You are on page 1of 3

Problem Statements for

Sno. PsID Title Domain


Graphical Password Cyber Security &
1 DS01
Authentication
Chat Messenger CyberForensics
Security &
2 DS02
Decryption
Email Spoofing Tool CyberForensics
Security &
3 DS03 Secure
Detection CyberForensics
Security &
4 DS04 Communication
Secure Digital
CyberForensics
Security &
5 DS05 Identity Channel
Verification
Spam Alert Forensics
6 DS06 System AIML
System
Fake News
7 DS07 AIML
Detection System
Phishing Detection
8 DS08 AIML
Solution
Placement Aiding
9 DS09 AIML
System
Mental Health
10 DS10 AIML
Chatbot
Customer AIML & Web
11 DS11
Segmentation
Predicting Stock Development
AIML & Web
12 DS12
Market
Smart Trends
Home Development
13 DS13 AIML & IoT
Automation
Student
14 DS14 IoT
Parking Tracker
15 DS15 AIML & IoT
System
E-Ticketing
16 DS16 IoT
Smart Cane System
17 DS17 IoT
Safetyfor/Blind People
Emergency
18 DS18 Mobile App
App
Attendance Web Development /
19 DS19
System
Class Mapping WebMobile App
Development /
20 DS20
System
Gamified Fitness Mobile App
21 DS21 Mobile App
Tracker
Event Managment
22 DS22 Web Development
System Welfare
Dean Students'
23 DS23 Web Development
WebPage
E-Commerce Web Development /
24 DS24 Inventory
App Mobile App
25 DS25 Management Cloud Computing
IoT Device
26 DS26 System Cloud Computing
Manager
Problem Statements for Evolute 2k23
online banking, and e-commerce platforms. Description Graphical Password Authentication
(GPA) is a type of user authentication method that uses images, shapes, or
messengers such as WhatsApp, Telegram, Signal, and others, use end-to-end
symbols
to be from as apasswords
legitimateinstead of traditional
source but are actually alphanumeric
sent from a passwords. In GPA,
fraudulent source.
encryption to protect the privacy and security of the messages being sent
Email spoofing can be used for various malicious purposes, such as phishing
communication channels is more important than ever. This is because remote
attacks, spreading malware, and identity theft. An Email Spoofing Detection
workersverification
identity are often accessing
system that sensitive company
can prevent fraudinformation
and protect and data through
personal
information.
or unwanted This problem
messages statement
or emails, would focus
commonly known onasdeveloping
spam. These a secure anduse
systems
Fake News and its origin using official sources as the input filter. The solution
various techniques and algorithms to detect and filter out spam messages, such
should have
Detection anda mechanism
Alert System.toThe mitigate theshould
solution impactbe of able
the spread of Fake
to identify the News
sourceby of
auto-populating
phishing attacks
guidance the fake
and recommendations news
in web pages, emailspreader’s inboxes
apps, social
to students based with
media, the official/authenticated
instant
on their messenger
skills, experience, apps,
text interests.
and messagesThe etc. system
The solution may bewith
can interact in the form ofthrough
students a desktop/mobile
natural language
Design a web-based chatbot that offers mental health support and resources,
processing and provide them with relevant job search resources, such as job
including features
demographic, such as and
geographic, mood tracking and
behavioral mindfulnessThis
characteristics. exercises.
can help
businesses
company tailoron
based their marketing
historical data.efforts
The modelto specific
shouldcustomer
be able segments, and
to identify patterns
homeowners. Smart Home Automation refers to the use of technology to control
and trends in the data, and use them to make accurate predictions about future
and automate various household appliances and systems. Smart home devices
student activity within a school environment. The primary objective of a student
typically operate using Wi-Fi, Bluetooth, or other wireless protocols, and can be
tracker system
spaces. is to of
At the time improve
entrance student safety,
the cars attendance,
will be provided theandavailable
academicfree slots
and assign
reduces those expenses
booking spaces to by theeliminating
vehicles itself.
the Along
need forthisprinting
the time andwillmailing
be paper
documents.inCan
difficulties help in
tracking thekeeping
harmfula objects
better record
in theirofsurroundings.
visitors. Can improve salesisasto
The solution
bind with
mobile usertheand
feature likean
triggers developing
SOS alertvoice instructions
with location of nearest
details based on harmful
multimodal
organizations and educational institutions manage their attendance records
data from a mobile device such as audio, video, image, motion detection etc.,
efficiently. Design an Attendance System App for GLA University that can be used
manage the physical space of a building, particularly classrooms, lecture halls,
to take attendance of students, faculty and other university staff in a central
and or
app meeting
devicerooms. Design a class
that incorporates mapping
game-like system to
elements formotivate
Gla University
users tothat enable
engage
in physical activity
Management System,andwhich
achieve theirthe
allows fitness goals.toThese
students applyapps or devices
for the often
leave, only after
Life at GLA University is presented. There must be Grievances Section for the
uploading the confirmation of participation documents (Here it can be
students to directly send
Develop full-fledged their problems
e-commerce Android to/ the
IOSDean
/ WebofApplication
Students Welfare of the
using MERN
University. The
(MongoDB - No website must beExpress
SQL Database, responsive as wellWeb
JS Backend as latest technology
Framework, usage
React JS
provides real-time inventory management to businesses. The solution must allow
Front-End Framework, Node JS Server-Side Javascript) stack technology.
businesses
of collectingtoand track their inventory
processing levels,
data from IoTmonitor
devices,stock movements,
and should allow and
organizations to easily build and deploy IoT applications. The solution should also
3
(GPA) is to provide a secure Objective
and user-friendly method for
authenticating
and decrypt theusers in various
encrypted dataapplications, such as mobile
from chat messenger
devices, online banking, e-commerce
applications. These platforms, and other
tools typically
and enhance safety by implementing effective email
require
This accessstatement
problem to the encrypted data, on
would focus such as a device
developing a or
authentication mechanisms, such as SPF, DKIM, and
secure communication platform that can be used for
authentication methods, such as biometrics or one-time
remote work, including video conferencing and file sharing.
passwords.ofDevelopment
Collection feedback followed of a system that can
by updation in be
theeasily
model
should
the be done soof
dissemination asaccurate
to get the best solution
information, to the the
prevent
spread of fake news, and mitigate the
these different channels. By analyzing the content negative impact
and of
behavior
resources,ofand these channels,
student the solution
profiles. Then, one can identify
would use AIML
to develop a chatbot or virtual assistant that
exercises, self-care tips, etc should be some basic features can interact
chatbot should
engagement andoffer. Test the
retention. chatbot with
Measuring users and getof
the effectiveness
identify patterns and trends that can help in making
marketing campaigns for each customer segment and using
accurate predictions about future market behavior.
person present. The result must be an AIML chatbot which
It should
which canbe helpa tool for investors
identify potentialand traders
safety to and
issues make improve
detects voice commands and create rountines for the
response
about times parking
available in case of emergencies.The
spaces, reducing thesystem can
time spent
monitor student
searching academic
for a parking progress
spot. Automate andthe provide
parking real-time
process
hardware for the seamless visitor experience in
by assigning parking spaces to vehicles based on their size
Museums/Heritage
fullest. It allows the sites.user toIn scan
addition,
theirThe predictionfor
surrounding of the
danger. It can utilize a combination of sensors, such as
obstacles or orientation marks. It will also give voice
audio, video,
credentials toimage,
accessand theirmotion detection,
attendance to detect
records.The app
danger.have
should It's important
a dashboard to ensure that the
that displays theapp is easy to use,
attendance
location. It should allow users to reserve rooms in advance.
summary of the user. The app can be customized to meet
It should
the fitnesshave security
tracker shouldfeatures that ensure
incorporate only authorized
gamification
elements such as badges, rewards, and challenges. Keeps
Link for other
(Structured details toNo-SQL
Database). be added andallowed
is not graphical to representation:
be used. All https://docs.google.com/presentation/d/15fE
the major modules needed to be in the Dean Students
transactions and ensure that the customer's data is
Welfare
(StructuredWebsite must be
Database). present.
No-SQL Students
is not allowedcan to take
be used. All
protected and provide a seamless experience for both
the major modules needed to be in the Inventory
cloud. Features- IoT asset tracking (On and Off IoT Devices),
Management System Website must be present. Students
Smart thermostats, Monitoring Camera

You might also like