An exploration into categorization of fraudulent ad images that attempt to steal brand copyrights
A diverse and applicable process automation platform intended to simply mundane or repetitive user actions
A basic home security system that can run using only a Raspberry Pi, webcam, and a gmail account
GUI healthcare system allowing management, providers, and operators to work on the same data
Exploration of TOR exit node data, wherein a total of 4.5 terabytes were collected over 6 months and analyzed for trends, general use cases, and connection types.
Primary Contributing Role: Programming and Data Analytics