ENGINEERING

sample

IJETEV1I2A001 – ART INTEGRATION- A CROSS-CULTURAL APPROACH TO TEACHING AND LEARNING IN THE TWENTY FIRST CENTURY  AUTHORS : Dr.Biju.G ABSTRACT – Integration of art is an innovative teaching learning approach through which the concepts can be taught and evaluated equitably in and through art. Due to the variety of implementation methods, arts integration is complicated. There is […]
Read more

IJETEV1I2A001 – ART INTEGRATION- A CROSS-CULTURAL APPROACH TO TEACHING AND LEARNING IN THE TWENTY FIRST CENTURY

IJETEV1I2A001 – ART INTEGRATION- A CROSS-CULTURAL APPROACH TO TEACHING AND LEARNING IN THE TWENTY FIRST CENTURY  AUTHORS : Dr.Biju.G ABSTRACT – Integration of art is an innovative teaching learning approach through which the concepts can be taught and evaluated equitably in and through art. Due to the variety of implementation methods, arts integration is complicated. There is […]
Read more

ART INTEGRATION- A CROSS-CULTURAL APPROACH TO TEACHINGAND LEARNING IN THETWENTY FIRST CENTURY

IJETEV1I2A001 – ART INTEGRATION- A CROSS-CULTURAL APPROACH TO TEACHING AND LEARNING IN THETWENTY FIRST CENTURY AUTHORS : Dr. Biju.G ABSTRACT – Integration of art is an innovative teaching learning approach through which the concepts can be taught and evaluated equitably in and through art. Due to the variety of implementation methods, arts integration is complicated. There is no one […]
Read more

IJETEV1I1A003 – ANDROID HACKING AND EXPLOITATIONUSING KALI LINUX : A CYBER FORENSIC ANALYSIS OFVULNERABIILTIES AND MITIGATION

IJETEV1I1A003 –  ANDROID HACKING AND EXPLOITATION USING KALI LINUX : A CYBER FORENSIC ANALYSIS OF VULNERABIILTIES AND MITIGATION AUTHORS : G.Vishvanath Sundharam, Sudhakaran S, Vijayasarathi S,  James Godwin G. ABSTRACT – IT security is a paramount concern in today’s internet landscape due to the prevalence of communication activities. Testing for personal data theft using social engineering […]
Read more

IJETEV1I1A002 – BLOSTERING WEB SECURITY BY INTEGRATING FRAMEWORKS TO DETECT SQL INJECTION AND XSS VULNERABILITIES

IJETEV1I1A002 – BLOSTERING WEB SECURITY BY INTEGRATING FRAMEWORKS TO DETECT SQL INJECTION AND XSS VULNERABILITIES AUTHORS :  G. Sivakumar,  Arthi M.E, Sahasra S, Gowtham Siddarth N ABSTRACT – With the increasing number of web applications, cyber threats such as SQL Injection (SQLi) and Cross-Site Scripting (XSS) have become more prevalent. This paper presents a framework for […]
Read more

IJETEV1I1A001 – E-MEDICARE REVOLUTIONIZING HEALTHCAREDELIVERY WITH AI-DRIVEN SOLUTIONS

IJETEV1I1A001 – E-MEDICARE REVOLUTIONIZING HEALTHCARE DELIVERY WITH AI-DRIVEN SOLUTIONS AUTHORS : Mrs. R. Arthi M.E, Manoj V, Dinesh D, Tejesh Reddy M ABSTRACT – Artificial intelligence is revolutionizing healthcare, and EmAI is leading the way with smart, AI-driven solutions. Our platform, E-Medicare, enhances healthcare accessibility and efficiency by offering features like an Emergency Alert System, […]
Read more
Cart