Dec'22

Distributed Systems

  • Simple client: The client connects to a Group Coordinator Daemon through a TCP/IP connection. It sends a message to the list of group members, prints out the responses, and exists.
  • Detection with Published quote: Implemented the Bellman-Ford algorithm which utilize UDC/IP connections to monitor currency exchange rates from a price feed and prints out a message whenever arbitrage opportunities in reverse order (showing losses instead of profit)
  • Distributed Hash Table:Chord is a P2P lookup service that allows any node to join the group when the DHT is not fully filled, and ither nodes to update their finger tables on each joining. Queriers are able to interact with any node on the network to retrieve a value for a given key or add a key/value pair.
  • BitCoin Blockchain: A P2P connection is used to fetch an old block from the BitCoin blockchain (TCP/IP). Our SU IDs corresponds to block numbers. A transaction in the block can be modified to change its output account. Represent the modified data correctly in the block. Reports generated by programs should show how the block hashes have changed and how peers may reject the block. Block transactions are displayed.
Feb'22

Image Processor

An image processing application was developed and the user provide an image in specified format. The API allows user to performs combination of operations like flip, rotate to certain degree, resize, generate thumbnail and change images to greyscale.

Feb'22

Postal Address Handler

Designedweb-basedUI form that can capture a country-specific addressformat entered by user. The API dynamically capture the address formats and present the list of addresses to the user.

March'22

Crack leaked password database

One of the responsibilities of a governance analyst is to gauge the effectiveness of controls implemented and minimize the probability of a successful breach. If you are a security professional, you will often need to know the methods that hackers use to defeat controls implemented within an organization, as well as suggest ways to improve security overall. Once the attackers acquire valid credentials they can access an organization's IT system, which allows them to avoid many of the perimeter security controls in place.

Dec'21

Tennis-game

Tennis is an arcade game which is played using paddles (racquets). This project is made keeping in mind a single player and it's opponent as an computer bot. The left paddle is being controlled by a player who uses his mouse to control the paddle, whereas the right paddle decides it's moves based on the tennis ball's position on the canvas. A player scores a point when his opponent misses to strike the ball. This project is developed using JavaScript and HTML5.

Dec'21

RedHawks Digital Libraby

Team Redhawks created a digital library consisting of a collection of selected Computer Science books. Our product invites all levels of expertise who share a common interest in the field of computing. Our team gathered eBooks interrelated to the discipline and will be providing details, description, author(s), publication date, copyright, and etc. Our main objective was to collect these notable resources and have them readily available on one platform.