I aspire to learn everyday and use my talents to work in real life. I aim to use my computer science degree to create and have fun!!
My main goal is to be well rounded in the world of computing especially in how to secure a network, create intersesting and Eye popping web designs.
Aspiring Jobs
- CyberSecurity Specialist
- I.T. Specialist
- Web Development
Currently a College Student at the โ๏ธ University of Texas at El Paso (UTEP) โ๏ธ
- GPA: [3.82]
- MAJOR GPA: [3.87]
- Math Minor
Degree
- Associate of Arts in Computer Science @ El Paso Community College
- Personal
- Simulation model to imitate how a sonar identifies an item.
- In this project I use a dataset with two items: [๐ชจ] Rock and [๐ฃ] Mines.
- Personal
- Using a dataset to analyze the user's input and use match pattern to categorize
possible options that are similar to those of the user's input.
- A user inputs their favourite [โญ] movie and the program will give
suggestions of other [๐ฅ] movies to recommend to watch.
- Personal
- Demonstrating the process of training and evaluating a machine learning model.
- The model is trained on a dataset and evaluated for its performance on a test set.
- From a list of handwritten [๐ข] digits, the model shall accurately determine what digit from a chosen index. [#๏ธโฃ]
- Personal
- Observe how well a program is able to generate a number from a previous iteration or image using DCGAN
and predict the number trying to generate. [๐ข]
- (DCGAN) A Deep Convolutional Generative Adversarial Network is a type of Generative Adversarial Network that uses
deep convolutional neural networks in its architecture.
- GANs are a class of machine learning frameworks designed for generative modeling,
where the goal is to generate new data samples that resemble a given dataset.
- Personal
- Main Purpose: To ignore YouTube's Algorithm and only view videos you personally want to search for.
- A [๐ด] YouTube clone is a web application designed to mimic the functionality and features of YouTube,
the popular video-sharing platform.
- Building a YouTube clone involves creating a platform where users can search, view thumbnails, interact with videos,
and view YouTube Channels.
- Personal
- Create a personal webpage for the weather. [โ
]
- Personal
- The user has the ability to personally input a sudoku and the program shall
either solve the sudoku or output "No Solution". [๐ข]
- Personal
- The user can input a [โ๏ธโ๐ฅ] URL and customize the color scheme of their custom QR Code.
- Course Work
- CS 4177, Software Vulnerabilities.
- Created installation tutorial, video walkthrough, mutliple powerpoints & a class excercise that students can perform.
- [๐พ] Powershell-Empire was an open-source post-exploitation agent to
"assess resilience of systems against cyber threats."
- Our team utilized the Kali-Linux with Powershell-Empire & A virtual Machine running Windows 7 for the excercise.
- Course Work
- CS 3331, Adv. Object Orientation.
- **Disclaimer** Ticketminer uses a pre-set of data with FAKE user accounts, names, events, venues, and prices.
- [โ๏ธ] Utilize course lessons of file handling, dynamic structuring using UML Diagrams, design patterns, and polymorphism to emulate Ticketmaster.
- Just like Ticketmaster, [๐๏ธ] Ticketminer has an admin and a user/customer. An admin can add, update, and remove events or venues,
while customers are limited to only buying or canceling one or more tickets. The customer can vue their order in their own invoice directory.
- Course Work
- CS 2401, Elem. Data Struct./Algorithms
- Utilize the Dijkastara Method to find the shortest path between El Paso Community College locations and
University of Texas at El Paso.
- Personal
- A single-page web application for "[๐ชจ]Rock, [๐] Paper, [โ๏ธ] Scissors" where a player competes against a CPU.
- Involves building a simple interactive interface and backend logic to handle game mechanics and outcomes.
- Personal
- A [๐งโโ๏ธ] Hangman game web application which allows players to try to guess a hidden word by suggesting letters.
- Each incorrect guess results in a part of a hangman figure being drawn.
- The game ends when the player either guesses the word [๐] correctly or runs out of chances. [๐]
- Personal
- The [๐] clock has both standard and military time for all users.
- This clock may not be enjoyable for all, but it is to me and gives tribute to a creator. [๐ง]
~ Methodologies, approaches, and techniques associated with software requirements analysis and definition.
~ First semester of a two-semester CAPSTONE project working alongside peers and a client.
~ Captured and specified requirements for a real-world application, to be coded in Fall 2024.
Roles: Team Leader / Behavior Manager
Grade: [A]
~ Network architecure, protocols, IP and MAC addressing, routing, and switches to enable communication between
devices
~ Required and performed many server to client or client to client projects using TCP and UDP.
Grade: [A]
~ Circuit and Packet Switching, wireless communication principles, network design and architecture,
various wireless standards (such as Wi-Fi, Bluetooth, and LTE), and techniques for optimizing
wireless network performance.
~ Captured and received radio waves from air traffic control with 4 other members using a
Quarter Wave Ground Plane Antenna, GNU Radio Software, and a RTL-SDR.
Grade: [B]
~ Developed a comprehensive framework and functionalities, encompassing .csv file management,
dynamic structures to enhance modularity, and the application of design patterns,
to emulate the operations of Ticketmaster.
~ after working individuallly, then my peers combined, innovated, and refacotred each others code.
~ Learned their approach into programming and implementation of JUnit testing and Javadoc made communication better.
Grade: [A]
~ Insight into the internal structure, design, and operational principles of computer systems, assebly proccessing,
and optimizing system performance and data management.
~ Learned the input/output of assembly and machine language, including memory-mapped I/O.
~ Created a Pong Game designed as a Tennis Game MSP-430 project that included interrupts and exception handling.
Grade: [A]
~ Theoretical computing models used to study the behavior of systems with a finite number of states, transitions,
and inputs.
~ Some models used were but limited to pushdown automata, context-free grammars, Turing machines and computability.
Grade: [A].