Help
Home
Search the Forum
You are Here :
Forum
Jobs
Computer Software / Telecom
Core java professionals : Bangalore
Ask Question / Post resume
Post a reply to the thread:
Core java professionals : Bangalore
Your Message
Your Username:
Click here to log in
Notes:-
1) You can copy and paste your full resume in the box below.
2) Or you can ask your question. We try to answer, as far as possible.
Title:
[QUOTE=Guest;138626]CURRICULUM VITAE [b]Ch.Srilakshmi Email id [/b]:srilakshmi.ch552 AT gmail.com. [b]Objective [/b]: To be associated with a progressive organization that gives me the scope to apply my knowledge and skills and involve myself as a part of the team that dynamically works towards the growth of the organization. [b]Academics [/b]: Course University/Board Of Examination Year of course Percentage MTech Vignan University 2011 75%(upto date) B.Tech (C.S.E) JNTU university 2008 57.34% Inter Board of Technical Education, A.P. 2003 81.0% S.S.C Board Of Secondary Education, A.P. 2001 76.33% [b]Software Exposures [/b]: [b]Programming Languages [/b]: C,C++,JSE,c#.net,asp.net [b]Operating Systems [/b]: Windows 98 / XP . [b]Database [/b]: SQL Server. [b]PROJECT PROFILE [/b]: B-Tech [b]Project Title [/b]: ACCESS Remote Database. [b]Platform [/b]: .net. [b]Database [/b]: SQL server. [b]Description [/b]: Access RD facilitates the Accessing Database Remotely with security in OTS. [b]Our project includes three major modules namely [/b]: 1. Connection Establishment. 2. Database Objects. 3. Security and Maintenance. Connection Establishment phase is used to made a connection with the desired database by taking three inputs (Server id, Username and Password) supplied by the user. The Database Objects module of this project comprises the services like creating, modifying and deleting the Database Objects such as Tables, Views and Stored procedures. At last Security and Maintenance module is for providing the security from the unauthorized persons [b]Role [/b]: 1. Involved in designing screen layouts using asp.net for presentation layer. 2. Used ADO.NET to fetch data from database using sql stored procedures. 3. Involved in designing Data flow, Control flow, Sequence & Use case diagrams. 4. Making setup and deploying the Application. [b]PROJECT PROFILE [/b]: M-Tech: [b]Project Title [/b]: Capturing The Application Layer DDoS Attacks For Popular Websites. [b]Platform [/b]: Java. [b]Description [/b]: Finding the new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources. [b]My project includes four major modules namely [/b]: 1) Multidimensional Data Processing 2) HsMM 3) Self-Adaptive Scheme 4) Detection Architecture Multidimensional detection may become a mainstream method in anomaly detection. PCA and ICA are used which enables the detector to implement the multidimensional monitoring with less computation and without special assumption for the distribution of the original data. Hidden semi-Markov model)can describe most practical stochastic signals, including non-stationary and the non-Markovian and widely applied in many areas such as mobility tracking in wireless networks. By Self-Adaptive Scheme we found the normal user’s access behavior and the Website structure exhibit hours-long stability regardless of whether or not there are flash crowd events occurring during the period. The proposed architecture is expected to be practical in monitoring App-DDoS attacks and in triggering more dedicated detection on victim network [b]Role [/b]: [b]PROJECT PROFILE [/b]: [b]Project Title [/b]: Watermarking Relational Databases Using Optimization-Based Techniques. [b]Platform [/b]: .Net. [b]Description [/b]: A watermark describes information that can be used to prove the ownership of data such as the owner, origin, or recipient of the content. The rapid growth of the Internet and related technologies has offered an exceptional ability to access and redistribute digital contents. We propose three techniques that altogether may be used to detect, determine and trace-back data leaks from relational databases. My project includes six major modules namely login, image, watermark embedding, secret key, edit watermarked image and dataset. The user can give image as input to embedded a watermark text. We can secure particular image that can be upload in the form. The output of the project is only authenticated user access the watermarked image. Personnel Strengths: 1. Aptitude to work hard. 2. Passion for Speed, Creativity, Learning and Quality. 3. Interested with much of eager to learn new things. Achivements : - Secured first prize for THROW BALL at school level. - Participated in cultural events held at our college. - Got First prize in Essay Writing. - Participated in seminars at our college. Declaration: I hereby declare that the above written particulars are true to the best of my knowledge and belief. (Srilakshmi.ch)[/QUOTE]