Hi, It's Me
I'm Baskaran s
I completed B.Tech degree from Sri Balaji Chockalingam Engineering College, Anna University, and a strong interest in Fullstack Development.
I completed B.Tech degree from Sri Balaji Chockalingam Engineering College, Anna University, and a strong interest in Fullstack Development.
I am committed and loyal professional known for my strong work ethic and leadership abilities. Punctuality is one of my primary strengths, and I consistently prioritize work completion on schedule. Being a quick learner enables me to adjust quickly to new difficulties. My passion to perfection drives me to complete work efficiently and effectively. I am proud of my abilities to lead and inspire people, generating a happy and productive work atmosphere. My dedication to my work and ability to complete projects on schedule make me a valuable asset to any team.
Read moreI completed UG at Sri Balaji Chockalingam Engineering College, Arni Anna University, In the Degeree B.Tech in Information Technology.
learn MoreI completed Higher Secondary at Government Higher Secondary School Renukondapuram in the State Board and in my group of Bio-math, my percentage is 58%.
learn MoreI completed Secondary School from Government Higher Secondary School Renukondapuram through the State Board, and my SSLC percentage is 77%.
learn More• The course covered a wide range of topics, including network security, cryptography, threat analysis, risk management, and other related fields.
• The course covered a wide range of topics, including HTML, CSS, JavaScript, server-side scripting, database integración, and other related fields.
Ransomware, as a specialized form of malicious software, has recently emerged as a major threat in computer security. In the context of ransomware, a proactive approach is imperative to stay ahead of adversaries who continuously refine their tactics. Generative Adversarial Networks (GANs), a class of artificial intelligence models, have shown remarkable success in various domains. In ransomware defense, RanGAN is tailored to understand and generate synthetic ransomware samples, enabling the creation of resilient defense mechanisms. Hash Conceal introduces an innovative layer of defense by concealing critical files through cryptographic hashing techniques
Blockchain technology allows transparent information sharing within a business network. It uses identification of real and fake products through scanning QR codes. This technique is used to watch the supply chain in the market. The proposed system not only stops the making of fake products but also spreads awareness about it.
lorem upsu dirt anet ibsectur addioisicekk illum mull eaGo Make Something Awesome Font Awesome is the internet's icon library and toolkit used by millions of designers, developers, and content creators. Made with and in Bentonville, Boston, Chicago, Grand Rapids, Joplin, Kansas City, Seattle, Tampa, and Vergennes. labot ques? With a proven track record of reliability, I am seeking an opportunity to leverage my