Sie sind auf Seite 1von 24

Swami Keshvanand Institute of Technology

(Department of Computer Science Engineering and Information Technology)


Abstarct: As part of university courses(Project-1,Project-2) following is the list and brief descriptions of identified p
IBM and Infosys,and these projects we are also submitting for external evaluation to IBM and Infosys and are suppor
i.e. Project Kit, Student Kit, Faculty Kit, Project Software Requirement Specification docs, and project evaluation for
allocating to students from 5th semester onward, i.e. from Campus Connect Projects, and thenafter are being continue
projects.

S No. Project Name


Agent-based information
1
push
Imagemechanism
Segmentation &
2
Recognition
Criminal Record
3
Management System
4 Web Based School Admin
5 System
Web-based Recruitment
6 Process System
Design and for the HR
development of
7 group
an for a
Insurancecompany
agent Samurai
Feature extraction from
8 AutoCAD 2D Drawings
Mobile Travel Guide- A
9 Smart Way to Travel
Feature-rich,Change Request
10 tracker
Lost Articles and Letters
Reconciliation System

11 Miles Acquisition System


12 (MAS)
Network packet sniffer
13 Repository and Search
14 Engine for Alumni
Web Based of
Mail Client
College (RASE)

E-Learning Resource
15
Locator
LMS
16 Schedule Lawer
17 E-Post Office
18 Auto-summarization tool
19 Budget Approval System
Cross platform IDE for Unix
20 Design
based Cand development of a
systems
21 Skill andand
Design Activity Trackerof
development
22 System (SATS)
an Equity Trading Portfolio
Design
Managerand implementation
23
of a Work Planner
Development of a Reverse-
24
Engineering Tool for Java
25
Effort Tracker System

Feature rich, practical online


26 Tickets reservation system
27 for Cinema halls

Feature-rich, practical online


application
Feature-rich,forpractical
the Training
online
28
and Placement
intranet knowledgeDept.mgmt
of the
29 Feature-rich,
system for thepractical
college college online
30 leave
(KMS) management system
31 (LMS)

Feature-rich, Resume
32
Builder and
Design Application
development of
33
Speed Cash System [ SCS ]
34

Interest Calculation system


35
for a retail bank
36 Network Print Spooler
Online Course Portal for a
37
campus
Practical Online Help Desk
38
(OHD) for the facilities in
the campus
39 Student Project Allocation
Prison management system
and Management with
40
Online Testing System
41 SCM
(SPM) Calculator
Online Library Management
42
System (LiMS)
Swami Keshvanand Institute of Technology
(Department of Computer Science Engineering and Information Technology)
rsity courses(Project-1,Project-2) following is the list and brief descriptions of identified projects in consultation with
projects we are also submitting for external evaluation to IBM and Infosys and are supported by project meta documents
t, Faculty Kit, Project Software Requirement Specification docs, and project evaluation format, and these projects we are
5th semester onward, i.e. from Campus Connect Projects, and thenafter are being continued as Project-1,Project-2

Project Description

Information push mechanism is a way of pushing the information to the user who would be interested in that.
This technique
Personal is widely
identification used in
system web-site
based on theadvertising
images of (showing
the face isthe advertisements
often effective duethat a user
to its userwith a certain
friendly nature.
profile
But there
The would
application be
are many interested
more facts
is proposed in, yahoo!
to like sites
race, age,
centralize for example).
gender and
information This technique
facial coverings
management in crimecan
that also be
affects
world applied
forwhen in other
identifying
the purpose areas
of fastpersons
and
wherein
using the
easy project a
access of user
existingwith a
facialknown
information profile
expression
across all interacts
recognition with
the law-keeping an
systems. information
And
bodies the system
output
acrosswhich (such
may also
the territory.Theas a website).
change due
application Based
to the on the
differences
can be usedofin
This
profile and onis the
aimed at developing
history ofcriminal
activities a school
ofback administration
the user, a behavioural systemprofile of can
that streamline
user could the administration
be determined and
of the image
mobiles
school. and
It’s quality
tablets
often feltand
making
that the
the amount
school of
registration
management ground easy
is clutter.
and
chaotic During
quick.
in A
nature.theItpast
CRMS isfew
under
involves years facial
implementation
many expression
administrative inGroup
Mexico
workuser
This
this project
behavioural is aimed
profile at developing
will help the a web-based
information and
push central
system Recruitment
in determining Process
the System
content for
that the
the HR
particular for
recognition
city, and it wouldreceived be aincreased
great ideaattention
tosystem and has
implement advanced
such a system technically.
forbased
Indian But significant
subcontinent research
with effortsaspects
a different
titillating still have
crime
aand
The
would co-ordination.
company.
Insurance Some
like to on Premium
view. This
features project
of
calculator is
this to develop
is a major will and
be deploy
creating
component a web
vacancies,
inrecognitions
athe application
storing
electronic so
Applicants
forSystems that
of been the
data,
Insurance Interview
Companies. theof
process
been
arate. focused
school thisThis
administration area. could
Though
become
be something
easymany to facial
handle.
like searching
expression repository the documents
systems have that
proposedwould andhelp
have
initiation,
The
user Insurance inScheduling
in preparing
data agent’s
AutoCAD Interviews,
Samurai
his current
drawings iscan
document Storing
the besystem
and Interview
meant
then
extracted results
in for
providing
the form for
insurance
him ofthe
those
DXF applicant
agent that and
helps
documents.
(Data Exchangefinally Hiring files.
to automated
Format) of theThis
most applicant.
of the
demonstrated significant promises, robust facial expression recognition is still under research.
Reports may
functionalities bein required
the insuranceto be generated
on this policy for
related the use
activities.of HRThis group.
system
project tries to
This project leverage
proposes architecture feature
of mobileof AutoCAD
tourist to extract
guide system forshould
machining Mobile have
features
Phone the
from facility
that the to enter
drawing.
is able the
The data
to provide
customer
related details
toinformation
these who
machining wants to take
features an
can insurance
be used scheme.
to provide The
inputsystem should
torequest
the CNC be able to provide necessary
tourism
This project is aimed toatthe mobile users
developing a tool conveniently.
for tracking This system
the change takes formachines
advantage
any the which istool
of light-weighted
project. This out will
ofmash
scope up
be an of
illustrations
this project.
technology and calculate
Functional
that can combine the premium
components
more of amount.
the
than onepeople This
project:
data sourcessystem
Data should
extraction also
and provide
Neutral Formatfacility to show
generation, the
Intranet
A based
Post Office application
wants to improve used by various
itsperefficiency byof tracktothe
topremium
delivering create
the lostvalue-added
change requests. services,
This will while
have overcomes
additional the
specification
Machining
limitations of
feature
of premium
mobile term
Identification.
devices. as
The the choice
Mobile application installed value
on toletters
the be andIflost
paid.
mobile of the articles
customer
tourist can
(which
actdecides
as a
are tosent
guide. goinfor
features
parcels) like cost,
in a insurance mail
short period notification,
of the
time. Reports
Currently per CR
it takes etc
about must be included
3 monthstheforfilled in this system.
a lostapplication
letter or a form Say for
lost article example the
the selected
Additionally, the estimated plan,
application system
would help should
user tobe able
find to the
out generate
weather forecast ofthe
the place, in MSto
distance
reach the
word
between
project
correct has been
destination. A machine and being
reads executed
addresses with
on 15%
letters. buffer
The already
ones, than
which if
could notCR be are
readexceeding
by the
machine, 15%
are
format.
different This system
places. The an also be implemented
application provides for standalone
videos, details machines
about the (for Insurance agents).
places.
buffer than the notification of re-negotiation must be send.
sorted by human intervention. Even after this, the address is not readable, it becomes a lost letter. Articles that
fall out of the parcel become lost articles. When the sender/receiver calls up or contacts the post office for their
letter/article, a manual note is made and then this note is sent to the warehouse where lost articles and lost
letters are kept.
Miles Acquisition System (MAS) is a Web based application for a particular Airlines company. This application
facilitates
This project registering,
is aimed atupdating,
developing andautilization
packet sniffer of mileson HTTPfor a Frequent
protocol. Flier This of its flights.
sniffer shouldThe frequent
be able flier
to monitor
should
and save
This be
project able to login
filesistransiting and key
over network
aimed at developing in all the details
. This project
a repository of his
for the travel
shouldalumni in their
be scalable airlines.
of the college,to supportThe
which application
other is
protocols
is of importanceaccessible
like toFTP, a for
the
POP3 frequent
etc. Thefliers from
practical the existing
purpose website of the airlines.
college.
This The
project Repository
is about and Search
developing aofwebthe
Engineproject
based(RASE)is providing
mail monitoring
is anconnecting
client Internet to aability
based Linuxfor
application thethat
Server administrator
can beaaccessed
running Mail of Server
a
network.
throughout This
and with Tomcat can
the World. be deployed
as theAny Webone in
can access the search Engine to know about any Alumni of that collegebuild
Server. home PC by parents to monitor the internet access, also. This has to but
over
can’t any
able interface
to add. provided
Alumni can by
The Project has the following main functionality freely
only available
update the libraries
database for
when capturing
they are packets
in the on
college.TCP/IP.
1. Receiving/Sending/organizing mails using POP3
The main purpose
2. Sending mail using is tosenddevelopmaila mobile application named “E-Learning Resource Locator” which will aim to
help students
3. Performing
Through this we to get
Admin all
aim to resources
functions
bring Anlike &edgestudy
managing materials
to the ofofevery
new user,
process course
resetting
learning available.
bypasswords
providingetc It willsaving
time also give
and the “E-Book”
innovative
facility.
solutions
ScheduLAWyer to the student
provides community.
an AndroidThe based initial module
platform to enables
Lawyersstudents all overtothe check
globethe tosyllabus
shift much . The of app
theircan be
written
extended
work like to
The e-Post includeis ways
appointments,
Office to check
dates,
the shopping case timetable
information
portal of the, attendance,
like next
world renowned marksand
date, andpresent
postal relevant
servicedatenotices
ontothe theirallAndroid
at a single
internet andsmartanclick and
additional
thus provide
phones/Tablets the right
from the information to the right person at the right time. It will enable community learning and
distribution
Auto-summarization
provide a
channel.
platform to
It aconventional
sells
isstudents Stamps,used
techniqueacross
diaries.
PostCards,
the to The
generate
country to
client
Packets, too
summaries
interact
canof
Cartons
and
beandinformed
has services
electronic
avail information
aboutlike
documents.the courier,
thus
hearing
This has
extending
in just
registering
some
learning
a tap. for
The ease
electricity
applications of access
vendors,
like is increased
selling
summarizing mobile in a huge
cards,
the search-engine manner
etc. Under sincethisall
results,the the
website
providing neededmany information
briefs products
of big andis in
documents your
services pocket/hands
can
that do be ordered all ,
This
beyond project
the is
set aimed at developing
curriculum. a system by which employees in the organization submit thenot have
bills to an
the
that time.
are also available in could
a categories
"normal" branch. The product
abstract
their
The etc. There
managers.
objective of theare
The two
bills
application ofis various of summarizers,
to provide types
an and also ofprices
linguistic various
integrated-development
areamounts.
and identical The
statistical. with
environment
the prices
Linguistic
employee of their
summarizers
after
comprising
normal
submitting
of offer use
editing,
branches.
knowledge
the bill will The
aboute-Post Office
the languange
automatically is
provideexpanded permanently
(syntax/semantics/usage
the manager’s name throughetc) new products
toplatform.
summarize and
abe services
document. in order
Statistical toones a
operate
compiling
Skill and and
Activity debugging
Tracker tools
System for C-C++
(SATS) programs
is an automatedontoUNIX which
system thethat
billcan will
The be submitted.
project
useful will
to Theabill
have
employees willthe
user-friendly
and pass
product
by finding
through portfolio
a workflow corresponding
the important process sentences to
and theusingthe market.
owner statistical
of the methods
bill can view (likethe frequency
status oftheof abill
the particular
at any word
time. etc).
An Statistical
email will
GUI
Equity which
managers incan
Trading any be run
Portfolio from
functional (ETP)windows
organization.
manager desktop.
SATS
is The
gives
assistant project shall
the facility
software for support
to define
traders source-
who file
tasks
normally editing
in the
do and save
organization
the trading changes
and
though also
summarizers
be
to sent
the to
UNIX the normally
concerned
system via doFTP not
people useto any
let
connection. linguistic
them know
The information.
editorabout
will the In
status
support this
of project,
the
Syntax bill. an auto-summarization
highlighting, data type tool
recognition is and
allows
some
Manager the
stock managers
brokers.
should be to
These
able track the
traders
to techniques.
assign efforts
mostly
task, spent by
track the
approve the
task employee
share
set by prices for
teamusing that
members particular
Newsand channelstask.
authorize A report
or news generation
papers and
the progress place
of tasks.
developed
other features using statistical
desirable for a program editor. The UNIX system compiler and debugger will be used and the
facility
the order is for
supported
stock in SATS
buy or sell that allows the managers toby analyze which are those skills by employee ofare
Team
This members
project
interface to theaims should
to
UNIX be
develop
host able
canatoto
tool
be
stock
seethat broker.
thatwill
established tasks Stock
assigned
reverse
via file
broker
engineer
transfer
actually
manager,
existing
or socket
does
add
java the
new
code buy or
tasks,
into
communication.
sell
mark action onclass
progress
meaningful behalf of
assigned
diagrams.
utilized
such and
traders. those
ETP which
manager are not
keeps utilized.
the track This
of tool
share can help
prices managers
offline (if timefor effort
permits estimation
this can per
be task.
made This
online) tool
tasks.
The Functional
tool must show components
various class of the project: 1. Manager
relationships, viz inheritance,: Manager can add team
aggregation, is-a, members,
has-a etc. The Manager mustand
utilitycreate
helps
providesemployees to document their efforts and analyze.
project tocharts
plug-in with and analysis
thedetails,
Eclipse IDE soofthat
Manager theselect
can itparticular companies’
teamaccessible
is easily member and tosharethenwith
developers.assign available
tasks
As an to data.
teamAt
option, End
member,
the of Manager
service Day,
could thebe broker
can
will update
approve suggested
exposed the closing
as a web-service. stock
task. Manager rates
Functional to database.
should Similarly
be able to see
components of the at Day’s
the project:
tasks projectopen the broker
wise and
Following will
is ateam update
list ofmember the opening
wise. 2. of
functionalities stock
Teamthe
rates
Member:(if time
Team permits
member this can
can be
add made
tasks online).
by choice. Only approved
system. More functions that you find appropriate can be added to this list. And, in places where the descriptiontask by manager will appear on screen. Team
member
of is not can mark progress
adequate, you can make of assignedappropriatetask. assumptions and proceed.
This project is aimed at developing a Effort Tracker System that is of importance to an organisation. The Effort
Tracker System is used to track the employee activities and summarize all related activities with the total hours
spent and percentage efficiency utilized and generate a report for the same. Functional components of the
project: Following is a list of functionalities of the system. More functionalities that you find appropriate can
be added to this list. And, in places where the description of a functionality is not adequate, you can make
This projectassumptions
appropriate is aimed at developing
and proceed.an online ticket reservation system for Cinema Halls. The Ticket
Reservation System is an Internet based application that can be accesses throughout the Net and can be
accessed by any one who has a net connection. This application will automate the reservation of tickets and
Enquiries about availability of the tickets. This application includes email confirmation for the tickets.

This project is aimed at developing an online application for the Training and Placement Dept. of the college.
The
Thissystem
project isis an online
aimed application an
at developing thatonline
can beintranet
accessed throughout
knowledge mgmt the system
organisation that isand outside as well
of importance with
to either
proper
an
This login is
organisation
project provided. atThis
or a college.
aimed system
The system
developing can be used
(KMS)
an online as
leaveis an
an application
Intranet based
management for application
system the that
TPOisofofthat the college totomanage
can be accessed
importance either an the
student information
throughout the
organisation with
or organisation
a college . Theregards to
or Leave placement.
a specified Students
group/Dept.
Management System logging
This(LMS) should
systemiscan an bebe able
used as
Intranet to upload their information
a knowledge/information
based application that can be in
the
mgmt form
accessed of
system a CV. Visitors/Company
for the the
throughout college. representatives
Students/Staff
organisation logging
logginggroup/Dept.
or a specified should be ablein may also
Thistosystem access/search
uploadcan anybe kind
usedany
ofto information
technical
automate the put up
by Students.
information. Students/staffs logging in may also access/search any
workflow of leave applications and their approvals. The periodic crediting of leave is also automated. information put up by others. KMSThere should are
facilitatelike
features knowledge sharing fromcancellation
email notifications, the grass root level like
of leave, projectapproval
automatic teams to of theleave,
entirereport
college. generators etc in this
Develop an Intranet Application for Winner Technologies Ltd. for automating the process of Resume Writing.
system.
This wouldCash
The Speed be facilitating
System isthe used employees
to transfertomoney
make and from print
onetheirplaceresumes
to another in awithin
properaformat.
day. This In isaddition,
basically it will
used
be speed
to facilitating
up thethe higher
money management
transfer. to searchinformation
The necessary the employees for thedepending upon their
money transfer fromskills
the sets
source andbank
otherto the
attributes. The
destination bank Basic Requirement
is sent in the formisoftofile haveonadailycentralized
basis. This repository of all the
file contains the skill-holders
information like in the organization
remitter details,
so that an employee with a particular skill set can be immediately found
beneficiary details and DD (Demand Draft) details, etc. Basically the remitter is a person who sends the money in case of urgent requirement.
and the beneficiary is the person who receives the money. If the remitter has already an account with the bank,
the deduction at the back end should happen instead of cash dealings. Once the file is received, it is processed
Consider
and the data a retail
is putbankintowhich collectsThen
the database. money it isfrom
again customers
processed andandin DD
return gives them
is printed. Thean interest
printed DDatwillpre be
determined
This
handed project rate. Our
over implements objective
to the concerned a network is to
person. automate
print spooler,
Various this process
which
reports arecan of interest
accept multiple
generated calculation.
simultaneous print requests should
by this system. The system developed and
calculate
handle interest daily for each account having balance more than zero at
This project aims at creating a Courses portal for a campus/organization. This allows registered users of thejobs
them gracefully. It should support display of the queue status, and the
allow correct
users interest
to remove rate. This
their owninterest
calculated
from willabecourse
thetoqueue. It cumulatively
should stored
also allow thein a table
spooler which the
manager will be updated
tomaterials
re-order every
jobs and day.
remove Remember
any that
job People
from the
the balance
system
This project join
is aimed at available
developing in the
an site
OnlineandHelp accessDesk the (OHD) forpublished
the facilitiesfor inthethe
course.
campus. This isqueue.
can an
on which interest
register themselves is calculated
as students daily
of abe will
course change
or Facultybecause for a the customer
course. When may deposit
a person or withdraw
registers himself money.
as a Every
Intranet based application that can accessed throughout campus. This system can be used to automate the
month
Faculty, thean cumulative
approval interest calculated
mechanism should will
be be credited
triggered which to sends
the customer.
an email to the Administrator for approving
workflow of service requests for the various facilities in the campus. This is one integrated system that covers
This
the project
person
different asisa aimed
kinds Faculty.
of at There
developing
facilities likewill a prison
be an admin
class-rooms, management
labs, approval
hostels,page system
mess, thatadmin
where
canteen,is a gymnasium,
collection
can approve ofcomputer
registers
the faculty and reports
members
center, for
faculty
the
This
club effective
for the course.
project
etc. management
The course
is aimed
Registered of prisons.
home page
at developing
users (students, This
afaculty,system
web-based should
shouldlab-assistants
contain
system, contain
the which
title the
andofothers)
manages modules
the coursewilltheand
be like
able nominal
a brief
activity to of roll,
description.
log “Student
in a requestcase register,
Project
for service
parole
for any
All register,
Management” Interview
and
of the functions,
facilities, “Online requests,
supported activities, Testing”. In-out
facilities. These This register
system
requests
associated and
will
with flow an automated
manage
beand the
senttransformation release
database
to the concerned diary
and generator.
maintain
people,
of goods andwhoa list of
are also
services all
fromstudent
valid rawusers
1.
of Nominal
groups
the that
system,
materials to Roll:
haveto Thethem
get
customer, details
registered
as onofthis
thethe
resolved.
well as prisoner
site, conduct
There are
associatedand his/her
their
features
information demographic
online
like test
email
flows. and details should
shortlist those
notifications/reminders,
Managing flow be information
of captured.
students who
addition A digital
have
of a photo
passed
new
through
This projectdifferent
comprising is aimedviews at developing
of the an online
prisoner and Library
the list Management
of articles System (LiMS)
surrendered by for theduring
prisoner college library.roll
nominal This
the
is aneligibility
facility
supply to thein
chain
Intranet criteria
system,
based as set by
report
orderapplication
to attain the
that professors.
generators
the level
can etc
of
be in this system.
synchronization
accessed throughout that will
the make it more
campus. This responsive
system can to
be customer
used to needs
search
are
whileto lowering
be recorded. costs. reserve books, find out who is having a particular book, put in requests to buy a new
for books/magazines,
2. Case register: All the details of the cases against the prisoner should be captured. This must include the
book etc.details,
This is remand/conviction
one integrated system that contains both the user component and the librarian component.
sentence details, etc.
There are features like email notifications/reminders, report generators the etc
list inofthis system.
3. Automated release diary generator: This report should be display prisoners to be released on a day,
the next day, the next week, the next month, or any given duration of time. The system should consider the
reduction of sentence length due to various considerations.
4. Parole register: This module should track all prisoners on parole and provide necessary reports on this data.
etc.
Mentor Name
CS IT
Pankaj Dadheech, Tapas
Neha
Badal,Janu
Manoj Kumar S R Dogiwal
Nama naveen jain
Aakriti Sharma

Neha Mathur

Sushila Vishnoi

Mehul Mahrishi, Priyank Richa Rawal

Deepa Modi, Sunil Dhank Vijeta Khicha

Harpreet Singh Gill

Kajal Mathhur
Anjali Pandey

Rubal Deep Gill


Priyanka Bhardwaj sanju choudhary

poonam varshney

M.K.Beniwal Aakriti Sharma

Priyanka Sharma Richa Rawal


Anjana Sangwan

Nidhi Srivastav
Nikhar Bhatnagar
Ministry of RURAL DEVELOPMENT

S.No. Problem Statement

1 Solution required for evidence based tracking of progress in house construction under PMAY(G) program:-
funds are done in installments with each installment linked to the successful completion of a house construction sta
photo has to be captured and uploaded after completion of each stage of construction, which is verified and validat
designated official. Only after successful verification, the funds are released to beneficiary. Challenges faced are:
A house construction stage may be complete but only after the official visits the house and inspects, can the funds
thereby introducing delay in inspection and ultimately release of funds.
Lack of standardization in quality/type of photographs (Pics clicked using different camera resolutions)
Physical travel required by official to perform inspection of houses in his applicable area.
Difficulty in identifying visible changes w.r.t. houses construction/density for any selective area/region.
2 Provide
Solution easy is to be anddeveloped
real timewhich accessisofable information
to assess and on flaghousing typologies
the probable forthat
areas areahave selected
higherbyinstances
Individuals of non forpro H
construction.:-Various
construction.
3 Multi types of housing typologies have been
Hazard visualization as per location selected by Individual:-Each and every regions is affected with natu developed to assist and help individuals in house co
per locally
disasters etc.relevant designs and materials. Each area has certain such characteristics regarding weather experienced, na
4 Procedure
(flat, hilly toRegion
regionsself verify, wise update/correct
etc.),
repository
exposure to
and visualization
natural individual
hazard etc.
is needed
details
Housing captured
typologies
that if a person
during defineearlier
how
selects
surveys
the
a particular
house forisPMAY(G)
to be
area, he
construct prois
what kind of disasters, calamities etc. that region is registered
prone to, for helping in the
selection of a criteria
type of definedhouse tofor be built
5 Currently,
Develop
to be used,
necessary
beneficiaries
aprecautions.
system
what materials arecan
that enables identified,
beanyused, selected
person
the shape in and
rural
and area
look of after
to house
proactivelypassing
etc. which demand eligibility
is for work
suited best torequired
withstand be PMAY
to the done
weath
from
MGNREGS the SECC
in that particular list.
recognized Since
region/area. these
work details were
classifications):-Under collected over
MGNREGSa period of time,
program, there
any is a
person possibility
holding that
a NREGAthe details
job of
ca
6 Mechanism
individuals mayto effectively
have changed. track and capture Attendance on work sites for MGNREGS workers using IRIS ba
demand
The housing
attendance for amonitoring
work to beare
typologies allocated
limited
system:-The totohim,
the in return
access
existing via
process he
a is paid
website
of daily
(RHKN)
registering wages on Provision
only.
attendance thefor basis of
is
MGNREGS work
needed done.
such
workers Hethatmight
all
includes neem
typo
7 Algorithm/Mechanism
personally travel ormanual
submit forapplications
analyzing and through estimating % match level for similarsoftware data column/s via the values (e.g. Na
easily
challenges
multiple accessible
DBs such asand
(e.g.: available
MGNREGS trackingon and
the and run to any the
capturing
AADHAR):-Consolidation ofworkers
individual
attendance whomodulewants
on intoNregaSoft
muster
of multipleunderstand/gain
rolls and lack
Govt. programsofknowledge
authenticity.
implies
website.
onan the These
housin
individua
A
8 timesystem
Customize
house consuming,
designsto be
open developed
and source
difficult
constructionor such that
to freeware
access beneficiary
in Anti-Spam
foridentify,
any rural areas and
location. is easily
solution able
not much to
withuser self
a novelcorrect
friendly. his details. The system
approach for increasing its SPAM detec should empowe
identified
individual in
to all DBs.
update/modify To uniquely applicable his a location
details and address
self is provided
authenticate by (e.g. a village name) and then other(ifdetai
9ASample
one stop
solution
name, Data
DOB, is Required:
source
required
Mother’s, to Yes
of Information
streamline
Father’s name interface
the attendance
etc. The with
name visualization
tracking
itself process
might display
not andbe ofuploading
performances,
introduce
same in all
supporting
automation
and can key
havein
documents
indicators
system
variations within and requ
ease
otheoto
would
A
statistics then for be
provision/system/mobile subjected
schemes to
under a
Appreviewis
MoRD:-There (verification)
needed such are that by
many theofficial
person thereby
programs/schemescan limiting
directly official’s
provide
which fallan intervention.
interest/application
under the department for
of work
rural
implementation,
10 (Name
Alignment – Raam, between high
Ram, accuracy
various
Rama), and
location
(Father’s processstructures
Name effectiveness.
and common
– Shyam, An
Syam, IRIS based
location
Sham etc.).attendance
mapping
Algorithm capture
between
is requiredand
SECC, monitor
suchLGD system
that andinferenc to
var
allocated
umbrella
using IRIS to him
including
recognitionthrough
programs a mobile
technology. such interface
as
The PMAY, enabling
attendance MGNREGS, of ease
worker of access
PMGSY,will beand
SAGY, submission
recorded DDU-GKY
using of
thework
etc.
IRIS demands,
To see
recognitionany along
scheme’s
systemwith r
pw
11 applicable
drawn
System
Real
provision as
time to to beschemes:-Various
what
such
visualization
forthe percent
submissionthat it the
is
of user locational
field
location value
friendly,
for applications wise hierarchy,
is
easematching
financial
from of openstructure
anyplace between
access
transactions
along
are
and being
entries
easy
(volume
with in in followed
toother
tracking DBs.
understand
and across
This
amount) to different
will help
individuals,
for divisions
various estimating
supporting
schemessuch the as ov
eas
[suc L
achievements
installed
and ofother on orofficial’s
independent areas of weak
phone
programs performance,
and only
inmanner after
ministry. there
the is no
IRIS
There single
ifisdetails
mismatch platform
of
parttheof workers
the notoof
availableofarehiscaptured,
request
where
belocations
status.
Secretary
uploaded,
(districts, An aauto
scannedacknowl
orsub-districts,
minister can
and vi
12 %
PMAY(G),
work
Payment
check
field
correction/update
should
attendance
aprovided the
values
MGNREGS,
also
process
collective
will
solutiontoisbeneficiary be
in
in
get
needed which
other
agenerated.
time
streamlining
performance
recorded.
DBsbound
PMGSY,
can
andalong
of
bring
theNRLM,
all
all
accuracy
with
schemes
programs
level
DDU-GKY]:-As
solutionandmappedfor these
Last
correspondingly
on
programs
mile
to a Delivery
commonbe
are
various
aware rural converged
mechanism
at
aligned alldevelopment
times
centralized for with
and variouseach
schemes,
accordingly
location
other. financia
programs/s
take
in which fundsexisting are transferred toprocess
various(releasebeneficiaries. Some locations or areas have highto
structure t
13 as PMAY(G)toand
decisions/actions.
Mechanism
interoperability.
Initially
(volume, it can
amount) behelp MGNREGS:-The
one
and rural
field,
some people
then
have canto
low self
be select
extended
financial
payment
forto receiving
combination
transactions benefit
recorded.of multiple
of funds)
offered under
fields
to beneficiaries
etc.Govt.
Due scheme.:-In
to large
is cumbersome,
volume existing
of data s
Sample
delays
Sample Data
and
Data turn Required:
around
Required: No
time,
No status incorrectness in transactions, inclusive is of various issues anddevelopment
inefficient inprograms/schterms of ex
14 approach
sample
Verification
information sizefollowed
can
of
between be for
placement beneficiaries
determined
participative
selection
and(employment
taken for type,
to calculate
intermediaries.
variousthe schemes
match.
location etc.) top
after down. All
a candidate rural is placed under DDU-GK
A platform/dashboard
extending maximum or
benefitsmechanismto rural using
poor. which
Assessment Secretary /minister
ofstructure
eligibility can
isof
alldonehave access
by various to all schemes’
officials assigned performance
at Centre
15 Also,
DDU-GKY
An
specific
system
the process
automated
Detection is of
parameters
needed
of any
isplagiarism
asystem
placement
where withis new
required
and
limited
the
addition/update
linkedother training
which
beneficiary
can
fraudulent
dependency can
act
get
in as
initiative
on
existing
where
repository
activities
contacting
selected into
placement
in for
post
individual
schemes
allfor
Placement schemes
candidates
information
specific
and offer relatedinisscope
and
departments
himself
mandatory
visualize suchlocation
documents:-Project
to or
tracked
as
and
involving
PMAY(G),
using
incentives
wise Implem
manual
unique
MG
transacfor
in
ide
SECC
Sample
partners
happening.
Agencies etc.
data
are should
have required:
aligned
This to go
would
providethrough
No
accordingly.
help proof a
the common
Physical
MoRD,
of placement centralized
DFS, verification
banks/FIs
for update
is
candidates an
etc.( framework,
important
participating
they’ve only
factor
trained after
of it
stakeholders
and inapproval
placed.which in a which
Documentssample
schemes) will
of
to
such then
the be
candidat
visualize
as bank refl
ths
A
16 An solution
android
(Biometric
centralized is required
application
perhaps!!!)
locational to eliminate
solution
database (LGD).problems
for faced in
mobilization/Identification existing payment of structure
Beneficiaries:-PIAsand suggest and new ways
States of
have executio
to work
placed
payslip are
transactionalare visited
some load at
area their
wise employment
and help location
them in and
making their placement
location specific is verified.
decisions (such as installing branches, ATM
funds
Sample overall
17 collaboration
An app/IVRSData withofeach
from
Required: the Yesdocuments
Centre/State
other to to that areand
applicable
mobilize used as the
of now.
beneficiaries.
find intended A lotbeneficiary
Solution of documents
ofcatering
Ruralunder toarelastsubmitted
the mile
DDU-GKYpayment acrossrelated
(DRD)program.
the countryproblem
An app by
areas with lowtosolution
developed.
be developed penetration
aid
forhaving
PIA/State
DDU-GKY
to large
find
beneficiaries:-Department
transaction
relevant volumes)in each district/village.
beneficiaries
Development
Sample
18 DDU-GKY
Can
Improving Datathe
aa technology hasRequired:
plenitude
existing Yes
tool/solution of monetary
employment bebe developedand process which
framework/mechanism oriented
can aid benefits
the alignedpeople:-Emphasis
verification
for skilled to support
process candidates.
balancing is toasIt’s
between skill important
effort
over Februtaken
40 fo
cro
Can
Details computer
of central vision
assistancealgorithm sanctioned developed
and to detect
released under plagiarized
Pradhan documents
Mantri Awas across
Yojana the country?
(PMAY) on 18th
beneficiary
veracity
Sample of the
Data to know what
ofverification.
Required: Yes he/she is eligible for and it’s important for the Ministry to know whether the beneficiarie
19 various
System
(From:the
SECC
given
kinds
for
Ministry
datasets efficient
support canmultiple
ofthat’s and
Housing
be used skills
transparent
toand
mandated.
by 2022process
Urban
formulate so
Poverty that of
strategies they forget
Alleviation) employment
buyer-seller
mobilization andfuture
interactions, thusprovision
improvecenters. entrepreneurship.
for creating nicheSome
https://data.gov.in/catalog/answers-data-rajya-sabha-q
and training produc pr
in existing
Sample
SHGData system :
20 for
session-238
Provision
Status of forRequired:
groups
Statewise
for allYes
a centralized areas:-The
Allocation, stopbasic
oneRelease source
and
ideafor behind
Expenditure
the NRLM
information under aboutgov.all
National
scheme/program
government
Rural Livelihoods
is to organize the people
programs/schemes
Mission (NRLM) drillabl
durin
i
into
NumberSHG of (self Help
households Groups)
demanded and make them capable of self-employment by helping them start some entrepreneuri
ofand of employment provided under Mahatma Gandhi National to Rural Employment
21 level
A toolfor
System
2016
Chances
These (From
SHGs
SAGY.:-The
isgenerating
required
of :Ministry
the which
skilled
provide the development
of
various
opens
total
Rural
youth noup
not people
Development)
landing
offerings
Gram
communication
in up
form aPanchayats
eligible directly
for identified
with
to:receiving the under SAGY
beneficiaries
pensions under isNSAP
— intended
https://data.gov.in/catalog/answers-data-rajya-sabha-questions-sessio
jobof due
products improper
and demand
services which
right
tracking/awareness.
can be used
from
(Indira
on
take place
mobilization,
Gandhi
Possibility
demand basis
through
ofby trainin
Nationa
explo
any
t
Scheme
convergence
placement (MGNREGS)
and and can be anfrom
implementation 2009-10
invaluable of to
tool 2015-16(From
existingto and Government
monitor the Ministry
schemeSchemes of Rural
and Development)
Programs without https://data.gov.in/catalog
allocating additional fun
22 Pension
Physical
mismanagement
Assessment
Key problemsScheme)
and of allofbut
Financial are
Progress
employed
computers
encountered
data-rajya-sabha-questions-session-239
not included
: under
areyouth
for pirated (area
byNational
the wise):-Currently
employer Rural Livelihoods
with
unauthorized no one the
software/seligible
toMission
adequately people
(NRLM)
installed helpareon identified No based
assystem:-Currently,
post onjob.31.07.2015 properonmapping athelotdeta
of po
individuals
unauthorized filtered
software/s from the
are NSAP
installed DB on after
various satisfying
https://data.gov.in/catalog/physical-and-financial-progress-under-national-rural-livelihoods-mission-nrlm
a skilled youth with the job allocated to him. Lack of
computers the
Awareness, eligibility
by usersImproper criteria
which for scheme.
demand-supply
are not ethical andmatching
are a interface/repo
threat in some
Funds
23 Ensuring
The released
Ministry toRural
freeofflow, States under Mahatma
uninterrupted,
Development regular
has Gandhi
brought National
internet Rural Employment
bandwidth
out a document at allGuarantee
usage ‘Samanvay’
named times –for Scheme
using internet
compilation (MGNREGS)
of 223 forCentral –2
officia
Funds
when
other.
Restrictedreleased
there
Solution
26/11/2015) is(From
growth, to
a is
largeStates
needed demand under
localization
:Ministry which ofMahatma
available.
can
of help
products
Rural Gandhi
track,
and
Development) National
consolidate
services, Rural
and
Limited Employment
report
exposure all suchto Guarantee
software/s
vast market
https://data.gov.in/catalog/answers-data-rajya-sabha-question Scheme
along
(consumption (MGNREGS)
with other relevant
within – v2
sma
limiting
Centrally
24 Intruder
However, available
sponsored
detection
there are bandwidth
and
oncan
chances 1806
computers:-A
that for
State accessing
detailsschemes.
system
of many other internet
is individuals
needed to beare sites/urls:-Accessing
putnotin there
placein toNSAP
help with leisure
DB sites
physical
and (such
thereforeintruder as youtube,
detection
although eligi o
26/11/2015)
appropriate
geographical (From
measures
area), :Ministry
limiting be of
taken.Rural
or Mahatma
reducing Development)
the demand https://data.gov.in/catalog/answers-data-rajya-sabha-question
and
State-wise
downloading
computers.
be considered payment
In etc.)
case
for can
theofduean under
consume
unauthorized
payment of large
pensions. Gandhi
bandwidth
access on and
a thussupply
National
computer, Rural
can slowrequirements.
Employment
provision the BAUto be Guarantee
process
made such Scheme
forthat
departments’
the (MGNREGS)
intruder functioning
details –can2
State-wise
The key problem payment
roomfaced dueinunder this Mahatma
is proper Gandhi
tracking, National
allocation Rural
and Employment of
employment Guarantee
inthe Scheme (MGNREGS)
trained/skilled –of2
25 Conference
27/11/2015)
for various
Ministry
and intends
appropriately (From
official that
booking
:Ministry
works.
alertsthis candata
system
be ofmay
System Rural
triggered
across
tobe leveraged
multiple
beDevelopment)
developed
to the owner
ministries/departments
mobile
ofdownthat application
computer. resources
with
different
ahttps://data.gov.in/catalog/answers-data-rajya-sabha-question
forsuch that the bandwidth useraccess
friendly under youth
(whenbuildings:-Creation
search strain in
options due a relev
forto un
bette
27/11/2015)
avenue/platform
platform/Mobile
Currently,
State-UT-wise (From
products is
App
details :Ministry
needed
madewhich
of bywhere
amount of
acts
SHG Rural
individual
as a
groups
released Development)
repository
in
under departments
a listing
particular
the https://data.gov.in/catalog/answers-data-rajya-sabha-question
Mahatma of
area ministries
location
offer
Gandhi lower have
wise direct
conference
quantity,
National Rural several or
rooms they
types
Employment can
available
products. directly
Guaranteeacross seek
Provisiondiffe
Sche
access)
by all the are blocked and the resources freed up for official work.(eOffice)
Requirement
departments
SHGs
(MGNREGS) forstakeholders
State-UT-wise
people within large
inis of
details
demands
different
afrom
particular
2012ofoflocations.
a system rural
inwhich
amount
area
to 2015
development.
various is
released
An
to produce
(From
able
job to
under
areas
official
same
:Ministry
The
fetch
to
canthemobile
ofMahatma
cater
type log to
into
ofRural
application
details/information
their
output the system,may
Gandhi
requirements.
product
Development)
using
National
check
so
beother
that
named
theRural
the DBs
room asEmployment
volume
‘e-SAMANVAY’.
(such
options as available
islater.
more, SECC),
https://data.gov.in/catalog/answers-data- Guarantee
thus
Theaccord
compare
and
attracting
infor
Sche wan
be
NSAPmade
(MGNREGS) DB available
and provide
fromfor in both
2012 the English
mismatch
to 2015 and
(From Hindi
count or
:Ministry with
list provision
of individuals
of Rural for adding
that are regional
eligible languages
yet not covered for the pension sc
the meeting room
entrepreneur/investor/buyer
questions-session-237 a particular to source date from and time
that in advance,
region itselfDevelopment)
inandtheavoid
building https://data.gov.in/catalog/answers-data-
as per otherwise.
searching applicability or requirement. It sh
location/area realastime
questions-session-237
to provideProgress required.
Financial
Sample Data Required: ofstatus
PMGSY
Yes
regarding
(as onallocation
31 March,(booked/free) status of available rooms for conducting meetings ba
2012) https://data.gov.in/catalog/financial-progress-pmgsy
Financial
delimiting
Solution
Physical Progress
the
is neededOf
Progress scope of PMGSY
of
to PMGSYa meeting
analyze these (as on
room
As Ongaps 31 March,
being used
and challenges
31 March, 2012)for https://data.gov.in/catalog/financial-progress-pmgsy
a and create department
particular a solution which
2012 https://data.gov.in/catalog/physical-progress-pmgsyonly. would enable better and transp
Sample
Availability Data of Required:
Funds for YesMaintenance under PMGSY and Bharat Nirman – (2000-07) – Based on Sample
of buyer-seller
District wise Physical mechanism. Performance of Rural Road Scheme under PMGSY during the period of 2000-01 to Survey
2004-052
https://data.gov.in/catalog/availability-funds-maintenance-under-pmgsy-and-bharat-nirman-based-sample-survey
Sample Survey 2010 https://data.gov.in/catalog/district-wise-physical-performance-rural-road-scheme-under-pmgs
Expenditure and Beneficiaries Under NSAP from 2002-03 to 2014-15 https://data.gov.in/catalog/expenditure-and-b
sample-survey
under-nsap
Availability
Physical AndofFinancial Funds forProgress Maintenance under PMGSY and Bharat Nirman – (2000-07) – Based on Sample Survey 2
of NSAP Components https://data.gov.in/catalog/physical-and-financial-progress-
https://data.gov.in/catalog/availability-funds-maintenance-under-pmgsy-and-bharat-nirman-based-sample-survey
components
Total number ofAssistance
active DDU-GKY training centres as on 26th November
Eleventh 2015 (From :Ministry of Rural Developm
National Social Programme (NSAP) Progress In The Plan https://data.gov.in/catalog/national-
https://data.gov.in/catalog/answers-data-rajya-sabha-questions-session-237
assistance-programme-nsap-progress-eleventh-plan
Status of Statewise Allocation, Release and Expenditure under National Rural Livelihoods Mission (NRLM) durin
2016 (From :Ministry of Rural Development) https://data.gov.in/catalog/answers-data-rajya-sabha-questions-sessio
Physical and Financial Progress under National Rural Livelihoods Mission (NRLM) as on 31.07.2015
Mentor Name
CS IT
under PMAY(G) program:-Release of
ion of a house construction stage. House
n, which is verified and validated by
iciary. Challenges faced are:
se and inspects, can the funds be released

camera resolutions)
area.
lective area/region.
aveselectedhigherbyinstances
Individuals of non forprogress
House in
dy help individuals in house
regions is affected with natural calamities, construction as
rding
nerselects weather experienced,
a particular area, he nature of
is able to knowland
ow surveys
the house forisPMAY(G)
to betoconstructed, program:-
of
ility a type
criteria of house
defined be
for built
PMAY(G) and technology
with the
program
or work required
ted best to withstand the weather to be done (underand hazard anjana sangwan
ersona possibility that the details of thecan directly
REGSholding workers a NREGA
using IRIS job cardbased
is of
on
MGNREGS is work
needed done.such
workers Hethatmight
all
includes need
typologies
majorto are
data ftware column/s
via the values
website. (e.g.
These Name) methods in are
/gain
ack ofknowledge
authenticity. on the housing be typologies,
or increasing its SPAM detection uniquely
programs
s. The implies
system shouldan individual
empower the accuracy :-There are plenty of Antispam solution. Find out a novel approach to increase the SPAM
ge name) and
supporting then other(ifdetails
documents required) suchwhichas
mances,
tomation
nd can key
havein indicators
system
variations with and
in ease other
other of DBs relevant
such as
l’s
nunderintervention.
interest/application
the department for
of work
rural to be
m capture
between is requiredand
SECC, monitor
such LGDthatsystem
and
inference to development
variousbe cancreated
be
of
KY the
ss work
etc.
IRIS
different demands,
To see anyalong
recognition
divisions scheme’s
system
such withas real time
performance
which
LGD, will
SECC beor
his
unt)to
equest will
for help
individuals,
various
status. estimating
An supporting
schemes
auto the overall
easy
[such
acknowledgement as variation of
ere
ptured,
ions Secretary
uploaded,
(districts, or a minister
scanned
sub-districts, can
and actively
validated,
villages etc.),
verged
evelopment
nism
times for with
and variouseach
schemes,
accordingly
other. financial
programs/schemes
take support is so
such
entralized
locations or location
areas structure
have highto facilitate
transactions
beneficiaries
Govt. scheme.:-Inis cumbersome,
existing with longthe
scenario,
c. Due
s anddevelopment to large volume
inefficient inprograms/schemes of data,
terms of exchange initially of aat
ural
ate is placed under DDU-GKY program:- aim
dssscope
us toofficials
allsuch
mandatory
visualize
schemes’ assigned
asand
location
documents:-Project
performance
PMAY(G),
incentives
wise forbased
at Centre/States
MGNREGS,
transactions
Implementing
on
the project etc. A
tments
elf
provalto or
tracked
whichinvolving
using
will manual
unique
then be interactions.
identifier.
reflected in
which
ers
ed.
suggest
-PIAs in a sample
schemes)
Documents
and new ways
States
of
suchthe
tohave
ofas candidates
visualize bank
execution
to work the ofclaimed
level
statement
in ofthe
releaseandas of
ch
mile
epment as
bmitted
DDU-GKY installing
payment across branches,
the country
related
program. ATMs,
problems
An by various
toBCs
app/dashboard be inPIAs. can
(DRD)
ort
balancing
Emphasis
ss candidates.
the(PMAY) is toasIt’s
between
country? skill important
effort taken
over February
40 fortothe
crore verify
peoplev/s in
ana
know whether theonbeneficiaries
18th are2016
being
ove entrepreneurship.
oncenters. Some
for creating niche product offerings
og/answers-data-rajya-sabha-questions-
ng problems faced
am is to organize the people
t programs/schemes drillable in torural areas
village
hoods
them
National Mission
start some (NRLM) during
entrepreneurial 2013 to
activities.
ntended
right
SAP from
(Indirato Rural
take GandhiEmployment
place
mobilization,
a-rajya-sabha-questions-session-237
awareness. Possibility through
training
National
of
Guarantee
the
exploitation Oldto post
Age
and
ethout
ment) usedhttps://data.gov.in/catalog/answers-
on demandadditional
allocating basis by any funds. individual.
re identified No based
assystem:-Currently,
post
n onjob.31.07.2015 properonmappingathelotdetails of and of
or tracking
of pirated
eme.
s’ihoods-mission-nrlm
supply
hical
ntee –for andmatching
Scheme
using
compilation are interface/repository
a threat
(MGNREGS)
internet
of 223 inCentral
for some form
– 2015-16
official work
sector, oreven
the
(till
and
ntee
are/s
arket Scheme
along with
(consumption (MGNREGS)
other relevant
within
wers-data-rajya-sabha-questions-session-237 –
small2015-16
details (tillthat
so
isure
h physical
B sites
and therefore (such
intruder as youtube,
detection
although videos,
on various
eligible, might not
wers-data-rajya-sabha-questions-session-237
ntee Scheme (MGNREGS) –can2015-16 (till
uch forthatdepartments’
the intruder functioning
details using
be internet
captured
ntee Scheme (MGNREGS)
rained/skilled –of2015-16 (till
erent under youth
(whenbuildings:-Creation strain in
wers-data-rajya-sabha-questions-session-237
sriendly search options due a to
for
relevant
unofficial
better
sector.
a centralized siteAn
utilization
wers-data-rajya-sabha-questions-session-237
ce cess
veral or
rooms
Employment they can
available
types products. directly
across
Guarantee seek
Provision for
different
Scheme skilled
for enabling
m as ‘e-SAMANVAY’.
sEmployment
(such
options as available
SECC), Guarantee The
compare
and information
with
Scheme
accordingly entriesmay
book in
ume is more, thus attracting
a.gov.in/catalog/answers-data-rajya-sabha-
uages later. an
not covered for the pension
a.gov.in/catalog/answers-data-rajya-sabha-
plicability
erwise. or requirement. It should be able scheme for each
ms for conducting meetings basically
ancial-progress-pmgsy
ancial-progress-pmgsy
would enable better and transparent process
sical-progress-pmgsy
7)period – Based on Sample
of 2000-01 to Survey
2004-052010 – Based on
nirman-based-sample-survey
ural-road-scheme-under-pmgsy-based-
v.in/catalog/expenditure-and-beneficiaries-
7)ysical-and-financial-progress-nsap-
– Based on Sample Survey 2010
nirman-based-sample-survey
m//data.gov.in/catalog/national-social-
:Ministry of Rural Development)

hoods Mission (NRLM) during 2013 to


a-rajya-sabha-questions-session-237
as on 31.07.2015
Ministry of Skill Development & Entrepreneurship
S.No.
Problem Statements
1 Location and Availability of Skill Courses-India has more than 12,098 ITIs and 4,315 training centers pr
2 Training
Linking Supply and RPLand for Demand
Level 1, 2,of3Skills-•Currently
or 4 level of NSQF. a lotStill, the exact
of skilled andlocation
semi-skilled of thelabor
ITI/Training
force is employe Centers
3 skill courses
help in Market
Labor along
homes, gardeners, with
trend tracker- quality rating is not readily available on
drivers, neighbor hood electricians, carpenters, plumbers, mechanics, cooks, a single platform. Data for location of ITIsw
https://ncvtmis.gov.in/Pages/ITI/Search.aspx,
household ecosystem. There is also a huge demandand for for PMKVY
people inCenters
public is
and available
private at https://pmkvyofficia
offices for computer o
4 System to track advancement in the skill/equipment’s requirement-India has the world’s largest youth
Centre.aspx.
entry operators, typists, peons, security guards etc. representing
5 with•India
Skill 354.4
Games-Gaminghas
millionthe world’s
people largest
aged
is considered youth
between as one population,
15of and the29, bestwith ways 354.4 million
to impart a population people
skills aged
share
while between
of
playing. 27 per This15
cent and
can 29,utili
(compar
be re
•Even
population
million in andthe commercial
share
a share of 27
of per
22.8 space,
cent
per people
(compared
cent in are
China). employed
to 314.1
In equivalent as
million caterers
orderinformation
to reap and a and
share cook
the demographic of in
22.8 marriage
per cent
dividend parties
in or
China).
this offers,restaurant
In order
the ed
6 imparting
PMKVY
assistants skill
Dynamic
in training
showrooms, Trainingand creating
helper Calendar
staff NSQF
in privatelevel
App-Recent hospitals, Games
accounts for
/are
data
handlersvocational
are in courses
available
small firms on and
the
etc. trades.
PMKVY
Even E.g.
organ w
demographic
skills
plumbing of youth
that dividend
are
uses vital
the this
so
virtualoffers,
that they
realitythecan education
to maximize
impart theand their
exactskills of
productive
skills. youth
Data vital
contribution.
regarding so that
the they
Indian
NSQF can
Labor
levelmaximize
market
for is
various the
hig
PMKVY Employers App-•The IVdetail setof
7 like all trainees enrolled onmany
PMKVY centers is available onad LMI
Also,Bollywood
contribution.
availablethe in Industrial
public
employ
Indian Labor on market
Revolution
domain.
a daily
Design
basis,
is highly
isgames skilled
to dynamic.
bring
which
people
huge
can be
ranging
Also,
changes
made
from
theavailable
Industrial
in stunts-men
Revolution
sectors.
on Play A toSystem
Store
technicians
IVor is set Center
can
App to
be forbring
designed hoc
for hugpe
8 Usually
Technology
many these
sectors.
advancements employers
platform
in the for look
skill/equipment for
spreading prospective
awareness
required person
to about
carry using
outPMKVY
a anjob informal
scheme
role. This networkamong
will and
help uslocal
keep knowledge.
masses-•Schemes abreast like
with thP
and learn while playing.
9 •India
PMKK hasetc
•A Systemskill
Platform
changing availability
has
tocan been
be designed
track of
launched
workforce
requirements skilled
to for
intrack workforce
the
termsLabor erupting
requirement-•Creating and demand.
youth
market trends
of technological of This
INDIA. workforce
This
to know skilling
a platform
advancements is
which can a may
unique
needs not
crawl be formally
endeavour
(distributed
information by trained
the
through Govt.
over the / cert
geogr of
in
not
nevergethappened
sectors)
websites linked
through
where toTenders
thesuch
in
Big person
Data a
and who
pronounced
analytics needs
Proposals – ontheir
away
are a products
even
continuous
being after
listed /ongoing
7services.
outdecades
in Such
of
basis?
India. linkingArtificial
independence.
Through with training
Enumerate andvarious
Intelligence, customersthe met
sys
10 Skill India App-•There are many services provided by NSDC, details of which are available on webs
opportunity
how
•India
the toLabor
work percolate
force for value
Market
requirement addition
suchUpdate a noble inILOin terms
intention
each Country of
of quality
ourand
Office Prime of services
for Minister
India
submit| July and customer
toentry
reach
2016 ontothe satisfaction.
more and more masses?
11 App
•In
•Design to track
order to
an Migration
bridge
effective themediagap trends
between
Campaign to proposal
find
these app skill
potential
based/
can
requirement-•Data
webemployers
based
an
/ and
any is publically
skilled
other forlabor
website.
available
force,out
reaching through
aprojects
web based
to masses IMO andand
mobile cre
•Additionally,
which we can we can
see the take futuretrends
migration requirements
and forecast fromour theskills
corporate for their upcoming
requirements based on the same. and
This allocate
would
12 Platform
designed
confidence onfor helping
which
in the can
heart youth
use themakedatabase informed of skilleddecisions
force on
to career
link the choices
prospective in the vocational
employers of sector-•With
skills to those
numbers
international based and their of
onnational people of India
commitment.
migration The that
trends system the can
(Natural
schemes recordlaunched
Calamity the
ortwo future
any
UNDERdemandSKILLING
Disaster). of the corporate DEPARTMENT and throug
youth
•Design entering
and the
suggest job a market
Digital every
solution month,to vocational
achieve the pathways
above objective as an alternative
for creating to
suchacademic
backward stream is imp
13 MIS
the
•Design
for
existing
dashboard a
coordination
eco
can know
Digital
system
solution
of
of various
the
the details
to be
country.
where
able
departments
to his workforce
aggregate
in
these
GoI-•When
is getting
data and trained.
give
government
Design
such
departments
and propose
national and such aand
work
International
in forw
digitalsilo,
trend
14 several
location
start thousand
wise,
of duplication
Leveraging taking
Project skill
and acentres
LOONcity asby
redundancy have
a base opened
GOOGLE offorworkthisacross
problem
leading
for thetocountry,
spreading red-tapism informed
awareness and of decision
frustrations. making
Almoston18-24
skill programs-•Google whichministrie
istrade
launc a
can
to provide
evolve these
Skills services.
Requirement for the nation.
undertake
own skilling training
initiativesis lacking.
being This
undertakenis because today there
and isone information
of the most asymmetry.
important If youth
tasks of had
MSDE access to releva
15 LOON,
E- portal which
for would use helium
processing application, balloons to reach toinspection
registration, billions of and internet providinguser allstatus over the world.
report on affiliatioC
is to create
(online)
among
•How – they
all INDIA
can can
such initiatives.
as make
an an
emerging informed decision
technological on
head choice take of trade
leverage and
ofof opt
such for appropriate
initiatives to training.
communicate
16 •There
Creation are of13,343
App ITIs
for in the country
obtaining the and out
status of of which
regular only
up-gradationabout 2300 itare Govt.ITIs
is-The ITIs. can Hence
come there
on aretomo
commo th
•Information
•Keeping
educate the such
above as:in mind, enumerate methods that can be enabled on digital India mission to create an M
17 ITIs
with the them
operated
Creation
•Options proposal on
by skill
ofministries private
E-information
available
awareness
of(sectors players.
up-gradation andCelljob
programs?
Further,
ofroles)
for their many
providing more
Skillofnew
infrastructure with
trainingaspirants/entrepreneurs
allrelated
supporting information.
information arewhich
interested
This canwould to invest
be enabli
dissem
the
new various
ITIs which /
will definitelydepartments give of Government
a leapguidance-
to national India.
skillofdevelopment.
make
schools
•Access: a suitable
for
where decision
providing
such onsector
necessarythe approach
career and modalities up-gradation. Further, tendering, is anprocurement
18 Developing
•Design
•We can and
provideSoftware
suggest an atraining
App for
Digital
for
issolution
setting
available
specific
up new professional
to achieve
ITIs by licenses
thefacilitating
above for skill
objective.
on-line trainers-There
application, registration, opportunity
document
equipment
•Cost
digital – free
based etc.
or and
paid
decision the time
supporton to time
system status
for report
the on
qualified up-gradation
professional can be
who would obtained through
aspire this
to become digital
skill platfo
train
19 E-information/
and also providing Technology
feedback platform
standing for standardized
committee inspection building and layout
finally and
granting space allocations
affiliation. for shop
following
•Academic
platform Information
would
system canE-beportal requirements
provide
designed can 5)
all beJob
the disseminated
prospects
basic
to providelearning requisites
information such as
such
on trainingas trade
trade specific specific contents/coverage,
advancements in the building types of
layoutquestion / amb
20 National for distance in skill in each sector-•A method of studying in which
•Estimated
of conducting wages
assessment etc. will be provided for their necessary e-certification to become a trainer. The
21 floor layouts
broadcast
E-library or
and required
lessons
digitized to set
are conducted up
didactic a modern
bysectors
cell training
correspondence,
for all center
instructional to
withoutfacilitate in
the student
materials, implementation
needing to physically
Question/Answers of standardized
Bank attend
and /bes
bui
trou
•Career
would
The focus choices
progression
facilitate
on safety available
forway etc.
conducting
norms inanddifferent
evaluation
other necessary and
ofwithout
theprescriptions
candidate and enable bethem to becomeinformation
licensed trainer.
22 school
•The
On-line /college.
Information
skill test A explosion,
in every of learning
searching
sector remotely
for problem
every level inof regular
traditional
skill-On-line &should
live
libraries, physical the additional
low
examination face-to-face
cost of technology
itself is contact
Economical, and to
with be
conside
Logis
hig
a tea
•Emerging
•Would
will help of demand
greatly
usThis assist
keepwould and
abreast in Job
making prospectsappropriate choices. There could also be provision of psychometric tests w
classroom.
capacity
and Realsuggestions
Time digital document
Evaluation. bewitheasy andthe
Further, to changing
use
its and
itmaintenance
is not
requirements
accessible,
human then also.
inexpensive
itincan
dependent be for and realize
easily can replicate
evaluation. thatthe
All thethecostactual
activities job
of technologies
such situation
as deve
23 •Access:
provide
Technological where such
solution ontraining
trades
for iswhich
available
recognition would of be most
prior skills suitable. This
informal would be empowering
sector-•Majority of for
Indian candidates
workforce an
platform.
less thanof
application The
that expert
of
software trainer
traditional
for canadmission/confirmation,
libraries.
online provide practical
A digital library demonstration
ispolicy
not confined
examination in one tofeeaparticular
particular
payment location
location
confirmation, can
or sobehall regularly
called ticketbu
24 •Details
improve
informal
Easy solutions the
outcome
sector. training
One
for of courses
metrics
doing the as
BIG also
biggest DATA reduce
challenges dropout
analysis-•Indiafor the rates which
has a are currently
makers
population is toof high.
understand
134 CRORES the existing
(1.34 skill
BILLIONS relat
all over
virtually
attendance the country.
distributed
reporting all over the world: The user ofthe aupdigital library need notoftoskillgototodevelopment
the library physically,
25
•Estimated
•Design
and
database
National and
toE-portal
develop
whichwages
suggest
skill
contains
Entrepreneurship aand declaration
Digital
development
only solution
one program
line
Internship
ofinformation
results
to achieve
for can
skill
Exchange-•An
be
for brought
above
gradation.
one person
Online
on A
objective.to a e-platform
number
each,
National our data
Internship basefacilitate
is estimated
Exchange
more candida
policies
to
platform cross thh
•The
all over
evaluation the with will
world provide
could
higher gain
level allof necessary
access
validity to theinformation
and same on
information,
reliability. the details
as longof enlisted
as an expert
Internet trainers,
connection trade
is specific
available
•Career
launched
Zettabytes. progression
but Howinclusivity
can etc.
we of informal sector still remains a challenge. The first ideal step is to understand th
win-win
covered
PWD model,
and
(Divyang) other where
necessary
user inskill
NIESBUD
friendly ourtime,
details countrymen
on can get short
24schedule to learn
aonof term
telecastBig data
resources
etc. analytics
This for various
ofwould and create systems
entrepreneurial
beEcosystem-•Presently
aThe
great help forwhich
services can
the trainees beisu
like
26 libraries
•This
manpower
Solutions
can
E-information be accessed
data
may befrom Cell
the
readymade
at
can any
informal actEntrepreneurship
assector
solution repository
for
hours
based
Big of
Data
day
all Support
which and
analysis
365
information
the &
days Facilitation
program
or which
pedagogy
the
forare year.
frequently
skill
for up
learning
same
gradation
to
resources
sought
do can
so. afterbe
Design bythere
can
designe be
the
and c
Preparation
the
same critical
Entrepreneurship
time by Assistants,
practical/theory
a Toolkit
number Training
of exercises
Application
users. Co-coordinator
A through
(viz
particular BrailletheAssistant,
digital direct
/ Sign
library Conduct
demonstration
Language/
can provideField
Speechofthe – Recognition
Online
expert
link to – Surveys,
trainers.
any software)
other Datathat
Thisresources
also gatheri
would can
of h
27 Entrepreneurship
would
penetration
Digital
primary
greatly
solution
and
assist
ofsecondary
mobile
to Facilitation
in
achieve making
technology
the
resources,
Services
appropriate
above is vast Processing
objective.
Research
choices.
andAssistants
the reach that Centre-
is increasing
can help every
NIESBUD day. Adeveloptechnologies effective solution
and is eo
effic
learn
Divyang the same at
Entrepreneurs. their convenience.
28 library
Application
understand very easily
theSoftware
prior and skill –There
thus
for is needsector.
in ainformal
seamlessly
Training for a Divyang
integrated
Facility TheManagement,
solution usable
resource hasApplication
•Theresharing nocan
is based
toNoida
be Cloud
and that
be
on is
&compatible
achieved.
Guwhati- Social fee based
individualistic –response
downloadable
Online mech Ap
and
Phone
•Hence
can services.
or I
facilitate in pad
e-platform or E-Book
to
Entrepreneurs provide or Desktop
all necessary – Laptop, based
instructional Entrepreneurship.
materials, question & answers will benefit the lear
the diversity
Aaccess
bespoke sector. to do
theApplication their:
development viz •Presently
National there is no In-house Application – that can fa
•Need:
•Day toAn
smooth
booking day
of integrated
to the
accounting Application
information
– purchases, development
and speedy
sales, that
learning.
returns can beEntrepreneurship
accessed by Divyang Internship Exchange
Entrepreneurs. for Hiring
Performance
•Cash flowfacility Tracking, Assignment Allocation to be developed.
•Incubator
•Stock
•Training takingroom facility
•Budgeting
•Online and Forecasting
registration for Trainings and Variance Analysis
•Third-party Vendor
•Payment gateway for online deposit Management – Invoicing
of fees byand Payment
Partner System
Institutes, leveraging
Training smartVendors
Partners, paymentthat solutions
use Train ,r
management
incubators. viz AP , AR with OCR enable EIPPS ( Electronic Invoice Presentment and Payment System
•OnlineisSmart
•There No Online Banking – phasing
dashboard thatout can Manual
provide Cheques,
remotelyDoing Occupancy OnlineStatus Bank Reconciliation
of Training Rooms / Incubato
•XBRL enabled Regulatory reporting
Trainer or an Entrepreneur can plan his/her Business Premises requirements in accordance
•Need:
•Need: A customized
Application thatApplication
can betterthat leverage can be‘Training
accessedInfrastructure
either as a Licensed at NIESBUD versionand or outsourced
IIE to Govt.
Managed Entrepreneurship Facilitation Services Processing Centre.
trepreneurship
Mentor Name
CS IT
and 4,315 training centers providing Skill
nkilled
of thelaborITI/Training
force is employedCenters and as available
domestic
orm. Data for location
mbers, mechanics, cooks, sweepers of ITI is available
in at
lable at https://pmkvyofficial.org/Training-
rivate
has theoffices world’s forlargest
computer youth operators,
population, data
hile aged
share between
of
playing. 27 per This15
cent and
can 29,utilized
(compared
be representing
tofor 314.1a
marriage
8ic per cent
dividend parties
in this or
China).
offers,restaurants,
In order
the to or
education as
reap the
and
onal small courses
available firms on and
the
etc. trades.
PMKVY
Even E.g.
organized games
website for
to
industries see PMKVY centers closest to one’s location preference – open, closed, available for
on.thethat
Indianthey
NSQF can
Labor
levelmaximize
market
for is
various their
highly productive
trades dynamic.
is
centers
enAtoSystem
olution is available
technicians
IV is set Center
to for on
bringad LMIS
hoc
huge data
assignments. atthehttps://www.lmis.gov.in/certified-candidates.There exists an opportunity to link emp
ays. Store or can
App be designed
for tochanges
people trackto in
engage
rk
ong and
help uslocal
keepknowledge.
masses-•Schemes abreast with likethe PMKVY, continuously
dsnot
ue
rawl be formally
endeavour
(distributed
information by trained
the
through Govt.
over the / certified
of
geographies India,
internet orthrough
may
which
and
with
ence. training and customers gives an
hich Enumerate
Artificial areIntelligence,
available variousonthe methodologies
system of
websites canNSDC trackon and Skill Exchange etc. The services are listed below•Enrollment yourself for PM
eisfaction.
and
ebsite. more masses?
yaching
r available
force,out through
aprojects
web based
to masses IMO andand
mobile create MEA,
platformmore fromcan be
coming
sed on the same. and
This allocate
would PMKVY
include
the
edSKILLINGvocational
employers of sector-•With
skills
DEPARTMENT to those 1
withmillionskills.
. ofdepartments
the corporate and throughwill thechange
tive
ting
ent to
such academic
backward stream
work and in is imperative.
forward
silo, the linkage
result While
is
nional
and propose
and such a digital
International trends platform
of migrationwhich
on
ions. making
Almost on which
18-24
programs-•Google is launching project trade
ministries a candidate
have their
If youth hadworld.
access tocreate
relevant information
gtasks
all overofthe
status MSDE
report is toaffiliation
on Coordination
of ITIs-
appropriate
tiatives to training.
communicate
ovt.
he ITIs.
ITIs can Hence
come there
on aretomore
common the masses than 11,000
e-platform and
leursIndia mission
arewhichinterested to create
to invest an MIS
in MSDE between
settingtoup
formation.
mation This canwould be enable
disseminated toall
her,
ners-There tendering, procurement
is an opportunity of tools
for creating etc.& a
tion,through
ned registration,this document
digital platform. verification The
ddnting
aspire
space to become skill
allocations
affiliation. for shoptrainer. This
floors-A
coverage,
smethod
in the building types
of studying of
layoutquestion/ ambiance
in which sets andand
lectures mode shop
are
on
mentation
eding to become of a trainer.
standardized
to physically attend The same
building
/be present platform
norms. in a
on/Answers Banktrainer.and trouble shootings-
becomeinformation
ditional
ce-to-face licensed
contact to
with bea highlighted.
teacher in the This
nst of technology
itself
ision ofispsychometric
Economical, and considering whichthe
Logistically
tests storage
efficient
could
licate
Allhatthe thethe costactual
activities job
of technologies
such situation is
as development onmuch the virtual
more
ofin
mpowering
Majority of for
Indian candidates
workforce and is potentially
working
ular
cular
ment location
location
confirmation, can
or be
so regularly
called
hall ticket disseminated
building
verification,ITIs
gh.
rstand
CRORES the existing skill
(1.34 BILLIONS). related manpower
If we create a
orm gototodevelopment
skill the library
facilitate more physically,
candidates,
policies havepeople speedy
been from
ata
rnship base is estimated
Exchange
expertconnection
trainers, trade to
platform cross
specific millions
thatDigital
can be a
exercises of
ernet
ideal step is to is available.
understand the skill
create systems
entrepreneurial which
services can be
like safe
Business proof?
aThe
great
quently
up
help
Ecosystem-•Presently
same
gradationsought forafter
resources
can
the trainees
be bythere
can beis
the
designed. used
candidates
The at thePlan
tonounderstand and
earning
nline
nk rt
cognition
to any to
– Surveys,
trainers. do so.
software)
other Design
Datathat
Thisresources
also would and
gathering
can
of suggest
help
be
other both
them
used aby
from
digital to
D. Adevelop
technologies effective solution is expected
and efficient programsto
&swhati-
compatible
hieved.
Social fee –response
baseddownloadable
Online on Smart
Application
ndividualistic mechanism duethat to
answers
use Applicationwill benefit – that the
can learners
facilitate through
Online
ernship
ng Exchange for Hiring, Deployment,
Entrepreneurs.

grtners,
smartVendors
paymentthat
solutions , receivables
use Training rooms or
tment and Payment System )
feconciliation
Training Rooms / Incubators so that a
n accordance
rsionand
UD or outsourced
IIE to Govt. Owned and
Department of Science and Technology
S.No. Problem Statements
1 Gaming, Apps, etc. for the elderly-We are presently having the largest population of youth and that is th
2 future.
Managing However,
visitors wetoare soon also
Science going to have Express
Express-Science perhaps is thea largest
unique population
science exhibitionof the elderly
mounted andon get16-co
the l
Nation.
built But these
for Department elderly have
of Science & been the backbone
Technology of
(DST).for our nation
It has and we
been travelling must ensure
successfullythat it remains strong
for past 9 parliam
years
3 Digitised Platform /Automatic Response platform handling Parliament Questions-During
mentally.
over It
1,50,000 is the latter
km across issue (mental)
the country, and
receiving the challenges
more than that
1.50 it entails
crore that
visitors weat wish to bring to the notice
4 Department
Discovery receives number of Parliament Questions on varied topics raised by400+
MPshalts,
andbeingin 1500+
handled in days
a ver
offer
the viableplatform
longest solutions.
running
ofThe
and
startups-India
the elderly,
most as per
visited
is the
a home
mobile
to nearly
information
science
20,000
gathered
exhibition
startups.
from
in India,
The
Department
and
startups
perhaps of Geriatrics,
in the
founded
world AIIMS by
and w
5 on top
generation
Corporate priority.
connect Each
entrepreneurs reply
platform is
often generally
find
for it prepared
challenging
startups-For by to seeking
connect inputs
to the from
relevantall the other
players ofrelevant
startup departments
ecosystem
degradation
Limca Book of mental faculties which could leadmany startups
to several ,as larger
disorders companies
like Amnesia, and big corporates
Alzheimer disease, areamt
efforts
technical
acquirers , isof
anddomain
part alsoRecords.
of B2B
From
time consuming
experts , I.P
sales, , 2007 at to
legal,
business the 2011
financesamethe
mentors, HR, train
time.
and Ittravelled
is proposed
mentoring,
a enabling Go the
‘Science
to to digitise
market,
business
Express’
the entire
business
models
displaying
of process
services
starts
cutting-ed
of
and
ups byreceivin
network
suppo
6 possible
Know
spreading way
your to arrestabout
incubator
awareness the onset
through or at least
a digitised lessen the
platform-Over impactglobal
of
200these challenges
incubators, is to engage
accelerators the
andwords elderly in
co-working
from
proposed
CSR
Suduko,
the
supported
Lok
to
funding
Chess,
and
Sabha
come
. It
few is
and out and
so with
proposed
private on. astrengths
Rajya
Based
Sabha
supported
ofdirected
comprehensive
to formulate
on our
science
spread a toineach
national
corporate
experience
all over
meeting
of
the
Department
digitised
digital
keeping
countryconnect
the
challenges,
platform
as
as interactive
kids
an
perfordefined
engaged
including
start set on
ups
platform
&
institutionalized
latest
of key
theto
interested
mode
discoveries
same.
register
in
of
along
sciencecorpo
support
w
bn
7 Aggregation
field
sent of modern
to all concernedof latest
science. nation
12
ministries –
coachesWide
by startup
were
selecting scenario
thematically
through in a dynamic/real
designed
a dropinterest
down wiseby Noble time
menuconnects mode-There
laureates
with an attached from are
Max multiple
deadlinePlanck . The blo
Socpl
facilitating
unconventional region , and wise, a domain
innovative wise
Teaching andLearning
areas of mutual
Materials and match making assome
athe
ws
8 is proposed
like your
interactive
Digital
have story to provide
exhibits,
theTechnologies
feature ET online
models
/MIS
of uploading digitized
andand
for many
the version
other
audio-visual
monitoring
inputs bythrough
similar
displays.
Water
all selected aQuality
search
online After 4(TLM),
ability
platforms and
successful
Management
departments
we had
whose inthought
andfiltration
content
phases,
then water
subsequent
of also
techniques
itiswas
focussed tomaking
redesigned
supply spot
on Indian
network
uploading and
on
ofat kn
app d
etc.
based The youth
onof
inspirational
and from location, brigade
stories,
2012-2014, domain,from
account
it travelledEngineering
mentoring,
of interesting
as Science streams
funding journeyand
Express can of be
startroped
investment, ups
Biodiversity in to
other
successes,develop
Specialbusiness Apps,
support
failures
(SEBS), aGaming,
and service
other
unique and the(WQM
offerings
stories
collaboration like,ar
and
9 absence
handling
Smart any
department stringent to norms
the on
parliament water,unit the andexisting
the Lok methodology
Sabha or for
Rajya Water
Sabha Quality
Parliament Management
unit
an endNetworks
challenge. for Renewable Integrated Sources for stand alone Microgrids-Conditioning Monito
startups
Ministry user
and
of i.eecosystem.
its startup. Itofispollution.
desired tocollection
aggregate all the stories and latest news relevant to
putIndian start
identify
system isthe theEnvironment,
various
processsources Forests
of systematic &data
Climate Change
Integration and (MoEFCC),
of data on water
evaluation Govt.
to of India.
quality
identify withDST
changesdata inhad upsupplies,
onperformance
water exhibiti
or c
successes,
Climate
important
system, failures,
Change,
orfrom challenges,
Biodiversity
the point ofsuch
its components, support
and
viewthat Water, networks
of assessing Sustainable
remedial water , investments,
Environment
actionavailability
may be planned grand and
for meetingchallenges,
Energy
in a cost competitions
Conservation.
various
effectivesocial,
manner , awards,
After
economic 7
to maintai suce
and
platform.
India,
processit of
objectives,was isredeveloped
hardly done.
continuous and fromof
Finally,
monitoring 15their
in October
the absence 2015,
electrical it isstringent
ofparameters
any running as
innorms ‘Science
order Express–
onidentify
to water quality Climate
testing,Action
a significant resultsSp
change wc
collaborative
agencies dependinginitiative on of DST,
sampling MoEFCC,
procedure, and
timeMinistry
of of
testing,
developing fault. Different micro-grids groups have been developing their own remote maintenance and Railway,
and Government
testing instruments of India.
and It aims
procedure. to creat
Thus,
various
tangent to
engineeringsections
a large
system ofgroup
society, especially
of beneficiaries.
of their choice. The students,
That isaswhy
appropriate togeneric
how Climate
development
tools havingChange
of simple lowcanandbe fast
cost combated through
water quality
providing mitig
detecti
safe solution
test, validate and
the challenge for implement
robust and state-of-the-art,
reliable micro grid. innovative, accurate, robust, reliable and cost effective rapid
Though a project
monitoring tools in ofIndian
this naturecontext.has its inherent complexities, one of the major challenges is management o
on days when the number crosses 10,000 odd. Each phase of Science Express is spread over 6-7 months o
cover 50-60 locations across India. Usually, we keep the first half of the day dedicated to organized visits
appointment. However, on an average, in each phase, at 20-25 halts, the number goes way beyond 20,000
best efforts like sending invites way in advance to schools and giving them time slots, all the planning goe
buses crowd the entrance of Railway Stations, children queue up for their turn which sometimes waiting f
and then just push jostle their way inside. In the process they get only 40-60 minutes inside the train and j
the exhibits. Entry to exhibition is free to all, being a public funded project, and Indian Railway also does
ticket. Though the visitors still seem to enjoy this visit, how can we afford the visitors a more fulfilling ex
details please visit website: www.sciencexpress.in.

Sample data required: Yes; Though the number of visitors vary from just a few hundred to tens of thousan
assume 2-3 scenarios: About 10,000 which is the daily average recorded over past 9 years of operations; 2
throng it in mostly Tier II, III towns for about 50-60 days in each phase (run) of the train.
logy
Mento Name
CS IT
n of youth and that is the bedrock of our
he elderly
tion mounted andon get16-coach
the labelAC of the train Geriatric
custom-
esfully
that itfor
remains
past 9 strong-
years physically
across India as
and well as
overed
uestions-During parliament session , each
h+tohalts,
bringinto1500+
the notice ofIt make thetheyouth to
Ps andbeing
rtups handledfoundedin days.
a very
by young is thus
time bound
, face
first largest,
manner
nt of Geriatrics, AIIMS, tend to gradual
srhaps
ernd big
in thedepartments
ofrelevant
startup
Alzheimer
world and which
ecosystem
corporates
disease,
has
areamongwhich
the
sixincludes
end
entries inlot of
requires
users,
others. potential
One

ntire
ss displaying
process
services cutting-edge
ofbyreceiving
and networking research
parliament
platforms andquestion
etc. It is
srators
of starts
o engage ups
the
andwords supporting
elderly in&
co-working mind
spaces them
games through
largelylike govt.
ding
et
s of
on latest
key
the discoveries
same. along with innovations
a provision in tothe
be
atform to
interested
ized areregister
in sciencecorporates
by making and forstart-ups
frommode
-There
ached Max of
deadline support
multiple
Planck . The network
blogs
Society,
platform and news
Germany
should startups.
using It
platforms
also
d
ht match
of
chniques also making
tomaking
spot as a
some
and win
know win
models,
about situation.
toys,
anby games,
incubator
ris
wasfocussed
redesigned
supply
quent on Indian
network
uploading on
ofatthe start-ups
theme
district
approved scenario
Biodiversity
level-In
reply the,
Gaming,
port service and the
offeringslike, to
fromaddress
the this
perspective
and
iament other
atyunique
Management
unit
s-Conditioning stories
collaboration and
(WQM)is
Monitoringarticles
between on
(CM)DST
inadequate relevanceto toof
and
of electrical
DSTelevant
data
es inhad to
putIndian
onperformance
water start
upsupplies,
exhibition up
whichscenario
on the
or conditioning capturing
themes
is very of theof
ompetitions
nservation.
s social,
ctive manner ,
economicawards,
After 7 etc
successful in a
and environmental
to maintain single
tours dynamic
across
reliability. It is the
ess–
quality Climate Action
a significant change whichchange
testing, results Special
can is(SECAS)’ acrossasofaa
indicative
sfmote
India.
and It aims
procedure. to create
Thus, awareness
water
maintenance and diagnostic units quality among
testing
on is
ombated
providing through
st water quality
safe solutionmitigation
detection are kits and adaptation.
is essential
required to addressto
nd cost effective rapid water quality
lenges is management of visitors, especially
read over 6-7 months of running and we
ated to organized visits by schools by prior
oes way beyond 20,000 each day. Despite our
ots, all the planning goes haywire. The school
ch sometimes waiting for hours for their turn,
es inside the train and just catch glimpses of
dian Railway also does not insist on Platform
ors a more fulfilling experience? For more

ndred to tens of thousand each day, we can


9 years of operations; 20,000+ visitors that
e train.
Airport Authority of India
S.No. Problem Statements
1 Monitoring mechanism for passenger throughput time at check-in counters and SHA by AAI at Air
2 Monitoring mechanism for passenger
Excessive Passenger/vehicles congestion throughput time atCurb
at City-side check-in areacounters
: The problemand SHA by AAI
occurs when at Airports
too manyu
3 analytics
Suspect / dispersion
passengers/vehicles
recognitionarrives analysis.
from CCTV in the airport
footages: at the samecameras
CCTV time, thisare may
fittedbe indueAAI to clubbing
premises.ofAnalytics
flights, inadequ
on vide
WeMaking
earlywish to
arrival
to be improved Airports
have
of an Noise
automated
passengers
using facial Free:
to avoidAAI
system airports
which
delay.
recognition Long are
will providing
inform
visible
applications the
queue WIFI
and comparison for service.
recipients
security aboutThe
check,
withfound project
the
suspect’s average is
congested to make
time
database Airports
spend
departure
at in
hall
airports thin
4 Inventory
Zones. management
Design a of lost
system for and found
pushing items at
Targeted Airports:
messages, Lost and
announcements to items leads
passengers, to serious
airport chao
officia
counter,
and security
thisissues
congregationcauses of and
further
people. commercial
congestion. activities through an appropriate application presented on a dashboard
5 creates
Passenger
personnel on into storing.
Facilitation: Especially
Usephones
theautomated
smart Location high
so thatvalue
Intelligence
the itemsand
Airports leads
are to further
Geospatial
noise data
free. pilferage
May alsoand
through related
GAGAN
be used issues.
forand the
pushing custome
sale c
We
We wish
Availability
wish to
to have
of
have an
such an
web-based application system
package could which
be
inclusive alerts
useful
of thesecurity
for
mobile recipients
app about
reasons
based anticipated
to identify
android/ios congestion
suspects
application time, geogr
/visitors/trespa
that could ena
6 smart-phones to triangulate their location with accuracy through
deals the
etc. new application on android and IOS
congestion
claim/retrieval and to remedial measures.
the travelling public. Provide them with a short summary of their travel – airline numb
7 Provide
BaggagewelcomeTrackingmessage to customers,
for Passengers: Use IoT sensors and IoT data integration to provide details of the lug
number, departure
passengers on their gate, arrival
mobile app. gate,
This where to get boarding
ispassenger
especially useful when passpassengers
etc., Also schedule
are taking cross sell opportunitie
connecting flightstoan
8 Protection and information flow of baggage at Airport at domestic airports: We wish h
points
their such ashas
luggage providing
reached free
the Wi-Fi access/lounge
destination or not. access to returning customers.
9 automated system which shall track all checked-in baggage to the
Commercial Promotion: Use the location of the customer using their GPS/blue-tooth and providing real right destination and generate alerts abo
10 tampering
and “ET” or
Passenger to the authorized
time to reach
Facilitation recipients
their
regarding departure andgateswait
estimated based on their
times current check
at security locations ins at
andtheother
airport. Also provide
queues at the
SMS
the information
airport
installing shops,
IoT beaconson the
facilities,
at baggage
promo
strategic loaded
offers
locations on
and flight
at the to
discounts the
airport, PAX
in these
the stores
airport canto the
providecustomer on
real-time their
data app
to custom
11 Multi Lingual Virtual Assistants: For assistance in check in , boarding, security, terminals , airport facil
12 mobile
will
Airport app
be very
Map regarding
useful
Guidance estimated
in the RCS (VR
using wait
small: times
To be at
regional security atcheck
) airports.
available ins
Project
major and
is toother
airports create
, may queues at thenearby
electronic
also show airport.hotels,
Virtual This make
Assistance
tour
experience
communicate
May be used of customers
in
to multiple
promote much
Indian
Tourism. more enjoyable
Languages.
Project is to and
They
create reduces
can be the
accessed
interactive anxiety
VR frommaps of customers
dedicated
showing to
Kiosks worry
Airport or about
terminals.
Terminals, possi
Ch
13 Emergency Help: An application that will be configured to accept all relevant info in case of emergency
etc.
Restaurants, Lounges, rest number,
rooms and
14 to contact, number,
Verification police
of passengers at airport etc.other
The facilities
entry program at thework
shall
gate . Concern Airport .
in such
is Unauthorized a wayentry that when it is clicked,
to airports using fakeit wt
The information
coordinates
tickets of yourto
carrying QR Codes be accessible
location through
(forcing
to be used:for the dedicated
GNSS to beterminals
turned or
on), kiosks.
then The
open project
the camera,may also
shoot be
15 extended
seconds
15 Asset Management - Maintenance Usevalidating
RFID etc andthe authentication
sensor tags on allofcritical
the ticket.
airport equipment especial
information
wherever theregarding
phone’s the city,istourist
camera pointed, attractions
record audio to verify what’s happening to you, and transmit allteo
16 equipment
Automated which might
trolleytoretrieval need repair.
machanism:This will keep
Trolleyswill sending
used by real-time
the passengersdata on machine
are left where health,
usethewear andEsp
is over.
cloud. The
replacement person
needs etccontact
which in
cancase of
eventuallyemergency
save millions be notified
in of
maintenance these information.
costs through Also
predictive emergen
mainte
17 arriving
Development
can be sentpassengers leave
of software
automatically the
tofor trolley
the in help
generation
police parkinglinearea
and or even
validation
number. ofthey takemaps
survey to the &metro/bus
charts tostation
reduce eventually
time andl
18 trolley.
efficiency:
Smart AppDevelopment
for Airport Feedback of software for generation
: AAI airports collect and validation
feedback of formssurveyas partmaps of& charts tosatisfaction,
customer reduce tim
efficiency
feedback mechanism. Project is to collect the data electronically in the form of an APP with selectable par
We wish
rating to have
. The APP willan automated
be available system which on
by default will
theenable
free WIFI us to service
send alerts that toAAI theisrecipients
going to via SMSatand
provide Airp em
display the required information on the dashboard of the individual recipients on a portal for ready referen
Mentor Name
CS IT
rs and SHA by AAI at Airports:
dlem SHA by AAI
occurs when at Airports
too manyusing video S R Dogiwal
clubbing
premises.ofAnalytics
flights, inadequate entry gates,
on video footages need S R Dogiwal
epect’s
ck, project
he average is
congested to
database make
timedeparture
at Airports
spend in the
halls,
airports as Noise
check-in
etc.
in large Free
results
dopresented
items leadson to
passengers, serious chaos and even
aairport officials,
dashboard security
hand
otify be related
GAGAN
used issues.
forand the
pushing customers
sale couponsown GPS,area on
sweet
ated
scation congestion
suspects
application time, geographical
/visitors/trespassers.
that could enable of
on android and IOS and using this:
of to their travel
provide – airline
details of thenumber,
luggagePNR, statusgate
to
edule
taking cross sell opportunities and
connecting flights and are worried if loyalty
stic
rs. airports: We wish to have an
ation and
ue-tooth and generate alertsreal-time
providing about anydistances
ss atandtheother
airport. Also provide
queues details of
at the airport: Byall
ustomer
de real-time
rity, on their
terminals data app
to customers
, airport on theirThis
facilities……..
ues at thenearby
lectronic
so show airport.hotels,
Virtual This makes
Assistance
touristtothebe overall
able
places to
……. Neha Mathur
omers
ated
wing to
Kiosks worry
Airport or about
terminals.
Terminals, possible
Check wait
in times
counters,
t info in case of emergency such as person
that when
ntry it is clicked,
to airports using fake it will get the
tickets: Airline
eroject
camera,
cket. may also
shoot be
15 extended
seconds
airport equipment especially mechanical
to
videoinclude
of
ng to you,
machine and transmit
health, wear alltear,
of these
andEspecially urgent to the
eormation.
left where usethe is over. the
setro/bus
through Also
predictive emergency
maintenance. help message
charts tostation
reduce eventually
time andleadsimproveto loss of
maps
art of& charts tosatisfaction,
customer reduce timegrievance
and improve
f an APP with selectable parameters and
Ieisrecipients
going to via SMSatand
provide emails and also
Airports.
on a portal for ready reference.
INDIAN SPACE RESEARCH ORGANISATION-ISRO

S.No. Problem Statements


1 Storing emails on mailbox server in encrypted format accessible only to owner of the email :-Encryp
2 stored on mailbox
Determine server using
the authenticity of disk
the emaillevel or blockwithout
sender level encryption.using personal In this approach
digital certificatesall the emails are encr
:-Authentic
3 single
sender key and are unencrypted on the fly when accessed
Network Traffic classification tool for detecting anonymized traffic :-Develop a network traffic same.
is extremely important in many cases. Personal by
digital the owner
certificates of the
are email.
generally The shortcoming
used for the of thP
classif
that the
certificates user with
need to web root
be privileges
in signed will
tobycategorize be
a third party able to access the emails of all the users.
4 enterprise
Detect automated networks order
traffic generated fortrusted
the a web CA.
following In aclasses
four
server:-Websites large organization,
of traffic:
hosted for (i) itnormal
is notaccess
public very traffic,
web economical
are access (ii) p
individual
VPN
entities. traffic, certificates
Majority and (iv) are to
The
genuine each
Onion user.
users.Router Others (TOR) includetraffic. The
software classifier
based should analyze networkprobes traffic in real
5 Novel
Suggest approaches
and implement for botnets
aThe mail detection
encryption in real
solution time
which :-Botnet
can is ascanners
restrict network
even the and
ofroot automated
compromised
user from machines/co
accessing from at
the
Workout
Deep
Automated Packet a unique
Inspection.
probes solution
are sophisticated to determine
classifier can
enough the authenticity
use any
toCommand machine
act like human of the email
learning
visitors. sender
approach
Work without
out including
apassingusing
solution such
deep personal
learning.
to distinguish Ac da
6 communicate
Simulate
mails. Virus and coordinate
Spread from their
client actions
machine by through &
email Control:-In (C&C)
case one or
of bythe client messages
machine to
inside one th a
certificates.
detection
traffic from is utmost
human important.
generated The
traffic. tool should also generate a report to the system administrator about the
7 might
infected
Detection bewith built
of into the
virus,
“Zero the
day” botnet
virusmalware as P2P).
may toMany
trypropagation
propagate.hostand /network
Email is approaches
one of theoftransport
identification have been
the infected withproposed
maximum
machine(s). to detect
reachabili
:-“Zero botne
generating
employ p2p,
signature VPN based, and TOR
anomaly traffic.
based, data mining approaches etc. to detect botnets. Most of the approa
malware
Notes:
attacks
Notes:
Customize In which
Participants
are very
order
open propagates
common.
to have to
demonstrate
source using
simulate
Antivirus theemail the
solution
working as transport
mailbox theserver
ofwill be from
ablewith
solution, client
to some
detect machine.
participants sample
such Simulation
mails
viruses
have to only in order
simulate is required
after to
they
an email areforsetup
demonstrate evalua
reported th
wi
8 Notes
highly
mechanisms :effective
Participants
in in
place. have or
detecting to freeware
simulate
decentralized Anti-Spam
the web (P2P, server solution
required
FastFlux) with for aPOC.
botnets novel
using The approach
solution
encryption for
should
in increasing
real work
time. on
When its SPA
Windothe
solution.
Workout
accounts.
accuracy a unique solution which can detect “Zero day” malware which attempts to propagate through eM
9 Notes:
Develop
platform.
detected a:-There
Simulate
by thesenetwork
solution arefor plenty
approaches SPAMtrafficofa Antispam
data of containing
identification
lot financialsolution. all four
using
loss, Find
a novel
data out aapproach:-There
classes
leakage novel
ofetc. approach
abovehas mentioned
already to
areincrease
taken network
plenty theAntispam
of
place. SPAM
traffic.
Therefore, detec
soluw
infected
of any
aDevelop
novel of machine(s).
the
approach existing for antispam/antivirus
SPAM identification solution.
without using any of the
10 approaches a software
for detection capable of exploiting
of sophisticated and mail server botnets
advanced using IMAP/POP3 in real time. interface :-There are plentyTh
existing antispam/antivirus solution. o
11 the
which novel approach
interacts with should
mail be
server betterto than
get mailsexisting
either open
Develop a monitoring tool for email infrastructure servers.:-In large organizations, email infrastructure throughsource IMAP or freeware
protocol solution.
or POP3 Protocol. If the end us
12 infected,
several
Develop athe
servers mail which
smartphone server handlecan be theattacked
application mails forinusing
emailvulnerability
secure flow.
email Each
access ofusing
server these interface.
assigns
SMTP eachand Simulate
mailIMAP a software
an unique
:-An to
mail applica
email expl
ID/Que
Notes:
IMAP/POP3 In order to
interface demonstrate
toonexecute the working
anormally of
script onofinteracts
mailthe solution,
server participants have to simulate an email setup.
13 model
Android,
Develop posesaWindowsrestriction
solution mobile
to detect remote
or iOS
security analysis breaches mail withusing
orinfrastructure
anomalies mailaserver normal
intonetwork
identify
usingemail IMAPaccount
probable
traffic using
credentials.
andcompromise
SMTP.
network In caseof
logany anas
the
aamount
solution
compromised, which
ofDatadata the
is can
malwarecoordinate will the of
also handling
be able tooflogs.
emailThese
interact among
withlogs different
mail server servers to such
on IMAP/SMTP. asthecommonDevelop mail ID/Q
a secur
ifavailable be in
14 Simulate
Sample Data leakage
Required: using form
ICMP network
and DNS protocols:-Most can
of be theused perimeter model security behavior
implementation of a term
Also
current
which investigate
email
allows status
only it canSimulate
etc.
predefined which done will
mail
spam
without
ensure mails
application the credentials.
better to management
connect to IMAPof email.
and The
SMTP solution
servers. should
Also also
ensure monitor
that no
15 over
outbound
Develop the time.
DNSfor
tools Based on
andinfrastructure the
demonstration analysis
ICMP trafficservers of
inoftheir network
firewalls.
wireless logs,
cracking ICMP propose and and
DNS
:-Demonstrate implement
protocolsWEP data mining
can be leveraged
encryption approaches
cracking by that
the attac
and dem
between
on the different
device is not able or to detect
read stored alogin such that alarm
credentials can be
and SMTP, raised if any abnormal behavior or commun
16
alerts
data
mechanism
Notes:
Design
of
fromIn security
the
order
ainbreach tobreach
toorganization.
secure detectionitservers.
demonstrate system theanomalies.
Implement working
(BDS) simulation
of the solution,
:-Breach software
detection that
participants
systemscanIMAP beattempt
used
have
configurations
tofor data
tosimulate
discover leakageon mobile.
anmalwares
emailusing setup ICMP
andwi in
is found any of the
tunneling.
Demonstrate
accounts.
attempts The WPA software encryption is required
cracking for the
and evaluation
demonstrate of firewall
mechanism intelligence.
to secure it
17 Design
Notes:
Notes: athat
In order
Simulate bypass
solution tolargeusingthe
demonstrate traditional
volumescustomized the security
working
ofcracking
network TCP/IP detection
of for
the The
traffic. mechanisms.
allowing
solution, shouldUnlike
network
trafficparticipants beaccess
have
from IPStotoor firewall
trusted
simulate
multiple anthat
clients
machines email scan
:-with
At incomi
setup presen
certa wi
Demonstrate
BDS
Notes:
clients focuses
In
are order WPA-2
on
allowed to malicious encryption
demonstrate
access onactivity
the the within
working
switch/router theof network
the
based solution,
on it protects.
participants
IP/MAC. It determines
However, have to
these possible
simulate
can be breaches
an email
easily by
setup
spoofed. differwiI
18 accounts.
Develop
showing
Notes: aorder
solution
Inanomalous to
toheuristics protectdue
behavior
demonstrate against
to
theanalysis, website
infection.
approach, defacement
The
simulate approach
a setup attempts
should
inthe which be:-Most
demonstrated
only ICMPof theand cases
using
DNS oflogswebsite
traffic is defac
generated allow
combinations
accounts
solution and of
sample mails traffic
passing through risk assessment,
different servers safe
in marked
setup. traffic, data policy understanding
19 traffic. which
replacement
Detecting
Internet of uses
Advanced files modified
inPersistent
server root TCP/IP Threat protocol
directory. (APT) Work stack
by out inaorder
modeling solution tothe identify
touser,
prevent trusted
this clients
computer even & as in atcase
networkswitch/router
thebehavior
webserver lev:-
report.
Subsequently
compromised.Design and
solution
The implement
solutionshould a breach
restrict
shouldcentrally detection
network
implement system
access
anhave based
additional capable
on
layer thisof detecting
identification. breach soon as possible.
targeted attack on andofmissing
security for the web server root to direct
to an organization. The attackers patience moves oflatterly andinfirewall.
20 Develop aorder
solution which could monitor System Hardening machines days andSimulate
connected months. the Ma na
Notes:
Sample InData Required: simulate Simulatebreachnetwork use, setup logs.a small network with IPS an
moves
:-Computers
Develop in parts. systems
an android are issued
containing to forusers and
securely mostly
accessing administrator
private privileges’
services of an lies with
enterprises. the users in worksta
21 where
Notes: perimeter
Participants
Participate hasshouldbeen
should breached
use their
simulate and
own
aworked use
compromised your
hardware solution
like switch,
web to demonstrate
server torouter, PC successful
demonstrate etc. tohis
their detection:-Work
demonstrate
approach. of breach
their
The out a
solution
solution
An agent
environment.
container based
that Worksolution
securely out a should
novel
validates be
solution
a device to & out
monitor
usersto model and
credentials the user,
manage and computer
health
establishesof theand each
secure network
andVPN every behavior
sessioncomputer to over
accesscon
22 Design
source
on Windows a smartphone
switch & firmware
Linux app
ifThe
Operatingthetochange
protect
solution
System. OTP
involves from being
modifying accessed
firmware byofany other
switchapp
thecentral running
to understand on the
customise devi
interacting
network.
services. Thewith user(s).
solution should ensure in
that the behavior
each and should
every be
machine notifiedon theto network server
is healthywhich in will
terms further
of sec
based OTP has become standard in two factor authentication. At the same time,alert many useful
23 Design
to monitor a solution
similar to detect
behavior inhypervisor
other machines.level rootkit
Finally,:-By model exploiting
should hardware
generate featuresabout the applications
such as Intel VT
probable attaof
24 to
typeallow
Develop access
of Simulate
rootkit
a solution to SMS.
runs in
which This
Ring-1 poses
andtohosts
implements a great the threat
Machinetargetthe to OTP based
operating
Network system
finger security
as virtual
printing system. Although
tomachine,
detect advanced
thereby
anomalies enabling
in andro
netwo th
confidence
Notes: level.
Participants a small
should network
simulate demonstrate
a private network approach
with services (e.g. Web service, FTP, email etc.) runh
marshal
intercept
of machines mallow
all hardware allows end
calls user
made toby disable
the targetsuch access
operating manually,
system. there
Unlike is high
normal degree
hypervisors, of error due
they doto frequ
not
Notes:
Propose andto:-Each
Participant implement and every
should simulate
techniques user amachine
small
to detect hasfirmware/BIOS
network different
under akinds APTof network
attack
rootkits:-A behavior
to demonstrate
BIOS-level based
their his usage.
solution.
rootkit attack, Wor
25 VPN
and
before
approach
server
application
the toOS, demonstrate
installation.
but
fingerprint can load
each
their
Design
into
and
solution.
anevery a mobile
operating
machine app
system capable
based before
on of
its detecting
promoting
network apps
it into
activity. trying
aThe to
virtual access
finger machine.
print SMS of A realals
inhypervi
machine tim
26 persistent
Develop a BIOS
malware attack, isallowing
analysis an exploit in
solution:-Differentwhich the BIOS
types is
of flashed
malwares, withonmalicious
execution, code.
performA BIOS rootkit
different ena
types
should
not have havetoand a
make feature of
anysolution
modifications or blocking
to the kernel(singleof theaccess,
target all access within a day/week/month, always)
27
from
Sample
avoid
Design
from
time Data
administration.
detection,
a
accessingsolution
hence
Required:
Since
maintain
SMS to the Data
ensure
access. BIOS should
should
persistence is stored
continuous
bebe
and adaptive.
simulated
in memory
perform
execution
The
by
desired
of
solution
participants
rather thaninshould
activities.
security onorder
hard
The
to
take subvert
disk, into
malware
applications:-Security a BIOS it-thereby
account rootkit
modifies
making
automatedcansystem,
file
applications
its
networ
survive like
dete
mac
an
difficult.
human
attempts Suggest
generated
of getting an approach
traffic. The to
solutiondetect such
should rootkits.
generate figure printing of organization network segments an
28 types
many
Develop of system
a times
aThe APIrid
takes
solution
of malware,
calls,
significant
implementing performs resourcesincluding
network
agent and
based
reformatting
activities
slows down
Network etc.the or replacing
Certain
response.
Admission malwareshard
Hence,
Control
drive.
can end bework
through user out new
concealed
kills
DHCP such approach
within word
process.
enforcem
network.
such
documentsRootkits. or solution
normal should
executable generate
files various
can alerts
besimulate
back to
doored. end user
These and
files system
can administrators
besolution
flagged by in
anti-virus case of
but anom
to a
29 into
Design
an
Notes:
Developsecurity
approachsuch
Use anythreat.
mobile
to
a solution enforce
publicly Develop
app
to available
ensure a health
for Android
DHCP solution
in flatand
arootkit which
Microsoft.
ofnetwork
or
machine will
usingnotyour
using protect
Layer-2
Agentown such
switches.
rootkit
based application.
toThedemonstrate
Network ItAdmission
should theprotect
could be
approach applicatio
client
Control:-Sing based
actual
local
machines behavior
and domain
connecting of the malware
administrators.
through DHCPconcealed
The solution
should within
get will themensure
network an automated
that
access. all such
Machinessystem is
applications
not required
using ARP areDHCP to analyze
running should all machine
the
not attime
bep
machine ain an organization network poses aattacks
great threat. Current network admission control mechanism
30 Notes:
Design
Notes:
file
machines.
Sample
communicate
Simulate
Use
is opened
Data
solution
publicly
The or aanysmall
toavailable
applications
Required:
with other
detectnetwork
executable
Simulate protected
machines isto
Arp-spoofing
rootkit(if demonstrate
executed.
OTPalso. by any)
the
based or
Design
solution
the
simulate
messages
approach
originating
an
can your
automated
to be own within
terminated
demonstrate rootkit
dynamic aornetwork:-
the to demonstrate
malware
disabled
approach analysis
only Attacks
the
through solution.
system aims
solution.for re ex
31 switches
ARP records
Demonstrate to block
ofa a unhealthy
machine
Proof of so machine.
Concept as to of Work
silently
an out
eavesdrop
exploit novel
kit:-A approach
or manipulate
exploit to
kit check
is all
a the health
software data of
that
kit each
is machine
sent
designed over
to asking
the
run onnetwo
web fo
suspicious files in an isolated environment. It should execute and monitor the behavior of given malware a
admission on network made isofcapable
low cost un managed switches. Unhealthy machine should not be able to
32
Sample
application
the purpose
completion
Develop
Notes:
Data
a
Simulate ofRequired:
is
of required
solutionidentifying
execution
a to
small
Simulate
that
detect software
generate
network payloads
network
comprehensive
with a DHCP
data
of generated
detecting
vulnerabilities ARP-based
in
reports
server by client
tools
to onmachines
the
like
demonstrate
attacks originating
communicating
capabilities,
veil-evasion:-Tools
your behavior
approach.
within with
and
like
The
the it,network.
and
activities
veil-evasion
solution should theinw
ofWork
discover have
other
approach
exploitingmachine on thesuch
tovulnerabilities
develop network. application
in The
itofSystem.
to machine
execute shouldcode
malicious not be onableclient. to get
Exploitany meaningful
kits are data even
modular, allowing it is silentl
easyto
33 recent
Work
Windows times
out that are
&novel
Linux capable
approach
Operating to bypassing
implement anti-virus solutions.
honey pot/net/service/app These tools
in real uselive a lotsurfing
of advanced environment evasion te
data
removal on network.
of vulnerabilities and provides a user interface to control the settings, thereby automating the enti
Notes:
generates Simulate
polymorphic various types of malwares and their concealment approaches to demonstrate the solution
34 or/and
Design
Notes: machine
a Network
Simulate levelpayloads
compromise.:-Honey
aclient.
small Application
network
to avoid
with Layer potssignature
arp-spoofing and honey
Firewall:- detection.
attacks nets toare
Demonstrate Following
well known
demonstrate a POC techniques
themethod
ofapproach are
an application used tothe
to detect evade
layer attack. dete
firewa H
compromising
requires establishment a ofnetwork
dedicated infrastructure forstroke
the same. Workhave out an
35 on network
Notes:
Develop Simulate traffic
a person passing
a small
identification through withthe
system gateway.
networkusingdevicesThe
key firewall
such asshould
switch/router
dynamics:-Keystroke theapproach
capability
to demonstrate toofimplement
dynamics analyzing
the thethe
usesapproach. mann so
traffic
Randomization
environment.
protocols of
at individual
the variable names and methods
36 should
in which
Develop
Notes: work an
Simulate on application
Add-on Windows
a web fortypes any
server &layer.and Subsequently,
Linux
characters
popular Operating
open-source
vulnerable it should
System.
on a keyboard.
clients VPN It is allow
usedapplication
solution
to demonstrate forfor behavioral
the improving
approachlayerbiometrics
traffic from
the security whereina customizedan iden
of authent
Encryption
layer protocol of source
and block all other protocols.
is determined
Customize
Develop anyor
a solution verified
popular based on theVPN
for open-source
protecting patternssolution and to timings
enableofbased the key
secure strokes.
authentication Develop usingaprivate
solution which
Key, Biom im
37 Native
Notes:
strokes
stagers
Simulate
dynamics
(shellcode-less)
a assmallan network to App distribution:-Web
demonstrate
authentication/verification themechanism
approach model
minimizing
for distributing
the false positives
the smart phone a
38 It should
authorized
Method
Simulate not
nops allow
persons
(randomizing
Virus Spread password
is very base
popular.
program’s
throughto authentication.
Although
Network call tree webvia site
Connection:-Ifdummy provides methods) a level of protection
an organization is infected by ZERO-day virus against the app copyin
Notes: Simulate a small network demonstrate the approach
39 it is
Developnot
Obfuscated
antivirus enough. loaders
solutions
a solution Work would out
to ensure a
not solution
be able
health which
to detect
of machine ensures
the integrity,
same.
using Agent (Antivirusproper
based installation,
solutions
Network depends and usage
Admission on theof an app.
virus
Control:-Sing signatur
Sample Data Required: Simulate sample data for demonstration
Figure
which out
could solutions
be obtained for better
only detection
after their of each
teams of
know
machine in an organization network poses a great threat. Current network admission control mechanism these
about payloads.
it. Zero-day attack is the first attack and hencere
teams aretonot
switches blockaware about the
unhealthy same)Advanced
machine. Work outViruses novel approachhave self-spreading to check health capabilities.
of each machine Such Virus askingscansfot
Notes:
connected
admission For demonstration
on network to generate payloads using veil-evasion
made of low cost un managed switches. Unhealthy machine should not be able to th
find out vulnerabilities of the remote which
machines. is open
It will source.
propagate by exploiting in
vulnerabilities.
other machine on the network.A simulated software
The machine showingshould self-spreading
not be able capabilities
to get anyismeaningful needed to help data security
even it isteam silentl to
40 Develop a cloud based centralized repository for distribution, management and updating of cyber se
41 for
Building government Trustedorganisations.:-This
Execution Environment aims at forcreation of a secure
Linux:-Trusted centralized
execution (TE) repository
includes security
a group of tools viz
featur
42 anti-malware,
verify
Securethe distribution IPS, IDS
integrity ofoffilesetc.,infor
an an
restricted organization.
OSdocuments
like Linux.outside It can thusthe block any attempts to executehave
organization:-Organization malicious
varietycode of doth
The
of
which repository
the trusted
some adocuments shall
database. have the
Hence,
are veryprovision
developments for
sensitive.Secret on-the-fly
SuchforandLinux updating
documents OS are neededfrom
requiredreliable
such sources
to bethatprotected.on the Internet
Implement solution which preserves Top andThetop Sensitive doc
thatSecret
43 Documents:-Secret secret docum
The
Hashed
classified end-user
signature
as system
restricted,for shall
followingbe dynamically
Confidential, types of
Secret updated
files can
and be
Top sogenerated
Secret. zero-day
for
Implement attacks
Linux a OS areany
solution addressed
time
to cater effectively.
the following pr
all
Data shared.
leakage As per old procedure,
detection andbe such documents
prevention areofprinted and ensured thatsothe softcopy is monitoring
destroyed. In
44 •SystemKernels administration
and kernel shall
extensions alerted forof theconfidential
surge documents:-A
threats in the Internetmajor requirements
that stringent for all the org o
world
securing therethe is need
confidential to work out
documents.solution In to protect
current such digital
era, there areanmultipledocuments. ways working
in which in data is regularly tran
45 •Detection
organization
All
Problem setuid and can
root
1: Document prevention
be effected.
programs, of
All
Security data
setgid
outsideupload
root on Internet:-In
programs
organization organization secure environmen
organization. Hence it is necessary to have a mechanism forthechecking
necessary
This tosecure
ensure that Internet access issteganography:-Steganography
provided totothe users with transmission
restrictions on ofdataunauthorized/restric
upload. HTTPS p
46 Anyinfrastructure
Implement
•Problem program
1: Workout
shall
data
exclusively have
solution runa by
transfer
to
proactive
using
root
protect or mechanism
suchby a member
document
alert
of
even
the government
system
from group
server and
agencies
is a storage
process using
of
admins.
the fastest
concealing file,mom
Implement
end secured a solution
encrypted which:
channel between end user machine and destination server. Similarly, SFTP also pro
47 •communication
or
End video
Any
Develop within
program
users an requires so that
another
that
efficient tomay the
spear
share government
file.
alterOften
thesystem
phishing
document agencies
thisconfiguration
technique
mail can
detection
with others adopt
is files
used to the
system:-Spear
to achieve countermeasures
bypass thephishing
desired scanners to
anmitigate
is which
goal. Existing emaillookthatthe
freeware, cyber
PDF secur
forappears
specific for
from
writ
end secured
•Notes:
extensions.
or Participate
Important
business encrypted
Design
configuration
that should
and
yousecurity
know,channel
manage
Implement
files
but between
cloud
a
itprotect
isn’t. novelend
based user
approach machine
resourcesof to and
securely destination
demonstrate the
transferring FTP server.
approach
confidential Since
data application
using this da
tebh
48 provide
Develop
Problem
1.Flags document
a solution
2:
any Workout
confidential to detect
solution features
documentbackdoors
to for These
sent password
such mails
in components
outside document maycannot
protection,
organization contain malicious
disabling
of enterprise
viabeemail
accessedcut, attachments
paste,
infrastructure:-Solution
even after or URLs
copy,stealing
save, thewhich
print, should
storage lea
etc. Thi
in these
Existing protocols,
LOADER it is hard
of experts.
Linux to
OS detect
ashall the document/data
besolution
modified uploading.
49 or
be malicious
bypassed
backdoors
Please
Develop a in
suggest websites.
easily
following
solution by
a solutionto Develop
components:
other
detect thansolution
Workout
backdoors tonetwork
encryption.
in detectto such
such
providethat
mails.it consults
high
routers:-Security level ofHashof
signature database
document
network security
router istoofensure
every time
utmostthat imp
Sample
loading
neither Data:
any
viewed To
process
by be simulated
in memory
unauthorized byforthe participant
execution
person nor copied partial/fully.
secure
2.Flags
Design the
aany aassets within
confidential
solution to an enterprise.
document
restrict usage beingDesign
ofthe uploaded
public a solution to
on Internet detect backdoors
Website in them.
50 Work
Any
Notes:
Problem
out
change
Simulate
Applications 3:
solution
inand
Top Hashan
OS.
Secret
which
signature
email can
setup
Document
detect
database
and spear
requires shall bemailing
document/data
phishing
highest effective
mails service
security.
upload
only
to from
through
after
demonstrate
Workout a
government
reboot allof
the
unique
encrypted
OS.
solution.
solution
infrastructure:-Usage
data transfer protoco
to provide suchorgan
a ex
51 mailing
should
Design
Notes: aservice
also
All be
solution
the liketoto
able gMail,
detect
detect
servers/services Yahoo,
the
Physical
requiredetc.Intrusion
websites from
for government
providing
POC upload infrastructure
detection:-Usage
have to be features
simulated and
of issubsequently
CCTV
by prohibited
the is quite
participantsespecially
block
common inwhen
them. current er
Problem
Desktop/server
level
Notes: of 2:
3.Automatically Document
security.
Simulate hardware.
a back
encrypts Security
doored
the for
router restricted
confidential to document
demonstrate
document the
being solution
copied to USB drive
52 provide
sensitive
Develop own
aareas email
solutionare now service.
for under There
protecting are
CCTVphotocopylarge
watch. Worknumber of know
out solution
of Highly mailing
which can
Confidential service and there could
find out anomaly from
Documents:-Some be unlimited
of theroutine
confiden mu
Network
services. switch.
It is easy for anyone to setup his own mail server and start mail service easily using various tools
Sample
generate
requires Data:
trigger.
even Not required
higher security andsecurity
needs to ensure
53 Confidential
Develop
Router.
Sample asuch
Data: document
solution
To for
beWork requires
Document
simulated by thetracking more
participant.
participant thanthat
within anno
the one isin
defined
organization able take
problem its1.photocopy
The aboveof
network:-Some using
solution
the external
will not
documents cam wb
is one
solution of to tool.
protect such out
documenta solution
from which can
photocopying. detect the attempt to connect such mail server using http
protect
restricted
Modem. some are to take
generally photograph
available of
withthe screen
multiple using
personsexternal
in an camera.
organization.Work out
Work a solution
out a will
solution can
whichtrack su
keep
and block
Notes:
Sample All
Data:it.
the servers/services
Participants required for their
POCown have to be simulated bytime
the participants
attempts
document Alltowithin
Smartphone.
Notes: find
the the culpritshould
organization
servers/services doing simulate
such
network
required unauthorized
and
for POCrecords have
data
activity.
its using
movement
to be simulated
any real
through
by the USB, video
file streaming
sharing, email,
participants
device. etc.
The solution can be a toolkit comprising of
Notes: Simulate a small network with a gateway to demonstrate the approach separate solutions for each component.
SampleSimulate
Notes: Data: Tofile be simulated by the participant.
sharing mechanisms to demonstrate the solution
Notes: The participants can attempt individual parts of the problem if they are not able to address all the co
ATION-ISRO
Mentor Name
CS IT
wner of the email :-Encrypted emails are
proach
gital all the emails
certificates are encrypted
:-Authenticity of the using email
email.
generally The shortcoming
used for the
elop a network traffic classification tool for same.of this approach
Personal is
digital
ers.
on, (i) itnormal
is notaccessvery traffic,
web economical (ii) p2p to byprovide
traffic, (iii)
for public are accessed various
nalyze
nd froot networkprobes
automated
compromised traffic in real
from
machines/computers time using
attackers. that
h ithout user
including using from such
deep accessing
personal
learning. the encrypted
digital
Accuracy of
out
by a solution
passing
the client to
messages distinguish
machineabout to one
insidethe automated
another
thehostsIntranet (C&Cweb
is
stem
been administrator
proposed to detect botnets. Theythat are
rt with
fected maximum
machine(s). reachability.
:-“Zero day” Simulate
malware a Vipin Jain
ulation
ils botnets.
slution in order
only after Most
is required
to
they of the
demonstrate
are approaches
forsetup
evaluation
reported theand workingare
of not
security
analysed. of
ooach simulatefor
should an email
increasing
work on its SPAM
Windowswith test user
detection
and Linux
ption
pts to in real
propagate time. When
through the botnets
eMail. Identify get the
eionedto
areincreasenetwork
plenty theAntispam
of SPAM
traffic. detection
solution. accuracy
Find out
dy taken place. Therefore, work out novel
ntispam/antivirus
nterface :-There are solution.
plentyThe accuracy
of eMail clientof
ution.
POP3 Protocol.
izations, If the end user
email infrastructure machine of
comprises is
h mail
nd Simulate
IMAP a
an unique
:-An software to exploit
mail application
email ID/Queue ID. for Such a
oobablesimulate
account an email
credentials.
compromise setup.
of any server. Suggest
MAP
affic using and SMTP. network In case log the smart phone
analysis.:-Large is
such
MAP/SMTP.
model as commonDevelop
the behavior mail a ID/Queue
secure
of a terminal ID,
solutionmachine
eter security implementations allow
olution
servers. should
Also also monitor
ensure that no the
othermail traffic
data mining
can be leveraged
encryption approaches
cracking by that
the attackers
and can
demonstrate toprogram
createleak
bnormal
nfigurations behavior
on mobile. or communication pattern
tofor data
tosimulate
discover leakage
anmalwares
emailusing setupICMP
andwith andtestDNS
intrusion user
Sooor it firewall
multiple trusted
simulate anthat
clients
machines email scan
:-with
At incoming
setuppresent,
certain traffic,
trusted
with machines
test user
o
heses possible
simulate
can
of theand be
cases breaches
an email
easily
oflogs by
setup
spoofed.
website differing
with test
Implement user a
nstrated
CMP
c, data
using
DNS
policy traffic
understanding is defacement
generated allowed fromover
and
involve
such
violation
ds clients
uter even & as in atcase
networkswitch/router
thebehavior
webserver level.
:-APTmachine are is
breach
on.
or the web soon
server as possible.
root
Serly
machines andinfirewall.
days andSimulate
connected months. to directory.
the
anManynetwork
attack times it
scenario
an iesenterprises.
essful with the users
detection ofinbreach
:-Work workstation
out a shouldsecure android
d to
their demonstrate
his approach.
network their
The
behavior solution.
solutionover Use
the timeany byopen
work
each
er ecure app and VPN every
running sessioncomputer
on to
the accessconnected
device:- privateSMS on
itch
ral to
server understand
which willcustomised
further TCP/IP.
generate action
orkmany
e, is healthy
useful inapplications
terms of security.
forces endwith user
re alert about the probable attackAMD-V,
features such as Intel VT or along this
m.
machine,
oservice, Although
detect anomalies advanced
thereby enabling
in android
network the OS
rootkit like
behavior to
al degree
hypervisors, FTP,
of error emaildue
they etc.) running
to frequent
do not have tobehind
updates a
havior
monstrate
BIOS-level based
their his usage.
solution.
rootkit attack, Work
also out
known aload
novel
as a
ying
aThe to
virtual access
finger machine. SMS inhypervisor
Amachinereal time. The
rootkit appdoes
ous
ution, code.performA print
BIOS ofrootkit
different enables
types may
of change
remote
activities to
erta day/week/month,
it-thereby making always)
its other
detection apps
very
ato
ware account
BIOS
-Security modifies automated
rootkit cansystem,
file
applications
network
survive like
traffic
conventional
make
antivirus different vs
are
ization
rive. bework network
out new segments
approaches and overall
to detect
,anl end
through concealed
user kills
DHCP within
such word/pdf
process.
enforcement:-Propose This results
dministrators
flagged by in
anti-virus case of
but anomaly
to analyze observed.
the
n.
rkolution It
onstrate should
Admission could protect
be
the approach applications
client based. Only
Control:-Single even
vulnerable from
required
tions
temonstrate
using ARP areDHCP to analyze
running should all machine
the
not attimes activity
berequireson defined
able to high when
mission
work:- control the mechanism
Attacks solution. aims poisoning the
alware
abled
roach analysis
onlymachine system
through solution. for examining
hbehavior
of
ae that eachis sent
kit designed over
to run asking
the onnetwork.for
weband network
A
servers,securitywith
of given malware after
chine
ing
nicating should
within with the not be
network. able
it, and discovering to
Work interact
out andnewwith any
ehaviorThe
-Tools
proach. andveil-evasion
like activities
solution of have
should thework malware.
come on up in
ningful data even it is silently spoofing andthe
eslive are modular,
a lotsurfing
of advanced allowing
environment evasion easyto addition
techniques,
detect attack
to
niques
method thereby to automating
demonstrate
are used to
detect the
the evade the detection:
solution
attack. entire
However, processit of
fapproach
an application layer firewall that works
pproach
capability
ooke demonstrate
dynamicstoofimplement
analyzing
the thethe
usesapproach. mannersolution
traffic Theofandall inrhythm
solutionlive
yerbiometrics
al
ving
ach traffic from
the security whereina customizedan identity
of authentication:- application
of person
Develop
tion usingaprivate
istributing solution
the smart which
Key, phone implements
Biometricapp among and OTP. key
the
false
ection positives
against the app copying and forging,
infected by ZERO-day virus attack, their
on,
depends
rk Admissionand usage on theof an app.
virus signature and
Control:-Single behavior
vulnerable
is the first attack
mission control mechanism requires high and hence Antivirus
pabilities.
h of each machine Such Virus askingscansforthenetwork machines
source.
ll propagate by exploiting
chine should not be able to interact with any the
eded
ningful to help
data security
even it isteam silentlyto test their the
spoofing
nt and updating of cyber security tools
E)repository
includes security
a group of tools viz., anti-virus,
features which can
to execute malicious code
anization have variety of documents that is notout
partof
ources
hatprotected.on the Internet
andThe top Sensitive documents areare
e-Secret secret documents not at
ny addressed
ion time
to cater effectively.
the following problems:
the softcopy is destroyed. In today digital
or that
requirements for all the organizations
stringent monitoring of the is
which data is regularly
orking in secure environment, it is transferred from an
ssion
ns on data
agencies
process of unauthorized/restricted
upload.
ofusing HTTPS
the fastest
concealing provides
file,mode
message, data.
of end imageto
storage
ver.
es to admins.
Similarly, SFTP also provides end to
rs anmitigate
is which
Existing emaillook that
freeware,the cyber
PDF security
forappears
specific formats
from
writer, threats.
anWord,or etc,
individual
P server.
proach
onfidential
achments Since
data
or URLs application
using this data is
technique. encrypted
ste, copy,stealing
save,
structure:-Solution
en after thewhich
print, should
storage lead
etc. Thisbe to phishing
security
able
hardware. can
to detect
ignature
ment database
security to everythat
ensure timedocument
before is
work router is of utmost importance to
ncrypted
ment them.infrastructure:-Usage
data transfer protocols. of public
Solution
OS.
olution.
solution to provide such a extremely high
hibited
quite especially
squently
participants block them.
common inwhen organization
current era. Most of the
ndeoutthere couldfrom
anomaly betheunlimited
routine unknown
movement mail
and
ments:-Some of confidential document
ce easily
hotocopy using
using various
external tools.
camera. Google
Work apps
out a Harpreet Singh Gill
The
k:-Some aboveofsolution
the will not which
documents be ablemay to be
ct such mail server using http or/and https
trka out
solution will can
a solution whichtrack suchtrack
keeps photography
of such
participants
video streaming device.
B, file sharing, email, etc.
participants
nent.

not able to address all the components.


destruction of valuable
National Disaster information
Mitigation Plan and vandalism.
(Drought, Video
Floods andSummarizer, Individual cameraisview,
Cold Wave/Frost):-Drought switchrecu
a normal, cam
detailed view, Voice enabled activation, development of efficient Security Algorithms, Video Surveillance
climate and characterized in terms of its spatial extension, intensity and duration. Conditions of drought ap
Hosted
rainfall Video services,
is deficient On-sitetovideo
in relation monitoring,
the statistical Video Alarm
multi-year averageverification, video
for a region, overanalytics, Riskperiod
an extended managemof
video solutions. Sample Data Required: Yes
year, or even more. Drought is a temporary aberration unlike aridity, which is a permanent feature of clima
measures
A Ministry
GISmeasures
are initiatives
based integrated ofsolution
Electronics
undertaken to reduceand
forclimate
personal security Information
the incidence or minimise Technology
where instant police
impacts of drought.(MeitY)
assistance should be
Besides droug
provided to
these help in adapting to change, restoring ecological balance and bringing development
extreme
people. distress
However, or feeling high
drought mitigation threat to safety.
programmes The system should
are not to be construed cater for women and children
stand-alone interventions whenthatthe
ar
Networking
immediate (Inter-Connected)
help. Healthcare Technology:-Currently, Hospitals/Healthcare centre work in
implemented
means
Accurate only inof
for detection theimpersonation
wake of a drought;
co-ordinated/inter-connection among
inGIS but them
online must formstillpart
isElectrical of developmental
a long
examination:-Impersonation way to go in(EEE) planning
India.
detection in
Patient the domain
records
isimplementation
awhere
major (meo
proble
S.No. Designing
Electronic of geo-spatial
Personal Safety tracking
System:-A of and
Electronicbased andProblem
integrated Statement
Equipments
solution for personal for
security instant
conservation,
history
conducting as
responsibility well
any watershed
as case to
examination,
in Electronic
development
case) are not
especially
Waste Rulesin forestry.
digitalized
Online / As such,
transcribed
examination.
2016:-According
drought
to and
The the
E-waste
mitigation
maindata/record
cause
Management
measures
of of
the medicalare
difficulty
Rules
to be
history
2016, is mainstr
the
wasteof aEpp
lack
1 assistance
regular should be provided
development programmes to a of
person in extreme distress or feeling high threat to safety. The system sh
readily
and/or
disposal available/accessible
integrity on thewhen
is responsibility part online
of
ofthey theneed
producer. or Central
on-demand
Invigilator.
For such
and State
across
Inpurpose
order toGovernments.
various Hospitals/Healthcare.
have a fool-proof
producer’s need to automated Networked
track their system,
products itfor devices
is advised
at least
2 women
hospitals and children
monitor patients when immediate
they are away, help.
and
humantime
which factor in product
that impersonationstops detection.
functioning Hence,
and enters anrecommend
accurate interventions
system
into electronic for detection
waste whenof
stream. aimpersonation
Which serious problem
product willin is
onli
enteim
3 Policy,
is the needguidelines,
of the norms, digital
houris difficult appliances and various software applications are required to Network all
stream
Digital atRights
what phase
Management to ascertain in terms
System:-Various knowledgeof productcontentlifelike
dueText,
to two primary
Scripts, factors;
Audio, one,Image
Video, in Ind
4 and
are Healthcare
repaired/ centres
refurbished inmultiple
India. times before it enters waste stream and second electronic waste collectio
when collected from various sources / resources persons can be digitally managed. Rights to the shared co
5 challenge
free/open or forcharged
most ofper-usage.
the states in India. So,
A system is totracking
be developedan EEEtoproduct
digitally is manage
best waysuch to provide
work-out yearly collect
between va
6 App for
producers monitoring
in India. the work
Constraint/s: done
Trackingin Swachh
cannot Bharat
be based Mission
on (GIS
ownership based):-App
as it will should
violate theirbe able
privacy. to Ge
Easy Navigation System for Visually Impaired Persons:-GIS based navigation system to help blind per
7 photograph and upload the same. At any time given time,and forspecific
same location progress can beshould
monitored (in
navigate
Online
Automation in open
submission & constrained
and
in preparation of areas,
processing the ofbuildings,
telephone
tender offices
and newspaper
documents:-Preparation locations.
bills:-Generally,
of a Tender The system
in government
document have
is a lengthy mu
offices
and
Facility to upload by citizen. Can be linked to Municipal Bodies monitoring system for finding the loopho
8 support
newspaper
consuming andbills
speech
process. interface
arereporting
submitted
By using integrated
on paper for
automated with
tenderit. document preparation,
reimbursement. By facilitating online
specific submissionfor
requirement of the
these bills
tender
improve upon the system.
9 1Making
wastage ofof virtual
paper and environment
time in the for practicing
government offices.cyber forensics learning:-The
and can made in shortest possible time. Also, it would facilitate in adhering to the laid out rules and proced virtual environment for p
10 cyber
without forensics
anyfaced will
dilution. be immensely
Though useful for cyber
exceptions can be captured crime investigators
into the developedto gain a thorough
system wherever understanding
possible. o
Sample
Problems Data Required:
in crypto Yesdomain:-Challenges in decrypting PGP, AES, Truecrypt encryptions. This prob
11 and creation
Lack of several
Testbedof much neededsecurity
for cyber technical manpower in thiscreation
experiments:-For area. This include creation
of indigenous cyber of virtual
range forlab having
training cyb a
faced
learningin management cases of cyberwhere
system crimestudents
where the can criminal
access has encrypted
various tools of his entire
learning, hard disk and
lectures, it is difficu
animated demo
There are available test bed’s offered by various vendors like Breaking Point by IXIA (Cyber Range) , Cyb
12 data.
Lack
Israeliof
sharing Secure
of
companycostlychannel
equipment
which foror
offers communication
resources of
generation among
etc.traffic in thecyber security
computer networkexperts:-Developing
and introductionSecure of malwaresforumsf
13 knowledge exchange among cyber security experts in the Country
cyber security drills etc. We can have attacking team who carries a cyber attack and a defending team whic
14 itself and thequestionnaire
infrastructure from the attacks.
Automated and test for basicThen
cyberthere is a third
security team that
learning for oversees this drills. The
senior non-technical availab
officers:
15 Create
very a program
costly
Lack of Cyber and we for
need
Security year-wise
indigenous listing of work done
solutions/equipment by
forresearchers
training related
purposes. to keyword input on web
questionnaire
Classroom will help theAwareness
optimization, trainees toamong
Laboratory master Students
the subject
optimization &
inand
technical
correctinstitutions:-Conducting
Optimization themselves.
of other
Cyber Secur
resources:-Sometimes, it
16 should have country tags, institution tag and any other tag that
treasure hunt kind of Games to enhance cyber security awareness and skill sets. could be provided to program throu
all the classrooms
Project assessmentare andoccupied
technologywhile most of therequires
development labs arelot
unoccupied
of backgroundand the machines
check are lyingand
on feasibility idletechno
and
17 Designing
Kids,
suitable of
adults product
and
optimization specific
internet
matrix product
awareness.
will make development
Kids
maximum cycle
educational
usability based
apps:-India
of all on
the manufacturing
specific apps model
for (business
educational and
purpos
The most time consuming effort in this task is collection of relevant data (work done by different researche
18 the product.
increasing theProduct
spread development
of incycle
education such timeevery
virtually needssubject
to be minimized
and may for the problem:- Every product ha
19 resources.
world).
productSeveral document
development cyclesources as patents,
and manufacturing journal
model. papers
During etc. cater
handling needs from
to bebasic
looked
of projects,
to advanced level.
into to arrive
the product developmat a
19 know
needs how
to beand extract the
minimized forfeasibility
development of the project.
time for theTospecific
minimize the time,
product. automation
Design an genericof this task is necess
20 optimization technique to minimize development time based on Nair’s product development model as de
21
dual cameraisview,
):-Drought switchrecurrent
a normal, camera view forof
feature
orithms, Video Surveillance Cameras,
on. Conditions of drought appear when
,deo
overanalytics, Riskperiod
an extended management, integrated
of a season or a
a permanent feature of climate. Mitigation
hnology
cts of drought.(MeitY)
istance should be
Besides drought proofing,
provided tobenefits a persontointhe
ce and bringing development
women and children
d-alone interventions when they
that in need
areisolation.
to be The
ls/Healthcare centre work Mentor Name
ntal
in planning
India.
ns (EEE)
detection Patientin the domain
records of
(medical soil life
sonal forisare
security awhere
majorinstant
implementation problem ofinproducer
police CS IT
se n measures
cordof of
the medical
difficulty to be
history
is mainstreamed
the of a
lack patient
of innot
is
efficiency
gement
hreat Rules 2016,
to safety. The systemwaste EEE’s
shouldlet proper
cater for
althcare.
omated
ck their system,Networked
products itfor devices
at least 5will
is advised totoremove
10 years thein
when
tion
am. of a
Which serious
impersonationproblem
product will is imminent.
in enter
onlinethe examination
waste
so are required
primary to
factors; Network
one,Images, all the
in India,Gifs Hospital
products
Scripts, Audio, Video, etc
nd electronic waste collection
aged. Rights to the shared content might be is a major
wayge suchto provide
work-out yearly collection
between various targets for
sources.
d):-App
will system should
violate to theirbe able
privacy. to Geo-tag a
tion help blind persons to
ogress can be monitored (in Real Time).
der. The
erally, system
document should
in government
is a lengthyhave multi-lingual
offices
and telephone
time and
ystem for finding the loopholes and
ine submission of these
c requirement for the tender may be givenbills, it would avoid
The the virtual
laid outenvironment
rules and proceduresfor practicing strictly
a thorough
ystem wherever understanding
possible. of the subject
ecrypt of
eation encryptions.
virtual This problem is often
cyber range forlab having
training a complete
cyber warriors.
ire hard
ing,IXIA disk
lectures, and it
animated is difficult to decrypt the
by (Cyber Range)demonstration
, Cybergym by an
:-Developing
d introductionSecure of malwares forums/groups
for having for
k and a defending team which protects
ersees
nior this drills. The
non-technical available system are
officers:-Automated
d
.es.to keyword input
ns:-Conducting Cyber Security on web. Output drills and
er resources:-Sometimes,
provided to program it is found
through input:- that
s.
heckmachines are lyingand
on feasibility idletechnology
and vice versa. status.A
ckturing
apps model
for (business
educational and
purposes
done by different researchers all over technical)
will helpofin
the
emproblem:-
basic to Every product
advanced level. has its own
oojects,
be looked into to arrive
the product at a decent
development cycle status
omation
an generic of this task is necessary.
ct development model as depicted.
Ministry of ROAD TRANSPORT

S.No. Problem Statement


1 Ambulance Service on National Highway:-In case of accident, user is directed to nearest ambulance ser
2 the app. A listcare
Emergency for services/Hospitals:-
all ambulance services to beshould
There prepared and mapped in
be standardized tollthe app,
free along with
national contact
access details
number to ca
3 calling
Online through
emergency the
Tollmedical
payment app
help facility.
near National
system:-1-2 Highways.
km before the toll plaza, a notification should be received on the mobil
4 approaching
Mobile user with Toll
Mechanic:-In case Name
of tyreand amount of applicable
burst/puncture, the nearest Toll Fee. Payment
mechanic can be details
with contact facilitated
can through
be foundm
5 and credit
app. The
Public cards
Toilets:-An payment
mechanicsapp canto integration.
belocate
registered An
public electronic
ontoilets
the app receipt
and the
along be generated,
theyNational
will receive with bar
a notification
Highways code/QR nominalwhich
code
for aregarding
with details time can
charge.
of
the Toll Booth.
other services A list for
available. all the toll plaza and respective services to be made available in the app.
6 Nearest railway station:-An app to locate nearest railway station along the National Highways with detai
Sample Data
schedulePublic Required:
of trains Noand other facilities available at the station.
passing,
7 Nearest Transportation facilities:-An app to locate nearest bus stop along the National Highways
8 regarding
Petrol scheduleapp
pump:-An of buses passing
to locate andpetrol
nearest other pump
facilities,
alongif any available.Highways with details regarding ti
the National
9 operation and other services available.
Police booth:-An app to locate nearest police station along the National Highways with details regarding n
10 contact
Geo Tagdetails of SHO. offices:-Ministry of Road Transport has offices spread across India. The app sho
all department
11 the offices
Online so that the competentof
appointment:-Ministry authorities can be easily
Road Transport found of
has footfall with
manycontact number,
citizens department
on a daily name, ad
basis. Appointm
12 done through
Bypass:-If wethis
areapp with a through
travelling notification and
a city reminder
and there is option.
a optionThe person then
of bypass with through
whom anthis appointment
app we canischso
13 privilege to accept
Area speeding the request
check:-Due to or declineconstraints,
resource it with a reason.
no traffic police staff is posted at road crossings. Acci
14 reported
INFRACON due tomobile
negligence by the road users.
app:-“INFRACON” hasSpeed
been limit of the by
developed area can check
NHIDCL as by using technology
a comprehensive and au
National
15 be intimated
Infrastructure
INAM-Pro mobile of the over-speeding
Consultancy firms & Key
app:-INAM-Pro 24×7. Also a
is aPersonnel.photo
web basedThe should be shot
Portalplatform
common through
has the facility the traffic cameras
to host Firms,
for Infrastructure andand of the
Personne
Materials spe
Pro
and
their relayed
Credentials
Buyers totothe
online. authorities
A
conduct mobile for in
app
business due
is a action.
needed
free to
and enable
fair firms
manner to
with apply
utmostfor a tender, generate
transparency. A a
mobileTeamapp IDs,
is enab
requi
16 Grocery Stores/Restaurants:-An app to locate grocery stores/restaurants along the National Highways w
Personnel
full user and
regarding to accept
time product request for
andany
registration
of operation tender, and facilitate
functionality, authorizeplacing
the clients to make
of orders, changes
viewing oftoorders,
a tender.
and scheduli
17 Pollution check:-Air pollution istypes
highofinfoods.
many cities in India. Due to resource constrain, the pollution che
deliveries.
captured. A solution to this problem needs to be developed which is effective and cost efficient.
18 Traffic on road:-We
Sample Data Required: Yes can check the huge traffic area and if we are travelling through that area a notificatio
received that this areasystem:-Employee
has
Yeshuge traffic. A can
Leave solution
applytoleave
this problem needs to beAdeveloped
solution towhich is effective
19 Samplemanagement
Data Required: through app/portal. this problem ne
20 efficient.
developed
Mobile whichbills
& Tour is effective and cost efficient. of Road Transport has offices spread across India. Throug
reimbursement:-Ministry
21 employees should
Flyover:-There is abehuge
ablenetwork
to claim of Mobile
road inbills andAn
India. tourapp
bills
to online.
search how many flyovers are being constru
22 flyovers,oncost
Games of flyover, aapp
Transport:-A process
gametoonmonitor the is
Transport flyover
required if any maintenance
to teach the new ispeople
required.
howWho wason
to drive theroad.
per
23 the flyover
Potential etc
incentivizeoffollowing of traffic rules
Digilocker:-Driving and discourage,
Licenses and Vehicle by Registration
means of penalties, the breaking
Certificates can nowof betraffic rules.
accessed thro
24 App. integration of DigiLocker with Driving Licenses (DL) & Vehicle Registration
Weight of vehicle:-An app which will use RC number to view the vehicle details, weight of vehicle and Certificates (RC). With
h
Sample
integration
weight data required:
people to
is allowed noloadNo
longer
on need
vehicle. to carry
And alsoaround physical
through app copies
we canofsearch
their RCs and Driving
for Truck Weigh in Licences. They
motion Syste
access
sent to digital
competent copies of the same
authority if the onloadtheir mobilethan
is higher phones
legalvia the DigiLocker
limits through thismobile
app. app. We want further d
app to check the insurance as well as pollution expiry details through same app.

Sample data required: No


RT
Mentor Name
CS IT
ted to nearest ambulance service, through Harpreet Singh Gill
p, along with
national access contact
number details asfor
to call well as
uld be received on the mobile phone of the Sushant Sanju Choudhary
can be details
contact facilitated
can through
be foundmobile
through wallets
the
bar
cation
with code/QR code
for aregarding
details which
nominal charge. can be shown
time of operation and at
vailable in the app.
National Highways with details regarding
along the National Highways with details
ways with details regarding time of S R Dogiwal
ways with details regarding name and
ad across India. The app should geo-tag all Anjana Sangwan
number, department
ns on a daily name, addressshould
basis. Appointment etc. be
nh through
whom anthis appointment
app we canischeck sought, thehas the
same.
osted at road crossings. Accidents are often
ks by using technology
a comprehensive and authorities
National Portal forcan
he traffic cameras
to host Firms,
rastructure andand of the
Personnel
Materials speeding
CVs and
Providers vehicle
and
er, generate
rency. A a
mobileTeamapp IDs,
is enable
ng the National Highways with details the
required Key
to allow
hanges oftoorders,
a tender.
ewing
constrain, and scheduling
the pollution check isof not
and costthat
hrough efficient.
area a notification should be
Adeveloped
solution towhich is effective
this problem andtocost
needs be
s spread across India. Through an app, the
y flyovers are being constructed, length of
s required.
people howWho wason
to drive theroad.
person
Gamewhoshould
made
e breaking
es can nowof betraffic
accessedrules.through Mobile
ration Certificates (RC).
ails, weight of vehicle and With
how this
much
sTruck
and Driving
Weigh in Licences. They canAlert
motion System. instead
to be
mobile
app. app. We want further development of
p.
Ministry of Tourism
Application
Developmentfor of mapping
simple, user of trekking
friendly routes in the Himalayas
and effective applicationgiving for safety details andofsecurity
accommodation of single facilitwoma
S.No. hospitals, eateries, real-time information
India. Application should be compatible on all platforms-Development on weather and
Problem Statement other relevant information
of simple, user friendly and required for eff
tre
1 Trekking
application in for
Indiansafety Himalayas,
and Maps
security Western
of Ghats,
single womanEasternofGhats, inGarwahl, Kumaon, Vindhya, be Satpura, Arava
Developing
Developing
rapidly growing
aOffline
Live
in
Tourism
City
popularity
Map
as of of
important
tourists seek citiestraveler
India-Ministry
different
Tourism
in kind
India-City
of
India.
is maps
vacations.
Application
interested are
An very should
in developing
useful tool
application for
compatible
afor
livetourists
mapping
tourism on
all to
p
2 that
city should
they are show important tourism landmarks in the country, interactive and user friendly.
Smart
routes in the visiting.
solution Himalayan Ministry
for providing ofasTourism
ranges,commentarywell as other is of
interested
exhibits
mountain inindeveloping
Museum
ranges within Off-line
India-The
necessary maps of various
Ministry
/ relevant of cities,
touristTourism that
informa is
3 downloaded
developing from
application the Incredible Indiacommentary
website of the on Ministry of Tourism.
by
Mobiletrekkers
Developing toan
application bealgorithmforthat
developed. provides
mapping
for impact wildlife sanctuaries
analysis of
the/ exhibits
various National
publicity
inParks
leading
campaign
Museums.
/ Bird Sanctuaries
being
This would
undertaken
come h
with requisi
by the
4 visitors
information to museums.
useful forMedia,
tourists-Wildlife
Tourism in the Print TV, Onlineisand oneSocial
of theMedia-The
important aspects Ministry of of
adventure
Tourismtourism. undertakes Thepublicit
Minist
5 is interested inDigital
showcasing the diversity ofCuisine,
flora
of and fauna in etc-Virtual
India’s National
the Print, TV,Virtual
Developing media,
Tour on etc.
the for
themesvisibility brand Incredible
festivals, India, to
TourcreateisParks / Willifeabout
a awareness
technology sanctuaries
driven India
toolam /w
6 Application
Sanctuaries
travelers and to for
bothreal time
domestic
to encourage monitoring
and
Indians of
international daily
to explore expenditure
travelers
theirmyriad
country. through (accounts)
a mobile
A methodology of India
application. Tourism
is required Offices
to bebeauty
workedcannoin Ind
out t
marketing destinations all over the world. India’s tourism products and unparalleled
7 overseas
effectiveness
Solution -The
for ofMinistry
real such
time of Tourism
campaigns
monitoring is
& required
undertakentracking by toofmonitor
Ministry
projects expenditure
of Tourism
and of
both
utilization its
in fourteen
the
of domestic
funds officesand
sanctioned overseas.
international
to The
State
by any other
Creating
Creating a
a country. Ministry
dashboard
dashboard for
for real
real oftime
Tourism
time is interested
monitoring
monitoring of
of in developingby
performances
performances Virtual
by 20
14 Tours
India
India on various
Tourism
Tourism theme
Offices
Offices inclu
located
located
located
Solution
& Union atfor
Sydney,
real
Territory Singapore,
time monitoring
Administration Beijing, &underTokyo,
tracking Dubai,
PRASAD Johannesburg,
of projects Scheme and Frankfurt,
ofutilization
the Ministry Paris,
ofinfunds
of has Milan, Amsterdam,
sanctioned
Tourism-National MisL
to State
8 of
based
based Cuisines
onLos
on popular
their
Annual Annual in India
Action Action
Planand ofcolorful
Plan-The
the festivals.
Ministry
concerned ofallotted
Tourism
offices-The has
Ministry 20 funds
offices
of Tourism India, they
14 are called
offices India
overseas,
Toronto,
Creating
& UnionTheir
Pilgrimage Angeles
Incredible
Territory
Rejuvenation and
India New
Mobile
Administration York App
Spiritualunder
and performances Each 2.0office
version
Swadesh
Augmentation is to make
Darshan
Drive annually
it
(PRASAD) most
Scheme isofeffective in
the Crores
and
Ministry of
sought Rupees
of after for runnin
applicat
Tourism-Swa
9 Offices.
India activities and are required to their
be monitored onone of
aIndailyonthe two by
abasis flagship
creating schemes
a das
is oneTourism
undertaking
Ministry
Ministry of ofof
theTourism
twoOffices.
tourism
Tourism flagship
for
Their
promotion
launched activities,
schemes
integratedthe of theperformances
in ‘Incredible
various
development countries
India’
Ministry of of required
under
mobile
Tourism,
pilgrimage
to
applicationbe monitored
jurisdiction.
wherein
destinations ainlarge
September
in a order
sum ofdaily
planned, to2014
funds basis
ensure
prioritized
by
assist creating
toareeffective intern
disbursed
and us
su
10 Smart
application
domestic Solution
for/ real for monitoring
time monitoring publicity
oftourism
daily returns
aboutexpenditure of Travel
ofby Writers
overseas / Journalists
offices required. / TV Team,
Allocated etc.
funds invit
are
Governments
manner
hospitality totourists
provide
scheme
tocomplete
Union access
ofitems
the
information
Territory Administrations
religious
Ministry of Tourism
Ministry
for developing
experience.
for providing
Tourism
Under therecognized
tourism
publicity
related
Scheme, tourism
large
for India-The sum service
infrastructure. of funds
Ministry
providers
Technology
are disbu
of Touri
na
11 /offices
Inbound
Governmentsunder
Tour
application various
Operators,
required
/ Union to of expenditure.
Adventure
effectively
Territory Tour
monitor
Administrations Operators,
funds for Domestic
released and
developingOpinion Tour
their
tourism Operators,
utilization
related Tourist
by State
infrastructure.Transport
Governments Operator
Technology / UT
Application
overseas travel for sourcing
Writers, content
Journalists, and
TV relevant
Team, information
Photographers, from various
Makers websites
on of Tourism
a familiarization Depart
of tour
12 Agents, Regional
/Administrations.
application requiredLevel to Guides,
effectively Classified
monitor Hotels
funds available
released in
and respective
their cities
utilization / Tourist
by State centers
Governments including / UT
Governments
its hospitalityofscheme.and Union Territory Administrations in India-In order
The purpose is to create awareness about India in the overseas markets and enhance to populate content in the form o
13 significance
Administrations.
Smart application the place.
for monitoring and tracking applications received and funds released under Mark
and videos
arrivals
Application on
to India. the www.incredibleindia.org
These overseas
for providing company guestsprofile website
after visiting of the Ministry
India, provide
of wholesaler / retailer of Tourism,
publicity
tour operators it is interested
returns inoverseas the form within developi
articles,
detad
14 Development
application
programmes, for Assistance
sourcing
photos, etc. Scheme
authentic
on India to
in service
contents
various fromproviders
websites
publications, ofofthe
TV Ministry
tourism
channels, of
departments
etc. Tourism-The
in theirof States
countries.Marketing
and AUnion
smart Deve
Terr
sol
brochure support,
Incredible India Mobile jointAppadvertising
2.0 version support,
with hospitality
more features guests
using sent, technology
latest etc-An application to India, providingtoinfo
be developed ma
15 Assistance
required Scheme
to /monitor (MDA),
publicity administered
returns of on by
various the Ministry
guests such of
invited Tourism,
by MinistryGovernment
of Tourism. of provides finan
wholesaler
sought
Smart after
solution retail
travel for tour operators
application
monitoring overseas
forand India to takewith details
allfollow
platforms. up actionTheasapplication
brochure
with tour support
must
operators beand Joint
purely
and Advertising
informative
decision and
makersSupn
approved tourism service providers, i.e. hoteliers, travel agents, tour operators,tourist transport operators, a
16 by India Tourism
provision forof Offices in
commercial overseas
transactions markets
oforprivateto be developed.
participating
the Ministry inTourism,
various leading
Govt. Travel
of India by the party
ExhibitionsState /Tourism
fairs / Marts Department / Expos, etc-The
in the case Ministry
of Jammuof&Tourism Kashm
17 offices in IndiaStates
North Eastern and overseas
(Arunachal markets
Pradesh, participate
Assam,inManipur,
a numberMeghalaya,of leading travel Mizoram, and tourism
Nagaland, fairs, exhibition
Sikkim and T
18 smart solution
undertaking a is required
various to
tourism monitor
promotional follow up action
activities with
abroad.
Programme to monitor proposals pending with other Ministries and Departments at a glance-The tour operators
Application and
for decision
monitoring makers.
and tracking applM
19 received
Tourism and
receives funds a released
number under
of MDA
proposals Scheme
under is
various required.
promotional
Any other path breaking technological solutions that would catapult India as the number one touris and developmental schemes of the
20 Programme is required to of
for global travelers-Out monitor
the boxsuch proposals received
technological solutionsand thataction
are path taken on theand
breaking same. would revolutionize
21 tourism to India in the overseas markets and within India.
ls ofsecurity
and accommodationof single facilities,
woman traveler banks, in Mentor Name
nformation required
simple, user friendly and effective for trekkers- CS IT
aon,
ion Vindhya,
should be Satpura,
compatible Aravalli
on all ranges
platforms.is Kajal Mathur
in
erydeveloping
useful tool afor
livetourists
tourism to map
exploreof India
the
application for mapping all popular trekking
usermaps
-The friendly.
of various
Ministry of cities,
Tourism thatis could
interestedbe in
ary / relevant tourist information required
Museums.
rd beingSanctuariesThis would come handy
with requisite travelfor
gn undertaken by the Ministry of
venture
Tourismtourism.
undertakes Thepublicity
Ministrycampaigns
of Tourismin
Parks
ate
is / Willifeabout
a awareness
technology sanctuaries
driven India /widely
toolamong Bird overseas
used for
ndia Tourism
ication.
sdrequired Offices
to bebeauty in
workedcannot India
out tobe and
analyze
unparalleled matched
ourteen onoffices
fefunds
domestic and
sanctioned overseas.
international
tolocatedThese
State Offices
media.
Governments are
Tours
dia
dia Tourism
Tourism various theme
Offices
Offices including
located in on variety
India,
overseas
fn, funds
ry Paris,
of has Milan, Amsterdam,
sanctioned
Tourism-National
India, they are called to State London,
Mission
India Governments
on
Tourism
rism
Crores
e and of 14
sought offices
Rupeesafter overseas,
for running
application-Thethey are called
office,
eeddaily
Ministry
of the two
basis of
by Tourism-Swadesh
flagship
creating schemes
a dash of Darshan
the
board.
enasum
ptemberon aofdaily
order to2014 basis
ensure
funds by creating
toareeffective
assist usetoaofState
international
disbursed dash
funds,board.
and an
nalistsplanned,
/ TV prioritized
Team, etc. and sustainable
invited under the
dequired.
tourism Allocated
service
infrastructure.
large sum of funds funds
providers
Technology
are are
disbursedutilized
namely
based by the
toapproved
solution
State
India-The
n , Tourist
by State Ministry
Transport
Governments of Tourism,
Operators,/ UT invites
Travel
ds infrastructure.
websites
on of Tourism
a familiarization Technology
Departments based
of tourheritage
of India solution
ofunder
State
s
n / Tourist
by State centers
Governments including / UT
opulate content in the form
verseas markets and enhance foreign tourist of text, images
funds
m,eturns released
it is interested
in the form under
inwith Market
developing
articles, an as
documentary
erators overseas details such
ourism-The
ents
nology of States
their countries.Marketing
and AUnion
smart Development
Territories.
solution ismost
An application
to providing
be developed information
tofinancial
make about
it asupport
ment
Tourism. of India, provides to
rt
rators and
be purelyJoint
and Advertising
informative
decision Support
and not
makers extended
to haveby
after any
,tourist transport operators, approved
n, theetc-The
case Ministry
of Jammuof&Tourism Kashmirand anditsthe
field
and tourism fairs, exhibitions,
ram, Nagaland, Sikkim and Tripura) for expos, etc. A
decision
monitoringatand
artments makers. tracking applications
a glance-The Ministry of
velopmental
a as the number one touristMinistry.
schemes of the destination A
n the same.
king and would revolutionize promotion of

Das könnte Ihnen auch gefallen