Email is still a key part of digital communication for people and businesses all around the world. But at the same time, it has become a major way for cyber dangers to spread, such as phishing, virus distribution, and social engineering attacks.
2.
A Digital Marketplace for Farmers and Consumers Dr.C. Senthamarai, Baladhinesh B, Divakar M, Senthilkumar M, Krishna Kumar K
For all the farm-tech, Agdata and excitement around dapps, the world is still Agrarian Fuelled yet rarely is there a fair market price mechanism available to both producers & consumers; even when we see innovations in so many other core components that are needed to allow Rural people access beyond their own village.
3.
AI Mock Interview Chatbot using Generative AIProf. C.Sitrarasu, Dhanushraj M, Nivetha B, Pieo Antony J, Ragul A
Generative AI (Gen AI) technology has come a long way in recent years, and AI-powered mock interview chatbots are one of the most exciting new tools for preparing for interviews. Getting enough people to do traditional mock interviews isn't always straightforward, and they can be inconsistent and hard to scale.
4.
AI-Driven Healthcare SystemsProf. X.Sangeetha, Brindha G,Fathima Rakshana B, Mohamed Idrees A, Nanthamanish M
The use of artificial intelligence (AI) in healthcare systems has changed the way doctors diagnose and treat patients and manage their care. AI-powered solutions make it possible to find diseases more accurately, tailor medicine, use predictive analytics, and allocate resources more efficiently.
5.
AI-Based Recipe Generator Website: Harnessing Artificial Intelligence for Personalized Culinary Experiences Prof. N.Sindhuja, Deepak M, Dharani S, Dhivakar M, Mohammed Taufik M
Artificial intelligence is transforming a variety of different fields, and the mutual fund industry is a fantastic location for new technologies to thrive. Digital cookbooks that don't get fresh recipes are a major step back from websites that employ AI to produce recipes.
6.
Attribute-Based Encryption Reliable Outsourcing Decryption Prof. G.Kanimozhi, Dineshwar V, Kaviya P, Suriya Prakash R, Keerthana K
Attribute-Based Encryption (ABE) is a more complex way of encrypting data that lets you restrict who can see it by encrypting it with a set of descriptive properties. Only users whose attributes match those in the access policy that is hidden in the ciphertext can decode the data.
7.
Blockchain-Based Online C rime Complaints SystemProf.U.Ranjani, Kabilan Inambu, Mugesh R, Panneerselvam K, Vaseeharan V
Many professions, including law enforcement, are looking into blockchain technology because there is a growing demand for public services to have digital infrastructure that is safe, clear, and can't be changed. Internet crime reporting systems that have been around for a while include issues such data tampering, lack of openness, limited traceability, and public distrust.
8.
Car Rental Booking System C.Varshini, Ayaz Ahmad S, Mohamed Harise H, Salamudhin A, Satheesh Kumar R
The Car Rental Booking System is a powerful online car rental management system designed to meet the specific and particular requirements of all types of business enterprises supplying leased cars. Historically the car rental automotive market has come under significant pressure this century to deliver increasingly fast, transparent and reliable services as tourism, business travel and urban transportation have all expanded.
9.
Data Security in Communication Using Blockchain and Key Based ProtocolsProf. M.Jaya, Sripathi P, Sridhar M
As digital communication has expanded a lot, making sure that the information sent is safe, correct, and real has become a highly essential concern. Some of the challenges that traditional communication systems have to contend with are central points of failure, poor key management, and the possibility of interception and tampering.
10.
Distributed Denial of Services (DDoS) Attack Prediction System Prof.C. Chitra, Mohamed Yusuf M, Nagarjun B N, Pazhani Bharathi S, Saravana Kumar M
Distributed Denial of Services (DDoS) assaults are some of the most dangerous and disruptive threats to online safety. These attacks send a lot of bogus traffic to internet services from a number of different areas in an effort to render them unavailable.
11.
Dress Selection and Skintone Matching Tool Dr. T.Brindha, Aiswarya Lakshmi K, Dhayananth M, Gomathi K, Athishree K
As humans how we dress and mix colors together is a great factor in our style this can really determine ow attractive we will be seen and lastly the confidence will come into play. Still, most people struggle to identify what color suit they have and their skin feel resting on a hunch or vague premise.
12.
Explainable AI Application in Cyber SecurityS.Abdul Khader, A.Sneha, Abinaya M, Karkuzhali K, Monika M, Pradeepa G
Increased severity and complexity of cyber attacks led to the use of Artificial Intelligence (AI) and Machine Learning (ML) in contemporary cyber security. Intelligent machines are capable of detecting anomalies, detecting intrusions, and eliminating threats in real time.
As a result, the growing demand for timely healthcare services has drawn attention towards severe under performance in traditional appointment scheduling systems, which are inherently flawed with long patient wait times, high no-show rates, poor access rates and low clinic resource utilization.
14.
Smart Online Voting System Using Blockchain TechnologyD.Saranya, Baskar T, jayaprakash C, Harishbhavaran R, Pavithra P
Making voting processes digital has both good and bad points. People are often worried about fraud, manipulation, and poor voter turnout when they use traditional voting methods since they aren't always clear, safe, or trustworthy. Blockchain technology is a great alternative for online voting systems that are safe, open, and can be checked because it is decentralized and shows when someone tries to change it.
Enhanced Email Service with Real-Time Threat Detection
Prof.N.Kavitha, Balamurugan K, Manikandan U, Pravenkumar S, Sunil Shanmugha Priyan S
Download
Email is still a key part of digital communication for people and businesses all around the world. But at the same time, it has become a major way for cyber dangers to spread, such as phishing, virus distribution, and social engineering attacks.
A Digital Marketplace for Farmers and Consumers
Dr.C. Senthamarai, Baladhinesh B, Divakar M, Senthilkumar M, Krishna Kumar K
Download
For all the farm-tech, Agdata and excitement around dapps, the world is still Agrarian Fuelled yet rarely is there a fair market price mechanism available to both producers & consumers; even when we see innovations in so many other core components that are needed to allow Rural people access beyond their own village.
AI Mock Interview Chatbot using Generative AIProf. C.Sitrarasu, Dhanushraj M, Nivetha B, Pieo Antony J, Ragul A
Download
Generative AI (Gen AI) technology has come a long way in recent years, and AI-powered mock interview chatbots are one of the most exciting new tools for preparing for interviews. Getting enough people to do traditional mock interviews isn't always straightforward, and they can be inconsistent and hard to scale.
AI-Driven Healthcare SystemsProf. X.Sangeetha, Brindha G,Fathima Rakshana B, Mohamed Idrees A, Nanthamanish M
Download
The use of artificial intelligence (AI) in healthcare systems has changed the way doctors diagnose and treat patients and manage their care. AI-powered solutions make it possible to find diseases more accurately, tailor medicine, use predictive analytics, and allocate resources more efficiently.
AI-Based Recipe Generator Website: Harnessing Artificial Intelligence for Personalized Culinary Experiences
Prof. N.Sindhuja, Deepak M, Dharani S, Dhivakar M, Mohammed Taufik M
Download
Artificial intelligence is transforming a variety of different fields, and the mutual fund industry is a fantastic location for new technologies to thrive. Digital cookbooks that don't get fresh recipes are a major step back from websites that employ AI to produce recipes.
Attribute-Based Encryption Reliable Outsourcing Decryption Prof. G.Kanimozhi, Dineshwar V, Kaviya P, Suriya Prakash R, Keerthana K
Download
Attribute-Based Encryption (ABE) is a more complex way of encrypting data that lets you restrict who can see it by encrypting it with a set of descriptive properties. Only users whose attributes match those in the access policy that is hidden in the ciphertext can decode the data.
Blockchain-Based Online C rime Complaints SystemProf.U.Ranjani, Kabilan Inambu, Mugesh R, Panneerselvam K, Vaseeharan V
Download
Many professions, including law enforcement, are looking into blockchain technology because there is a growing demand for public services to have digital infrastructure that is safe, clear, and can't be changed. Internet crime reporting systems that have been around for a while include issues such data tampering, lack of openness, limited traceability, and public distrust.
Car Rental Booking System C.Varshini, Ayaz Ahmad S, Mohamed Harise H, Salamudhin A, Satheesh Kumar R
Download
The Car Rental Booking System is a powerful online car rental management system designed to meet the specific and particular requirements of all types of business enterprises supplying leased cars. Historically the car rental automotive market has come under significant pressure this century to deliver increasingly fast, transparent and reliable services as tourism, business travel and urban transportation have all expanded.
Data Security in Communication Using Blockchain and Key Based ProtocolsProf. M.Jaya, Sripathi P, Sridhar M
Download
As digital communication has expanded a lot, making sure that the information sent is safe, correct, and real has become a highly essential concern. Some of the challenges that traditional communication systems have to contend with are central points of failure, poor key management, and the possibility of interception and tampering.
Distributed Denial of Services (DDoS) Attack Prediction System
Prof.C. Chitra, Mohamed Yusuf M, Nagarjun B N, Pazhani Bharathi S, Saravana Kumar M
Download
Distributed Denial of Services (DDoS) assaults are some of the most dangerous and disruptive threats to online safety. These attacks send a lot of bogus traffic to internet services from a number of different areas in an effort to render them unavailable.
Dress Selection and Skintone Matching Tool Dr. T.Brindha, Aiswarya Lakshmi K, Dhayananth M, Gomathi K, Athishree K
Download
As humans how we dress and mix colors together is a great factor in our style this can really determine ow attractive we will be seen and lastly the confidence will come into play. Still, most people struggle to identify what color suit they have and their skin feel resting on a hunch or vague premise.
Explainable AI Application in Cyber SecurityS.Abdul Khader, A.Sneha, Abinaya M, Karkuzhali K, Monika M, Pradeepa G
Download
Increased severity and complexity of cyber attacks led to the use of Artificial Intelligence (AI) and Machine Learning (ML) in contemporary cyber security. Intelligent machines are capable of detecting anomalies, detecting intrusions, and eliminating threats in real time.
Smart Healthcare Appointment Booking SystemD.Sumathi, Abishek G, Ajith R, Jaasim J, Jeeva Arun Kumar R
Download
As a result, the growing demand for timely healthcare services has drawn attention towards severe under performance in traditional appointment scheduling systems, which are inherently flawed with long patient wait times, high no-show rates, poor access rates and low clinic resource utilization.
Smart Online Voting System Using Blockchain TechnologyD.Saranya, Baskar T, jayaprakash C, Harishbhavaran R, Pavithra P
Download
Making voting processes digital has both good and bad points. People are often worried about fraud, manipulation, and poor voter turnout when they use traditional voting methods since they aren't always clear, safe, or trustworthy. Blockchain technology is a great alternative for online voting systems that are safe, open, and can be checked because it is decentralized and shows when someone tries to change it.