Talks

Critical Analysis of PPO and DDPG Algorithms

April 11, 2025

Talk, Intro to Arificial Intelligence Course from University of Detroit Mercy, Detroit, Michigan

Delivered a presentation on a critical analysis of PPO and DDPG algorithms.

Attainment of ABET Outcomes through Cooperative Education: A Student Perspective

December 15, 2024

Talk, Professional Practice of Engineering Course from University of Detroit Mercy, Detroit, Michigan

Delivered a presentation on attainment of ABET outcomes through cooperative education from a student perspective, highlighting how coop work terms and traditional coursework differentially contribute to ABET student outcomes in engineering and CS programs.

Allure of Mathematics

December 09, 2024

Talk, Professional Practice of Engineering Course from University of Detroit Mercy, Detroit, Michigan

Delivered a presentation on my personal journey of what has made me appreciate mathematics.

Joystick-Controlled Convoy Protocol

December 06, 2024

Talk, Computer Networking Course from University of Detroit Mercy, Detroit, Michigan

Delivered a presentation on a joystick-controller convoy protocol, showcasing functions such as leader election, secure command transmission, and dynamic joining of new vehicles.

Insights on Air Quality and Land Types

May 31, 2024

Conference proceedings talk, 24th Annual IEEE International Conference on Electro Information Technology (EIT), Eau Claire, Wisconsin

First conference attended! Presented insights on air quality and land types, along with data extraction techniques.

4PTRB Software Project Management Framework

February 14, 2024

Talk, Software Project Management Course from University of Detroit Mercy, Detroit, Michigan

Delivered a presentation on the 4PTRB framework, offering a summary and our analysis of its advantages and effectiveness in college-level software education projects.

Trapdoor Architecture

November 18, 2023

Tutorial, Computer Security Course from University of Detroit Mercy, Detroit, Michigan

Presented an updated iteration of the original trapdoor article, featuring improvements and practical application through experimentation with various adversarial attacks. An explanation of the architecture can be found here.