Summary
Work History
Education
Skills
Certification
Timeline
Projects
Projects
Generic
DILEEP MARUPUDI

DILEEP MARUPUDI

Cincinnati,Ohio

Summary

IT master’s student who is precise and has a strong interest in data engineering. I use my academic background and advanced technical abilities to make a meaningful contribution in a data-driven workplace. Enthusiastic about putting theoretical knowledge to use in practical settings and deeply committed to streaming data pipelines improving data quality and generating business insights via creative thinking.

Work History

Machine Learning

Rinex Technologies
Hyderabad
01.2022 - 02.2022
  • During my internship at Rinex technologies, I focused on implementing object detection algorithms using Python
  • I successfully developed and used harcascade classifier
  • My responsibilities included preprocessing data and deploying models in production environments
  • I collaborated with cross-functional teams to integrate object detection systems into applications, contributing to projects like a real-time detection system
  • Through this experience, I enhanced my skills in machine learning and model evaluation.

Education

Masters in lnformation Technology -

University of Cincinnati
Cincinnati, Ohio

Information Technology -

Gokaraju Rangaraju Institute of Engineering and Technology
Hyderabad, India

Skills

  • Python
  • Google cloud platform (GCP)
  • SQL
  • BigData analysis
  • Pandas
  • Numpy
  • Scikit-learn
  • TensorFlow
  • Airflow

Certification

  • THE JOY OF COMPUTING PYHTON (NPTEL) - (07/2021 - 10/2021)
  • PROGRAMMING, DATA STRUCTURES AND ALGORITHMS USING PYTHON (NPTEL) - (01/2022 - 03/2022)
  • ARTIFICIAL INTELLIGENCE WITH MACHINE LEARNING (ORACLE) - 04/2022
  • WHAT IS DATA SCIENCE? (IBM) - 05/2024

Timeline

Machine Learning

Rinex Technologies
01.2022 - 02.2022

Masters in lnformation Technology -

University of Cincinnati

Information Technology -

Gokaraju Rangaraju Institute of Engineering and Technology

Projects

REAL TIME HUMAN DETECTION AND COUNTING

01/2022 - 05/2022

The primary task in the project is to detect objects which are in motion. It is performed using some techniques such as optical flow, background subtraction and spatial-temporal filtering techniques. Once a moving object is detected, it is further classified using shape- based, texture-based or motion-based features. Thus, humans are detected and the count of humans are also recorded by using the created mode.

PRIVACY PRESERVING MECHANISM USING BLOCKCHAIN TECHNIQUES

08/2022 - 12/2022 

To avoid security problems and offer better protection in a cloud environment, we have used “fully homomorphic encryption (FHE)” and “SHA” algorithms to provide encryption. If any of the unauthenticated users are trying to access the file initially. The system checks the key matching parameters. The proposed model was developed to provide better security for text-based files presented in the cloud environment. 

PRIVACY PRESERVING MECHANISM USTNG BLOCKCHAIN TECHNIQUES (Extension)

01/2023 - 05/2023

The proposed model was developed to provide better security for mufti-media files which includes image files and text files which are in the cloud environment. The proposed model will do performance evaluation before and after attack launching (DOS attack, Brute Force attack). In the performance analysis, the performance rate of the proposed model is evaluated. However, the parameters in the proposed model were compared with the existing model to make sure better performance was attained through the proposed model. 

Projects

REAL TIME HUMAN DETECTION AND COUNTING

01/2022 - 05/2022

The primary task in the project is to detect objects which are in motion. It is performed using some techniques such as optical flow, background subtraction and spatial-temporal filtering techniques. Once a moving object is detected, it is further classified using shape- based, texture-based or motion-based features. Thus, humans are detected and the count of humans are also recorded by using the created mode.

PRIVACY PRESERVING MECHANISM USING BLOCKCHAIN TECHNIQUES

08/2022 - 12/2022 

To avoid security problems and offer better protection in a cloud environment, we have used “fully homomorphic encryption (FHE)” and “SHA” algorithms to provide encryption. If any of the unauthenticated users are trying to access the file initially. The system checks the key matching parameters. The proposed model was developed to provide better security for text-based files presented in the cloud environment. 

PRIVACY PRESERVING MECHANISM USTNG BLOCKCHAIN TECHNIQUES (Extension)

01/2023 - 05/2023

The proposed model was developed to provide better security for mufti-media files which includes image files and text files which are in the cloud environment. The proposed model will do performance evaluation before and after attack launching (DOS attack, Brute Force attack). In the performance analysis, the performance rate of the proposed model is evaluated. However, the parameters in the proposed model were compared with the existing model to make sure better performance was attained through the proposed model. 

DILEEP MARUPUDI