Yashas Udupa N ( : +91-966*******
( :
*********@*****.***
Passed as an engineering graduate, I am keen to translate my curriculum
knowledge into practical application in a working environment, bringing in
value addition to the organization. I intend to work with best of my
abilities aligning with the goals / objectives of the organization
SUMMARY OF EXPERIENCE
PG Diploma (Embedded Systems) 2014
R.V VLSI -Design Center
B.E (Telecommunication engineering) 2009-2013
Vivekananda Institute of Technology-Affiliated to VTU
Aggregate: 65%(Till 8th semester)
Class 12
2009
KLE's Education Society-Karnataka State Board
Score: 75%
Class 10
RPA'S Association-Karnataka State board
2007
Score: 78.88%
TECHNICAL SKILLS
. Good exposure to technology by undergoing additional training in
Embedded Systems.
. Knowledge on 16bit and 32bit micro controller
. Good knowledge on Data Structure and Embedded C/C++ programming.
. Good working knowledge on Linux.
. Good knowledge on Hardware Debugging.
. Good Knowledge on OS Concepts.
. Knowledge on I2C and SPI Communication.
Academics:
> Internship:
Embedded Systems with ARM Cortex-M3 microcontroller - Technophilia
Systems
I have learnt the concepts of ARM Cortex - M3 microcontroller programming
using Embedded C & have conducted ample of experiments on interfacing of
different peripherals and input/output like Bluetooth module,
acceleration sensor, optical sensor, seven segment display, IR wireless
communication module, touch screen, external EEPROM module, optical
encoder for making contactless tachometer, speedometer, relay board used
in home and industrial automation systems etc
> Seminar:
Digital Processing-Steganography
Modern digital technology has made it possible to manipulate multi-
dimensional signals with systems that range from simple digital circuits
to advanced parallel computers. The goal of this manipulation i.e.
steganography is to give the next level of security during the
information transfer. Suppose if you have some secret data, you should
encrypt it to make it unreadable for the third party, data encryption is
done by its conventional methods. Even though with the encryption some
non ethical hackers they would be so ingenious to decrypt the message
hidden and get their work done with so ease. In order to avoid this
fraudulent activities Steganography has been brought into the action
where with its simple mechanism provides a high level of security.
Academic Projects
Title: Real time Routing on wireless sensor network systems
Role: Worked on coding adaptive clustering scheme
Organization: Vivekananda Institute of Technology
Duration of Project in
Months: 8
Description: Energy conservation is one of the biggest challenges in
wireless sensor networks, conventional routing protocols
such as LEACH, PEGASIS, and CCS try to minimize energy
consumption but consumed energy is still high because of
redundant data transmission. In proposed adaptive sector
clustering scheme (routing algorithm of my project), we
divide the network into concentric circular tracks and
triangular sectors. This division of tracks and sectors
helps to reduce energy consumption by minimizing data
transmission.
Tools Used : Matlab
Deliverable/Challenges Energy conservation is one of the biggest challenges in
Faced: wireless sensor network. It is successfully achieved by
using adaptive clustering scheme.
Achievements:
At Academics: Participated in inter-collegiate basketball tournament as a
team captain.
PERSONAL PROFILE
V NAME: YASHAS UDUPA.N.
V SEX: Male
V DATE OF BIRTH: 08/09/1991
V FATHER'S NAME: S.NAGARAJ
V PERSONAL ADDRESS: #66/b(1708),30th Cross,2nd
Block,Rajajinagar,Bangalore-10
V LANGUAGES KNOWN: English, Kannada and Tulu
DECLARATION:
I hereby declare that all the above information is true to the best of my
knowledge and any information if found to be false is only due to my
negligence.
PLACE SIGNED