Download Vinod Malla

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Database wikipedia , lookup

Relational model wikipedia , lookup

Microsoft Access wikipedia , lookup

Microsoft Jet Database Engine wikipedia , lookup

Clusterpoint wikipedia , lookup

Concurrency control wikipedia , lookup

Database model wikipedia , lookup

Object-relational impedance mismatch wikipedia , lookup

Transcript
Raja Ram Sah
N.I.T.K. Surathkal
E-Mail: [email protected]
Mobile: +91 8050858092, +917794882028
To
learn and function effectively in an organization and be able to deliver to the bottom-line. To
constantly upgrade my knowledge and skills and make a difference in whatever I do.
ACADEMIC
Academic
Qualification
School/College
Board
Year of Percentage
Passing
X
Gandhi High School, Chapra
B.S.E.B. Patna
2001
57
XII
S.D.S. College, Chapra
B.I.E.C. Patna
2003
70
B.E.
Truba Institute of Engg. &
I.T.
R.G.T.U. Bhopal
2010
67.13
M.Tech.
N.I.T.K. Surathkal
N.I.T.K. Surathkal
2013
6.75
(CGPA)
FIELD OF INTEREST

Data Structure & Algorithm Design

Theoretical Computer Science

C-Programming
EXPERIANCE
Teaching Experience - 6 month
Subject Handled – Advance Data Structure for M.Tech., Data Structure for B.Tech. with excellent feedback
from student(approx 91%).
COMPUTER COMPETENCY
Tools
General Programming Skils
Domain Specific Programming Skills
Operating Systems
Subject Skills
.
:
:
:
:
:
MS-Office, NS-2
C, C++, Basic Java
HTML,Shell Programming, Basic IPC programming
Window, Basic Linux,
Data Structures, Algorithm Design, Operating System,
System, Computer Networking,
ACHIEVEMENTS
.
 Achieved 98.2 percentile in GATE 2011
 Achieved 99.0 percentile in GATE 2013
 4 time gate qualified out of which above two are best (2010,2011,2012,2013).
ACADEMIC PROJECTS

Project Name: Implementation of RSA algorithm(128 bits)
Role: Complete Implementation
Description: The RSA algorithm is a public key mechanism of cryptography. The main purpose of
implementation of this algorithm is to implement the algorithm for key length of 128 bits without
using any API (application programming interface). As we know the size of integer is 2 bytes (16
bits) for turbo C compiler and 4 bytes (32 bits) for visual Studio or gcc compiler, therefore the
implementation of 128 bits key is challenging.
Domain Knowledge: Cryptography
Solution Environment: C

Project Name: Partially Distributed Key management in the wireless ad-hoc network.
Role: Partial Implementation
Description: The wireless networks are easy to attack because of their relative ease of access to
the wireless medium. Therefore if we give the responsibility of key management to single node and
somehow the node is under attack, then the entire network will become insecure. In partially
distributed system the key management is distributed to a set of nodes, i.e. one single node alone
is not responsible for key management. Therefore this mechanism avoids single point vulnerability.
Domain Knowledge: Wireless network and cryptography
Solution Environment: Java

Project Name: Parallel Prefix computation using MPI
Role: Complete Implementation
Description: The speed of execution of any algorithm is one of the major issues in computer
science. Everyone wants to do work faster possibly as much as one can. The main aim of this
project is to learn how to make independent instructions run parallel on different processors. The
parallel instructions can run simultaneously, so it takes lesser time to execute. I have implemented
such an algorithm namely; parallel Prefix computation, using MPI (Message Passing Interface).
Analysis shows, serial Prefix Computation takes the time of O(n) while parallel takes only O(log2 n).
Domain Knowledge: Parallel algorithm design.
Solution Environment: C

Project Name: Reflective Database Access control
Role: Design of total working model and writing all the SQL Queries
Description: The access control in a database is the most important part of the database system.
There are various access control mechanisms such as Discretionary Access Control (DAC),
Mandatory Access Control (MAC), Role based Access control (RBAC) etc. These techniques face
weakness in granting access control at more fine-grained level i.e. access control at certain
portions of database table. Moreover, since these methods are generally implemented using Access
Control Matrix (ACM) these are not flexible. Reflective Database Access Control (RDBAC) is a
model in which a database privilege is expressed as a database query itself, rather than as a static
privilege contained in an access control matrix. RDBAC aids the management of database access
controls by improving the expressiveness of policies. We have Implemented RDBAC on Students
Result Information System.
Domain Knowledge: Database management system.
Solution Environment: MySQL and PHP

Title: Intrusion detection in Ad-hoc network by correlation of Multiple Layers of Protocol Stack.
Role: Complete Implementation (M.Tech. Major Project)
Description: Wireless ad-hoc networks are vulnerable to various kinds of security threats and
attacks due to relative ease of access to wireless medium, limited bandwidth, restricted resources
and lack of a centralized infrastructure. These attacks affect the service availability and connectivity
of the wireless networks and hence reduce the network performance. Here we intend to detect and
mitigate the Denial of Service (DoS) attacks that prevent unauthorized users from gaining access
to the networks. Intrusion detection systems do just that: monitor audit data, look for intrusions to
the system, and initiate a proper response. In my work, I implemented intrusion detection using
the information from multiple layers of protocol stack to mitigate with intrusion. The reason for
using multi layers is attacks are possible at any layers of protocol stack. I used data link layer and
network for my project.
Domain Knowledge: Cryptography, wireless Ad-hoc Network
Solution Environment: NS-2 Simulator.
PERSONAL VITAE
Father’s Name
Date of Birth
Gender
Linguistic Abilities
Permanent Address
:
:
:
:
:
Dharm Nath Prasad
06-12-1986
Male
English, Hindi
s/o Dharm Nath Prasad,
Masoom Ganj, Chapra(Saran),
Bihar-841301
REFRENCES
Dr. K. C. Shet
Department of Computer Science & Engineering,
National Institute of Technology Karnataka, Surathkal
Karnataka – 575025
E-mail: [email protected]
DECLARATION
I hereby declare that above mentioned details are correct and complete to the best of my knowledge.
Date:Place: -
Raja Ram Sah