N.Valli,
E-Mail ID : *************@*****.***,
Mobile : +91-994*******
OBJECTIVE
To succeed in an environment of growth and excellence and earn a job which provides me satisfaction and self employment and help me to achieve the excellence in the field of computer.
EDUCATIONAL QUALIFICATIONS
COURSE/DEGREE
INSTITUTION
BOARD/UNIVERSITY
YEAR OF PASSING
PERCENTAGE
BE-CSE
Francis Xavier Engineering College,
Tirunelveli
Anna University,Chennai
2016
6.8 CGPA
HSC
Victoria Girls’ Hr.Sec.School,
Tuticorin
Stateboard
2012
86%
SSLC
Victoria Girls’ Hr.Sec.School,
Tuticorin
Stateboard
2010
92%
AREA OF INTEREST
Asp.Net
Database Management System
TECHNICAL EXPERTISE
Languages: C, C++,Asp.net,Sql Server
Webdesign Language :HTML
Certification in Oracle
PROJECT
Final year project based on the domain Network
EXPERIENCE
1 Year experience at Phoenix systems with designation C# coding.
Working Period From 13th June 2016 to 13th June 2017.
My Project and Durations:
Data Leakage and Detection During (Jan 2017)
DESCRIPTION:
This paper contains the implementation of data leakage detection model’s technology. This paper deals with new technique of research for secured data transmission & leakage detection, if it gets leaked. A data distributor has given sensitive data to the trusted third parties (agents).if some data are leaked and found in an unauthorized place. The distributor must analyze that the leaked data came from (where) one or more agents. We propose data allocation strategies to improve the probability of identifying leakages. We can also add” fake object” to further improve our chances of detecting leakage and identifying the guilty party.
Two way Authentication In Hospital Management System. Duration( April 2017)
DESCRIPTION:
It simply based on hospital management system. Bt here we used OAuth function for authentication purpose. Each patient can have own id to login and can view then doctors updated files which are about some diseases. So the patient can search about any disease and they will be aware of that diseases. Patients also have own problems so they can ask some query to doctors which are more personal. Doctor also response to them. Bt if the patientwants to open that response he/she should enter the API keys of any social network. If they verified by authorisation then only they can view and download the doctors response and files.
Statistical Based Detection of Drifted Twitter Spam(October 2016)
DESCRIPTION:
Spam has become a critical problem in online social networks. This paper focuses on Twitter spam detection. Recent research works focus on applying machine learning techniques for Twitter spam detection, which make use of the statistical features of tweets. We observe existing machine learning based detection methods suffer from the problem of Twitter spam drift, i.e., the statistical properties of spam tweets vary over time. To avoid this problem, an effective solution is to train one twitter spam classifier every day. However, it faces a challenge of the small number of imbalanced training data because labelling spam samples is time-consuming. This paper proposes a new method to address this challenge. The new method employs two new techniques, fuzzy-based redistribution and asymmetric sampling. We develop a fuzzy-based information decomposition technique to re-distribute the spam class and generate more spam samples. Moreover, an asymmetric sampling technique is proposed to re-balance the sizes of spam samples and non-spam samples in the training data. Finally, we apply the ensemble technique to combine the spam classifiers over two different training sets. A number of experiments are performed on a real-world 10-day ground-truth dataset to evaluate the new method. Experiments results show that the new method can significantly improve the detection performance for drifting Twitter spam.
TECHNOLOGY USED:
ASP.NET, SQL Server, AJAX, C#, ADO.Net, Twitter API Keys
ID2S Password Authentication Key Exchange Protocol(Dec 2016)
DESCRIPTION:
In a two-server password-authenticated key exchange (PAKE) protocol, a client splits its password and stores two shares of its password in the two servers, respectively, and the two servers then cooperate to authenticate the client without knowing the password of the client. In case one server is compromised by an adversary, the password of the client is required to remain secure. In this paper, we present two compilers that transform any two-party PAKE protocol to a two-server PAKE protocol on the basis of the identity-based cryptography, called ID2S PAKE protocol. By the compilers, we can construct ID2S PAKE protocols which achieve implicit authentication. As long as the underlying two-party PAKE protocol and identity-based encryption or signature scheme have provable security without random oracles, the ID2S PAKE protocols constructed by the compilers can be proven to be secure without random oracles. Compared with the Katz et al.'s two-server PAKE protocol with provable security without random oracles, our ID2S PAKE protocol can save from 22 to 66 percent of computation in each server.
TECHNOLOGY USED:
ASP.NET, SQL Server, AJAX, C#, ADO.Net
Dynamical and Load Balance Flow Scheduling Approach in Big Data Centers(Mar 2017)
DESCRIPTION:
Load-balanced flow scheduling for big data centers in clouds, in which a large amount of data needs to be transferred frequently among thousands of interconnected servers, is a key and challenging issue. The OpenFlow is a promising solution to balance data flows in a data center network through its programmatic traffic controller. Existing OpenFlow based scheduling schemes, however, statically set up routes only at the initialization stage of data transmissions, which suffers from dynamical flow distribution and changing network states in data centers and often results in poor system performance. In this paper, we propose a novel dynamical load-balanced scheduling (DLBS) approach for maximizing the network throughput while balancing workload dynamically. We firstly formulate the DLBS problem, and then develop a set of efficient heuristic scheduling algorithms for the two typical OpenFlow network models, which balance data flows time slot by time slot. Experimental results demonstrate that our DLBS approach significantly outperforms other representative load-balanced scheduling algorithms Round Robin and LOBUS; and the higher imbalance degree data flows in data centers exhibit, the more improvement our DLBS approach will bring to the data centers.
TECHNOLOGY USED:
ASP.NET, SQL Server, AJAX, C#, ADO.Net
Other IEEE Projects are:
Online Ensemble Learning of Data Streams with Gradually Evolved Classes( July 2016)
Mining User Aware Sequential Topic Pattern of Document Streams(August 2016)
Statistical Based Detection of Drifted Twitter Spam(October 2016)
ID2S Password Authentication Key Exchange Protocol(Dec 2016)
Online Resource Scheduling of Concave Pricing( Feb 2017)
Privacy Preserving of Sensitive Data Exposure( Feb 2017)
Dynamical and Load Balance Flow Scheduling Approach in Big Data Centers(Mar 2017)
PERSONAL DETAILS
Date of Birth :02-07-1995
Father’s Name : V.Natarajan
Gender : Female
Marital Status : Single
Nationality : Indian
Linguistic Abilities : English and Tamil
Strength : Friendly Person, Help to others for Education, Self Confidence.
Permenant Address : C/O,N.Velayutham,
1/90 Main Road,
Vitilapuram (via) Seydunganallur,
Tuticorin(dis)-628809
DECLARATION
Hereby I declare that the information furnished above is true to the best of my knowledge and belief.
N.VALLI