Spearheaded programming and analytics efforts for 'Color Quest,' an indie 2D platformer game inspired by Super Mario Bros. with a unique color-changing twist - Link. • Developed key C# scripts using Unity 2D, including mechanics for color-changing player and platforms, super power timer countdown bar, jump mechanics, coin and collectible collection, and collision detection for spikes and moving objects, etc. • This role involved leading the technical development of gameplay features within Unity 2D, ensuring smooth mechanics and optimizing player experience through analytics-driven enhancements.
Developed the BattleBuddy application using Unity 3D for iOS app development, developing a custom C# script for implementing long-press functionality and drag-and-drop features for game objects. • Created a 'Favorite Photo' module enabling users to select and view favorite photos within the app. • Assisted in documentation review and enhancement, engaged in interdisciplinary research on virtual humans' impact on mental and emotional well-being.
Led a team of 6 in developing a Python web scraping program to extract research data from Google Scholar by professors, resulting in a comprehensive database accessible to students and faculty. • Implemented agile software development methodologies for efficient project management, overseeing data analysis and visualization to provide actionable insights for public policy and business strategies.
Developed a real-time motion detection system using Python and OpenCV to monitor and detect unusual activities captured by a camera feed. • Implemented algorithms for motion detection and object tracking, enabling the system to identify and track moving objects within the camera's field of view.
SQL injection is the most common web application vulnerability. This vulnerability can be generated unintentionally by software developers during the development phase. Thus, a tool to prevent SQLi Attack to improve the security of the website needs to be implemented.
We have implemented and improvised a rudimentary yet efficient solution by using the cosine similarity model to extract similar images for the given input image from the user. The model used is explained comprehensively together with visual representations. We have also explored multiple use cases that can be used as commercial products. The resulting web application can be utilised to act as a reverse image search engine as a standalone application or can be embedded as a sub-module in a larger application.
A Machine Learning model that predicts the marks obtained by a student in their final semester via regression methodology. It is important to find patterns in the student performance to be able to provide the necessary, accurate and timely diagnosis to the student. It also serves as a basic criterion for institutions to monitor the quality of education provided. The model considers factors such as previous academic record, attendance, socioeconomic background, etc.
A note-taking application using the latest cloud technologies. We solve the problem of slow speed, memory extensive and high cost of allocating resources, even in the cloud by implementing it with asynchronous functions with the concepts of async, await & Promise in TypeScript - React. And, to make it cost-efficient, we make use of serverless technologies
A Java-based Project for managing day-to-day expenses, allowing the user to keep a track of his/her debited & credited amounts on a daily, monthly, or even yearly basis. Also, to notify user if he/she crosses a threshold amount and thus helping them in maintaining their balance and expenses within set boundaries.
The SQL Injection vulnerability can either be unintentional by software developers or an intentional ploy employed by a hacker with malicious intent to exploit sensitive data. With the recent surge in information, there is an innate quest to safeguard this information from falling into the wrong hand leading to data theft, leak of personal data or loss of property. With relational databases like MySQL being the most popular, it allows users to extract any available information without any significant knowledge of databases. With vast information stored in databases warrants attacker’s attention, potentially risking critical confidential information. The premature detection of SQL Injection Attacks will be very helpful in preventing any malicious attempt by an attacker. In this research, we analyze the results of Reinforcement Learning algorithms like Q-Learning on a dataset consisting of potential SQL Injection queries. We intend to provide a Reinforcement Learning solution to minimise the potential threat posed by SQL Injection and give apriori to the model to learn to detect a SQL attack and prevent any unforeseen mishap more quickly and accurately.
An SQL Injection attack is a database focused attack for programmers that utilise data. It is accomplished by inserting malicious lines of code into the SQL query to alter and modify its meaning, allowing the attacker to gain access to the database or retrieve sensitive data. Many strategies for detecting and preventing such assaults have been developed and suggested. This study provides an in depth examination of 38 publications on approaches for detecting SQL Injection in web applications. This offers a foundation for designing and using efficient SQL Injection, detection and prevention techniques.
A Research Paper written on 'Reverse Image Quering using Cosine Similarity Model' published in a reputed international journal. We have implemented and improvised a rudimentary yet efficient solution by using the cosine similarity model to extract similar images for the given input image from the user.
Feel free to contact me either on the following phone number or email address.