SlideShare a Scribd company logo
1 of 1
Download to read offline
RUSHABHRAJ DHARMENDRARAJ SINGHAVI
1530 Varsity Dr Raleigh NC 27606
Phone: +1 (919)-272-9674 | Email: rdsingha@ncsu.edu | LinkedIn: /in/rushabhrajsinghavi
EDUCATIONAL QUALIFICATIONS
North Carolina State University December 2018
Masters of Science in Computer Systems Networking and Telecommunications.
Relevant Courses: Internet Protocols, Computer and Network Security, Switched Network Management, Internet of
Things: Applications and Implementations, Computer Networks, Advanced IP, Operating Systems, IOT Analytics.
KJ Somaiya College of Engineering (Mumbai University) May 2017
Bachelors of Engineering in Electronics and Telecommunications.
TECHNICAL SKILLS AND CERTIFICATIONS
• Programming Languages: C, Python, Java, HTML.
• Networking Technologies: TCP/IP Suite, OSPF, BGP, SDN, IPv4/v6, VLAN, VPN, IPSec, SSL/TLS, Firewalls, VoIP.
• Applications and Platforms: Wireshark, GNS3, Putty, Eclipse, VMware, AWS Console, IBM Bluemix.
• Hardware: Arduino, Raspberry Pi 3, FRDM KL25Z, Wi-Fi, BLE.
• Summer Industrial Training in Embedded Systems and IoT by Eduvance.
• ARM university program basic level certificate in Embedded systems design by Eduvance.
• Cypress Semiconductors University Alliance certificate in Internet of Things (IoT).
• Trained for CCNA Routing/Switching, CCNA Security and AWS Developer Associate.
ACADEMIC AND CO-CURRICULAR PROJECTS
Home Automation Transcriber using Amazon Alexa (HTML, IBM Bluemix, MQTT, Python, JavaScript, MySQL)
• IBM cloud server running Node-RED for MQTT connections between the Raspberry Pi, WebApp, and the database.
• MySQL database of all the customized commands and routines for the Alexa to execute was deployed on the WebApp.
Analysing the attacks on different MAC protocols used in Wireless Sensor Networks (OMNet++)
• Analyzed the behavior of different types of MAC protocols used in WSNs in customized jamming environments.
• Environment was built using OMNeT++ simulator and different performance metrics measured.
Bandwidth optimization over WAN networks (Socket Programming, Python)
• Saved bandwidth usage by almost 80% using data de-duplication.
• Evaluated our system for unencrypted text file, unencrypted video file, encrypted text file and encrypted video file.
Performance Analysis of various Encryption Algorithms (Java)
• Encrypted and decrypted a given file using various encryption algorithm like AES, RSA, HMAC and digital signatures.
• Analysed their performance and observed that RSA was the slowest amongst all while HMAC was the fastest.
Analyzing Security Practices in the Erlang Ecosystem (Erlang, Elixir, Hex)
• Investigated Erlang libraries from Hex packets manager to validate secure programming.
• Level of security and dependency on most of the libraries was determined.
Visible Light Communication (Python, C)
• A TCP connection was established and reliability assured with the help of ACK and NAK messages between two clients.
• Data rate of 1Kbps was achieved transferring data between LED (Sender, interfaced with Raspberry Pi) and Photodiode
(Receiver, interfaced with Arduino Uno) on a smaller scale.
Door position(Open/Closed) classifications using Support Vector Machines (Python, IBM Cloud)
• Interfaced an Inertial Measurement Unit, having a 3-axis gyroscope and accelerometer, with Raspberry Pi to obtain data.
• SVM classifier trained using machine learning algorithms on IBM Cloud which was used to make a prediction on door’s
current position and show if it was opened or closed or partially opened or closed on the app.
Wireless Sensor Network with IOT Logging (C, Phant Server)
• Stored the values received by WSN co-ordinator from multiple discrete nodes using NRF24L01P transceiver on Cloud
Phant server using ESP8266 Wi-Fi module.
EXTRA-CURRICULAR ACTIVITIES
• Badminton, Cooking.

More Related Content

What's hot

Internet protocol security
Internet protocol securityInternet protocol security
Internet protocol securityAnkit Anand
 
RESUME _ PRATHAMESH PISE
RESUME _ PRATHAMESH PISERESUME _ PRATHAMESH PISE
RESUME _ PRATHAMESH PISEPrathamesh Pise
 
謝續平
謝續平謝續平
謝續平9577601
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
LAN's by Group 1
LAN's by Group 1LAN's by Group 1
LAN's by Group 1Amanda2345
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkSecurityTube.Net
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Protocol for Secure Communication
Protocol for Secure CommunicationProtocol for Secure Communication
Protocol for Secure Communicationchauhankapil
 
Najeeb resume sjsu
Najeeb resume sjsuNajeeb resume sjsu
Najeeb resume sjsuNajeeb Shaik
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSystem ID Warehouse
 

What's hot (20)

Wifi security
Wifi securityWifi security
Wifi security
 
Internet protocol security
Internet protocol securityInternet protocol security
Internet protocol security
 
RESUME _ PRATHAMESH PISE
RESUME _ PRATHAMESH PISERESUME _ PRATHAMESH PISE
RESUME _ PRATHAMESH PISE
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Firewall
FirewallFirewall
Firewall
 
謝續平
謝續平謝續平
謝續平
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
LAN's by Group 1
LAN's by Group 1LAN's by Group 1
LAN's by Group 1
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Day4
Day4Day4
Day4
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Protocol for Secure Communication
Protocol for Secure CommunicationProtocol for Secure Communication
Protocol for Secure Communication
 
Najeeb resume sjsu
Najeeb resume sjsuNajeeb resume sjsu
Najeeb resume sjsu
 
N45028390
N45028390N45028390
N45028390
 
Firewalls
FirewallsFirewalls
Firewalls
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
 

Similar to Rushabhraj resume (20)

Resume
ResumeResume
Resume
 
Venkata brundavanam 2020
Venkata brundavanam 2020Venkata brundavanam 2020
Venkata brundavanam 2020
 
Venkata brundavanam 2020
Venkata brundavanam 2020Venkata brundavanam 2020
Venkata brundavanam 2020
 
PraveenKH_Resume
PraveenKH_ResumePraveenKH_Resume
PraveenKH_Resume
 
ApoorvJoshi_Resume
ApoorvJoshi_ResumeApoorvJoshi_Resume
ApoorvJoshi_Resume
 
Smriti shikha cv
Smriti shikha cvSmriti shikha cv
Smriti shikha cv
 
Phanidhar Gorrepati
Phanidhar GorrepatiPhanidhar Gorrepati
Phanidhar Gorrepati
 
CV 2
CV 2CV 2
CV 2
 
Naveen Narasimhaiah resume
Naveen Narasimhaiah resumeNaveen Narasimhaiah resume
Naveen Narasimhaiah resume
 
main_phase1 _3.pptx
main_phase1 _3.pptxmain_phase1 _3.pptx
main_phase1 _3.pptx
 
Resume
ResumeResume
Resume
 
Akshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedInAkshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedIn
 
Pallavi's Resume
Pallavi's ResumePallavi's Resume
Pallavi's Resume
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networks
 
Lavina Chandwani Resume
Lavina Chandwani ResumeLavina Chandwani Resume
Lavina Chandwani Resume
 
rajesh resume edit
rajesh resume editrajesh resume edit
rajesh resume edit
 
Naveen Narasimhaiah Resume
Naveen Narasimhaiah ResumeNaveen Narasimhaiah Resume
Naveen Narasimhaiah Resume
 
Arun Resume 2017
Arun Resume 2017Arun Resume 2017
Arun Resume 2017
 
HARIS NCSU_Resume
HARIS NCSU_ResumeHARIS NCSU_Resume
HARIS NCSU_Resume
 
Ramitha_Somasekhara_nontech
Ramitha_Somasekhara_nontechRamitha_Somasekhara_nontech
Ramitha_Somasekhara_nontech
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Rushabhraj resume

  • 1. RUSHABHRAJ DHARMENDRARAJ SINGHAVI 1530 Varsity Dr Raleigh NC 27606 Phone: +1 (919)-272-9674 | Email: rdsingha@ncsu.edu | LinkedIn: /in/rushabhrajsinghavi EDUCATIONAL QUALIFICATIONS North Carolina State University December 2018 Masters of Science in Computer Systems Networking and Telecommunications. Relevant Courses: Internet Protocols, Computer and Network Security, Switched Network Management, Internet of Things: Applications and Implementations, Computer Networks, Advanced IP, Operating Systems, IOT Analytics. KJ Somaiya College of Engineering (Mumbai University) May 2017 Bachelors of Engineering in Electronics and Telecommunications. TECHNICAL SKILLS AND CERTIFICATIONS • Programming Languages: C, Python, Java, HTML. • Networking Technologies: TCP/IP Suite, OSPF, BGP, SDN, IPv4/v6, VLAN, VPN, IPSec, SSL/TLS, Firewalls, VoIP. • Applications and Platforms: Wireshark, GNS3, Putty, Eclipse, VMware, AWS Console, IBM Bluemix. • Hardware: Arduino, Raspberry Pi 3, FRDM KL25Z, Wi-Fi, BLE. • Summer Industrial Training in Embedded Systems and IoT by Eduvance. • ARM university program basic level certificate in Embedded systems design by Eduvance. • Cypress Semiconductors University Alliance certificate in Internet of Things (IoT). • Trained for CCNA Routing/Switching, CCNA Security and AWS Developer Associate. ACADEMIC AND CO-CURRICULAR PROJECTS Home Automation Transcriber using Amazon Alexa (HTML, IBM Bluemix, MQTT, Python, JavaScript, MySQL) • IBM cloud server running Node-RED for MQTT connections between the Raspberry Pi, WebApp, and the database. • MySQL database of all the customized commands and routines for the Alexa to execute was deployed on the WebApp. Analysing the attacks on different MAC protocols used in Wireless Sensor Networks (OMNet++) • Analyzed the behavior of different types of MAC protocols used in WSNs in customized jamming environments. • Environment was built using OMNeT++ simulator and different performance metrics measured. Bandwidth optimization over WAN networks (Socket Programming, Python) • Saved bandwidth usage by almost 80% using data de-duplication. • Evaluated our system for unencrypted text file, unencrypted video file, encrypted text file and encrypted video file. Performance Analysis of various Encryption Algorithms (Java) • Encrypted and decrypted a given file using various encryption algorithm like AES, RSA, HMAC and digital signatures. • Analysed their performance and observed that RSA was the slowest amongst all while HMAC was the fastest. Analyzing Security Practices in the Erlang Ecosystem (Erlang, Elixir, Hex) • Investigated Erlang libraries from Hex packets manager to validate secure programming. • Level of security and dependency on most of the libraries was determined. Visible Light Communication (Python, C) • A TCP connection was established and reliability assured with the help of ACK and NAK messages between two clients. • Data rate of 1Kbps was achieved transferring data between LED (Sender, interfaced with Raspberry Pi) and Photodiode (Receiver, interfaced with Arduino Uno) on a smaller scale. Door position(Open/Closed) classifications using Support Vector Machines (Python, IBM Cloud) • Interfaced an Inertial Measurement Unit, having a 3-axis gyroscope and accelerometer, with Raspberry Pi to obtain data. • SVM classifier trained using machine learning algorithms on IBM Cloud which was used to make a prediction on door’s current position and show if it was opened or closed or partially opened or closed on the app. Wireless Sensor Network with IOT Logging (C, Phant Server) • Stored the values received by WSN co-ordinator from multiple discrete nodes using NRF24L01P transceiver on Cloud Phant server using ESP8266 Wi-Fi module. EXTRA-CURRICULAR ACTIVITIES • Badminton, Cooking.