organisation for digitally signing documents. The IT department of the organisation can deploy the Digital signature module in their applications. Technology that can help address the issue : Digital Signature APIs available in ASP.NET. Desired Solution : a)Authentication of the user using public – private key pair b)Digitally signing the document using private key

Sector : Governance
Category : software
Priority : high

Even if Intranet and Internet application available in PSU computer users, but the usability and success rate is very less and resistive. Please forward 10 most effective ways to motivate users to use online applications for better digital India. Please also mention how to overcome resistance by different legal departments who always ask for ink signed hard copies. Users of this system : All officers and computer users of our organization Technology that can help address the issue : All forms of digitization and computer technology to be used. Desired Solution : Paper-Less Office

Sector : Technology
Category : software
Priority : high

Outgoing Mails & Incoming mails to a particular Mail Id. Within this, segregation should be made between internal domain & external domain. Day/Week/Month/Year Wise reports should be available. Top 10 Mail Id’s by No. Of Mail received / sent, Size of mail Boxes, Total size of Attachments sent / received should be made available. Inbound & Outbound Mail Analytics to be gathered and shown Users of this system: : HOD (IT), Mail Administrator Technology that can help address the issue: A JAVA based in-house Portal can be made with a MYSQL database to store Mail Data. Desired Solution : Better Management of Mail Boxes. Proactive monitoring. Detecting any suspicious activity.

Sector : Governance
Category : software
Priority : high

The Finished Products as well as input materials of a group of organizations are more or less similar in nature. The resources, facilities, specialized skills are also common across the sector. Can we build up a common portal showing spare Resources, Facilities, and Workmen with specialized Skills, Materials with their detailed description, specifications, spare quantity, /unit Rate, and availability so that all Shipyards can go through that and instead of going for a new Purchase through a new tendering process, can order it from another shipyard. Collaboration on sharing Inventory levels for excess items, Specialized Resources which can be shared in temporary manner among all relevant organisations. Users of this system: A Single Nodal Officer and HODs of an organisation can access the portal. Nodal officer can upload the Data. HODs can access the data and determine their requirements. Technology that can help address the issue: A portal which can be hosted on parent portal site and can be accessed by nominated Officers. Desired Solution : Better utilization of idle inventory lying at different organizations , Better utilization of Skilled manpower.

Sector : Technology
Category : software
Priority : high

Evaluation of a group messaging solution between senior executives of a group of organizations and concerned ministry’s workforce. The solution should be secure and only encrypted messages should be allowed, with no uploading of any file. The solution should support Group conference. Development of a shared & secure messaging solution between Top Management of a group of organisations. Important discussions, plans can be discussed. Messages to be encrypted while sending & retrieving. The Messaging server can be kept in ministry. The Messaging client can be installed on Top Management’s Laptops. Users of this system: Top management of relevant organizations and ministry’s executives. Technology that can help address the issue: A solution on the template of Google hangouts which can support group messaging between two executives as well as group messaging. Desired Solution : A safe and secure professional communication between two people or a group of people when needed.

Wireless connectivity can be detected by devices that support Wi-Fi connectivity such as laptops, smart phones, handheld devices etc. from within organizational premises. If password is hacked/known unsolicited user(s) can access Wi-Fi from within the organizational premises. Mechanism for blocking of wireless connectivity is not known. Users of this system: Every individual connected to the cyberspace in O. F. organization which consists of i. User’s who directly access the PCs of the organization. ii. Server administrators. Technology that can help address the issue: Stationary hi power sensor(s) that detect(s) Wi-Fi connectivity inside the premises and debar access is suggested. The system running on the hardware device/sensor can be developed through java or any other API (Application Programming Interface). Desired Solution: Stationary hi power sensor(s) that detect(s) Wi-Fi connectivity inside the premises and debar access is suggested. A prototype is required to be developed for this purpose. This will ensure full assurance regarding implementation of MoD guideline of not permitting Wi-Fi within organizational premises.

USB white listing becomes essential for demarcation of pendrives/ external hard drives issued by organization and fit for use to handle official data. USB white listing can be done in such a manner so that same USB storage device can be accessed from any PC, server and laptop issued by the organization, irrespective of their connectivity to the internet or to the intranet. It may also be ensured that the encryption mechanism remains standard and uniform throughout the organization. Outside systems should not be able to access such encrypted storage devices. Users of this system: Users using pen drive to transfer data from Intranet to Internet & vice-versa. Technology that can help address the issue: An integrated system that will provide MAC addressing based bulk whitelisting of storage media. It can be developed through java or any other API (Application Programming Interface). Desired Solution: A prototype/application of national system for media access that will encompass standard policies/guidelines for media/USB device access control policy and data recovery can be deployed, preferably open source. There will be improvement in internal efficiency saving of time and effort as well as improved user experience.

Sector : Technology
Category : software
Priority : high

Algorithm to be developed for maintaining secure communication for smart cars. Algorithm for situational awareness. Cyber-Physical Systems (CPS) are integrations of computation, networking, and physical processes. Embedded computers and networks monitor and control the physical processes, with feedback loops where physical processes affect computations and vice versa. The economic and societal potential of such systems is vastly greater than what has been realized, and major investments are being made worldwide to develop the technology. The technology builds on the older (but still very young) discipline of embedded systems, computers and software embedded in devices whose principle mission is not computation, such as cars, toys, medical devices, and scientific instruments. CPS integrates the dynamics of the physical processes with those of the software and networking, providing abstractions and modeling, design, and analysis techniques for the integrated whole. These days the development of smart cars is on the rise. Self-driving cars equipped with sensors is in high demand in the research field. Users of this system: The solution will be used for in vehicle communication and vehicle tracking application Technology that can help address the issue: Sensor integration / Cloud computing Desired Solution : The solution is to be developed for secure communications between sensors in the car as well as the secure communication between smart cars to prevent cyber-attacks on smart cars.

Sector : Technology
Category : software
Priority : high

These days the sabotaging of railway tracks has been causing immense accidents and loss of lives. Algorithm to be developed with the help of computer vision and Internet of Things based methods to detect any anomaly on the railway tracks. The solution should comprise of sensors which can keep tab on the railway tracks and the consolidated picture can be seen at a local and global surveillance shelter. Besides sensor based surveillance the solution should also be camera based and video based surveillance systems to monitor the railway tracks and detect anomalies within a buffer area of the railway tracks. This solution should be able to identify/track railway tracks health index and any deterioration must be accompanied by alerts and alarms and the geo location of the tracks. Sensors needs to be installed on the tracks and internet based surveillance of tracks shall be developed. Users of this system: The solution will be used in sensing the railway tracks. Technology that can help address the issue: Sensor integration / Cloud computing Desired Solution : The solution should be able to identify/track railway tracks health index and any deterioration must be accompanied by alerts and alarms and the geo location of the tracks.

Sector : Governance
Category : software
Priority : high

The recent advance in the use of image processing applications has benefitted many areas including the forensic and digital verification techniques in cybercrime detection. At the same time the features of image processing techniques are used for producing digital evidence in criminal activities. Image processing tools have been associated with a variety of crimes, including counterfeiting of currency notes, cheques, as well as manipulation of important government documents, wills, financial deeds or educational certificates. Users of this system: The solution will help the document verifier/examiner find out and differentiate a fabricated document with an original one. Technology that can help address the issue: Open source image processing libraries like OpenCV, AI techniques can be used. Desired Solution : The solution should focus on the use of image processing tools for the examination of computer-manipulated documents. The altered documents once examined using a suite of currently available image processing tools should be capable of detecting computer-based manipulations of written documents.

Sector : Governance
Category : software
Priority : high

Atmospheric turbulence can severely degrade the quality of images (video sequences) produced by long range observation systems, rendering the images unsuitable for vision applications such as surveillance or scene inspection. The degradation arises from the complicated, random fluctuations in the refractive index of the air, caused by the fluctuations in temperature. Sample Data will be provided during implementation. Users of this system: The tool will be used in video surveillance solution. Technology that can help address the issue: Open source image processing libraries like OpenCV can be used. Desired Solution : Restoring a scene distorted by atmospheric turbulence is the scope of the Project / Problem statement.

Sector : Governance
Category : software
Priority : high

Geographic Information System (GIS) is used to store, retrieve and render the Earth-relative spatial data. GIS deals with flat map projections. Geodetic datum uniquely defines each location on Earth’s surface with coordinates in latitude and longitude. Notable geodetic datum’s are NAD27, NAD83, Everest datum and WGS84. The coordinates for each point on Earth in one geodetic datum is different from other geodetic datum. For example, the latitude and longitude of a location in a Everest datum differs from NAD83 or WGS84. The transformation of one datum to other geodetic datum is known as a datum shift. GIS applications demand the support for more than one geodetic datum’s for both vector and raster maps, hence the datum transformations or datum shift are often necessary. Users of this system: The solution will help Geographic Information System (GIS) based applications which requires different geodetic datum. Technology that can help address the issue: Any high level Program language, Map data handling techniques. Desired Solution : The geodetic datum’s transformation tool should have a provision for input to take map data of one geodetic datum and convert into other geodetic datum for each NAD27, NAD83, Everest datum and WGS84.

Sector : Governance
Category : software
Priority : high

The maritime anomaly detection is very crucial in ensuring coastal security of any nation. The ships in sea follow a common route for a particular source and destination pair. The solution should detect anomaly, if a ship follows unusual trajectory which is different from the normal route followed by majority of ships. Sample Data will be provided during implementation. Users of this system: The tool will be used in Ship Navigation and Guidance solution. Technology that can help address the issue: machine learning / Neural Networks Desired Solution : A machine learning algorithm is to be designed to extract the normal route from the historical ship movement data and to predict the class i.e. Normal or anomalous of any given trajectory.