VOLUME 1

IJETEV1I1A001 - E-MEDICARE REVOLUTIONIZING HEALTHCARE DELIVERY WITH AI-DRIVEN SOLUTIONS

AUTHORS : Mrs. R. Arthi M.E, Manoj V, Dinesh D, Tejesh Reddy M

ABSTRACT – Artificial intelligence is revolutionizing healthcare, and EmAI is leading the way with smart, AI-driven solutions. Our platform, E-Medicare, enhances healthcare accessibility and efficiency by offering features like an Emergency Alert System, Quick Medicine Finder, AI-powered appointment scheduling, real-time monitoring, and personalized treatment plans. With a focus on secure medical records, user friendly interfaces, and seamless provider collaboration, EmAI creates a more connected and patient-centric healthcare experience. By bridging gaps in medical services, the platform ensures timely interventions, better resource management, and improved patient outcomes. In this presentation, we’ll explore how EmAI is redefining digital healthcare, its cutting-edge technology, and its real-world impact in making medical services more efficient, accessible, and holistic.

IJETEV1I1A002 - BLOSTERING WEB SECURITY BY INTEGRATING FRAMEWORKS TO DETECT SQL INJECTION AND XSS VULNERABILITIES

AUTHORS : G. Sivakumar,  Arthi M.E, Sahasra S, Gowtham Siddarth N

ABSTRACT – With the increasing number of web applications, cyber threats such as SQL Injection (SQLi) and Cross-Site Scripting (XSS) have become more prevalent. This paper presents a framework for bolstering web security by integrating multiple detection mechanisms for SQLi and XSS vulnerabilities. The system combines automated scanning techniques with penetration testing tools such as SQLMap for SQL Injection and script-based analysis for XSS detection. The proposed framework enhances web security by assisting security professionals in identifying vulnerabilities and mitigating potential threats before exploitation occurs. The findings emphasize the importance of proactive security assessment in modern web applications. Additionally, this research explores novel techniques in heuristic analysis, machine learning-based anomaly detection, an

IJETEV1I1A003 -  ANDROID HACKING AND EXPLOITATION USING KALI LINUX : A CYBER FORENSIC ANALYSIS OF VULNERABIILTIES AND MITIGATION

AUTHORS : G.Vishvanath Sundharam, Sudhakaran S, Vijayasarathi S,  James Godwin G.

ABSTRACT – IT security is a paramount concern in today’s internet landscape due to the prevalence of communication activities. Testing for personal data theft using social engineering methods aims to identify potential security vulnerabilities in the system and network of a user’s Android device. These vulnerabilities could be exploited by hackers if users are unaware of social engineering tactics, allowing for data theft through the use of a Remote Administration Tool (RAT) inadvertently downloaded onto the Android device. The deployment of a RAT via social engineering represents a viable and effective method for compromising the privacy of Android users. This study provides an overview of fundamental concepts related to data theft, ranging from recent call and personal data breaches to the remote manipulation of Android users’ cameras and microphones. users no longer need to install additional tools manually. Apart from that, Kali Linux also has an intuitive user interface so that users can efficiently operate the system and the tools provided. Another advantage is modifying and customizing the tools according to user needs through manual configuration or built-in features such as meta packages. Thus, Kali Linux is one of the right choices for android hacking practitioners in conducting security testing on the Android system.

Cart