RESUME
M.NAGAMANI Email:*********.***@*****.***
***/***.******* ***** ***** street, MOBILE NO: 741-***-****
Muthu Krishn Puram,
Kadayanallur-627751
Tirunelveli,Tamil Nadu.
CAREER OBJECTIVE:
To be a part of a venerated organization where my full potentials may be reached and to build a successful career in an organization which will utilize my skills and provide me an opportunity to enhance my knowledge and ability.
ACADEMIC CREDENTIALS:
Course
Board / University
% of Marks
Year of Passing
MCA
S.Veerasamy chettiar college of engineering and Technology-Anna University Chennai
7.6 CGPA
2015
B.Sc
(COMPUTER SCIENCE)
Mano college-MS University
79%
2012
12th
Government Girls Higher Secondary School -State Board
72%
2009
10th
Government Girls Higher Secondary School -State Board
61%
2007
PROFESSIONAL CAPABILITIES:
AREAS OF INTEREST : Java,Oracle
PROGRAMMING LANGUAGES : C,C++,Java,Visual Basic.
OPERATING SYSTEM : Windows,Linux
DATABASE SYSTEM : SQL,MS-Access
PROJECT PURSUED:
UG PROJECT:
TITLE
RICEMILL MANAGEMENT SYSTEM
FRONT-END
VISUAL BASIC 6.0
BACK –END
MS-ACCESS 2005
PROJECT DESCRIPTION:
“RICEMILL MANAGEMENT SYSTEM” is developed to computerize for maintaining the details of available stock, customer information, updating the current product information details, billing and import transaction.The billing rate and capacity differs for both. This can be easily maintained and charged accordingly. The stock of market product and all its details are processed swiftly.
PG PROJECT:
TITLE
A SECURE INTRUSION DETECTION SYSTEM AGAINST DDOS ATTACK IN WIRELESS MOBILE NETWORK SERVICE PROVIDES
FRONT-END
DOT NET
BACK –END
SQL SERVER
PROJECT DESCRIPTION:
Malware is pervasive in networks, and poses a critical threat to network security. However, users have very limited understanding of malware behavior in networks to date. In this paper, to investigate how malware propagate in networks from a global perspective. To formulate the problem, and establish a rigorous two layer epidemic model for malware propagation from network to network. Based on the proposed model, our analysis indicates that the distribution of a given malware follows exponential distribution, power law distribution with a short exponential tail, and power law distribution at its early, late and final stages, respectively. Extensive experiments have been performed through two real-world global scale malware data sets, and the results confirm our theoretical findings.
ACHIVEMENTS:
I have the following certificate
Microsoft certified professional
Microsoft Technology Associate
Microsoft Office Specialist-Office Excel(2013)
Microsoft Office Specialist-Office Power Point(2013)
STRONG POINTS IN MYSELF:
Hardworking towards the achieving the Goal.
Intellectual thinking.
Flexibility in technical area.
PERSONAL DETAILS:
Name : M.Nagamani
Father’s Name : T.Mariappan
Mother’s Name : M.Sangaranantham
Gender : Female
Date of Birth : 11.05.1992
Language Known : Tamil & English
PassPort Number : N4683070
Passport Valid Upto : 2015-2025
DECLARATION:
I do hereby declare that the above details are true to the best of my knowledge and I assure you that, if I were given a chance to work in your concern, I will produce my best to be a part of your company.
Place : Signature
DATE: (M.Nagamani)