Relevant Coursework : Advanced Topics in Web Programming, Advanced Information Security, Advanced Software Engineering,Topics in Data Science.
I have worked on dozens of projects so I have picked only the latest for you.
This is Small web based application developed using HTML5,Twiter Bootstrap, Servlets.
Application allows the users to enter the code snippets of any programming language that they knows and helps other individual like me when they face hard time doing programming. Currently, I am working on this application to make it more secure by authenicating the users and few new features related to users privacy using Spring Framework in java.
This is Single page Marvel web application developed using node.js,express and VUE.js for the front-end. This application uses the Marvel API for fetching the dynamic data from the marvel website. The data was then customize accordingly and then display the data renders from the API to front-end using VUE.JS
The task is to perdict the sales in the stores of Ecudorian supermarket chain so that they can avoid over stocking, which would reduce waste and loss of food in the supermarket.
The machine learning model that we developed also helps in minizing the understocking which induces opportunity cost and lower customer satisfication.
This is group project during my graduate course of Introduction Data Science class at California State University, Los Angeles.
Malicious web sites largely promote the growth of cybercrimes and constrains the development of web services. As, result there has been strong motivation to develop system solution that prevents the users from visiting such malicious websites.
We propose a learning-based approach to classify the websites into two categories Benign or Malicious. The objective of this project is to evaluate the web sites as malicious or Benign based on application and network characteristics.
A clever implementation can actually hide the mess of encryption, decryption and key exchange protocol entirely. As far as the server is concerned, it only wants to know if the client is authorized and receive and send data in clear-text even though the actual bytes on the network are encrypted. As far as the client is concerned, it only wants to know that it is connected to the real server and also wants to exchange data in clear-text even though the physical bytes transmitted are encrypted.
The application to demonstrate work is very simple. The Client opens a connection to the Server. The handshake takes place, then the client sends data read from the keyboard and sends it encrypted to the server. The server examines the data and re-sends it encrypted to the client, but slightly modified: all upper case characters are converted to lower case, and all lower case characters are converted to upper case. Store the keys, the user info and the users profile in files.