About Me
.Determined, innovative seeking for a position as a software engineer where I can constantly learn and contribute with my skills and knowledge towards the prosperity of the organisation and build self – esteem.
... Show MoreSkills
Data & Analytics
Others
Programming Language
Web Development
Development Tools
Software Engineering
Operating System
Graphic Design
Database
Portfolio Projects
Company
Alternate Path Reconstruction to Circumvent Malicious Attacker with IP Traceback
Description
Due to increasing threats in the internet circumventing these attackers is the best choice instead of taking measures after getting attacked. To circumvent the attackers, we have to find from where the attack is happening and after locating the attack we evade it by taking another available path even if it is not the shortest path. With the available technology, it is easy to spoof the source IP addresses. To locate the attacker, we use advanced techniques in IP Traceback like DPM, PPM, IP Logging etc. During the traceback process, routers are queried in the reverse-path flooding (RPF) manner and the digest tables at queried routers are examined to reconstruct the network path.
Show More Show LessSkills
Java (All Versions)Tools
EclipseCompany
Rule Power Factor: A New Interest Measure in Associative Classification - Implementation
Description
Rule Power Factor: A New Interest Measure in Associative Classification is a new interest measure proposed by Ochin, Suresh Kumar, Nisheeth Joshic in the paper "Procedia Computer Science 93 ( 2016 ) 12 – 18"
This tool after processing the dataset, the minor generates the associative classification rules and the Rule Power Factor calculates the interestingness of the rule. This Rule Power Factor Interest measure finds the valued interesting rules which are useful to the user in effective decision making even in an exceptional set of circumstances.
Java programming is used to build this tool using Linked list, Set, HashSet, ArrayList, Java.io etc.
Skills
Java (All Versions)Tools
EclipseCompany
Cows and Bulls Game
Description
description
A person thinks of any isogram word and gives out the number of letters in the word. The computer tries to figure that word by guessing isogram words containing the same number of letters. The person responds with the number of Cows & Bulls for each guessed word. "Cow" means a letter in the wrong position, while "Bull" means a letter in the right position.
It is done in JAVA Programming.
Skills
Java (All Versions)Tools
EclipseCompany
Encryption tool using Symmetric-key Cryptographic Algorithms in C Language
Description
Encrypts and Decrypts text and also brute forces to find the key.
Cryptographic algorithms of the medieval period(Ceaser, Multi, Vigenere, Substitution etc. including brute-force decryptor) are implemented in C language without using ASCII values such that the program can encrypt or decrypt the entire file into Ciphertext or Plaintext.
Skills
C LanguageTools
VSCode