You are on page 1of 10

PS ID Title: Theme Technology Domain: Description:

Bucket

SIH1517 Identification of Space ICT, Cyber- AI/ML (Natural Building a geospatial querying system
place names from a Technology Physical Language based on natural language requires
natural language Systems, Processing) identifying geospatial entities by their
sentence. Blockchain, names. The scope of this work involves
Cognitive automatically identifying names of places
Computing, from a sentence. A universe of canonical
Cloud names (single way of spelling and correct
Computing, AI spelling) will be provided in the form of
& ML. tables. For example, Country, City and
State table containing the possible
universe of names. It should take into
account spelling errors in the names and
multiple ways of spelling and mentioning
the same entity in the query and map it to
canonical name. For example: Given an
input: Which of the following saw highest
average temperature in January,
Maharashtra, Ahmedabad or entire New-
Zealand? Here, first the system should use
NLP to filter out words that are not names
of places, then it must do a fuzzy match to
find candidate canonical names in tables
and report the output. Output: Token:
Maharashtra, Canonical name:
Maharashtra, table: State Token:
Amdabad, Canonical name: Ahmedabad,
table: City Token: New-Zealand, Canonical
name: newzealand, table: Country Please
note that query need not be a question. It
can also be an imperative sentence for
example. “Show me a graph of rainfall for
Chennai for the month of October”
SIH1518 Change detection Space Clean & AI/ML (Image Using satellite imagery, create an
due to human Technology Potable Water Processing) automated system for detecting change
activities related only to human activities from
satellite imagery. i.e. Develop AI/ML based
model for change detection of only
manmade objects like vehicles, buildings,
roads, aircraft etc. from remote sensing
images Data: Sentinel-2, LISS-4
SIH1519 Generation of Space IoT Based Planetary Data We have TMC images of nearly 80% area
Hazard map at 1m Technology Technologies Processing of moon at 5m resolution while OHRC data
grid spacing (1m (e.g. security & at 25cm resolution having very limited
height resolution) surveillance coverage. Due to limited coverage of
using 5m spatial systems etc) OHRC, there are constrains to land at any
resolution data for place on the moon surface. Hence, a
safely navigating a problem has been defined to create hazard
Lander to a safe map using super resolution techniques
landing site using from TMC 5m images considering the
Super resolution hazard definitions (like Slope-10 degree,
techniques. Crater / Boulder depth/height – 1m, Crater
distribution, shadow etc.) for safely
navigating a Lander. This challenge
includes the showcasing of lander
navigation techniques for safe landing
considering reference as TMC 5m datasets
in near real time.
SIH1520 Development of Space Other Navigation and Server development for RTK correction
NTRIP (Network Technology Emerging areas positioning reception from NTRIP Server and
Transport of RTCM Innovation for Transmission to NTRIP client. Desired
via internet Startup Outcome: The developed system shall
protocol) Caster, provide the following: 1. Web/mobile
NTRIP Client and application for transmitting corrections to
Server on web or NTRIP caster and receiving the correction
mobile platform. from NTRIP caster 2. User interface for real
time display with map support. 3. Time
tagged Data logging. Dataset: NavIC/GNSS
receiver data of different stations in
NMEA/RTCM format.
SIH1521 Development of Space Travel & Weather Nowcasting of heavy precipitation/ rainfall
Explainable AI (XAI) Technology Tourism modelling and events with an understanding of the most
based model for Nowcasting, important predictors and also an idea as to
prediction of heavy Disaster why a certain model can fail. Desired
/high impact rain Management Outcome: The developed system shall
events using provide the following: 1. AI based model to
satellite data predict particular rain episodes of greater
impact using satellite data (INSAT-3D/3DR)
. 2. An explainable module into the AI
model (XAI) 3. The final output should be
in terms of a web application, with
associated accuracy of the models worked
on and an explainable component of the
outputs. Dataset: INSAT-3D/3R data, IMD
rainfall data
SIH1522 Development of UT Space Clean & Baseband
(user terminal) to Technology Potable Water Communication
UT Voice, Image, Software
Video and Data
Communication APP
(Android or iOS)
using Bluetooth 2.0
or above wireless
interface and
custom protocol
SIH1523 Quantum Secure Space Agriculture & Quantum Email communication is a fundamental
Email Client Technology Rural Communication part of modern business and personal
Application Development interactions. However, conventional
encryption mechanisms are susceptible to
various threats, including eavesdropping,
man-in-the-middle attacks, and data
breaches in post quantum era. Quantum
Key Distribution (QKD) offers an
unprecedented level of security by
distributing secure keys to two users over
quantum channel and these keys can be
used for encryption to achieve
unconditional/enhanced security.The
objective is to develop email client
application like Microsoft Outlook (can be
named as QuMail) which integrates
Quantum Key Distribution (QKD) service
with existing email protocols to enhance
the security of email communication while
maintaining compatibility with widely used
email servers (Gmail, yahoo mail etc).This
application interfaces with KM (Key
Manager) for getting the quantum keys
using APIs (illustrated below), with Email
servers through standard protocols to
utilize email service facility and with users
through GUI for capturing various user
inputs.Use case Scenario:Users (having
quantum keys access through the KM)
need to exchange email with attachment
over untrusted network (i.e. internet) and
existing email service providers (Gmail,
Yahoo mail etc). It is assumed that local
key managers at both ends have already
generated symmetrical quantum keys at
their ends. The participants may start with
a key bank of 100 keys, each of size 1Kb at
KMs.Features:•Implemented solutions
shall have good modularity to allow easy
upgradation•KM service and email service
login feature•Three level of security
configuration:▪Level 1- No Quantum
security▪Level 2- Quantum-aided AES: use
Quantum keys as seed for AESLevel 3-
Quantum Secure : use One Time Pad▪Any
other encryption may be given as
optionChallenges:Develop a robust
mechanism to seamlessly integrate QKD
technology into existing email
infrastructure. This includes using secure
key which is distributed using QKD, in
existing email communication for
encryption while maintaining
interoperability.An approach to this
problem can be Encryption at application
layer can be introduced in email client
which will use QKD key.Preferred OS:
WindowsNote: The participants can make
further assumptions regarding the
problem. The features listed here are
baseline and do not limit the scope of
application development.Illustration of
REST based API for key request and
delivery1.Email client requests local KM
(Key Manager) for quantum keys. Each
local KM has a QKD link with other
KM.2.Each email client will have a unique
ID.3.KM will authenticate each request and
identify the unique ID of the user trying to
access the application.4.KM will provide
Web API server functionality to deliver
keys to email client application via HTTPS
protocols.5.Email client will make HTTPS
requests with destination user unique ID
to KM to get keys.Example: Following
methods may be used by API:1.Get
Key2.Get Key with Key_ID
SIH1524 Domain Name Space Agriculture & Cyber Security DNS Filtering service helps blocks
Server (DNS) Technology Rural malicious domains and prevent malware
Filtering Service Development from communicating with Command-and-
using Threat control servers. It also aids in blocking
Intelligence feeds phishing attacks, playing a crucial role in
and AI/ML enhancing security and ensuring
Techniques appropriate content access. The solution
should provide a secure DNS resolver that
blocks resolution of malicious domain
names. It should be capable of detecting
and filtering malicious domains using
blacklists, threat intelligence feeds with
support for STIX/TAXII protocol, and
leveraging AL/ML for identifying malicious
domains generated using domain
generation algorithms or any other
techniques employed by botnets. The
solution should also be able to detect
attempts at DNS tunnelling employed by
malwares. It should allow the resolution of
non-malicious domain names while
blocking the resolution of malicious
domains. Furthermore, the solution should
support DNS over UDP, DNS over DTLS and
DNS over HTTPS for DNS resolution. It
should be scalable to handle a large
volume of DNS queries and maintain an
average DNS lookup time within 100
milliseconds. Additionally, the solution
should support DNS caching for faster
resolution. The solution should be capable
of conducting both active analysis of DNS
queries to filter malicious domains and
passive analysis of DNS data provided in
PCAP format or Zeek TSV format for the
detection of malicious domains. It should
also provide a web interface for
monitoring statistics on malicious domains
identified in DNS queries, as well as source
IP addresses that generated those queries.
SIH1525 Development of Space ICT, Cyber- Satellite 1. Classification & identification of audio,
software application Technology Physical Communication, video, data & protocol such as MPE, ULE,
for analysis and Systems, Networking SIP, RTP, FTP, SFTP, HTTP, HTTPS, SNMP,
processing of dvbs2 Blockchain, POP, SMTP, SSH etc.2. Classification
receiver output Cognitive Identification of encryption/scrambling if
stream i.e., raw BB Computing, present in stream through headers and SI
Frames, GSE and TS Cloud tables3. Extraction of VoIP calls, audio and
in near real time. Computing, AI video programs, file, email, web-page etc
& ML. in separate files.4. Decoding and playing
selected audio/video contentsPreferred
Language: Python, Lab-view, C/C++,
VHDL/VerilogExpected Outcome:
Algorithm/Software/GUIPreferred
Platform: Windows/Linux

You might also like