Name: Syed Haider Ali Zaidi
Type: User
Company: Conovo Technologies
Bio: Software Engineer @ Conovo - Computer Science Graduate from FAST NUCES
Location: Lahore, Pakistan
Blog: https://www.linkedin.com/in/haideralizaidi/
Syed Haider Ali Zaidi's Projects
Data privacy is one of the biggest difficulties that every organization faces nowadays. All organizations should provide security protections on personal data against unauthorized access and modifications of any data. Healthcare is such an example where patient data should be handled properly and the leakage or alteration of this data assists in a huge privacy-neglecting issue. Immutability can be provided by adopting the blockchain technology in healthcare. Encryption is a key baseline to data privacy protection. This code introduces a new approach to secure keyword search over encrypted data in the blockchain. In this code, we propose the implementation of the bit-string signatures in the design of a data structure to secure search and access data while hiding the search pattern and share the patient data records between authorized organizations, while ensuring the privacy and im- mutability of the data. Besides, the secure cryptographic protocol - proxy re-encryption is applied to support proper encryption and decryption without revealing the keys and access control over secret data. The goal of this code is the evaluation of the keyword search using bloom filters over encrypted data in the blockchain.
This is the game same like Candy Crush using the concepts of Object Oriented Programming (OOP) in C++.
This is a AI based game in which the car will run on its own. The model has been trained and directed to follow the path given by the AI.
You are given the network design with minimal technical documentation; your task is to make this up and run in 4 hrs. Use all your mind capabilities to solve this. 1. Following are the steps you need to perform in the topology according to the given layout. Configure this scenario and find your given IP address in the file " IP address " attached with this. Find out the Network Addresses and start working with them. And use them as required. 2. Please find the number of required hosts per subnet in the given file. Each student is given a different number of required hosts per subnet. Networks are labeled alphabetically in the given file of IP ADDRESSES. The networks with Router23 are not labeled so you can choose any number of hosts for those subnets. 3. Use EIGRP in First Block for Routing , OSPF with area 1 in Second Block , Rip in Block Third and OSPF with area 0 in the last block as mentioned on the top of each block. 4. Use Redistribution on Router6 and Router13 for connecting EIGRP with OSPF and OSPF with RIP. Use Redistribution on Router11 for connecting OSPF area 1 with OSPF area 0. 5. All hosts in EIGRP, OSPF area 1 and RIP will get IP addresses from "DHCP Server" present in the first block. 6. All hosts in OSPF area 0 will get hosts from βDHCP Serverβ present in its own block. (named as web server in the picture) 7. You have to use VLSM in each network of the topology. 8. You have to IMPLEMENT NAT in Router7 with the NetworkG. Use the Private IP Address given to you in the attached file for Natting. 9. One of the PCs of Network L will not be allowed to access the TFTP server. One of the PCs of Network E will not be allowed to access the Data server in the 1st block. All hosts connected in network A will not be allowed to access "Web Server". 10. The TFTP and Data servers do not need to have running services. They will simply be treated as hosts. You just need to block the access of those servers from respective networks. (Access List)
Calculate Combnational Sum using an array
Dodge 'Em game using basic programming in C++ language.
A web-based application that can be used to manage the day-to-day operations of a driving school. Tracks student enrollment, schedules classes, manages instructor schedules, and generates reports. Features student management, instructor management, class scheduling, fee management, and report generation.
EMS using React framework. Also SweetAlert Library has been used with it.
This is speech to contract project which will convert call recording into smart contract which can be digitall signed and authorized.
Calculates the Grade of different number of students using nested if else and While loop.
This project reads the data as input and predicts whatever is written in the file.