SlideShare a Scribd company logo
1 of 4
Download to read offline
BASIC DETAILS OF THE TEAM AND PROBLEM
STATEMENT
PSID: KVH-020
Problem Statement Title: Indigenous Crypto Currency Investigation Tool
Team Name: TECH SQUAD
Team Leader Name: NITESH P B
Institute Code (AISHE): 397
Institute Name: BANNARI AMMAN INSTITUTE OF TECHNOLOGY
IDEA/APPROACH DETAILS
1. Blockchain Explorer: A blockchain explorer that allows users to search through multiple
blockchain platforms to track and trace specific transactions, addresses, and blocks. This tool
can also provide detailed information about the origin, destination, and value of each
transaction.
2. Wallet Tracker: A tool that can track the movement of funds between different wallets and
identify any suspicious activity. This tool can also generate alerts when transactions are made to
known scam addresses or when funds are being transferred to a high-risk country.
3. Automated Risk Assessment: A tool that can automatically assess the risk level of specific
transactions and addresses based on factors such as volume, frequency, and destination. This
tool can provide a risk score for each transaction or address, which can help investigators
prioritize their efforts.
4. Smart Contract Analysis: A tool that can analyze smart contracts on various blockchain
platforms to identify potential vulnerabilities or security flaws. This tool can also be used to
review the code of smart contracts to ensure compliance with relevant regulations and
standards.
5. Pattern Recognition: A tool that can identify patterns in transaction data across multiple
blockchain platforms. This tool can help investigators identify potential money laundering or
other criminal activity by detecting unusual patterns of behavior.
6. User Identity Verification: A tool that can verify the identity of users on blockchain platforms
to ensure compliance with KYC (know your customer) and AML (anti-money laundering)
regulations. This tool can use biometric data or other forms of identity verification to ensure
that users are who they claim to be.
7. Machine Learning Algorithms: A tool that can use machine learning algorithms to analyze
transaction data and identify potential fraudulent activity. This tool can learn from past patterns
of behavior and use this knowledge to predict future behavior and identify high-risk
transactions.
Technology stack
1.Programming languages: Python, JavaScript, or
Solidity
2.Cryptography Libraries: OpenSSL or Nacl
3.Blockchain APIs: APIs such as Bitcoin, Ethereum,
or Ripple
4.Distributed databases: Apache Cassandra or
MongoDB
5.Machine learning frameworks: TensorFlow or
PyTorch
6.Web frameworks: Flask or Django
7.Cloud computing services: Amazon Web Services
(AWS) or Microsoft Azure
8.Security tools: Encryption, multi-factor
authentication, and secure coding practices
DETAILS
USE CASE DEPENDENCIES
1) PYTHON & JAVASCRIPT
2) OpenSSL or Nacl LIBRARIES
3) API’s (BITCOIN, ETHEREUM or
RIPPLE)
4) APPACHE CASSANDRA or MongoDB
5) TENSORFLOW or PYTORCH
6) FLASK or DJANGO
7) AWS or ASURE
TEAM MEMBER DETAILS
Sr. No. Name ofTeam Member Branch
(Btech/Mtech/P
hD etc):
Stream (ECE,
CSE etc):
Year Position in team
(Team Leader, Front end
Developer, Back end
Developer, Full Stack,
Data base management
etc.)
1 NITESH P B BE CSE II Team Leader(Full
stack developer)
2 BAWYAV BE ISE II Front end &
Back end developer
3 NIKITHA M BE ISE II Front end &
Back end developer
4 ARJUN SV BE CSE II Front end developer
5 KAVIYALAKSHMI S S BE ISE II Front end developer
6 VIKHASH J P BE CSE II Front end developer
Sr. No. Name of Mentor Category
(Academic/Industry):
Expertise
(AI/ML/Blockchain etc):
1 KARTHIGA M Academic DATA SCIENCE
Team Mentor Details

More Related Content

Similar to TECH SQUAD - KAVACH 23 - NITESH P B - NITESH P B.pdf

Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptxDomain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptxInfosectrain3
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...ShivamSharma909
 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +infosec train
 
What are the best tools used in cybersecurity in 2023.pdf
What are the best tools used in cybersecurity in 2023.pdfWhat are the best tools used in cybersecurity in 2023.pdf
What are the best tools used in cybersecurity in 2023.pdftsaaroacademy
 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsSolarWinds
 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsMichele Chubirka
 
The Impact and Potential of Blockchain on the Banking Sector
The Impact and Potential of Blockchain on the Banking SectorThe Impact and Potential of Blockchain on the Banking Sector
The Impact and Potential of Blockchain on the Banking SectorPECB
 
Uport a blockchain platform for self-sovereign identity
Uport   a blockchain platform for self-sovereign identityUport   a blockchain platform for self-sovereign identity
Uport a blockchain platform for self-sovereign identityIan Beckett
 
Block Chain Report By Abhishek Patel
Block Chain Report By Abhishek PatelBlock Chain Report By Abhishek Patel
Block Chain Report By Abhishek PatelAbhishek Patel
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
final presentation of md asif ali.pptx
final presentation of md asif ali.pptxfinal presentation of md asif ali.pptx
final presentation of md asif ali.pptxMDASIFALI19DEE8027
 
Cryptocurrency Investing & Storing for Beginners
Cryptocurrency Investing & Storing for BeginnersCryptocurrency Investing & Storing for Beginners
Cryptocurrency Investing & Storing for BeginnersDane Robinson
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
 
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Mike Schwartz
 
Introduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart ContractIntroduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart ContractThanh Nguyen
 

Similar to TECH SQUAD - KAVACH 23 - NITESH P B - NITESH P B.pdf (20)

Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptxDomain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
Domain 2 of CEH v11 Reconnaissance Techniques (21%).pptx
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +
 
CompTIA Security+
CompTIA Security+CompTIA Security+
CompTIA Security+
 
Module 2.pdf
Module 2.pdfModule 2.pdf
Module 2.pdf
 
Module 2.Cryptography and Cryptanalysis
Module 2.Cryptography and CryptanalysisModule 2.Cryptography and Cryptanalysis
Module 2.Cryptography and Cryptanalysis
 
What are the best tools used in cybersecurity in 2023.pdf
What are the best tools used in cybersecurity in 2023.pdfWhat are the best tools used in cybersecurity in 2023.pdf
What are the best tools used in cybersecurity in 2023.pdf
 
2 . web app s canners
2 . web app s canners2 . web app s canners
2 . web app s canners
 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security Tools
 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security Tools
 
The Impact and Potential of Blockchain on the Banking Sector
The Impact and Potential of Blockchain on the Banking SectorThe Impact and Potential of Blockchain on the Banking Sector
The Impact and Potential of Blockchain on the Banking Sector
 
Uport a blockchain platform for self-sovereign identity
Uport   a blockchain platform for self-sovereign identityUport   a blockchain platform for self-sovereign identity
Uport a blockchain platform for self-sovereign identity
 
Block Chain Report By Abhishek Patel
Block Chain Report By Abhishek PatelBlock Chain Report By Abhishek Patel
Block Chain Report By Abhishek Patel
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
final presentation of md asif ali.pptx
final presentation of md asif ali.pptxfinal presentation of md asif ali.pptx
final presentation of md asif ali.pptx
 
Satoshi's toolbox, condensed form
Satoshi's toolbox, condensed formSatoshi's toolbox, condensed form
Satoshi's toolbox, condensed form
 
Cryptocurrency Investing & Storing for Beginners
Cryptocurrency Investing & Storing for BeginnersCryptocurrency Investing & Storing for Beginners
Cryptocurrency Investing & Storing for Beginners
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
 
Introduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart ContractIntroduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart Contract
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

TECH SQUAD - KAVACH 23 - NITESH P B - NITESH P B.pdf

  • 1. BASIC DETAILS OF THE TEAM AND PROBLEM STATEMENT PSID: KVH-020 Problem Statement Title: Indigenous Crypto Currency Investigation Tool Team Name: TECH SQUAD Team Leader Name: NITESH P B Institute Code (AISHE): 397 Institute Name: BANNARI AMMAN INSTITUTE OF TECHNOLOGY
  • 2. IDEA/APPROACH DETAILS 1. Blockchain Explorer: A blockchain explorer that allows users to search through multiple blockchain platforms to track and trace specific transactions, addresses, and blocks. This tool can also provide detailed information about the origin, destination, and value of each transaction. 2. Wallet Tracker: A tool that can track the movement of funds between different wallets and identify any suspicious activity. This tool can also generate alerts when transactions are made to known scam addresses or when funds are being transferred to a high-risk country. 3. Automated Risk Assessment: A tool that can automatically assess the risk level of specific transactions and addresses based on factors such as volume, frequency, and destination. This tool can provide a risk score for each transaction or address, which can help investigators prioritize their efforts. 4. Smart Contract Analysis: A tool that can analyze smart contracts on various blockchain platforms to identify potential vulnerabilities or security flaws. This tool can also be used to review the code of smart contracts to ensure compliance with relevant regulations and standards. 5. Pattern Recognition: A tool that can identify patterns in transaction data across multiple blockchain platforms. This tool can help investigators identify potential money laundering or other criminal activity by detecting unusual patterns of behavior. 6. User Identity Verification: A tool that can verify the identity of users on blockchain platforms to ensure compliance with KYC (know your customer) and AML (anti-money laundering) regulations. This tool can use biometric data or other forms of identity verification to ensure that users are who they claim to be. 7. Machine Learning Algorithms: A tool that can use machine learning algorithms to analyze transaction data and identify potential fraudulent activity. This tool can learn from past patterns of behavior and use this knowledge to predict future behavior and identify high-risk transactions. Technology stack 1.Programming languages: Python, JavaScript, or Solidity 2.Cryptography Libraries: OpenSSL or Nacl 3.Blockchain APIs: APIs such as Bitcoin, Ethereum, or Ripple 4.Distributed databases: Apache Cassandra or MongoDB 5.Machine learning frameworks: TensorFlow or PyTorch 6.Web frameworks: Flask or Django 7.Cloud computing services: Amazon Web Services (AWS) or Microsoft Azure 8.Security tools: Encryption, multi-factor authentication, and secure coding practices
  • 3. DETAILS USE CASE DEPENDENCIES 1) PYTHON & JAVASCRIPT 2) OpenSSL or Nacl LIBRARIES 3) API’s (BITCOIN, ETHEREUM or RIPPLE) 4) APPACHE CASSANDRA or MongoDB 5) TENSORFLOW or PYTORCH 6) FLASK or DJANGO 7) AWS or ASURE
  • 4. TEAM MEMBER DETAILS Sr. No. Name ofTeam Member Branch (Btech/Mtech/P hD etc): Stream (ECE, CSE etc): Year Position in team (Team Leader, Front end Developer, Back end Developer, Full Stack, Data base management etc.) 1 NITESH P B BE CSE II Team Leader(Full stack developer) 2 BAWYAV BE ISE II Front end & Back end developer 3 NIKITHA M BE ISE II Front end & Back end developer 4 ARJUN SV BE CSE II Front end developer 5 KAVIYALAKSHMI S S BE ISE II Front end developer 6 VIKHASH J P BE CSE II Front end developer Sr. No. Name of Mentor Category (Academic/Industry): Expertise (AI/ML/Blockchain etc): 1 KARTHIGA M Academic DATA SCIENCE Team Mentor Details