Home

Work

Current Role: Cyber Security Analyst

Github

Experience

I officially began using Python to program during my fall semester of College in 2018.
Relevant Coursework: CSC Programming languages, ISDS Intro to Python

Software

Jupyter Pycharm Tensorflow

Work

MadisonPoster artwork

Experience

Started college learning how to program using Java in 2015.

Software

netbeans

Terms/Keywords

Abstraction Only essential details are displayed to the user(Only focusing on the important stuff). Identifying only the required characteristics of a class. In java it is achieved by interfaces and abstraction classes. If you are going to have abstract methods you need to have an abstract class, but you can have an abstract class without the methods.
Encapsulation Is data hiding and Abstraction is detail hiding.

Encapsulation Wrapping up data under a single unit. Prevents data from being used by code outside the shield. DATA-HIDING. Make all the variables private and then use public methods to set and get the values of the variables. Increases flexibility because the variables can be made read-only or write-only.

Generics Allow types such as Integers, Strings, ect be a parameter to methods, classes, interfaces. Hashset, ArrayList, HashMap uses them.

Primitives Data types Because Java is statically-typed it requires all variables to be declared before they can be used. Int, byte, short, Float..

Static A keyword. A member(method) can be accessed before an object of its class is created.

Protected An Access Modifier: Helps control access to members of a class

Switch multi-level branch statement. Provides easy way to dispatch execution to different parts of code based on the value of the expression. Has cases.

Try Defines a block of code to be tested for errors
Catch Define a block of code to be executed if there was an error in the try block.

If Statements Most basic control flow statement. The code is executed if the test evaluated is true.
Else Statements Provides a secondary path if the executed clause evaluates to false.

Public Vs. Private Private(method, variable) is limited to the class only.

Polymorphism When a parent classes is used to refer to a child class. The only way to access an object is through a reference variable. All java objects are polymorphic. Once declared, the type of a reference can not be changed. A class is polymorphic if it has multiple inheritance. A child class can override a method in a the parent class. Overriden method is hidden from the parent and is not invoked unless the super word is used.

Virtual Method Invocation When compiled, uses the method from the referenced class to verify the method but invokes the method of the class it points to(after the key word new).

Inheritance One class inherit the features(Fields and methods of another) Super Class, Sub Class, and Reusability

Extends Keyword. Is for extending a class. Have to override methods.

Implements Is for implementing an interface(method that has been created, but know defined)

Overloading Methods Methods within a class can have the same name if they have different parameter lists

Variables Have to be declared and then initialized (given some value.)

Experience

During my sophomore year of college, I completed a 48hr game jam with my 5 other teammates. I took CSC Video game design my senior year and presented an indiviual game and a group video Game.

Technologies

Unity Xcode Oculus Visual Studios

Work

attack

Indiviual Game Assignment: Prince's Dream

In this game the main character, son of a king, has been confronted by this father. His father expressed his concerns about his son's mental strength. The main character goes to sleep and has a dream that prevents him from waking up until he learns to believe in himself.

  • Scripts: https://github.com/llmaze3/PrinceDream
  • Animated sprites: Idle, Walking, Attack
  • Implemented music
  • Original storyline

Group assignment: King Slayer

This is a full campaign virtal reality game. Developed by myself and five other indiviuals. I was the leader of storyboarding and testing.

  • In-game narration (voiceovers)
  • 4 total fight scences
  • Interactive UI (settings menu)
  • 3-D artwork
  • Health bar

Experience

Relevant Coursework: CSC Operating Systems, CSC Intro Cyber Security, CSC Reverse Engineering and Malware Analysis

Software

wireshark kali kali

Work

Assuring Accurate Asset Inventory PDF

The image below is my class work reverse Engineering a virus in Ida Pro

ida

Reference

osi

Confidentiality: the state of keeping or being kept secret or private.
Integrity: the quality of being honest and having strong moral principles; moral uprightness.
Accountability Having the information available
Authentication: the process or action of proving or showing something to be true, genuine, or valid.
Authorization: specifying access rights/privileges to resources


Unicast: transmission/stream sends IP packets to a single recipient on a network. Multicast: transmission sends IP packets to a group of hosts on a network. Common network based services: Directory services. e-Mail. File sharing. Instant messaging. Online game. Printing. File server. Voice over IP.

Experience

My CSC Object Oriented Design group developed an app that was placed on the App Store. I created an imessage sticker application for fun. My friend and I have been working on developing an AR application for some time now: Vision713

Software

xcode unity photoshop

Work

animal paw prints

Animal Paw Prints

iOS message sticker application

  • Signed up for the Apple Developer program
  • All original photos (made in photoshop)

Barstat

Barstat

This app allowed users to get real-time information on Tigerland Bars in Baton Rouge.

  • Add friends
  • See how many people were at a bar and using the app
  • Favorite a bar
  • Get notifications from bars about specials

vision

Vision713 prototype

Take a picture with Houston themed 3-D objecs!

Experience

I began using databases during my sophomore year of college for an iOS application. During more senior year I began learning more about database management and programming in SQL
Relevant Coursework: ISDS Database Management, CSC Database

Software

workbench firebase

Work

ERdiagrans Sqlpics Sqlpics

This ER diagram shows 5 attributes and their relationships with one another. Below the diagrams is the Relational Data Model. The Primary keys and bolded and the foriegn keys are italicized.

Attribute Closure F = {TY → S, S → P, S → A}

Terms

What is a Database and what is a database management system? A shared collection of logically related data and its descriptions. It is designed to meet the information needs of an organization.
What is a relationship? Relationships specify the type of association between entities.
What is the definition of a foreign key? A column that is a primary key of another table.
What is referential integrity constraint?For every value of a foreign key there is a primary key in another table with that value. A primary key must exist before the foreign key can be defined.
What are the four important features of Data Warehousing? Sub-Oriented Data, Integrated Data, Time Variant Data, Non-Volatile Data
ELT To move data on operational data source to centralized data warehousing system, the data destined for an Enterprise Data Warehouses (EDW) must first be (1) extracted from one or more data sources, (2) Transformed into a form that is easy to analyze and consistent with data already in the warehouse, and then finally (3) Loaded into EDW.
What is database security? The mechanisms that protect the database against intentional or accidental threats.
Four tasks that are associated with data administration: Authorization, Access controls, Views, Backup and recovery
Boyce Codd Normal Form (BCNF)
First Normal Form: The domain has to be atomic.
Second Normal Form: Have to be in first normal for and remove all partial dependencies. Fuctional Dependency: Require that the value for a certain set of attributes determines uniquely the value for another set of attributes.
Third Normal Form: Remove transitive dependencies by moving them to a new table and creating a foriegn key to reference that table.
Armstrong’s Axioms: reflexivity, augmentation, transitivity

1. Binary Search Trees Goal: Search for an item in an array. Method: Divide and conquer. First find the middle element. IF the key is (==) to the middle then that is the answer. IF the key is greater then just worry about the upper portion of the arry and if the key is lower then just worry about the lower half. The time complexity is O(log n)

Waterfall

Traditional model, used on devices such as remotes where the developers know exactly how to develop it. Once started, developers can't go back and make changes.

V-Model

Used by Army and NASA. Each line of code has to work so it is verfied each step of the way. If not, the client might sue. This is a very expensive architecture.

Prototyping

Client doesn't know what they want so as the developer you continue to make prototypes.

Spiral Model

Advantages of using: Someone might leave the team, risk analysis, study different alternatives, take the least risky one.

Agile Methods

The customers are always available. It is simular to waterfall, but changes can be made.

Extreme Programming

(Pair Programming) There is a driver and an observer. Refractoring, on-site customer, rubber duck debugging.

Types of Requirments

Fuctional

Describes required behavior in terms of the required activities.

Non-Functional

How? Describe some quality characteristics that the software must posses. All of the -ability words

Contraints

Design decision such as choice of platform or interface components. Process contraints: restriction on the technique or resource to build the system.

Experience

I have been using photoshop to create art and flyers since 2011.

Software

photoshop

Flyers

MadisonPoster

Single Artwork

artwork artwork