0% found this document useful (0 votes)
17 views3 pages

Hackathoneepproppejsb

The document outlines problem statements for a hackathon, encouraging participants to utilize various technologies to develop innovative solutions for real-world issues. It includes specific problem statements related to logistics, manufacturing downtime, digital trust, supply chain traceability, job screening, and national web infrastructure security. Participants are provided with guidelines for submitting their presentations, including required content and format.

Uploaded by

fn228f65px
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views3 pages

Hackathoneepproppejsb

The document outlines problem statements for a hackathon, encouraging participants to utilize various technologies to develop innovative solutions for real-world issues. It includes specific problem statements related to logistics, manufacturing downtime, digital trust, supply chain traceability, job screening, and national web infrastructure security. Participants are provided with guidelines for submitting their presentations, including required content and format.

Uploaded by

fn228f65px
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

ROUND 1 - PROBLEM STATEMENTS

Participants are encouraged to leverage any technology—whether it's artificial intelligence,


blockchain, cybersecurity, data analytics, or others—to develop their solutions. There are no
restrictions on the tools or platforms used, as long as the approach is innovative, addresses
the core problem effectively, and demonstrates practical feasibility for real-world
implementation.

PPT GUIDELINES:
Submit the PPT in PDF Format.
Page 1: Introduction

Page 2: Problem overview (Mention PS ID)

Page 3: Solution overview


Page 4: Technical deep dive

Page 5: Implementation details

Page 6: Feasibility analysis

Page 7: Team members (Also mention LinkedIN Id’s)

PS Title Description
ID
R1-01 Inventory A national logistics company operating multiple warehouses
Misalignment in across regions often experiences inventory discrepancies,
Multi-Warehouse leading to overstock in some locations and stockouts in others.
Logistics Despite using ERP systems, issues persist due to inaccurate
demand forecasting, inefficient inter-warehouse transfer
coordination, and a lack of real-time visibility. How can this
imbalance be addressed while keeping operational costs low?
R1-02 Unplanned Manufacturing SMEs often suffer unplanned machine
Downtime in downtime, leading to production delays and increased
Mid-Sized maintenance costs. These units usually lack advanced
Manufacturing monitoring systems and operate with minimal digital
Units infrastructure. What kind of system or process can help these
facilities anticipate failures and schedule maintenance
proactively?

R1-03 Digital Trust Online users frequently share personal data across apps, sites,
Without Digital and services without knowing how it's stored, shared, or used.
Clutter Most don’t read privacy policies or understand consent
frameworks. Meanwhile, developers build authentication
systems, yet ignore transparency or user control. Developers
focus on login systems but overlook transparency and user
autonomy. What kind of solution can empower users to take
control of their digital identity and data relationships, while
being easy for developers to integrate? You might build a
digital-passport, or an extension, or a dashboard, or maybe a
plug-and-play API! The innovation is yours…

R1-04 Trust Gaps in In global supply chains—especially for products like


Supply Chain pharmaceuticals, luxury goods, or perishables—tracking the
Traceability origin and movement of goods is difficult, often relying on
siloed, error-prone records. This creates vulnerabilities to
fraud, counterfeiting, and regulatory non-compliance. There’s
a growing demand for systems that offer traceability, integrity,
and transparency across multiple parties without relying on
centralized control. Participants can explore solutions for
ledger system, authenticity, or even sharing layer!

R1-05 Enhancing Job The recruitment process often involves manually reviewing
Screening numerous job descriptions (JDs) and CVs, which can be time-
consuming and prone to human error. The goal of this
hackathon is to develop a multi-agentic Al system that can
automatically read and summarize job descriptions (JDs),
match candidate qualifications with the JD, shortlist
candidates, and send interview requests based on the match.
Participants are expected to make a multiagent framework.
R1-06 Defending Government websites, financial portals, and public service
National Web platforms are frequently targeted by coordinated cyberattacks
Infrastructure such as DDoS, defacement, or data exfiltration—especially
from Targeted during geopolitical tensions. These attacks can disrupt critical
Attacks services, erode public trust, and compromise sensitive data.
Many institutions still rely on outdated security infrastructure
and lack proactive detection or rapid mitigation capabilities.
Participants are challenged to build solutions that detect and
block unusual traffic patterns, trace the origin of suspicious
requests without violating privacy, or create real-time
dashboards for monitoring and responding to infrastructure-
level threats. The solution should be lightweight, scalable, and
adaptable to different types of public-facing web applications.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy