top of page

HACKFEST

               2K18

Intracollege "24 hours" non-stop Hackathon
organised by department of 
Electronics and  Communication Engineering , 
Anand Institute of Higher Technology .

Training Partner 

For Training & Guidance contact..

Important dates

Submission of Project Proposal           : 22-06-2017  Extended to 26-06-2017

Announcement of selected teams        : 28-06-2017  Extended to 01-07-2017

Acceptance of selected teams             : 03-07-2017

Training of selected teams                   : 05-07-2017

Grand finale                                         : 8th& 9th  JULY 2017

Schedule

Day -1 (08.07.2017)

​08.00 AM to 08.30 AM--Registration

08.30 AM to 09.00 AM-- Inauguration

09.00 AM onwards      --Hacking/Coding Begins

11.00 AM to 11.15 AM--Tea break

12.30 PM to 01.00 PM--First Round of Evaluation

01.00 PM to 02.00 PM--Lunch break

04.00 PM to 04.15 PM--Tea Break

06.00 PM to 06.30 PM--Refreshment Activity

07.30 PM to 08.00 PM--Second Round of Evaluation

08.00 PM to 09.00 PM--Dinner

11.00 PM to 11.15 PM--Tea break

Day -2 (09.07.2017)

​12.30 AM to 01.00 AM--Third Round of Evaluation

01.00 AM to 01.30 AM--Gaming Activity

03.00 AM to 03.15 AM--Tea Break

05.30 AM to 06.00 AM--Fourth Round of Evaluation

06.00 AM to 06.30 AM--Yoga Session

06.30 AM to 06.40 AM--Tea Break

07.30 AM to 08.00 AM--Power Judging

08.30 AM to 09.00 AM--Valedictory

Rules

Dear Students,

We are quite sure that you all will be very excited about the Hackfest 2017 on 8th and 9thof July 2017.

The following are guidelines for students, which they need to, follow for smoothly conducting of Hackfest 2017.

 

1) As you are aware, all the departments of AIHT are going to compete on 1st week of july 2017 non-stop for 24 hrs. We want you to enjoy the process of Hackfest

 

2)The Batch size will be of maximum 5 students (same gender) with 1 staff mentor. The Batch has to select any one of the problemlisted in website and come with innovative solutions.

The College will make arrangements for your Food and Snacks from 8thJulymorning (Breakfast) to 9thJuly afternoon (lunch/brunch).

 

3) If you are on any special medication or suffering with any medical condition, then we request you to inform in advance, so that they can make appropriate arrangements. Also you can get along with you basic First Aids kit and some basic drugs like Dettol, Antacids, Combiflam, Vicks,etc.

 

4) Please dump waste in designated dustbins and not anywhere in the campus. We are all committed to Swatch Bharat.

 

5) Regarding IT/Hardware, please ensure that you bring all the required hardware along with you.

 

6) As stated earlier, we are trying to make arrangements for internet with high speed but then also there is very high possibility that the speed might become a problem, if large number of Laptops/PCs simultaneously connects to the network. Request you to ensure that you dependencies on internet are minimal.

 

7) During the 24hrsHackfest, all students are expected to code. The students will not be allowed to leave the campus. Rest area will be arranged near to actual Hackfest venue.

 

8) Students/Teams not coding and roaming will be immediately disqualified and asked to leave the competition. They will NOT even get the certificate of participation. We are here to code and work.

 

9) If any of the teams require PCs during the Finale, then please contact the respective coordinator.

 

10) All students are expected to strictly follow the norms/rules of the colleges and ensure that no damage is done to the property during your stay. We believe that all the selected students are good and talented youngsters and your behavior should give moral boost to the institution, so that they continue to support this initiative even in future.

 

11) Dress code as per college norms must be strictly followed during the event.

 

12) We will soon share with you a comprehensive 'Students Guide' highlighting Do's and Dont's

We have started working on the details of this function. So please do ask any questions at this juncture. Hope you will understand and appreciate When an initiative of this magnitude is planned, it requires humongous efforts and some mistakes are bound to happen from all the parties involved in this process. We sincerely request you to accommodate our shortcomings and join this movement in true spirit.

The success of our efforts are not based on how well are the logistics or arrangements but it will depend more upon how we can stimulate young students to think out of-the-box and build innovative digital solutions.

Prizes

1st Prize :Rs. 7500

2nd Prize :Rs. 5000

3rd Prize :Rs. 2500

Rules
Prizes
Dates
Schedule

Problem statement

AUTOMATION

Problem ID : #A01

Automated system which alerts the recipients about anticipated congestion time in toll gate, geographical area of congestion and remedial measures.

 

Problem ID : #A02

An application that will be configured to accept all relevant info in case of emergency such as person to contact, number, police number, etc. The program shall work in such a way that when it is clicked, it will get the coordinates of your location (forcing the GNSS to be turned on), then open the camera, shoot 15 seconds video of wherever the phone’s camera is pointed, record audio to verify what’s happening to you, and transmit all of these to the cloud. The person to contact in case of emergency will be notified of these information. Also the emergency help message can be sent automatically to the police help line number.

 

Problem ID : #A03

Construction, modification, demolition, reconstruction – are a part of todays environment to meet changing requirements. This involves man, material and vehicles . The complexity multiplies as most of the not highly educated. We wish to have an works monitoring system capable of providing alerts to the supervisor for commencement or termination (time-bound) through recoded voice-over mechanisms and acknowledgement loopback to enhance greater flexibility for works in between operations.

Problem ID : #A04

The working model should provide integration between College database &Aadhaar number. This App will provide the link between Aadhaar Number & Roll Number and the students should update the data of “Aadhaar Number” along with “Roll Number” , Verification of Students and Message service for students like job alert etc.

Availability of such an Application would be useful (Design and Development) for Integration of Biometric details of students record on a single mobile App.

 

Problem ID : #A05

Currently, Hospitals/Healthcare centre work in isolation. The means for co-ordinated/inter-connection among them is still a long way to go in India. Patient records (medical life history as well as case to case) are not digitalized / transcribed and the data/record of medical history of a patient is not readily available/accessible online or on-demand across various Hospitals/Healthcare.

Networked devices will let hospitals monitor patients when they are away, and recommend interventions when a serious problem is imminent.

Policy, guidelines, norms, digital appliances and various software applications are required to Network all the Hospital and Healthcare centres in India.

Problem ID : #A06

Impersonation detection is a major problem in conducting any examination, especially in Online examination. The main cause of the difficulty is the lack of efficiency and/or integrity on the part of the Invigilator. In order to have a fool-proof automated system, it is advised to remove the human factor in impersonation detection. Hence, an accurate system for detection of impersonation in online examination is the need of the hour

 

Problem ID : #A07

An app which will use RC number to view the vehicle details, weight of vehicle and how much weight is allowed to load on vehicle. And also through app we can search for Truck Weigh in motion System. Alert to be sent to competent authority if the load is higher than legal limits through this app.

 

Problem ID : #A08

Employee can apply leave through app/portal. A solution to this problem needs to be developed which is effective and cost efficient.

 

ELECTRONICS

 

Problem ID : #E01

Video Surveillance solutions are security tools that help reduce crime and protect people and property. These solutions deter revenue loss from stolen merchandise, destruction of valuable information and vandalism.

Video Summarizer, Individual camera view, switch camera view for detailed view, Voice enabled activation, development of efficient Security Algorithms, Video Surveillance Cameras, Hosted Video services, On-site video monitoring, Video Alarm verification, video analytics, Risk management, integrated video solutions.

 

Problem ID : #E02

A GIS based integrated solution for personal security where instant police assistance should be provided to a person in extreme distress or feeling high threat to safety. The system should cater for women and children when they need immediate help.

 

Problem ID : #E03

According to E-waste Management Rules 2016, waste EEE’s proper disposal is responsibility of producer. For such purpose producer’s need to track their products for at least 5 to 10 years in which time that product stops functioning and enters into electronic waste stream. Which product will enter the waste stream at what phase is difficult to ascertain in terms of product life due to two primary factors; one, in India, products are repaired/ refurbished multiple times before it enters waste stream and second electronic waste collection is a major challenge for most of the states in India. So, tracking an EEE product is best way to provide yearly collection targets for producers in India.

Constraint/s: Tracking cannot be based on ownership as it will violate their privacy.

Problem ID : #E04

GIS based navigation system to help blind persons to navigate in open & constrained areas, buildings, offices and specific locations.

The system should have multi-lingual support and speech interface integrated with it.

 

Problem ID : #E05

Sometimes, it is found that all the classrooms are occupied while most of the labs are unoccupied and the machines are lying idle and vice versa.

A suitable optimization matrix will make maximum usability of all the resources.

 

Problem ID : #E06

Drought is a normal, recurrent feature of climate and characterized in terms of its spatial extension, intensity and duration. Conditions of drought appear when rainfall is deficient in relation to the statistical multi-year average for a region, over an extended period of a season or a year, or even more. Drought is a temporary aberration unlike aridity, which is a permanent feature of climate.Mitigation measures are initiatives undertaken to reduce the incidence or minimise impacts of drought. Besides drought proofing, these measures help in adapting to climate change, restoring ecological balance and bringing development benefits to the people. However, drought mitigation programmes are not to be construed stand-alone interventions that are to be implemented only in the wake of a drought; but must form part of developmental planning in the domain of soil conservation, watershed development and forestry. As such, drought mitigation measures are to be mainstreamed in regular development programmes of Central and State Governments.

 

Problem ID : #E07

This is an age old problem for the life of people living in and around forest areas. In the last two decades there is an increase in human-wildlife conflicts. This is due to increase in human population, decrease in forest cover and in some cases increase in wild animal population as well. Till date there is no mechanism available to evaluate the human-wildlife conflict issues in the state and national levels. Also to mitigate the issue, no technological solutions are available. Development of sensor based technology to mitigate human-elephant conflict issue could be one of the suggested problems.

 

Problem ID : #E08

Our water bodies, especially those of the urban areas are under increasing threat due to pollution and anthropogenic pressure. As we have many colleges in cities and town, they can be motivated to do the pollution monitoring in a real time basis and the data can be integrated in to an assessment-warning-management suggestion system.

 

INFORMATICS

Problem ID : #I01

Analytics on video footages need to be improved using facial recognition applications and comparison with staff database at college. Availability of such an application could be useful for Staff attendance.

 

Problem ID : #I02

College is providing WIFI service. The project is to make college as Noise Free Zones. Design a system for pushing Targeted messages, announcements to students, staffs, security personnel on to the smart phones so that the college is noise free.

 

Problem ID : #I03

Project is to create interactive VR maps showing all details of College campus, department buildings, Mess, hostel, Canteen, rest rooms and other facilities at our college.
The information to be accessible through dedicated terminals or kiosks. The project may also be extended to include information regarding the route map to college.

 

Problem ID : #I04

Create an application for submission of data indicated in given format. The submitted data should be made available to designated users with numerical and graphical output on different variables, with capability of future addition of variables.

 

Problem ID : #I05

App based Alerts to staff and concerned HODs regarding the attendance and performance  of the students.

 

Problem ID : #I06

College collect feedback forms as part of students satisfaction, grievance feedback mechanism. Project is to collect the data electronically in the form of an APP with selectable parameters and rating . The APP will be available by default on the free college WIFI service.

 

Problem ID : #I07

College is looking for attractive website design with latest innovative ideas covering all activities of college with user friendly concept.

 

Problem ID : #I08

Organization is looking for attractive Mobile App developed with latest innovative ideas to display/provide information on some of the important activities of college with user friendly concept.

 

Problem ID : #I09

There are many Governmental and Non-Governmental sources of grants for undertaking research in Colleges and Universities. Lack of information in one platform about the institution granting funds, criteria of selection, norms and stipulations, time period, purpose for which grants are available, last date, eligibility criteria for all the grants available at International, National levels and local and subject-wise details, is inhibiting several potential researchers from availing the grants for undertaking research projects.

Provision of such a platform would be useful in enabling healthy competition among researchers and also for the best utilisation of funds for research programs.

 

Problem ID : #I10

Availability of single portal will be extremely useful for obtaining the information about all academic activities across the country, universities and international arena in chronological order and in subject areas so as to enable the students, faculty, and researchers to access information and prepare well in advance and participate effectively and successfully

 

Problem ID : #I11

Generally, in government offices telephone and newspaper bills are submitted on paper for reimbursement.By facilitating online submission of these bills, it would avoid wastage of paper and time in the government offices.

 

Problem ID : #I12

Challenges in decrypting PGP, AES, Truecrypt encryptions. This problem  is often faced in several cases of cyber crime where the criminal has encrypted his entire hard disk and it is difficult to decrypt the data.

 

Problem ID : #I13

Authenticity of the email sender is extremely important in many cases. Personal digital certificates are generally used for the same. Personal digital certificates need to be signed by a third party trusted CA. In a large organization, it is not very economical to provide individual certificates to each user.
Workout a unique solution to determine the authenticity of the email sender without using such personal digital certificates.

Notes: In order to demonstrate the working of the solution, participants have to simulate an email setup with test user accounts.

 

Problem ID : #I14

Develop a network traffic classification tool for enterprise networks in order to categorize the following four classes of traffic: (i) normal web traffic, (ii) p2p traffic, (iii) VPN traffic, and (iv) The Onion Router (TOR) traffic. The classifier should analyze network traffic in real time using Deep Packet Inspection. The classifier can use any machine learning approach including deep learning. Accuracy of detection is utmost important. The tool should also generate a report to the system administrator about the hosts that are generating p2p, VPN and TOR traffic.

Notes: Simulate network traffic data containing all four classes of above mentioned network traffic.

 

Problem ID : #I15

Botnet is a network of compromised machines/computers that communicate and coordinate their actions by Command & Control (C&C) or by passing messages to one another (C&C might be built into the botnet as P2P).  Many host /network approaches have been proposed to detect botnets. They employ signature based, anomaly based, data mining approaches etc. to detect botnets. Most of the approaches are not highly effective in detecting decentralized (P2P, FastFlux) botnets using encryption in real time. When the botnets get detected by these approaches a lot of financial loss, data leakage etc. has already taken place. Therefore, work out novel approaches for detection of sophisticated and advanced botnets in real time.

Notes : Simulate sample data by implementing publicly available botnets or using publicly available bot traffic data. The solution should work on Windows/Linux platform.

 

Problem ID : #I16

In case one of the client machine inside the Intranet is infected with virus, the virus may try to propagate. Email is one of the transport with maximum reachability. Simulate a malware which propagates using email as transport from client machine. Simulation is required for evaluation of security mechanisms in place.

Notes: In order to demonstrate the working of the solution, participants have to simulate an email setup with test user accounts. The solution should work on Windows, Linux, MAC, Android Operating System.

 

Problem ID : #I17

There are plenty of Antispam solution.  Find out a novel approach for SPAM identification without using any of the existing antispam/antivirus solution. The accuracy of the novel approach should be better than existing open source or freeware solution.

Notes: In order to demonstrate the working of the solution, participants have to simulate an email setup.

 

Problem ID : #I18

There are plenty of eMail client which interacts with mail server to get mails either through IMAP protocol or POP3 Protocol. If the end user machine is infected, the mail server can be attacked using vulnerability of these interface. Simulate a software to exploit IMAP/POP3 interface to execute a script on mail server using a normal email account credentials.

Also investigate if it can be done without the credentials.

Notes: In order to demonstrate the working of the solution, participants have to simulate an email setup with test user accounts.

 

Problem ID : #I19

An email application for Android, Windows mobile or iOS normally interacts with mail server using IMAP and SMTP. In case the smart phone is compromised, the malware will also be able to interact with mail server on IMAP/SMTP. Develop a secure solution which allows only predefined mail application to connect to IMAP and SMTP servers. Also ensure that no other program on the device is not able to read stored login credentials and SMTP, IMAP configurations on mobile.

Notes: In order to demonstrate the working of the solution, participants have to simulate an email setup with test user accounts.

Problem ID : #I20

Most of the perimeter security implementations allow outbound DNS and ICMP traffic in their firewalls. ICMP and DNS protocols can be leveraged by the attackers to leak data from the organization. Implement a simulation software that can be used for data leakage using ICMP and DNS tunneling. The software is required for the evaluation of firewall intelligence.

Notes: In order to demonstrate the approach, simulate a setup in which only ICMP and DNS traffic is allowed over Internet

 

Problem ID : #I21

Demonstrate WEP encryption cracking and demonstrate mechanism to secure it

Demonstrate WPA encryption cracking and demonstrate mechanism to secure it

Demonstrate WPA-2 encryption cracking

Notes: In order to demonstrate the approach, participants should use their own hardware with support for the above mentioned encryption technologies.

 

Problem ID : #I22

At present, trusted clients are allowed access on the switch/router based on IP/MAC. However, these can be easily spoofed. Implement a solution which uses modified TCP/IP protocol stack in order to identify trusted clients at switch/router level. Subsequently solution should restrict network access based on this identification.

Notes: Participants should use their own hardware like switch, router, PC etc. to demonstrate their solution. Use any open source switch firmware if the solution involves modifying firmware of the switch to understand customised TCP/IP.

Problem statement
08-Jul-2017, 8:30 am
Anand Institute of Higher Technology
Intracollege "24 hours" non-stop Hackathon organised by department of Electronics and Communication Engineering , Anand Institute of Higher Technology . Contact details: Mr.Saravanan, Assistant Professor, Department of ECE, Anand Institute of Higher Technology, Chennai. Mobile: 9789845078
Can you make it?
Details
bottom of page