Post Job Free
Sign in

Computer Science Software

Location:
Fairfax, VA
Posted:
October 03, 2013

Contact this candidate

Resume:

*

Shrijit Sudhakar Joshi, PhD Email: ***************@*****.***

**** ************ **, ******, **, USA 22180 Phone: +1-202-***-****

BJECTIVE

O

To seek a position where my proven confluence of multivariate skills in design & engineering,

mathematics, statistics, information technology, theoretical & applied research can be employed for

finding an innovative solution to the real world problems

UMMARY

S

Demonstrated innovative problem solving skills through published US Patents (US8136154,

US8489635, US20090328200, WO2009020482A2, & WO2009020482A3), licensed software technology,

10+ research publications, four reports of inventions (RoI), & two books/dissertations (ISBN

124*******, OCLC# 166409079).

Proven ability to work independently and as a part of a team demonstrated professionally at

Louisiana Tech University, Penn State University, Bank of America, & The World Bank.

Extensively employed pattern recognition/machine learning/data mining/statistical

algorithms, such as supervised/unsupervised learning, artificial neural networks, hidden Markov

model, Viterbi algorithm, naïve Bayes classifier, clustering algorithms (like K Means & Kohonen’s self

organizing map), & fusion of classifiers, to solve real world problems.

Demonstrated quick learning and self direction by designing and developing novel

algorithms & architecting software tools to find an innovative solution for the problems, such as

computer user authentication through biometric features, IP traceback, network traffic anomaly

detection, intrusion detection, adaptive vehicle navigation system, spam detection, & trend

analysis/forecasting of IT data center utilization.

4+ years of teaching/mentoring experience. More specifically; instructed courses based on

topics, such as Computer Networks, Artificial Intelligence/Machine Learning/Data mining, Software

Engineering, Analysis of Algorithms, Quantitative reasoning, Theory of Statistics & Probability,

Numerical analysis, Programming languages, Feature extraction/selection, dimensionality reduction,

Receiver operating characteristics curve, & outlier detection.

Board member/reviewer of numerous computer science/statistics journals/conferences.

8+ years of research and software development experience (using C, C++, VC++, JAVA;

mathematical tools such as MATLAB, SAS, Hadoop stack, WEKA; RDBMS such as Oracle &

MySQL, and scripting languages such as SQL, Perl, Shell script, Python/Jython, R/S Plus) in

designing and implementing machine learning/data mining/statistical classifiers/clustering algorithms

to build prototype/software products.

4+ years of strong experience in installation, configuration, & administration of middleware

technologies, such as Apache Tomcat, IBM WebSphere Application Server, WebSphere Portal, MQ,

Webservers (IBM HTTP Server, Oracle One/IPlanet, Apache Webserver), Monitoring (Introscope,

Sitescope, PRTG), Load balancers/Web Application Firewall (Big IP, Netscaler, ACE), Web

2

Content Management (DAY/Adobe CQ, CRX, Commonspot), Hadoop on Unix and Windows

environment of both physical and virtual machines..

SA PATENTS

U

Shrijit Joshi et al., “Hidden Markov Model (“HMM”) based User Authentication using

Keystroke Dynamics.” US Patent number 8136154. http://www.google.com/patents/US8136154

Technology is licensed to ZEH Software Inc. (now, Petris Technology), Houston, USA.

V. Phoha and Shrijit Joshi, “Method and system of identifying users based upon free text

keystroke patterns." US Patent number 8489635. http://www.google.com/patents/US8489635

DUCATION

E

Ph. D in Computer Science (March 7, 2009). Louisiana Tech University, USA.

Dissertation: Naïve Bayes and Similarity based methods for Identifying Computer Users using

Keystroke Patterns.

M.S. in Computer Science (August 2007). Louisiana Tech University, USA.

Thesis: Sequencing SOM output to a Supervised Competitive Neural Network for creating

Behavioral Biometric Profile.

M.S. in Mathematics & Statistics (March 7, 2009). Louisiana Tech University, USA.

B.S. in Industrial Engineering (June 2002). Nagpur University, India.

Project: Character Recognition using Artificial Neural Networks.

OOKS/DISSERTATIONS

B

Shrijit Joshi, “Naïve Bayes and Similarity based methods for Identifying Computer Users

using Keystroke Patterns.” ProQuest LLC, 142 pages, 2009.

http://www.barnesandnoble.com/s/shrijit s joshi

Shrijit Joshi, “Sequencing SOM output to a Supervised Competitive Neural Network for

creating Behavioral biometric profile.” Louisiana Tech University, 66 pages, 2007.

http://books.google.com/books/about/Sequencing_SOM_Output_to_a_Supervised_Co.html?

id=R6CitgAACAAJ

ECHNICAL SKILLS

T

J2EE Servers WebSphere Application Server 5.x/6.x/7.x/8.x, WebSphere MQ Server

5.x/6.x/7.x, WebSphere Portal Server 6.x, JBoss 5.x/6.x, JRun, Tomcat

Webservers IBM HTTP Server 6.x/7.x, Oracle One/IPlanet 6.x, Apache HTTP

Server, Microsoft IIS 5.x/6.x/7.x

Web Content Adobe/Day CQ 5.x, CRX 2.x, EMC Documentum 6.x, Drupal,

Paperthin CommonSpot

Management

2

3

Application/ Monitoring/ Repliweb, HP Sitescope, Introscope, HP Diagnostics, SiteMinder,

ITCAM, PRTG, LIBPCAP, Shunra, WINPCAP, ARCOT, ICAM,

Packet capturing

WireShark

Load balancers/Firewalls F5 Big IP, Citrix Netscaler, Cisco ACE, IBM Edge server

Mathematical tools Matlab, WEKA, SAS, R/S Plus, Hadoop Stack

Programming languages/ C, C++, VC++, JAVA, C#, XML, JSON, Perl, WSADMIN, JACL, Jython,

Shell, JavaScript, Jython, Python, R, S Plus, SQL, BladeLogic,

Scripts

HTML, JAVA Server pages, CSS, PhP, Ajax, Hadoop – Common,

HDFS, Yarn, Hive, Ambari, Avro, Cassandra, Chukwa, HBase,

Mahout, Zookeeper, MapReduce

Change management BMC Remedy, IBM Maximo, HP Peregrine

Databases Oracle, Sybase, MySQL, DB2, SQL Server, LDAP, AD

Operating Systems Unix (Linux, Solaris, IBM AIX), Windows, & Mac

Ancillary Tools ArcGIS, MS Office, Open Office, Adobe Photoshop, Adobe

Illustrator, HTTP Watch, FireBug, Adobe Connect, CISCO WebEx,

ArcGIS, Cordys, Adobe Livecycle, Cognos, JIRA, CVS, SVN,

Netcharts, MS Visio

ROFESSIONAL EXPERIENCES

P

Louisiana Tech University, Ruston, LA Sep’03 – Nov’ 08

Graduate Research Assistant, Department of Computer Science

Extensively employed pattern recognition/machine learning/data mining/statistical

algorithms, such as supervised/unsupervised learning, artificial neural networks, hidden Markov

model, Viterbi algorithm, naïve Bayes classifier, clustering algorithms (like K Means & Kohonen’s self

organizing map), & fusion of classifiers, to solve real world problems.

Designed and developed novel algorithms & architected software tools to find an innovative

solution for the problems, such as computer user authentication through biometric features, IP

traceback, network traffic anomaly detection, intrusion detection, adaptive vehicle navigation

system, & spam detection.

Formulated a novel pattern recognition method using the concept of hidden Markov model

(HMM) for static computer user authentication (fixed text monitoring) through keystroke

dynamics.

Designed and implemented a software product underlying the above technology for login time

authentication using VC++. Responsibilities include: (1) developing a GUI and (2) implementing the

4

formulated algorithm to perform user authentication. (Product is useful for login time user

authentication.)

Formulated two innovative pattern recognition methods (one method is based on naïve Bayes

learning and the other method is based on statistical classification) for continuous computer user

authentication using keystroke dynamics. (Product is useful for continuous monitoring/free text

monitoring.) Designed and implemented software product using VC++.

Innovative application of outlier detection while performing data pre processing (feature

extraction & feature selection) on the data obtained from user’s keystrokes.

Theoretically analyzed the fusion of two or more classifiers and proved the finding both

theoretically and experimentally.

Designed hidden Markov model based methods for performing network traffic anomaly

detection and for performing IP traceback.

Teaching/mentoring tasks included instructing courses based on topics, such as Computer

Networks, Artificial Intelligence/Machine Learning/Data mining, Software Engineering, Analysis of

Algorithms, Quantitative reasoning, Theory of Statistics & Probability, Numerical analysis,

Programming languages, Feature extraction/selection, dimensionality reduction, Receiver operating

characteristics curve, & outlier detection..

Played role as a project leader of a team of six; designed a project plan; implemented TCP

and UDP protocols using SOCKET programming in JAVA.

Assisted advisor while writing/reviewing grant proposals.

Software development tasks included plotting the data for analysis, data cleansing, and

implementing the designed algorithms using Microsoft Visual Studio, JAVA, Shell scripts, JACL,

Jython/Python, SQL, Perl, Python, R/S Plus, Matlab, SAS, MS Access, and Oracle on UNIX and

Windows environments to build prototypes/software products.

Outcome: numerous research publications, 2 US Patents, 4 Reports of inventions, 2

dissertations/books, teaching experiences, mentoring 5+ graduate students, & licensing technology

of biometric security to ZEH Software Inc., TX.

Louisiana Tech University, Ruston, LA Sep’03 – May’ 04

Graduate Research Assistant, Department of Industrial Engineering

Designed and implemented a novel algorithm using the traditional CPM and PERT

algorithms for management of two or more projects.

Developed a software tool for the formulated algorithm in VC++ and Microsoft ACCESS.

The World Bank, Washington, DC Aug’10 – Present

Consultant – Information Solutions Group

Provided infrastructure support for 140+ web applications.

4

5

Designed and applied statistical classifiers/clustering techniques like K Means,

Artificial Neural Network for inferring the relationship/independence of the massive amounts of

data (like economy/education statistics/foreign direct investment) gathered at the World Bank.

Administered Hadoop stack – MapReduce, Hadoop distributed file system, Hive, HBase,

Zookeeper, Accumulo, Mahout. Created Hadoop cluster; on master, maintained job tracker, task

tracker, name node, and data node; and on slave (worker node), maintained data node and task tracker.

Manager secondary name node so that there is no loss of data during corruption.

For mining the data, developed programs using JAVA/Shell/Perl/Python/R/S

Plus/WSAdmin/JAVA Script/JACL/SAS.

Playing role as release manager, responsible for version control and bi monthly production

releases to The World Bank’s websites. Working closely with business unit, operations of information

security, project managers, developers, & testers to align project deliverables, dates, & report

issues/concerns.

Secured web applications with the operations of information security using CISCO ACE and

Citrix Netscaler; and by integrating CSR/SSL certificates on the load balancer and/or on the

webservers. Also, load balancing web applications using various load balancing algorithms for high

availability.

Designed/architected JAVA based web applications for deploying them on IBM WebSphere

Application Server (WAS), JBoss, and Adobe JRun for 150+ World Bank member countries.

Designed/architected web content management (WCM) systems based on Adobe/DAY CQ,

CRX, EMC Documentum, PaperThin Commonspot, Drupal, & Adobe JRun.

Architected WebSphere Portal and MQ series based systems to enhance internet presence of

the World Bank by creating portlets and by setting up channels for asynchronous messaging.

Architected ArcGIS based systems to provide web service based inter operability of the

geographical/spatial information to 30+ web applications.

Installed and configured WAS 6.x/7.x/8.x, Portal 6.x, JBoss 6.x, CQ 5.x, CRX 2.x, Tomcat 6.x,

JRun 4.x, Commonspot 9.x, & MQ 6.x on UNIX (Linux, AIX, and Solaris) and Windows systems.

To enhance the performance of the JAVA and .NET based applications, installed/configured

webservers, such as IBM HTTP Server (IHS) 6.x/7.x, Oracle One/IPlanet 6.x, Apache HTTP Server

2.x, & Microsoft IIS 6.x/7.x and to provide identity authentication & single sign on operability,

installed/configured SiteMinder agent and its policy server. Generated plug in on the application

server to facilitate routing from webserver to the corresponding application server. Extensively worked

with active directory (AD) authentication typically when working with the Sharepoint based sites.

For balancing load on the application servers (J2EE layer), performed horizontal/vertical

clustering and applied the principles of work load management (WLM).

Deployed J2EE enterprise/ecommerce applications on WAS, Portal, JBoss, & CQ. Wrote scripts

for automating deployment/application server restart using Jython/WSAdmin/Shell/Cronjob.

Based on the application requirement, created JDBC data sources on application

server/cluster/node.

6

Deployed packages (ZIP files) to Adobe CQ based systems and used cURL based scripts for

automatic package build up/installation/download. Set up clustered authors and publish instances;

integrated replication agent/dispatcher flush agent; actively used Felix console/CRX

console/launchpad/admin while performing day to day duties in CQ administration; and also,

managed user/group on author.

Based on the results of security vulnerability report and the application design

considerations, migrated application from WAS 6.x to 7.x/8.x; CQ 5.3 to CQ 5.4/5.5; CRX 2.0 to CRX

2.1/2.2/2.3; JRun 4.0 to JRun 4.7; Commonspot 9.0 to 9.2.x.

Set up RepliWeb agent for replicating files/websites to multitudes of servers.

Monitored application using HP Sitescope, ITCAM, PRTG, & Introscope. Developed

scripts to trigger alert if certain error/warn related messages in the logs does not trigger vendor

provided monitoring software to send alert. Monitored various performance metrics such as web

container connections, JDBC connection pools, thread pools, system load like CPU utilization and

Memory utilization, garbage collection, and JVM heap size.

Performed troubleshooting WAS, WPS, MQ, CQ, Commonspot, JRun, ArcGIS, Webservers,

SiteMinder, & JBoss by monitoring logs and through Introscope.

Monitored application core dumps, & forced thread dumps to check for system objects using

thread analyzer tools. Opened PMRs with IBM and support tickets with Adobe/Paperthin, if

necessary.

Provided 24x7 on call supports (pager) and monitored trouble ticket queues to attend user

and customer calls.

Bank of America, Jacksonville, FL Mar’09 – July’10

Consultant – Systems Engineering Group

Designed JAVA based web applications for financial transactions, internal and external

visibility.

Involved in designing/building disaster recovery (DR) environments. Extensively used

3DNS/FDNS for serving user requests by DR environments when Production Live web application

is not functioning.

Provided infrastructure support for 65+ web applications and the primary support of 10+

applications.

Installed, configured, & administered IBM WebSphere Application Server ( WAS) 6.0/6.1

ND/XD/7.0, WebServers (Oracle ONE IPlanet, Microsoft IIS, IBM HTTP Server (IHS), & Apache) on

Linux, AIX, Solaris, & Windows.

Migrated applications from WebSphere application server 5.0 to 6.0/6.1 &

designed/implemented horizontal/vertical clustering and work load management (WLM).

Deployed J2EE enterprise/ecommerce applications on WAS & applied fix packs to WAS.

6

7

Configured WebServer, Session management, WebSphere resources, Resource Adapters, J2C

resources, Connection pools/factories, JMS resources, and WebServer configuration files.

Performed JDBC connectivity from WebSphere to Oracle, Microsoft SQL Server, and IBM

DB2. Configured WebSphere resources including JDBC providers, JDBC data sources, and

connection pools.

Application Server performance monitoring of resources like Web Container connections, JDBC

Connection Pools, Thread Pools, System Load like CPU utilization and Memory utilization, Garbage

Collection, and JVM Heap Size.

Monitored application core dumps, & forced thread dumps to check for system objects using

thread analyzer tools. Opened PMRs with IBM.

Worked with UNIX Administrators to tune OS and improve the performance of the J2EE

applications.

Installed/configured Wily Introscope Ver. 7/8 & ITCAM on application servers.

Installed/configured SiteMinder (SM) Ver. 6, SSL certificate on WebServers, & worked with F5

team to configure BigIP. SM worked as a layer between WAS & WebServer.

Provided 24x7 on call supports (pager) and monitored trouble ticket queues to attend user

and customer calls.

ELECTED PUBLICATIONS

S

R. Varanasi, V. Phoha, Shrijit Joshi, “IPTraceback based attacker tracking: A probabilistic

technique for detecting Internet attacks using the concept of Hidden Markov Models.” In Proceedings of

the 5th annual IEEE Systems, Man, and Cybernetics, NY, USA, 2004.

Shrijit Joshi and V. Phoha, “Investigating Hidden Markov Models capabilities in anomaly

detection.” In Proceeding of the 43rd annual ACM SE, Atlanta, USA, 2005.

V. Phoha, Shrijit Joshi, S. Vuyyuru, S. Phoha, A. Ray, “Hidden Markov Model based

Computer User Authentication using Keystroke Dynamics.” Reports of Invention, Louisiana Tech

University and Pennsylvania State University, 2006.

Shrijit Joshi and V. Phoha, “Competition between SOM Clusters to model User

Authentication System in Computer Networks.” In Proceedings of the 2nd International IEEE

CREATE NET, Bangalore, India, 2007.

Shrijit Joshi, “Sequencing SOM output to a Supervised Competitive Neural Network for

creating Behavioral biometric profile.” M.S. Thesis, Louisiana Tech University, 2007.

V. Phoha and Shrijit Joshi, “Methods for Identifying Users using text typed on an Input

Device.” Report of Invention, Louisiana Tech University, 2008.

Shrijit Joshi, “Naïve Bayes and Similarity based Methods for Identifying Computer Users

using Keystroke Patterns.” Ph. D Dissertation, Louisiana Tech University, 2009.

Shrijit Joshi and Meghana Joshi, “Web applications & Operating cost of data center.”

International Journal in Foundations of Computer Science & Technology, Vol 2, No. 5, pp 1 15, 2012.

8

Shrijit Joshi and Meghana Joshi, “Operating cost of IT infrastructure & hardware

procurement.” Manuscript under review for possible publication in International Journal in

Foundations of Computer Science & Technology.

Shrijit Joshi and Meghana Joshi, “Probabilistic determination of driver’s destination using

adaptive navigation system.” Manuscript under review for possible publication in International

Journal in Foundations of Computer Science & Technology.

EVIEWER/BOARD MEMBER

R

IEEE Transactions on Systems. Man, & Cybernetics – Part B.

International Journal of Computer Trends and Technology.

International Journal in Foundations of Computer Science & Technology.

ERTIFICATIONS

C

Information Security Awareness, The World Bank Group, Washington, DC, USA.

Think Security – Do your part, The World Bank Group, Washington, DC, USA.

DAY (now, Adobe) Communiqué 5.3 – Administration

DAY (now, Adobe) Communiqué 5.3 – Developer

Citrix Netscaler CNS 203

NDROID APPLICATIONS

A

Abstract Art Wallpapers

https://play.google.com/store/apps/details?id=com.mangodynamics.abstractwallpapers#?

t=W251bGwsMSwxLDIxMiwiY29tLm1hbmdvZHluYW1pY3MuYWJzdHJhY3R3YWxscGFwZXJzIl0.

Display Brightness Adjustment

https://play.google.com/store/apps/details?id=com.mangodynamics.brightness#?

t=W251bGwsMSwxLDIxMiwiY29tLm1hbmdvZHluYW1pY3MuYnJpZ2h0bmVzcyJd

8



Contact this candidate