• Resume
  • About Me
  • Work Experience
  • Blog
  • Python, Flask, ngrok

    Whatsapp Bot in Python

    This project is a Flask-based chatbot that utilizes the Google Search API and Twilio messaging to provide users with search results based on their queries. Users can send a text message containing their search query, and the bot responds with the top three URLs related to the query. It demonstrates integration of multiple APIs for information retrieval and communication, offering a simple yet effective tool for accessing relevant online content via WhatsApp.

  • React, Python

    Delivery Management System: BTown-Dash

    BTown-Dash is a Delivery Management System which provides customers a convenient platform to select delivery services from a diverse range of options. It serves as a centralized hub for customers and business owners to facilitate the global delivery of their items, providing assistance in obtaining the most favorable quotes through its website.

  • Javascript, HTML, CSS

    Chrome Extension

    A Chrome extension provides users with the ability to effortlessly save URLs with a single click. Beyond simplifying the process of bookmarking, it offers a convenient feature by presenting a comprehensive list of all previously saved URLs. This means that users can easily access and manage their collection of saved links directly through the extension, streamlining the way they organize and revisit web pages of interest.

  • OpenCV, Python

    Virtual Mouse Using Color Code Technique

    Developed an innovative solution using OpenCV to create a virtual mouse that proficiently executes computer mouse events by interpreting the colors displayed through the web camera. Implemented real-time color recognition, image filtration, and color matching algorithms to perform accurate mouse actions corresponding to color pointers captured by the camera.

  • Security, IoT

    Review on Data Flow Risk based on IoT

    Published in: 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). This paper focuses on IoT architecture, security threats, and strategies to safeguard devices against cyber-attacks, emphasizing the need to address these challenges for a secure IoT environment.