Portfolio

Projects

A comprehensive catalog of engineering projects, research prototypes, and system architectures.

ID: EXPLAINABLEAI
AI/ML

ExplainableAI Email Phishing

AI-powered phishing detection with explainable AI achieving 98% accuracy

PythonMachine LearningExplainable AIChrome Extension
ID: EVOLVEMORAL
Educational Tech

EvolveMoralMaze

AI ethics educational game with evolving moral decision paths

HTML5JavaScriptAI EthicsGame Design
ID: VOICE
AI/ML

Voice Mind AI

Research-based voice analysis platform for mental health screening using ML

PythonMachine LearningVoice AnalysisMental Health
ID: DECALCULATOR
Web Development

DeCalculator

Real-time collaborative calculator with advanced modes and chat

TypeScriptReactFirebaseReal-time
ID: PICPROMPT
Web Development

PicPrompt

AI drawing & guessing multiplayer game with Google AI Imagen

ReactFirebaseGoogle AI ImagenMultiplayer
ID: CPUSCHEDULE
Systems

CPU Schedule Simulator

Operating systems CPU scheduling algorithm visualization

JavaOS ConceptsAlgorithm Visualization
ID: LINUX
Security

Linux System Hardening

Comprehensive security hardening scripts for Linux systems

ShellLinuxSecuritySystem Administration
ID: CRYPTOGRAPHY
Security

Cryptography Cipher Cracker

Collection of cryptographic algorithms with AI-powered decryption

JavaCryptographyAILlama 3.3-70B
ID: CONROC
AI/ML

ConROc Helper

WoW Classic visual automation using OpenCV computer vision

PythonOpenCVComputer VisionAutomation
ID: CRYPTOGRAPHY
Security

Cryptography Library

Security library with RSA, AES, and Diffie-Hellman implementations

JavaRSAAESDiffie-Hellman
ID: ASSEMBLY
Systems

Assembly Prime Finder

x64 assembly implementation of prime number finding algorithm

Javax64 AssemblyLow-level Programming
ID: BINARY
Systems

Binary Calculator

Digital computer organization binary arithmetic calculator

JavaBinary LogicComputer Organization
ID: RISK
Security

Risk Assessment Drafting

Comprehensive risk assessment framework and documentation

Security PolicyRisk AssessmentDocumentation
ID: BYOD
Security

BYOD Policy Drafting

Bring Your Own Device security policy framework

Security PolicyBYODNetwork Security