Welcome Guest

Teaching Lecturer Faculty >> Lecturer 
Fresher Computer Science Lecturer Resume Sample

Sponsored Links:
    

Biodata

Name of the Candidate:[Private]
Name of the Post Applied:Computer Science Lecturer
Job related skills / software:Cloud computing, Computer networks, Operating system, Cryptography,Matlab, netbeans Java,SQL Server Express.
Category:Teaching Lecturer Faculty
Sub Category:Lecturer
Years of Experience:0 years
State:Tamil Nadu
Gender:Female
Salary Expected per Month(Rs):15,000 to 20,000
Highest Qualification attained:M.E. / ME : Master of Engineering
Major / Specialization:Computer Science
Email Id:[Private]
 
Are you looking for job now?:Yes
Can the recruiter contact you?:Yes
Sponsored Links:

Resume Format / CV Sample Template / Example / Model :

    

RESUME:
Punniya.K
Completed ME computer science,
Department of computer science and engineering,
Mailam college of engineering,

Email :punniyakumaran AT gmail.com

CAREER OBJECTIVE  :
To seek a position in the institution where I can be utilizing my abilities with the investment of hard work and confidence and develop my teaching skills.

ACADEMIC DETAILS :
2017 ME(CSE) Mailam college of Engineering 8.24/10
2014 B.Tech(IT) IFET college of Engineering 7.1/10
2010 Higher Secondary SRV higher secondary school 75.5%
2008 Secondary Govt.Girls.higher secondary school 95.4%

TECHNICAL SKILLS :
Programming Languages : C, C++,Java,SQL.
Softwares  : Matlab, netbeans java,SQL Server Express,photoshop.
Language  : C, C++,Basics of Java.
Platforms  : Windows 10 & Windows 10.1
Packages  : MS Office 2010,WPS.
Web Technologies : Basics of HTML,ASP.
Front End Tool :Visual Studio 6.8.

AREAS OF INTEREST :
** Cloud computing,
** Computer networks,
** Operating system,
** Cryptography.

M.TECH Project (2017- ) :
Title : Dynamic load balancing process on public cloud network.
Supervisor : S.PRATHIBA M.Tech,Mailam college of Engineering.
Description : Dynamic load balancing in the cloud environment has an important impact on the performance. Multimedia streaming applications and services, trusted video delivery to prevent undesirable content-leakage has, indeed, become critical. Their detection performance substantially degrades owing to the significant variation of video lengths. We focus on overcoming this issue by proposing a round robin algorithm and best-partition searching algorithm that is robust to the variation of the video length.

Good load balancing makes cloud service to be more efficient and improves user satisfaction. This article introduces a better load balance model for the public Network based on the Networking concept with a switch mechanism to choose different strategies for different situations. The algorithm applies the game theory to the dynamic load balancing strategy to improve the efficiency in the public cloud.

B.TECH Project (2010-2014) :
Title : Detection and localization of multiple spoofers in an wireless network.
Supervisor : M.Saravanan ME,IFET college of Engineering.
I did my final year B.Tech project on  : Detection and localization of multiple spoofers in an wireless network. Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements.

In this project we proposed to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries.


We proposed to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks.

CONFERENCESAND PUBLICATIONS :
Punniya.k, Dynamic load balancing process on public cloud network,Second International Conference on emerging trends in engineering(IRJAET) held on October 30th 2016.The paper has been published in www.irjact.com volume 2 Issue 6. page number : 71-81.

Punniya.k, Dynamic load balancing process on public cloud network,published during nov 2016 in the Second volume,Issue 6 of the International Research Journal in Advance Engineering and Technology.The paper has been published in www.irjact.com volume 2 Issue 6. page number : 71-81.

AWARDS  :
**  Best Paper Award2010 : Won the best paper award for the paper: Detection and localization of multiple spoofers in an wireless network,Fourth International Conference on Information Processing.

OTHER PROJECTS :
** Mini project on Magic Papers
** SQL Injection Attacks and Preventive Measures

CO-CURRICULAR ACTIVITIES :
Papers :Presented plenty of paper on new frangled topics and topnotched at Inter and Intra college symposia.
Seminars : Attended seminars on Redtacton technology ,Network security,Hardware and Personality Development.
Programs : Attended Infosys Foundation Program and has submitted post work as a part of RIA webinar series.
Industrial training :Client Query Registry ,Worked with the Oracle Web Support team in TCS,Chennai.

PERSONAL DETAIL :
Father’s Name :N.kumaran
D.O.B & Age :19.01.1993 & 24
Nationality :Indian
Marital status :Single

INTERPERSONAL SKILLS :
** Capable of tackle situation with excellent personal motivation,
** Communication skill with Perseverance and logical thinking,
** Optimistic thinker and Self Confident.

EXTRA CURRICULAR ACTIVITIES :
** Participated in comparing in various Internal Symposia.
** Has been an active vouleenter and co-ordinator of External events.
** Has awarded as many prize in athletics(Long jump,100 meters,volley ball)and drawing compitation in school days.

Social Work : Have participated in polio Free vaccination and Blood Donation camps.
Other Interests : Traveling,Painting, Photography, Pics Art,surfing Net.

DECLARATION :
I here by declare that all the information mentioned above is true upto my knowledge

Place :Villupuram
Date :12.02.2017

Yours Sincerely,
Punniya.K
 

Notes

1. This is an online resume, managed by the candidate.
2. Create your online resume here.
3. If candidate allows, recruiters can contact the candidate directly.
4. Personal and contact details can be kept private optionally by the candidate.
5. Create a link to this online resume where ever you want in the web.