
Experienced Data Analyst with expertise in Agile/SDLC processes, Python, SQL, and data visualization tools. Proven track record in developing web applications, generating graphical reports, and conducting exploratory data analysis. Skilled in database-level tasks, including writing triggers and stored procedures in MySQL. Proficient in Power BI and Tableau for creating insightful dashboards. Adept at business process modeling, data validation, and integrity testing. Strong problem-solving and presentation skills with a focus on delivering high-quality data insights.
Languages: Python, R, SQL, SAS, Pl/SQL Java, NET, GoLang, C, C, HTML, CSS, JavaScript, JQuery, PHP, Angular, Reactjs
Packages: NumPy, Pandas, Matplotlib, SciPy, ggplot2
Visualization and Other Tools: Tableau, Power BI, Microsoft Excel, Jira, Salesforce
Database: MySQL, SQL Server, Oracle, MS Access, Teradata
Tools, Framework, and Libraries: OpenCV, MongoDB, Pandas, NumPy, Keras, SciKit-Learn, TensorFlow, Matplotlib, AWS, Google Cloud Platform, NodeJS, Express, Hadoop, Linux, Django
Satellite Image Segmentation, Python, TensorFlow, Keras, OpenCV, matplotlib, 01/2022, 05/2022,
Implemented Image Segmentation using customized DeepCNN and evaluated along with UNet and ResNet for Satellite View Images. Reduced trainable parameters from 43.56 Million to 1.41 Million, also reduced the memory utilization and training time from 8 hours to 35 minutes.
Counting Vehicles in Lane, Python, OpenCV, Numpy, 01/2021, 05/2021,
Developed a detection program to count vehicles traveling in a single-lane video stream. Tackled the vehicle shadow overlapping issue with an accuracy of 92.22% on a cloudy day, 84.21% on Sunny days, and 89.79% at Night.
Encrypted Distributed File System, Python, socket, 01/2022, 05/2022,
Developed a Distributed File System (DFS) attributed with three server nodes, one master node, one scheduler, and multiple Clients. Contributed to implementing the following: DFS architecture, client authentication, input validation, data encryption, event logging, malicious activity detection, individual file accessibility, and scheduler for maintaining the functionality of the system.