Shameek Barman
Alumnus of Visvesvaraya Technological University
(VTU), Karnataka
Phone: #919535791807, Email: shameekbarman1998@gmailcom
+971585696326
Residence: Bangalore, India GitHub: github.com/adkloper
CAREER OBJECTIVE: PROJEC
want to begin a profession in electronic or computer 1. Object Detection, Identification & Gesture
communication-based technologies. | have an
electronics background with some knowledge in
computer science.
EDUCATION:
B.Tech., Electronics and Communication:
Acharya Institute of Technology,
Bangalore under VTU
Passed out in 2022
GPA: 5.25
Senior Secondary (XiIl), Science:
Our Own English High School, (Boys!
Branch), Sharjah, UAE.
(CBSE board)
Year of completion: 2016 Percentage: 66.80%
Secondary (x):
Our Own English High School,
(Boys’ Branch), Sharjah, U.A.E.
(CBSE board)
Year of completion: 2014 CGPA: 9.20/10
TECHNICAL SKILLS:
Raspberry Pi
Arduing
Linux (Ubuntu-based and OpensUsE)
Microsoft Office (Word, PowerPoint, Excel)
Python
Programming language
Control Using Machine Learning & Open CV
(1o/2021-07/2022).
Makes use of a Raspberry Pimicrocomputer and
Picamera or USB Camera as hardware.
Uses of the Inception¥3 image recognition modal
to form (Rol) Region of Interest pooling layers.
Uses NumPy, TensorFlow Lite, GpencV and Flask
to set up the runtime for object detection
interface.
Object detection is dane with the gaogle-coral API
(Application Programming intertace},
tensorflow.org API is used for image classification.
The code is written in Python and uses HTML,
JavaScript, and PHP for backend.
INTERNSHIP:
Cybersecurity from skiliDzire (12/05/2022.
(99/06/2022): The internship was conducted
‘through online live sessions and was covered ina
span of 4 weeks by SkillDzire, an online training
platform. The topks covered during the internship
are as follows:
‘Week 1: Cybersecurty Introduction, Cryptography
and Security Audit.
Week 2: Scanning and Patching, Sniffing and DoS
and Vendor Risk Management.
‘Week 3: Vendor Risk Identification, Vendor Risk
Assessment, IDS, Firewalls and Honeypots.
‘Week 4: Cloud Computing, Malware Threats, and
Social Engineering.
Also covered the various applications and software
tools relating to the various cyber security
applications.
LANGUAGES: