Leo Martinez III's Projects
Calculator that performs simple mathematic functions such as addition, subtraction, multiplication, and division using user input.
This Python program implements the Affine Cipher, a type of substitution cipher, for encrypting and decrypting messages. The Affine Cipher uses a pair of keys, alpha (a) and beta (b), to transform plaintext into ciphertext and vice versa.
The following program is capable of analyzing network traffic with multiple different machine learning (ML) and feature selection algorithms to determine whether or not it is malicious.
ATM service that utilizes multiple modules within a package in Java to simulate a user using an actual ATM system.
Program that simulates the board game "Battleship" and allows the user to attempt to take down opposing ships that are placed in randomized locations each game.
This C++ program will calculate carbon footprints of three specific pre-typed inputs. The main emphasis will be on a building, a car, and a bicycle.
This Python program provides a graphical user interface (GUI) for interacting with a MySQL database. The application allows users to perform various operations such as adding, modifying, deleting, viewing, and searching records in the database.
The Data Encryption Standard (DES) implementation used for encrypting/decrypting blocks of bits. This program implements the complex algorithm in C++.
Simple/Basic program that detects duplicates within in an array using Python.
This Machine Learning (ML) Python program aims to detect spam emails using an autoencoder-based learning approach. It first imports necessary libraries for data handling, evaluation metrics, preprocessing, and neural network modeling.
A simple program made using ArrayStack to organize two different types of funds in a stack written in Python that solves a specific scenario.
This Python program implements the K-Rail Fence Cipher, a type of substitution cipher, for encrypting and decrypting messages. The K-Rail Fence Cipher involves creating a zigzag pattern of characters in a matrix with 'rails,' and then reading the characters in a specific order to generate the ciphertext or retrieve the original plaintext.
This project consists of two components: a keystroke logger implemented in C++ to record a log of system-wide keystrokes and a log analyzer implemented in Java to analyze the keystrokes recorded, the analyzer is also capable of automatically searching for specific phrases or words.
This project implements a Markov Decision Process (MDP) using Reinforcement Learning in Python.
Simple code that merges two separate lists together with minimal runtime.
M.T.D. is a project that tackles the growing risks faced by industries worldwide due to cyber threats. Our project employs a comprehensive approach to address various cyber-attacks, focusing on intrusion and malware threats by utilizing Machine Learning (ML), Deep Learning (DL), and Artificial Intelligence (A.I.).
OpenGL program written in C++ that demonstrates a live demo of two 3D shapes constantly moving along with one 2D shape. The user will have control to move each shape in every direction (x ,y, and z plane).
Simple program that detects if a string is a Palindrome (word that is identical if worded backwards such as "bob" or "racecar") using minimal runtime.
Program that runs a calculator to calculate for Pythagorean Theorem using any side of a Right Triangle.
Assembly Program written in HCS12/9S12 Assembly that allows a user to input a master pin and a user pin to simulate unlocking a safe.
Program that organizes a random stack data type set of numbers into numerical order using Python.
Simple program that utilizes hash table maps and displays them when the code is ran.
A simple program written in VHDL used to simulate/solve the outputs of two separate logical equations both in SOP and POS simultaneously.
This repository hosts a C program simulating virtual memory management using paging techniques. Virtual memory is a crucial concept in modern computer systems, allowing programs to operate as if they have more memory than physically available by utilizing disk storage as an extension of RAM.
The program is dedicated to solving a specific scenario that involves creating an automatic payroll for multiple types of employees in an efficient manner.