Shrijit Sudhakar Joshi, PhD Email: ***************@*****.***
**** ************ **, ******, **, USA 22180 Phone: +1-202-***-****
BJECTIVE
O
To seek a position where my proven confluence of multivariate skills in design & engineering,
mathematics, statistics, information technology, theoretical & applied research can be employed for
finding an innovative solution to the real world problems
UMMARY
S
Demonstrated innovative problem solving skills through published US Patents (US8136154,
US8489635, US20090328200, WO2009020482A2, & WO2009020482A3), licensed software technology,
10+ research publications, four reports of inventions (RoI), & two books/dissertations (ISBN
124*******, OCLC# 166409079).
Proven ability to work independently and as a part of a team demonstrated professionally at
Louisiana Tech University, Penn State University, Bank of America, & The World Bank.
Extensively employed pattern recognition/machine learning/data mining/statistical
algorithms, such as supervised/unsupervised learning, artificial neural networks, hidden Markov
model, Viterbi algorithm, naïve Bayes classifier, clustering algorithms (like K Means & Kohonen’s self
organizing map), & fusion of classifiers, to solve real world problems.
Demonstrated quick learning and self direction by designing and developing novel
algorithms & architecting software tools to find an innovative solution for the problems, such as
computer user authentication through biometric features, IP traceback, network traffic anomaly
detection, intrusion detection, adaptive vehicle navigation system, spam detection, & trend
analysis/forecasting of IT data center utilization.
4+ years of teaching/mentoring experience. More specifically; instructed courses based on
topics, such as Computer Networks, Artificial Intelligence/Machine Learning/Data mining, Software
Engineering, Analysis of Algorithms, Quantitative reasoning, Theory of Statistics & Probability,
Numerical analysis, Programming languages, Feature extraction/selection, dimensionality reduction,
Receiver operating characteristics curve, & outlier detection.
Board member/reviewer of numerous computer science/statistics journals/conferences.
8+ years of research and software development experience (using C, C++, VC++, JAVA;
mathematical tools such as MATLAB, SAS, Hadoop stack, WEKA; RDBMS such as Oracle &
MySQL, and scripting languages such as SQL, Perl, Shell script, Python/Jython, R/S Plus) in
designing and implementing machine learning/data mining/statistical classifiers/clustering algorithms
to build prototype/software products.
4+ years of strong experience in installation, configuration, & administration of middleware
technologies, such as Apache Tomcat, IBM WebSphere Application Server, WebSphere Portal, MQ,
Webservers (IBM HTTP Server, Oracle One/IPlanet, Apache Webserver), Monitoring (Introscope,
Sitescope, PRTG), Load balancers/Web Application Firewall (Big IP, Netscaler, ACE), Web
2
Content Management (DAY/Adobe CQ, CRX, Commonspot), Hadoop on Unix and Windows
environment of both physical and virtual machines..
SA PATENTS
U
Shrijit Joshi et al., “Hidden Markov Model (“HMM”) based User Authentication using
Keystroke Dynamics.” US Patent number 8136154. http://www.google.com/patents/US8136154
Technology is licensed to ZEH Software Inc. (now, Petris Technology), Houston, USA.
V. Phoha and Shrijit Joshi, “Method and system of identifying users based upon free text
keystroke patterns." US Patent number 8489635. http://www.google.com/patents/US8489635
DUCATION
E
Ph. D in Computer Science (March 7, 2009). Louisiana Tech University, USA.
Dissertation: Naïve Bayes and Similarity based methods for Identifying Computer Users using
Keystroke Patterns.
M.S. in Computer Science (August 2007). Louisiana Tech University, USA.
Thesis: Sequencing SOM output to a Supervised Competitive Neural Network for creating
Behavioral Biometric Profile.
M.S. in Mathematics & Statistics (March 7, 2009). Louisiana Tech University, USA.
B.S. in Industrial Engineering (June 2002). Nagpur University, India.
Project: Character Recognition using Artificial Neural Networks.
OOKS/DISSERTATIONS
B
Shrijit Joshi, “Naïve Bayes and Similarity based methods for Identifying Computer Users
using Keystroke Patterns.” ProQuest LLC, 142 pages, 2009.
http://www.barnesandnoble.com/s/shrijit s joshi
Shrijit Joshi, “Sequencing SOM output to a Supervised Competitive Neural Network for
creating Behavioral biometric profile.” Louisiana Tech University, 66 pages, 2007.
http://books.google.com/books/about/Sequencing_SOM_Output_to_a_Supervised_Co.html?
id=R6CitgAACAAJ
ECHNICAL SKILLS
T
J2EE Servers WebSphere Application Server 5.x/6.x/7.x/8.x, WebSphere MQ Server
5.x/6.x/7.x, WebSphere Portal Server 6.x, JBoss 5.x/6.x, JRun, Tomcat
Webservers IBM HTTP Server 6.x/7.x, Oracle One/IPlanet 6.x, Apache HTTP
Server, Microsoft IIS 5.x/6.x/7.x
Web Content Adobe/Day CQ 5.x, CRX 2.x, EMC Documentum 6.x, Drupal,
Paperthin CommonSpot
Management
2
3
Application/ Monitoring/ Repliweb, HP Sitescope, Introscope, HP Diagnostics, SiteMinder,
ITCAM, PRTG, LIBPCAP, Shunra, WINPCAP, ARCOT, ICAM,
Packet capturing
WireShark
Load balancers/Firewalls F5 Big IP, Citrix Netscaler, Cisco ACE, IBM Edge server
Mathematical tools Matlab, WEKA, SAS, R/S Plus, Hadoop Stack
Programming languages/ C, C++, VC++, JAVA, C#, XML, JSON, Perl, WSADMIN, JACL, Jython,
Shell, JavaScript, Jython, Python, R, S Plus, SQL, BladeLogic,
Scripts
HTML, JAVA Server pages, CSS, PhP, Ajax, Hadoop – Common,
HDFS, Yarn, Hive, Ambari, Avro, Cassandra, Chukwa, HBase,
Mahout, Zookeeper, MapReduce
Change management BMC Remedy, IBM Maximo, HP Peregrine
Databases Oracle, Sybase, MySQL, DB2, SQL Server, LDAP, AD
Operating Systems Unix (Linux, Solaris, IBM AIX), Windows, & Mac
Ancillary Tools ArcGIS, MS Office, Open Office, Adobe Photoshop, Adobe
Illustrator, HTTP Watch, FireBug, Adobe Connect, CISCO WebEx,
ArcGIS, Cordys, Adobe Livecycle, Cognos, JIRA, CVS, SVN,
Netcharts, MS Visio
ROFESSIONAL EXPERIENCES
P
Louisiana Tech University, Ruston, LA Sep’03 – Nov’ 08
Graduate Research Assistant, Department of Computer Science
Extensively employed pattern recognition/machine learning/data mining/statistical
algorithms, such as supervised/unsupervised learning, artificial neural networks, hidden Markov
model, Viterbi algorithm, naïve Bayes classifier, clustering algorithms (like K Means & Kohonen’s self
organizing map), & fusion of classifiers, to solve real world problems.
Designed and developed novel algorithms & architected software tools to find an innovative
solution for the problems, such as computer user authentication through biometric features, IP
traceback, network traffic anomaly detection, intrusion detection, adaptive vehicle navigation
system, & spam detection.
Formulated a novel pattern recognition method using the concept of hidden Markov model
(HMM) for static computer user authentication (fixed text monitoring) through keystroke
dynamics.
Designed and implemented a software product underlying the above technology for login time
authentication using VC++. Responsibilities include: (1) developing a GUI and (2) implementing the
4
formulated algorithm to perform user authentication. (Product is useful for login time user
authentication.)
Formulated two innovative pattern recognition methods (one method is based on naïve Bayes
learning and the other method is based on statistical classification) for continuous computer user
authentication using keystroke dynamics. (Product is useful for continuous monitoring/free text
monitoring.) Designed and implemented software product using VC++.
Innovative application of outlier detection while performing data pre processing (feature
extraction & feature selection) on the data obtained from user’s keystrokes.
Theoretically analyzed the fusion of two or more classifiers and proved the finding both
theoretically and experimentally.
Designed hidden Markov model based methods for performing network traffic anomaly
detection and for performing IP traceback.
Teaching/mentoring tasks included instructing courses based on topics, such as Computer
Networks, Artificial Intelligence/Machine Learning/Data mining, Software Engineering, Analysis of
Algorithms, Quantitative reasoning, Theory of Statistics & Probability, Numerical analysis,
Programming languages, Feature extraction/selection, dimensionality reduction, Receiver operating
characteristics curve, & outlier detection..
Played role as a project leader of a team of six; designed a project plan; implemented TCP
and UDP protocols using SOCKET programming in JAVA.
Assisted advisor while writing/reviewing grant proposals.
Software development tasks included plotting the data for analysis, data cleansing, and
implementing the designed algorithms using Microsoft Visual Studio, JAVA, Shell scripts, JACL,
Jython/Python, SQL, Perl, Python, R/S Plus, Matlab, SAS, MS Access, and Oracle on UNIX and
Windows environments to build prototypes/software products.
Outcome: numerous research publications, 2 US Patents, 4 Reports of inventions, 2
dissertations/books, teaching experiences, mentoring 5+ graduate students, & licensing technology
of biometric security to ZEH Software Inc., TX.
Louisiana Tech University, Ruston, LA Sep’03 – May’ 04
Graduate Research Assistant, Department of Industrial Engineering
Designed and implemented a novel algorithm using the traditional CPM and PERT
algorithms for management of two or more projects.
Developed a software tool for the formulated algorithm in VC++ and Microsoft ACCESS.
The World Bank, Washington, DC Aug’10 – Present
Consultant – Information Solutions Group
Provided infrastructure support for 140+ web applications.
4
5
Designed and applied statistical classifiers/clustering techniques like K Means,
Artificial Neural Network for inferring the relationship/independence of the massive amounts of
data (like economy/education statistics/foreign direct investment) gathered at the World Bank.
Administered Hadoop stack – MapReduce, Hadoop distributed file system, Hive, HBase,
Zookeeper, Accumulo, Mahout. Created Hadoop cluster; on master, maintained job tracker, task
tracker, name node, and data node; and on slave (worker node), maintained data node and task tracker.
Manager secondary name node so that there is no loss of data during corruption.
For mining the data, developed programs using JAVA/Shell/Perl/Python/R/S
Plus/WSAdmin/JAVA Script/JACL/SAS.
Playing role as release manager, responsible for version control and bi monthly production
releases to The World Bank’s websites. Working closely with business unit, operations of information
security, project managers, developers, & testers to align project deliverables, dates, & report
issues/concerns.
Secured web applications with the operations of information security using CISCO ACE and
Citrix Netscaler; and by integrating CSR/SSL certificates on the load balancer and/or on the
webservers. Also, load balancing web applications using various load balancing algorithms for high
availability.
Designed/architected JAVA based web applications for deploying them on IBM WebSphere
Application Server (WAS), JBoss, and Adobe JRun for 150+ World Bank member countries.
Designed/architected web content management (WCM) systems based on Adobe/DAY CQ,
CRX, EMC Documentum, PaperThin Commonspot, Drupal, & Adobe JRun.
Architected WebSphere Portal and MQ series based systems to enhance internet presence of
the World Bank by creating portlets and by setting up channels for asynchronous messaging.
Architected ArcGIS based systems to provide web service based inter operability of the
geographical/spatial information to 30+ web applications.
Installed and configured WAS 6.x/7.x/8.x, Portal 6.x, JBoss 6.x, CQ 5.x, CRX 2.x, Tomcat 6.x,
JRun 4.x, Commonspot 9.x, & MQ 6.x on UNIX (Linux, AIX, and Solaris) and Windows systems.
To enhance the performance of the JAVA and .NET based applications, installed/configured
webservers, such as IBM HTTP Server (IHS) 6.x/7.x, Oracle One/IPlanet 6.x, Apache HTTP Server
2.x, & Microsoft IIS 6.x/7.x and to provide identity authentication & single sign on operability,
installed/configured SiteMinder agent and its policy server. Generated plug in on the application
server to facilitate routing from webserver to the corresponding application server. Extensively worked
with active directory (AD) authentication typically when working with the Sharepoint based sites.
For balancing load on the application servers (J2EE layer), performed horizontal/vertical
clustering and applied the principles of work load management (WLM).
Deployed J2EE enterprise/ecommerce applications on WAS, Portal, JBoss, & CQ. Wrote scripts
for automating deployment/application server restart using Jython/WSAdmin/Shell/Cronjob.
Based on the application requirement, created JDBC data sources on application
server/cluster/node.
6
Deployed packages (ZIP files) to Adobe CQ based systems and used cURL based scripts for
automatic package build up/installation/download. Set up clustered authors and publish instances;
integrated replication agent/dispatcher flush agent; actively used Felix console/CRX
console/launchpad/admin while performing day to day duties in CQ administration; and also,
managed user/group on author.
Based on the results of security vulnerability report and the application design
considerations, migrated application from WAS 6.x to 7.x/8.x; CQ 5.3 to CQ 5.4/5.5; CRX 2.0 to CRX
2.1/2.2/2.3; JRun 4.0 to JRun 4.7; Commonspot 9.0 to 9.2.x.
Set up RepliWeb agent for replicating files/websites to multitudes of servers.
Monitored application using HP Sitescope, ITCAM, PRTG, & Introscope. Developed
scripts to trigger alert if certain error/warn related messages in the logs does not trigger vendor
provided monitoring software to send alert. Monitored various performance metrics such as web
container connections, JDBC connection pools, thread pools, system load like CPU utilization and
Memory utilization, garbage collection, and JVM heap size.
Performed troubleshooting WAS, WPS, MQ, CQ, Commonspot, JRun, ArcGIS, Webservers,
SiteMinder, & JBoss by monitoring logs and through Introscope.
Monitored application core dumps, & forced thread dumps to check for system objects using
thread analyzer tools. Opened PMRs with IBM and support tickets with Adobe/Paperthin, if
necessary.
Provided 24x7 on call supports (pager) and monitored trouble ticket queues to attend user
and customer calls.
Bank of America, Jacksonville, FL Mar’09 – July’10
Consultant – Systems Engineering Group
Designed JAVA based web applications for financial transactions, internal and external
visibility.
Involved in designing/building disaster recovery (DR) environments. Extensively used
3DNS/FDNS for serving user requests by DR environments when Production Live web application
is not functioning.
Provided infrastructure support for 65+ web applications and the primary support of 10+
applications.
Installed, configured, & administered IBM WebSphere Application Server ( WAS) 6.0/6.1
ND/XD/7.0, WebServers (Oracle ONE IPlanet, Microsoft IIS, IBM HTTP Server (IHS), & Apache) on
Linux, AIX, Solaris, & Windows.
Migrated applications from WebSphere application server 5.0 to 6.0/6.1 &
designed/implemented horizontal/vertical clustering and work load management (WLM).
Deployed J2EE enterprise/ecommerce applications on WAS & applied fix packs to WAS.
6
7
Configured WebServer, Session management, WebSphere resources, Resource Adapters, J2C
resources, Connection pools/factories, JMS resources, and WebServer configuration files.
Performed JDBC connectivity from WebSphere to Oracle, Microsoft SQL Server, and IBM
DB2. Configured WebSphere resources including JDBC providers, JDBC data sources, and
connection pools.
Application Server performance monitoring of resources like Web Container connections, JDBC
Connection Pools, Thread Pools, System Load like CPU utilization and Memory utilization, Garbage
Collection, and JVM Heap Size.
Monitored application core dumps, & forced thread dumps to check for system objects using
thread analyzer tools. Opened PMRs with IBM.
Worked with UNIX Administrators to tune OS and improve the performance of the J2EE
applications.
Installed/configured Wily Introscope Ver. 7/8 & ITCAM on application servers.
Installed/configured SiteMinder (SM) Ver. 6, SSL certificate on WebServers, & worked with F5
team to configure BigIP. SM worked as a layer between WAS & WebServer.
Provided 24x7 on call supports (pager) and monitored trouble ticket queues to attend user
and customer calls.
ELECTED PUBLICATIONS
S
R. Varanasi, V. Phoha, Shrijit Joshi, “IPTraceback based attacker tracking: A probabilistic
technique for detecting Internet attacks using the concept of Hidden Markov Models.” In Proceedings of
the 5th annual IEEE Systems, Man, and Cybernetics, NY, USA, 2004.
Shrijit Joshi and V. Phoha, “Investigating Hidden Markov Models capabilities in anomaly
detection.” In Proceeding of the 43rd annual ACM SE, Atlanta, USA, 2005.
V. Phoha, Shrijit Joshi, S. Vuyyuru, S. Phoha, A. Ray, “Hidden Markov Model based
Computer User Authentication using Keystroke Dynamics.” Reports of Invention, Louisiana Tech
University and Pennsylvania State University, 2006.
Shrijit Joshi and V. Phoha, “Competition between SOM Clusters to model User
Authentication System in Computer Networks.” In Proceedings of the 2nd International IEEE
CREATE NET, Bangalore, India, 2007.
Shrijit Joshi, “Sequencing SOM output to a Supervised Competitive Neural Network for
creating Behavioral biometric profile.” M.S. Thesis, Louisiana Tech University, 2007.
V. Phoha and Shrijit Joshi, “Methods for Identifying Users using text typed on an Input
Device.” Report of Invention, Louisiana Tech University, 2008.
Shrijit Joshi, “Naïve Bayes and Similarity based Methods for Identifying Computer Users
using Keystroke Patterns.” Ph. D Dissertation, Louisiana Tech University, 2009.
Shrijit Joshi and Meghana Joshi, “Web applications & Operating cost of data center.”
International Journal in Foundations of Computer Science & Technology, Vol 2, No. 5, pp 1 15, 2012.
8
Shrijit Joshi and Meghana Joshi, “Operating cost of IT infrastructure & hardware
procurement.” Manuscript under review for possible publication in International Journal in
Foundations of Computer Science & Technology.
Shrijit Joshi and Meghana Joshi, “Probabilistic determination of driver’s destination using
adaptive navigation system.” Manuscript under review for possible publication in International
Journal in Foundations of Computer Science & Technology.
EVIEWER/BOARD MEMBER
R
IEEE Transactions on Systems. Man, & Cybernetics – Part B.
International Journal of Computer Trends and Technology.
International Journal in Foundations of Computer Science & Technology.
ERTIFICATIONS
C
Information Security Awareness, The World Bank Group, Washington, DC, USA.
Think Security – Do your part, The World Bank Group, Washington, DC, USA.
DAY (now, Adobe) Communiqué 5.3 – Administration
DAY (now, Adobe) Communiqué 5.3 – Developer
Citrix Netscaler CNS 203
NDROID APPLICATIONS
A
Abstract Art Wallpapers
https://play.google.com/store/apps/details?id=com.mangodynamics.abstractwallpapers#?
t=W251bGwsMSwxLDIxMiwiY29tLm1hbmdvZHluYW1pY3MuYWJzdHJhY3R3YWxscGFwZXJzIl0.
Display Brightness Adjustment
https://play.google.com/store/apps/details?id=com.mangodynamics.brightness#?
t=W251bGwsMSwxLDIxMiwiY29tLm1hbmdvZHluYW1pY3MuYnJpZ2h0bmVzcyJd
8