Fourth-year Dual Degree student in Data Science and Telecommunication Engineering with an average grade of 8/10 with hands-on experience in data analysis, embedded systems, and web technologies. Built ML models, conducted security testing, and developed a hardware-based Snake game on STM32. Passionate about solving real-world problems through technology and eager to keep learning in dynamic engineering environments.
Designed and developed versatile websites for small businesses to enhance brand presence and grow client base using data analytics and AI techniques.
Worked as an extracurricular English and Mathematics teacher at a high school helping students improve their academic performance and confidence in these subjects.
Pursuing a one-year exchange program at Purdue University, combining courses in Computer Science and Electrical and Computer Engineering to deepen knowledge in data science and telecommunication engineering
Currently pursuing a dual degree.
Summer English classes
Completed high school with a dual diploma.
I completed a course in JavaScript, PHP, and MySQL Programming, which focused on the entire process of creating dynamic and interactive webpages. The course covered front-end development with JavaScript, server-side scripting with PHP, and database management with MySQL, providing a comprehensive understanding of web development.
Identification and exploitation of common security flaws in web applications through controlled penetration testing.
Designed and programmed a Snake-style game using buttons, LED matrix, TFT display, and SD card on STM32 implemented logic in C and Assembly for ECE 362 at Purdue University.
Exploratory analysis of Titanic passenger data in R to identify survival patterns based on age, sex, fare, class, and travel conditions.
Designed and implemented machine learning models using Weka to classify optimal snake movements and predict game scores using an automatic gameplay agent
General Purpose:(Java, Python, C, Bash)
Web Development:(HTML, CSS, JavaScript, PHP, MySQL)
Data Science Analytics:(R, RStudio, SQL, Neo4j/Cypher, Spark, PySpark, Hadoop)
Embedded Systems Hardware:(C, Assembly, Verilog)
Análisis del Apagón Eléctrico en España: 28–29 de Abril de 2025 (Spanish version)
Exploiting vulnerabilities on web services
Design of a 4-bit adder. Input two 4-bit numbers A &B, output is the 4-bit sum and a carry
Exploits and mitigations for stack, heap, and side-channel vulnerabilities in C programs using ROP, unlink attacks, and timing/fault-based analysis.
Process of designing an 8-bit shift register using CMOS 45nm technology, optimized for minimum complexity and high-speed.
This post analyzes multiple security vulnerabilities in C programs, focusing on buffer overflows and memory corruption exploits.
Should social media platforms have the power to influence the world trough political advertising?
Presentation of a project
This is the report of the Lab 3 of ECE 440 at Purdue University. In this case we are trying to hear airport tower AM signals.