You are on page 1of 1
Shameek Barman Alumnus of Visvesvaraya Technological University (VTU), Karnataka Phone: #919535791807, Email: shameekbarman1998@gmailcom +971585696326 Residence: Bangalore, India GitHub: github.com/adkloper CAREER OBJECTIVE: PROJEC want to begin a profession in electronic or computer 1. Object Detection, Identification & Gesture communication-based technologies. | have an electronics background with some knowledge in computer science. EDUCATION: B.Tech., Electronics and Communication: Acharya Institute of Technology, Bangalore under VTU Passed out in 2022 GPA: 5.25 Senior Secondary (XiIl), Science: Our Own English High School, (Boys! Branch), Sharjah, UAE. (CBSE board) Year of completion: 2016 Percentage: 66.80% Secondary (x): Our Own English High School, (Boys’ Branch), Sharjah, U.A.E. (CBSE board) Year of completion: 2014 CGPA: 9.20/10 TECHNICAL SKILLS: Raspberry Pi Arduing Linux (Ubuntu-based and OpensUsE) Microsoft Office (Word, PowerPoint, Excel) Python Programming language Control Using Machine Learning & Open CV (1o/2021-07/2022). Makes use of a Raspberry Pimicrocomputer and Picamera or USB Camera as hardware. Uses of the Inception¥3 image recognition modal to form (Rol) Region of Interest pooling layers. Uses NumPy, TensorFlow Lite, GpencV and Flask to set up the runtime for object detection interface. Object detection is dane with the gaogle-coral API (Application Programming intertace}, tensorflow.org API is used for image classification. The code is written in Python and uses HTML, JavaScript, and PHP for backend. INTERNSHIP: Cybersecurity from skiliDzire (12/05/2022. (99/06/2022): The internship was conducted ‘through online live sessions and was covered ina span of 4 weeks by SkillDzire, an online training platform. The topks covered during the internship are as follows: ‘Week 1: Cybersecurty Introduction, Cryptography and Security Audit. Week 2: Scanning and Patching, Sniffing and DoS and Vendor Risk Management. ‘Week 3: Vendor Risk Identification, Vendor Risk Assessment, IDS, Firewalls and Honeypots. ‘Week 4: Cloud Computing, Malware Threats, and Social Engineering. Also covered the various applications and software tools relating to the various cyber security applications. LANGUAGES:

You might also like