ISSN : 2583-2646
1.
Enhanced Email Service with Real-Time Threat Detection
Prof.N.Kavitha, Balamurugan K, Manikandan U, Pravenkumar S, Sunil Shanmugha Priyan S
Download

Email is still a key part of digital communication for people and businesses all around the world. But at the same time, it has become a major way for cyber dangers to spread, such as phishing, virus distribution, and social engineering attacks.


2.
A Digital Marketplace for Farmers and Consumers
Dr.C. Senthamarai, Baladhinesh B, Divakar M, Senthilkumar M, Krishna Kumar K
Download

For all the farm-tech, Agdata and excitement around dapps, the world is still Agrarian Fuelled yet rarely is there a fair market price mechanism available to both producers & consumers; even when we see innovations in so many other core components that are needed to allow Rural people access beyond their own village.


3.
AI Mock Interview Chatbot using Generative AIProf. C.Sitrarasu, Dhanushraj M, Nivetha B, Pieo Antony J, Ragul A
Download

Generative AI (Gen AI) technology has come a long way in recent years, and AI-powered mock interview chatbots are one of the most exciting new tools for preparing for interviews. Getting enough people to do traditional mock interviews isn't always straightforward, and they can be inconsistent and hard to scale.


4.
AI-Driven Healthcare SystemsProf. X.Sangeetha, Brindha G,Fathima Rakshana B, Mohamed Idrees A, Nanthamanish M
Download

The use of artificial intelligence (AI) in healthcare systems has changed the way doctors diagnose and treat patients and manage their care. AI-powered solutions make it possible to find diseases more accurately, tailor medicine, use predictive analytics, and allocate resources more efficiently.


5.
AI-Based Recipe Generator Website: Harnessing Artificial Intelligence for Personalized Culinary Experiences
Prof. N.Sindhuja, Deepak M, Dharani S, Dhivakar M, Mohammed Taufik M
Download

Artificial intelligence is transforming a variety of different fields, and the mutual fund industry is a fantastic location for new technologies to thrive. Digital cookbooks that don't get fresh recipes are a major step back from websites that employ AI to produce recipes.


6.
Attribute-Based Encryption Reliable Outsourcing Decryption Prof. G.Kanimozhi, Dineshwar V, Kaviya P, Suriya Prakash R, Keerthana K
Download

Attribute-Based Encryption (ABE) is a more complex way of encrypting data that lets you restrict who can see it by encrypting it with a set of descriptive properties. Only users whose attributes match those in the access policy that is hidden in the ciphertext can decode the data.


7.
Blockchain-Based Online C rime Complaints SystemProf.U.Ranjani, Kabilan Inambu, Mugesh R, Panneerselvam K, Vaseeharan V
Download

Many professions, including law enforcement, are looking into blockchain technology because there is a growing demand for public services to have digital infrastructure that is safe, clear, and can't be changed. Internet crime reporting systems that have been around for a while include issues such data tampering, lack of openness, limited traceability, and public distrust.


8.
Car Rental Booking System C.Varshini, Ayaz Ahmad S, Mohamed Harise H, Salamudhin A, Satheesh Kumar R
Download

The Car Rental Booking System is a powerful online car rental management system designed to meet the specific and particular requirements of all types of business enterprises supplying leased cars. Historically the car rental automotive market has come under significant pressure this century to deliver increasingly fast, transparent and reliable services as tourism, business travel and urban transportation have all expanded.


9.
Data Security in Communication Using Blockchain and Key Based ProtocolsProf. M.Jaya, Sripathi P, Sridhar M
Download

As digital communication has expanded a lot, making sure that the information sent is safe, correct, and real has become a highly essential concern. Some of the challenges that traditional communication systems have to contend with are central points of failure, poor key management, and the possibility of interception and tampering.


10.
Distributed Denial of Services (DDoS) Attack Prediction System
Prof.C. Chitra, Mohamed Yusuf M, Nagarjun B N, Pazhani Bharathi S, Saravana Kumar M
Download

Distributed Denial of Services (DDoS) assaults are some of the most dangerous and disruptive threats to online safety. These attacks send a lot of bogus traffic to internet services from a number of different areas in an effort to render them unavailable.


11.
Dress Selection and Skintone Matching Tool Dr. T.Brindha, Aiswarya Lakshmi K, Dhayananth M, Gomathi K, Athishree K
Download

As humans how we dress and mix colors together is a great factor in our style this can really determine ow attractive we will be seen and lastly the confidence will come into play. Still, most people struggle to identify what color suit they have and their skin feel resting on a hunch or vague premise.


12.
Explainable AI Application in Cyber SecurityS.Abdul Khader, A.Sneha, Abinaya M, Karkuzhali K, Monika M, Pradeepa G
Download

Increased severity and complexity of cyber attacks led to the use of Artificial Intelligence (AI) and Machine Learning (ML) in contemporary cyber security. Intelligent machines are capable of detecting anomalies, detecting intrusions, and eliminating threats in real time.


13.
Smart Healthcare Appointment Booking SystemD.Sumathi, Abishek G, Ajith R, Jaasim J, Jeeva Arun Kumar R
Download

As a result, the growing demand for timely healthcare services has drawn attention towards severe under performance in traditional appointment scheduling systems, which are inherently flawed with long patient wait times, high no-show rates, poor access rates and low clinic resource utilization.


14.
Smart Online Voting System Using Blockchain TechnologyD.Saranya, Baskar T, jayaprakash C, Harishbhavaran R, Pavithra P
Download

Making voting processes digital has both good and bad points. People are often worried about fraud, manipulation, and poor voter turnout when they use traditional voting methods since they aren't always clear, safe, or trustworthy. Blockchain technology is a great alternative for online voting systems that are safe, open, and can be checked because it is decentralized and shows when someone tries to change it.