SELVAM A
UI Designer & Developer
PROFILE
CONTACT ME
actwvo@r.postjobfree.com
no.42,Annamalai nagar,
vadamathur,chengam(t.k),
T.V.malai(d.t).
606702
www.facebook.com/
thavaselvama
PROFESSIONAL SKILLS
PROGRMMER WEB
INTERFACE DESIGN
GRAPHICS DESIGN
INFOGRAPHICS
3D MODULEING
GAMING
www.behance.net/thavaselvama
WORK EXPERIENCE
FOURSTEPS TRAINING SOLUTIONS PVT LIMITED / Till the Date PERSONAL SKILLS
UI DESIGNER & UI DEVELOPER : Designing and Converting web pages, Designing dashboard - framework in angular js cross - browser compatibility, Designing Infographic Designs Vector Animation Designing Banners, Brouchers, logos, advertisement mail Design, posters and Letters. EDUCATION
B.E (Computer Science Engineering) / 2010-2014
Annai Teresa College of Engineering,Thirunavalur
SECONDARY SCHOOL LEAVING CERTIFICATE /
Percentage Scored : 65.4%
2009-2010
Percentage Scored : 60.7%
Government Higher Secondary School, Thanipadi
CREATIVE
INNOVATE
TEAM WORK
HOBBIES
WEB DEVELOPER : Responsible for maintaining,
expanding and scaling our site, Register websites with search engines to increase website tra c, Analyze
user needs to determine technical requirements.
GRAPHIC DESIGN TEACHER :
Instructor and Trainer in Design Principles,
Graphic / Multimedia Design, SEO, Adobe
photoshop cc, Adobe Illustrator cc, HTML5, css3,
java script, Web Designer, Bootstrap and any other relevant Design and Develop areas.
Rich experience in Webdesigning,
and specialized in the areas of User
Interfacedesign, Interaction design
Vector, Illustration Design.I’m a creative
artist, problem solver, self motived,and
have a stubborn eye for details.
ONLINE PORTFOLIO
PROJECT WORK
This project explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ battery power. these “vampire” attacks are not speci c to any speci c protocol, but rather rely on the properties of many popular classes of routing protocols. we nd that all examined protocols are susceptible to vampire attacks, which are devastating, di cult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages.
VAMPIRE ASSAULTS DRAINING LIFE FROM WSN
DECLARATION
I hereby declare that the above ststement made by me are true Place : Chennai
Date :
(SELVAM.A)
PHOTOSHOP HTML5
ILLUSTRATOR CSS3
PHP
SEO
JAVASCRIPT
CLOUD
COMPUTING
ANGULAR JS
PROFICIENCE