Built on top of OpenGL for high performant 3D/2D batched rendering. Includes an Entity Component System built from scratch based on ENTT groups and runtime filtering for cache friendly access, high code reusability, and easily parallelizable routines. Currently working on adding multiplayer support and building a full game demo
Gitlab pipeline that inspects projects code, recursively adds documentation to each file with an LLM, and publishes documentation to the repo's gitlab pages. To fetch good context, it constructs a dependency graph of the project code. It documents dependencies first. Then their documentation is used to document files that depend on them. It extracts docstrings and function signatures as context by recursing over the AST of these processed files.
Retrieval Augment Generation (RAG) system that takes in resumes and maintains a chunked embedding database of each resume. In the Streamlit chat bot frontend, you make queries which are lexically and semantically compared over the database to extract the top K relevant resumes, which are then inspected by an LLM and output a response
Reactive Typing Game
Web game featuring real time multiplayer with chat and same device pass and play for Ultimate Tic Tac Toe (some bugs)
Obstacle game where the player is controlled by singing pitch. Programmed directly into a computer board and connected to input/output devices with our own device drivers written in a custom class assembly
Collection of my high school web games. Mostly original single player games and some simulations like predator-prey
Implemented the Minimax algorithm with Alpha-Beta pruning and created heuristics for chess, othello, and connect4 game playing. Achieved high accuracy and speed, particularly in othello and connect4.
Implemented the A* Search, Depth Limited BFS, Iterative Deepening DFS algorithms and created heuristics for the Rubik's Cube and 15 Puzzle game playing. Consistently found optimal solutions in high speeds.
Programmed a password manager with encryption for confidentiality, a custom file management protocol for efficiency, and checksums to ensure integrity of data
Implemented the RSA encryption algorithm, as well as its vulnerability, Dixon Factoring, which could feasably crack RSA keys up to 128 bits long