How To Write A Curriculum Vitae For Software Engineer in Word Format Free Download -->

How To Write A Curriculum Vitae For Software Engineer in Word Format Free Download

Sample Template Example of Beautiful Excellent Professional Curriculum Vitae / Resume / CV Format with Career Objective, Job Profile & Work Experience for Freshers & Experienced in Word / Doc / Pdf Free Download



PROFESSIONAL SUMMARY:
Raymond Garcia has a consulting career that spans over 18 years.  In addition to pursuing research interests (please see the list of publications below), he has participated in the full lifecycle of software product development in various roles mostly held simultaneously in terms of system integration, lead architect and developer/implementer. 
Information Assurance & Security: work in these areas involved designing systems carrying various conceptual mappings to cyber defense involving mathematical, behavioral, biological, social, spacial, and temporal aspects.  This work manifested in the form of applying topics such as neural networks, evolutionary strategies, fuzzy inference, and genetic algorithms to information assurance problems (intrusion prevention, application security, denial of service, insider threat detection, etc.)
Dr. Garcia has a strong interest in applying his research skills for technology transfer and has a consistent interest in considering a commercialization strategy.  This is evidenced in his work with the SBIR programs having won several grants to apply his research ideas to the commercial world.
The skills utilized through this body of work include multi-threaded network programming with server-side, desktop, as well as embedded platforms that include using C++, Java/J2ee, WinCE, and PowerTV (cable settop) as well as projects that relate to the following:
- COTS integration, Web 2.0 development (GWT), information assurance, computer forensics, soft-computing, embedded software development for various platforms: Linux, iOS, WinCE, PowerTV; software development that interfaces with lab and field hardware; application-specific FPGA prototyping and multi-platform driver development. In addition to hands-on development, taught courses on a variety of topics including Java, C++, OO UML-based design concepts, metropolitan area networks, signals and systems, probability and random variables, and digital subscriber networks.


TECHNICAL SKILLS (SUMMARY):
Software/Dev Environments
IDE: Eclipse, GWT Designer, Netbeans, Matisse, Visual Studio/TS; Version Control: VSS, Perforce, CVS, SVN; Modeling & Simulation: Rational Rose, UMLet, MATLAB, Magic, Spice, QEMU, Micro Cap, MAPLE V, Mathematica, Opnet, NS-2; Web: Tomcat/Apache/IIS, WebSphere, WebLogic, WAPT; Multimedia: Flash, Photoshop, Gigapocket, Audacity; FPGA: Xilinx ISE, ActiveHDL
Languages
Java, Swing, J2EE, JSP, Servlets, JavaScript, C, C++, PHP, Microsoft: C#, MFC, Visual C++, ASP.NET, EmbedVC++, Visual Basic, SQL, XML,     XSLT, UML, Tcl/Tk, IDL, Flex, Perl, VHDL, XVT, Vax DCL, FORTRAN, Pascal, COBOL, Assembly (MIPS, 80x86, 6502), Omnis 7, MACCSII,  Accent
Frameworks/APIs
GWT, RPC, GWT-Ext, J2EE, EoD SQL, AJAX, Struts, Hibernate, JPA, JDBC,  ODBC, ADO, OLE DB, .NET, HotDraw, AspectJ, Velocity, OSGI (with JMS), JPF, JBoss, MPI, POI,  Apache Commons, Server Faces, NVIDIA CUDA, OpenNebula
DB, Security, Forensic
Enterprise DB: Oracle, Informix, MySQL, hsqldb, MS SQL 2005, Desktop DB: Access, Paradox; Scanning: NMAP, Nessus, Nikto; Packet: tcpdump, snoop, Wireshark; IDS:  Snort, NIDS, PHPIDS; Forensic:  FTK, Paraben, TSK/Autopsy, DASH4™, REM4™
OS, Specifications, Protocols, Techniques
Windows, Linux (many flavors), Unix/Solaris, Embedded PowerTV, Windows CE, Palm; Specifications Design Patterns, Anti-Patterns, RPC, BPM, COM/DCOM/ActiveX, DOM, MPEG2, MPEG4, IPTV, QOS, VoIP, NDIS, GPIB, Protocols: TCP/IP, Java RMI, JRMP, RTP, SDP, RTSP, Instant messaging- intant_t, SIMPLE, XMPP; Techniques: OOP, AOP, Neural Networks, Genetic Algorithms, BPM, Evolutionary Strategies,  Monte Carlo Methods, Game Theory, IDS/IPS, Agile SCRUM, OPC UA, OPC DA


EDUCATION:
Ph.D., Electrical Engineering, Minor: Applied Mathematics, Georgia Institute of Technology
M.E.E.E., Electrical Engineering, Pennsylvania State University
B.S.E., Electrical Engineering, Temple University
EXPERIENCE:
10/10 - Present, Consultant,
Pluraldom and Clients
(Several were held simultaneously)

Pluraldom Systems, Hockessin, DE
● Pluraldom/Cablevision (10/11 - Present), Principal Investigator/Consultant
Conducting a feasibility study on the use of run-time decompression as a means to extend the use of legacy hardware (Motorola DCT2000, DCT2500 series, using an OM2000) still in use today by numerous multiple-subscriber organizations. Post analysis includes use of several design patterns (including factory and strategy) in conjunction with MVC; use of core Hibernate as an ORM solution, JSP using Spring’s view resolver, and Java collections. 
Language and Tools used: cygwin toolchain, DCCG (stb environment), JAVA/J2EE, spring, hibernate (for post-analysis).

Yonsei University, Seoul, Korea (06/09 – Present),
Communications & Networking Laboratory
(Ranked #26 among Top Asian Universities)

Research Professor (Part-time)

Designing and implementing techniques for forensic analysis of large scale SOA architectures and mobile environments; conducting research on topics that include the application of signal processing, digital filter design, and control theory (MIMO systems) to digital forensics for virtual and mobile environments as well as large-scale architectures and cloud-computing with relational and NoSQL database back-ends.  In particular, architectures that prevail in financial and mobile systems are analyzed.  For example, the enterprise service bus SOA architecture is being explored as well as multiple specialized entry points for mobile clients (in terms of services) in a B2C e-Commerce banking business pattern.
Language and Tools used: Java, J2EE, GWT, Spring, Hibernate, C++, Objective-C, iOS, Xcode, XML-RPC, MySQL, Cassandra, Redis, Java/J2EE, MPI, OpenNebula.


● Cloud Scorpion (02/11 - 10/11), Principal Developer
Participated in a number of efforts:
      Designed and implemented tools involving the use of image processing, pattern recognition, and soft computing (artificial neural networks, genetic algorithms, and evolutionary strategies); the purpose of which was for digital forensic tools for litigation and law enforcement support.  Language and Tools used: Java, J2EE, GWT, Spring, Hibernate, C++, XML-RPC, MySQL, OpenNebula.

Generated numerous RPC services to coordinate with collection intelligence efforts for recommendation, prediction, and text analysis; created reconfigurable virtual client matrices for the cloud; replicated numerous SOA pattern components associated with an enterprise service bus.  Namely, JMS as a form of messaging, JTS as a mapping tool for clustering (JTS interfaces used as nodes with logical thresholds than can be rolled back).  JNI to utilize transform analysis implemented in C++ with STL use of containers.
Designed an architecture supporting speech recognition, natural language processing, object archiving, and network support for a media-based computing application. Language and Tools used: Objective-C, Xcode, Cocoa frameworks, Sqlite.
● Fourth Wall Media (10/10 - 09/11), Consultant
Designed and implemented run-time code decompression framework to optimize application footprint and embedded environment memory usage. This was applied for use on applications including Fourthwall's EBIF user agent; reducing the memory by over 30%.  Various malware techniques were employed including, symbol redefinition & injection, self-modifying code, and data execution. This object-oriented framework supported both build-time and run-time operations and made use of several design patterns. Designed cache policies and codecs (dictionary and variable-length).   Language and Tools used: C/C++ using GNU toolchain, Cisco SDK, Eclipse,Visual Studio 2010, C# (for RIOT EBIF applications).  Platform: Linux, PowerTV/PowerTV (Emulated for Linux).

01/03 – 10/10, Consultant,
Shadowband and Clients
(Several were held simultaneously)
Shadowband Systems, Norcross, GA
● Fourth Wall Media (12/09 - 10/10)
Ported the flagship RIOT product (EBIF, Interactive TV, and advertising middleware) from classic Explorer settops to the Linux-based Explorer boxes (4650HD, 86xxHD); extensive optimization for SARA integration.  Language and Tools used: C/C++ using GNU toolchain, Cisco SDK, Visual Studio 2010, C# (for RIOT EBIF applications).  Platform: Linux, PowerTV/PowerTV (Emulated for Linux).


● StreamSage/Comcast (09/09 - 12/09)
Algorithmic development for matching media assets as part of an entertainment knowledge base “relationship matcher”; investigated the use of soft-computing (neural, fuzzy, genetic hybrids) with hard and fuzzy c-means clustering as well as signal processing techniques with mapping as both continuous (Wavelets, Fourier series) and discrete-time (z-transform) functions; automated regex-generation and pattern extraction; created REST interfaces to asset matches. Language and Tools used: Java, SQL, eclipse, Oracle, MySQL, Spring, OpenPipeline, Jetty, Tomcat, REST (neolios, JSR311 Jersey).  Platform: Developed in Java in a Windows environment and deployed to Linux-based environments.
● Shadowband Financial (05/08 - 09/09)
1)      Created web-based, MGCP-based telemarketer workflow system.  Language and Tools used: Eclipse, Java, GWT, GWT Designer, GWT-Ext, hsqldb, httpunit, Cisco 7960 series phones.  Client-side work involved GWT, and associated tools, server-side work involved servlets and GWT-RPC.
2)      Created web-based, credit-to-speech system.  Credit reports pulled for customers were analyzed and processed speech was produced.  Language and Tools used: Java, Eclipse, GWT, GWT Designer, GWT-Ext, and several tts libs.
3)      Created commercial credit analysis tool “ShadowCASTER.”  This tool is used to help ineligible mortgage applicants obtain financing by analyzing their credit, debt-to-income, and housing goals coupled with identity-theft prevention.  Implemented in Java and operated based on client data collected from web interface using GWT.
4)      Conducted research on intrusion detection of temporally-spaced attacks using (Haar) wavelets to aggregate the time a frequency components.
● Haverford Trust Company (07/08 - 08/08)
Conducted annual network vulnerability assessment: used a variety of tools to assess the vulnerability of the external network as a Phase 0 test (i.e. zero knowledge of internal infrastructure) incorporating guidelines from NIST, Open-Source Security Testing Methodology (OSSTM), and Payment Card Industry Data Security (PCI DSS).  Tools used: Nessus, nikto, nmap, and ShadowDC.
● Forensic Trade Shows, LLC (06/08 - 07/08)
Designed and implemented a web-based marketing list generator; walked and parsed pages for contact list creation based on search criteria.  Tabbed interface included support for file upload and download with support for multiple file formats in a multi-threaded environment.  Language and Tools used: Eclipse, Java, GWT, GWT Designer, GWT-Ext, hsqldb, httpunit.  Client-side work involved GWT, and associated tools, server-side work involved servlets and GWT-RPC.


● National Science Foundation (01/04 - 01/05), Principal Investigator
SBIR Phase I work involved applying self-similarity metrics to security.  NS-2, C++, and Matlab were used to test hypothesis involving characteristics such as Hurst parameters,
wavelet estimation, and power spectrum; an ARMA model was created to remove data set irregularity.
● Cablevision (2/03 - 10/10)
Lead architect and implementer of 5 to 10 consultant teams for several projects:
1)            Designed a multi-threaded tool to generate Java-based soft-computing solutions for product and ad placement. Language and Tools used: Mixed-language C/C++ server-side, Java on the client end with a MySQL database back-end.
2)            Remote testing-script generator.  This application creates and deploys remote testing scripts to set-top box clusters through a client-server protocol with the head-end DNCS.  This includes task scheduling and log capture.  Language and Tools used: Mixed-language C/C++ server-side, Java on the client end with a MySQL database back-end.
3)            Web Server benchmarking; the goal was to assist Cablevision in determining the optimal amount of servers to purchase to adequately deploy their gaming services to several million homes with minimized cost. Language and Tools used: WAPT with Matlab.
4)            Set-top box system performance, threading processes, and memory fragmentation stress analyzer; communicated with the cable TV DNCS/Head-end as well as the set-top device itself through the serial port.  Language and Tools used: Mixed-language Java with Forte, MySQL as a back-end; server-side was a C interface to the DNCS and Head-end.
5)            Set-top box log file analyzer and report generation utility is designed to be used as a control panel for the analysis of log-file TRAP reports.  Hardware/software failures. Language and Tools used: Multi-threaded, mixed language- C++ for elf/coff processing with a Java-based interface and parser; report generation with 
L with CSS.
6)            Characterized services on the Cablevision DOCSIS network (Game Server, WWW traffic, and VoIP modeling) and analyzed OCAP Requirements.  Language and Tools used: C++, OTcl, Ns-2 and Matlab.
7)            Developed scripts to recursively parse game logs from head-ends serving 5M set-top boxes games from servers. Language and Tools used: Perl in a Windows environment.
8)            Analyzed general MSO (multiple subscriber organization) problems which include the following: Multicast with OPNET, Interactive Gaming (memory profiling and reboot analysis), Digital Headend products that support multicasting using IGMP, IP-to-ASI gateways.


● Shadowband Systems Inc. (2/03 - 2/07)
1) Coded, staffed and lead a team of engineers to create a design center with a multi-threaded plug-able architecture using JPF, then OSGI with code-generation for VHDL, and Java targets tested against multiple cluster back-ends.  Designed and developed (AOP and OOP) plug-ins that generated code and operated within the framework itself.  Plug-in types included Neural, Genetic, Evolutionary, Fuzzy, Data Mining, Sniffer, Plotter, Network Modeler, and Forensic.  This work also involved embedded development using a message passing interface and custom Linux kernel development. Language and Tools used: JAVA/J2EE, Javascript, JPF, OSGi, Velocity, Weka, MPI Platform: Cluster Deployment using Linux (Busybox).
2) Research on novel intrusion-prevention techniques including LSP routing security and mapping system behavior to very high-degree polynomials and transfer functions with roots and poles representing attack signatures using algorithms that include bisection, secant, eigenvalue, and hybrids with Newton’s method (all of which varied based on the expected values of the imaginary components of the roots).
● Air Force Research Labs, Principal Investigator
1)      Participated as principal and lead engineer for SBIR Phase I and II work on information assurance for mobile users by creating robust channels in the form of a multi-path routing MAC address (spoofing) scheme.
2)      Technically managed and led with hands-on coding the design of Prism chipset network device drivers for both Linux and WinCE in C/C++ and .net, FPGA prototyping, and network modeling.  The C++ coding was interfaced through ActiveSync once the board support package was setup for StrongARM-based PDA’s.  Some of the code involved support for plug and play detection for the adapter, NDIS miniport driver writing for MAC spoofing techniques, and GUI development for both driver testing and network discovery.  Other details of the driver work (WinCE) included managing the NIC as well as interfacing with the higher-level drivers (transport protocol drivers). Language and Tools used: ActiveSync, embedded Visual C++, Pocket PC SDK, and Platform Builder. Platform: StrongARM SA1110 Chipset.
3)      Designed and architected a forensic tool generator to operate with the following analytical capabilities: Network-based process, media, file system (physical and logical), memory, thread, process, malware and malicious code detection, encryption, and boot process control; other algorithms include the use of discrete cosine transforms (DCTs), hidden Markov models (HMMs) to determine clandestine activity. 
4)      Designed a prototype FPGA board with memory with a PCI interface.  Several design considerations were made from pricing to voltage regulation to layout and processor selection.
09/01 - 02/03, Consultant,
Scientific Atlanta, Lawrenceville, GA
Technical lead in the development and implementation of a multi-threaded navigational framework, SA’s C++, OO based set-top resident application, and multi-tuner DVR (digital video recorder). This effort represents a paradigm shift to an object-oriented environment. This includes a coded migration path from legacy code, sufficient breadth for feature enhancements via support for multiple design patterns, and plug-and-play-able layering with respect to switching operating systems.  Multiple hardware platforms with cross-over compilation were integral to the project.

04/01 - 09/01, Consultant,
Scientific Atlanta, Lawrenceville, GA
Lead, designed, and implemented a thread-safe object-oriented component library used by application developers and served as the set-top GUI underpinnings for Buzztime Entertainment, Inc. This C++ library has several features that present a consistent and versatile approach to developing applications that require GUI components for interactive television applications. Media-based efforts include jpg conversion for graphical animation.  The library was suitable for multiple hardware platforms and extensively interacted with video memory and window management.

05/00 - 04/01, Consultant,
PowerTV/Scientific Atlanta, Cupertino, CA
Projects included: Technical lead of 10 person team hired to enhance, port, and stabilize a multi-threaded C/C++ HTML engine; developed a JavaScript lexer-scanner used to search for unsupported language features involving pre-AJAX efforts involving the DOM and CSS; background work on MPEG-2 transport streams for data carousel creation; porting code to meet Suns JavaTV specification as part of an effort to meet the DVB-MHP standard.


09/00 - 02/01, Research Engineer,
GTRI, Atlanta, GA

Private and public-sector contract development; conducted research on security topics including soft-computing approaches to anomaly/intrusion detection, data correlation to reduce false positives, and wireless work on Mobile IP using Matlab, C++, and Java.  Techniques involving LVQ (learning vector quantization), SOMs (self-organizing maps), and radial basis functions.


10/97 - 05/00, Research Assistant,
Georgia Institute of Technology

Participated in several projects in several different areas:
● 06/99 - 05/00 GTISC (Georgia Tech Information Security Center) funded research related to the development of intelligent tools C++ and Java to analyze real-time network traffic data for detection of malicious activity; methods included characterizing port usage, source IP, Date/Time, etc.  This work also included analysis of denial of service, covert applet channels, buffer overflows in Java security assessments; RSA encryption strength via primality testing (including Solovay-Strassen and Lehmann algorithms).

● 06/98 - 06/99 NSF-funded Computer Enhanced Education project, developed software in Java, Matlab and C++ to facilitate the learning of classical control theory.  In particular, the tool allows iterative proportional integrator (PI/lag) and proportional differential (PD/lead) design directly on a root-locus plot as well as a Bode plot (magnitude and phase).
● 10/97 - 06/98 Efforts included research on dielectric heating and the design of a radio-wave heater for a Department of Agriculture sponsored project using C++ and Matlab

02/97 - 07/97, CONSULTANT,
CS Systems, Mount Laurel, NJ
Responsibilities included coding enhancements in Accent for a financial services application (text-based front-end with flat files and Oracle back-end), documentation, and acquiring specifications; interacting with various groups: users, analysts, and administration.  Coding involved porting flat files in Accent to Oracle stored procedures.



07/95 - 02/97, Academic Computing Fellow,
The Pennsylvania State University

Research related to applying intelligent tools to optimization problems as well as electrostatic boundary value problems.  In particular, evolutionary strategies to solve Laplace’s and Poisson’s equation, neural networks (various multi-layered perceptrons with Levenberg-Marquardt training), hybrid interpolative systems involving neural networks with Markov chains were designed.  Innovations include a new variation of a floating random walk.



06/94 - 07/95, CONSULTANT,
ISCG Inc., Malvern, PA

Serviced clients in the chemical, manufacturing and pharmaceutical industries (Namely, Johnson and Johnson Inc. and Arco Chemical Co.). Coded in C, C++, MACCSII, and Omnis 7. Developed applications generally 
d of a graphical front-end with a database back-end. Client needs included prototyping a compound registration system for chemists, assisting in the development of a material data sheet system, and automated file handling routines used in a customized barcode inventory system.  Coding effort involved chemist compound registrations.



08/93 - 06/94, SOFTWARE ENGINEER,
Numar Corp., Malvern, PA

Designed and coded software in C++ for a petroleum searching system using Nuclear Magnetic Resonance Imaging. Development effort consisted of approximately 70,000 lines of multi-threaded, object-oriented code. Coded mathematical algorithms to compute porosity, diffusion, and formation relaxation times. Code existed as both a server-side monitor and an embedded magnet communication driver.




Awards and Memberships:
Awards:
2007 Administrator’s Award of Excellence (June 2007): Award given by the Small Business Administration in recognition of outstanding service as a vendor to the Department of Defense.
SBIR Phase I Award ($100K): National Science Foundation: Self-similarity Metrics in Intrusion Detection
SBIR Phase I  Award ($100K): United States Air Force:: Multi-layered Protocol Security
SBIR Phase II  Award ($750K): United States Air Force: Multi-layered Protocol Security
SBIR Phase IIa  Award ($70K): United States Air Force: Multi-layered Protocol Security
● Georgia Institute of Technology Tower Award (2001) Award given in recognition of academic excellence
GTISC (Georgia Tech Information Security Center): Research Award (June 1999): $30,000 award to conduct security research as well as produce tools that can be used to facilitate the learning of security.
The Pennsylvania State University Academic Computing Fellowship (1995-96): $30,000/year renewed annually for two years. Tuition, monthly stipend, and yearly allowance to attend conferences and purchase equipment; first electrical engineering graduate school major to win such an award.
Eta Kappa Nu Honor Society Best Paper Award (1996): Penn State Chapter competition.

Memberships: Eta Kappa Nu, IEEE, ACM

PATENTS:

“Expandable Visual Design Framework with Flexible, Multi-Language Code Generation” (Non-provisional, filed 7/2008).

 

Publications:

Journal/Magazine:

1.
M. N. O. Sadiku, C. M. Akujuobi, R. C. Garcia, An Introduction to Wavelets in Electromagnetics, IEEE Microwave Magazine, pp. 63-72, June 2005.
2.
J. Cannady and R. C. Garcia. The Application of Fuzzy ARTMAP in the Detection of Computer Network Attacks, Lecture Notes in Computer Science: 2001 International Conference on Artificial Neural Networks. Springer:Heidelberg, GE
3.
R. C. Garcia and B. S. Heck, Enhancing Classical Controls Education via Interactive GUI Design, IEEE Control Systems Magazine, vol. 19, no. 3, pp. 77-82, June 1999.
4.
R. C. Garcia and M. N. O. Sadiku, Neuro-Monte Carlo Solution of Electrostatic Problems, Journal of the Franklin Institute, vol. 335B, no. 1, pp. 53-69, 1998.
5.
M.N.O. Sadiku and R.C. Garcia, Whole Field Computation using Monte Carlo Method, International Journal of Numerical Modeling: Electronic Networks, Devices and Fields, vol. 10, pp. 303-312, 1997.
Book Related Work/Book Chapters:
1.
Appendix B: Solving Electromagnetic Problems Using C++, M. N. O. Sadiku, Numerical Techniques in Electromagnetics, 2nd Ed., New York, NY: CRC Press, 2000.
2.
Appendix C: Numerical Techniques Using C++, M. N. O. Sadiku, Numerical Techniques in Electromagnetics, 2nd Ed., New York, NY: CRC Press, 2000.

Invited Conference:

1.
R. C. Garcia (Invited Paper) Network Security: Mapping Intrusion and Anomaly Detection to Very-High-Degree Polynomials, Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, California, Nov. 7-10, 2004.
2.
J.-M. Chung, S. Panguluru, D. Liu, and R. C. Garcia, (Invited Paper) "Multiple LSP Routing Network Security for MPLS Networking," Proc. of IEEE MWSCAS 2002, Tulsa, Oklahoma, Aug. 4-7, 2002.

Conference:

1.
R. C. Garcia, J. Cannady, and M.N.O. Sadiku, WAID: Wavelet Analysis Intrusion Detection, Proc. IEEE MWSCAS02, Aug. 2002.
2.
R. C. Garcia and J. D. Cannady, Boundary Expansion of Expert Systems: Incorporating Evolutionary Computation with Intrusion Detection Solutions, in Proceedings of IEEE SoutheastCon 2001, Clemson, South Carolina, March 2001.
3.
Dennis C. Bauer, J. D. Cannady, and R. C. Garcia, Detecting Anomalous Behavior: Optimization of Network Traffic Parameters via an Evolutionary Strategy, in Proceedings of IEEE SoutheastCon 2001, Clemson, South Carolina, March 2001.
4.
R. C. Garcia, M. N. O. Sadiku and K. Gu, Applying Absorbing Markov Chains to Solve Poissons Equation in Inhomogeneous Regions, in Proceedings of IEEE SoutheastCon 2001, Clemson, South Carolina, March 2001.
5.
J. A. Copeland and R. C. Garcia, Real-Time Anomaly Detection Using Soft-Computing Techniques, in Proc. of IEEE SoutheastCon 2001, Clemson, South Carolina, March 2001.
6.
B. S. Heck, S. E. Poindexter, and R. C. Garcia, Integrating the Web into traditional teaching methods, in Proceedings of 2000 American Controls Conference, Chicago, IL, June 2000.
7.
R. C. Garcia and J. A. Copeland, Soft Computing Tools to Detect and Characterize Anomalous Network Behavior, in Proceedings of IEEE SoutheastCon 2000, pp. 475-478, Nashville, Tennessee, April 2000.
8.
R. C. Garcia, R. J. LeBlanc, and M. N. O. Sadiku, JavaMonte: A New Programming Language for Monte Carlo Simulation, in Proceedings of IEEE SoutheastCon 2000, pp. 305-308, Nashville, Tennessee, April 2000.
9.
M. N. O. Sadiku and R. C. Garcia, The Method of Lines Solution of Axisymmetric Problems, in Proceedings of IEEE SoutheastCon 2000, pp. 527-530, Nashville, Tennessee, April 2000.
10.
R. C. Garcia and B. S. Heck, Enhancing Engineering Education on the Web: The Use of ActiveX Controls and Automation Server Technology, in Proceedings of IEEE SoutheastCon 2000, pp. 515-518, Nashville, Tennessee, April 2000.



11.
R. C. Garcia and B. S. Heck, An Interactive Tool for Classical Control Design Education, in Proceedings 1999 American Controls Conference, pp. 1460-1464, San Diego, California, June 1999.
12.
R. C. Garcia and M. N. O. Sadiku, Two-Part Solution of Laplaces Equation: An Adaptive Fuzzy System Front-End with a Markov Chain Back-End, in Proceedings IEEE SoutheastCon 1998, pp. 281-282, Orlando, Florida, April 1998.
13.
R. C. Garcia and M. N. O. Sadiku, Using Evolutionary Strategies to Solve Laplaces Equation, in Symposium Digest, 15th Benjamin Franklin Symposium, pp. 18-21, Philadelphia, Pennsylvania, May 1997.
14.
R. C. Garcia and M. N. O. Sadiku, Neural Network Solution of Poissons Equation with a Floating Random Walk Back-End, in Symposium Digest, 14th Benjamin Franklin Symposium, pp. 68-71, Philadelphia, Pennsylvania, May 1996.
15.
R. C. Garcia and M. N. O. Sadiku, Neural Network Solution of Laplaces Equation with a Markov Chain Back-End, in Symposium Digest, 14th Benjamin Franklin Symposium, pp. 3-6, Philadelphia, Pennsylvania, May 1996.
16.
R. C. Garcia and M. N. O. Sadiku, Monte Carlo Fixed-Radius Floating Random Walk Solution For Potential Problems, in Proceedings of IEEE SoutheastCon 1996, pp. 92-95, Tampa, Florida, April 1996.
17.
M. N. O. Sadiku and R. C. Garcia, Monte Carlo Floating Random Walk Solution of Poissons Equation in Proceedings of IEEE SoutheastCon 1993, Charlotte, NC, April 1993.



Download Resume Format 

0 comments:

Post a Comment

Resumes By Categories

1-5 Years Experienced CV 10-15 Years Experienced CV 10th Standard 12th Standard CV 15-20 Years Experienced CV 20-25 Years Experienced CV 30+ Years Experienced CV 5-10 Years Experienced CV Accounts CV Aeronautical CV Automobile Engineer B Com CV B Pharma CV B.Tech CV BA CV BA Philosophy CV Banking CV BBA CV BBM CV BCA CV BDS CV Beautiful CV Bio Technology CV BMS CV BPO Call Center CV BSC CV BSC IT CV Business Analyst CV CA CV Cashier CV CEO CV CFA CV Chemical CV Civil Engineering CV CMA CV Commercial CV Cook CV Cover Letter for Resume CS CV D Pharma CV Diploma CV Doctor CV draff Economist CV Electrical CV Electronics CV Engineer CV Fashion Designer CV Films CV Finance CV Foreign Resume Format Fresher CV GM CV Hotel Management Housekeeping CV HR CV ICWAI CV Import Export CV Industrial Engineering CV Instrumentation CV Insurance CV IT CV ITI CV journalist CV LLB CV M Com CV M Pharma CV M Phil CV M Sc Computer Science CV M Tech CV M.Tech MA CV Manager CV Marketing CV Mass Communication CV MBA CV MBA Event Management MBA Finance MBA Hospitality CV MBA HR CV MBA IB cv MBA Marketing MBA Production MBA Quality MBA SCM CV MBA System MCA CV Mechanical CV Medical Representative CV Mining CV MMS CV MS CV MSC CV Over 25 Years Experienced CV Paint Technology CV Pharmacy CV Phd CV Philosophy CV Project Manager CV Psychology CV Purchase CV Quality Engineer Real Estate CV SAP ABAP CV SAP Basis SAP BI CV SAP BO CV SAP CRM CV SAP CV SAP FICO CV SAP HR CV SAP MM CV SAP PP CV SAP SD CV SAP Security Six Sigma CV Special Resume System Administrator CV Teacher CV Textile CV Treasury CV USA Resume Web Designer CV