SlideShare a Scribd company logo
DHANANJAY SINGH
+1(469)233 5696 | danny12690@gmail.com | LinkedIn URL: https://www.linkedin.com/in/dhananjay-singh-9aa6328b
Education:
---------------------------------------------------------------------------------------------------------------------------------------------------
Masters in Computer Science : GPA3.61 / 4 Jan’15 – Dec’16
University of Texas at Dallas(UTD) , Dallas, Texas, USA
Bachelor in Engineering (Information Sciences) :GPA8.43/10 Sep’08 – Jun’12
M.S.Ramaiah Institute of Technology, Bangalore,India
Skills:
----------------------------------------------------------------------------------------------------------------------------------------------------------
Tools : AutoDesk maya, mudbox, 3DsMax, CryEngine 3, Unreal Engine 4, Unity3D, Rapid Miner, Abinitio, Gruff, Jena
Languages: C++, C#, Java,JavaScript, PERL/CGI, Unix Shell Scripting
Portfolio: https://www.patreon.com/tgxscavenger
Github: https://github.com/danny12690
Coursework:
Computer Graphics | Computer Animation and Gaming | Semantic Web Technologies | UI Design | Implementation of
algorithms | Analysis and Design of Algorithms |Database Design | Video Analytics | Multimedia Systems| Object Oriented
Analysis and Design| Software Testing |
Projects:
---------------------------------------------------------------------------------------------------------------------------------------------------
 Unity3D Multiplayer Game with voice and gesture based controls: (C#,C++)
 A multiplayer death match game.
 The player can control his/her character using voice commands as well as using head movements using the
openCV C++ library.
 Link: Video
 Link: Video
 Fall of Five (Unity 3D) tower activation game: (C#)
 A game based on the unity engine wherein enemies spawn at random intervals at random positions and each
enemy is faster than the previous one.
 To win, activate 5 towers that also spawn randomly, while surviving the enemy onslaught.
 Link: Video
 Procedural Skin and Mesh Generation (Unity3D): (C#)
 Geometry shapes and key frame values and their in-tangent and out-tangent values are given in a text file.
 My algorithm reads these values and renders the mesh as well as its associated animations on the screen.
 Link: Video
 Android Break Out Game (JAVA,XML)
 Break out game with gyro controls.
 Tetris with triangles (JAVA)
 Z-Buffer Algorithm Simulation in JAVA (JAVA)
 Fractals Simulation for a tree in JAVA (JAVA)
 Facial Emotion detection (C++)
 Real time emotion detection for a face being read from the web cam by using Haar Cascades,Eigen Faces.
 The predictive model is trained using SVM (Support Vector Machine).
 77 STASM facial points and their displacement over certain frames to make the model more accurate.
 Character Modeling using Autodesk Mudbox: Created a high-detailed humanoid character.
 Color Based Object Detection: (C++)
 Using HSV color space, detect an object in the scene and compute its dimensions using the dimensions of an
already measured object, in the scene.
 Library Management System: (JAVA,SQL)
 Using JDBC as front end and SQL as back end, designed a simple library management system.
 Android Contact Manager (JAVA,XML)
 Inventory management using pattern recognition (Data Mining) (JAVA, Rapid miner)
 Used the Apriori all algorithm for pattern recognition, came up with a support based pattern matching for
books issued by each student in each department.
 Devised a support count with these patterns and used the resulting trend to predict what book a particular
student tries to borrow next.
 PERL/CGI based web application (Perl/CGI,HTML/CSS, C++)
 A simple web based application focused on providing transparency in monetary dealings within the farming
community.
 A user can either sign in as a farmer or a broker and options will be populated on the screen on that basis.
Brokers have options to lend money, provide equipment, provide quotations for each commodity that he
desires.
 Each quotation has to be approved by an administrator before the farmer can see it on his screen.
 Farmer has the options of rejecting a quotation, buying equipment, providing his own crop output information
etc.
Work Experience:
----------------------------------------------------------------------------------------------------------------------------------------------------------
Systems Engineer, Infosys Technologies Ltd.[Server Administrator for Capital Group of Companies] Sept 2012-Jan 2014
Education Support, Make A Difference [Educator for under-privileged Children] Sept 2013-Dec 2015
Public Relations Team Member, Make A Difference [Content Writer] Sept 2013-Dec 2015
Activities:
----------------------------------------------------------------------------------------------------------------------------------------------------------
Student Coordinator for annual technical fest “IGNITE” in the year 2010 and 2011.
Competitive Gaming (Active member of Tactical Gaming for Titanfall and Titanfall2)

More Related Content

What's hot

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Dhvani Shah
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
IJMER
 
Graphical password
Graphical passwordGraphical password
Graphical password
sowji888
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
anilaja
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using Hmac
Arpana shree
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
bhavana sharma
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
Sarthak Gupta
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
أحلام انصارى
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
Mumbai University
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
Ketan Patil
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
Abha nandan
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
Parag Tamhane
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
Hari Krishnan
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
Nitesh Kumar
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
ZTech Proje
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
Alexander Decker
 
11aman
11aman11aman
11aman
Anu Jamwal
 

What's hot (19)

Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
A Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click PointsA Graphical Password Scheme using Persuasive Cued Click Points
A Graphical Password Scheme using Persuasive Cued Click Points
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using Hmac
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text Authentication Scheme for Session Password using matrix Colour and Text
Authentication Scheme for Session Password using matrix Colour and Text
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Authentication scheme for session password using Images and color
Authentication scheme for session password using Images and colorAuthentication scheme for session password using Images and color
Authentication scheme for session password using Images and color
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
11aman
11aman11aman
11aman
 

Similar to Resume_updated

Manoj(Java Developer)_Resume
Manoj(Java Developer)_ResumeManoj(Java Developer)_Resume
Manoj(Java Developer)_Resume
Vamsi Manoj
 
Onlinemovieticketbooking 120215060739-phpapp02
Onlinemovieticketbooking 120215060739-phpapp02Onlinemovieticketbooking 120215060739-phpapp02
Onlinemovieticketbooking 120215060739-phpapp02
ISHA AHUJA
 
Deep learning
Deep learningDeep learning
Deep learning
Sumit Sony
 
resume
resumeresume
Kotra Pavan Kumar(es)
Kotra Pavan Kumar(es)Kotra Pavan Kumar(es)
Kotra Pavan Kumar(es)
Pavan Kumar
 
Pavan(ES)
Pavan(ES)Pavan(ES)
Pavan(ES)
Pavan Kumar
 
Sameh ibrahem -CV
Sameh ibrahem -CVSameh ibrahem -CV
Sameh ibrahem -CV
sameh ibrahem
 
Amitav Mohapatra_Java
Amitav Mohapatra_JavaAmitav Mohapatra_Java
Amitav Mohapatra_Java
Amitav Mohapatra
 
Nikhil's resume
Nikhil's resumeNikhil's resume
Nikhil's resume
Nikhil Agrawal
 
Resume
ResumeResume
[Tutorial] building machine learning models for predictive maintenance applic...
[Tutorial] building machine learning models for predictive maintenance applic...[Tutorial] building machine learning models for predictive maintenance applic...
[Tutorial] building machine learning models for predictive maintenance applic...
PAPIs.io
 
Online travel booikng
Online travel booikngOnline travel booikng
Online travel booikng
sanket shah
 
周士云的简历
周士云的简历周士云的简历
周士云的简历
Jeff (Shiyun) Zhou
 
SasikumarManickam_9 Yrs Exp
SasikumarManickam_9 Yrs ExpSasikumarManickam_9 Yrs Exp
SasikumarManickam_9 Yrs Exp
Sasikumar Manickam
 
CV-05.04.16
CV-05.04.16CV-05.04.16
CV-05.04.16
Theo Christodoulou
 
Build, Train, and Deploy ML Models at Scale
Build, Train, and Deploy ML Models at ScaleBuild, Train, and Deploy ML Models at Scale
Build, Train, and Deploy ML Models at Scale
Amazon Web Services
 
Resume
ResumeResume
Resume
Jay Stanley
 
Resume_RB
Resume_RBResume_RB
Resume_RB
Ranjeet Bhargava
 
Resume_Kaveri_Bijjargi
Resume_Kaveri_BijjargiResume_Kaveri_Bijjargi
Resume_Kaveri_Bijjargi
Kaveri Bijjargi
 
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF AlgorithmEnhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
theijes
 

Similar to Resume_updated (20)

Manoj(Java Developer)_Resume
Manoj(Java Developer)_ResumeManoj(Java Developer)_Resume
Manoj(Java Developer)_Resume
 
Onlinemovieticketbooking 120215060739-phpapp02
Onlinemovieticketbooking 120215060739-phpapp02Onlinemovieticketbooking 120215060739-phpapp02
Onlinemovieticketbooking 120215060739-phpapp02
 
Deep learning
Deep learningDeep learning
Deep learning
 
resume
resumeresume
resume
 
Kotra Pavan Kumar(es)
Kotra Pavan Kumar(es)Kotra Pavan Kumar(es)
Kotra Pavan Kumar(es)
 
Pavan(ES)
Pavan(ES)Pavan(ES)
Pavan(ES)
 
Sameh ibrahem -CV
Sameh ibrahem -CVSameh ibrahem -CV
Sameh ibrahem -CV
 
Amitav Mohapatra_Java
Amitav Mohapatra_JavaAmitav Mohapatra_Java
Amitav Mohapatra_Java
 
Nikhil's resume
Nikhil's resumeNikhil's resume
Nikhil's resume
 
Resume
ResumeResume
Resume
 
[Tutorial] building machine learning models for predictive maintenance applic...
[Tutorial] building machine learning models for predictive maintenance applic...[Tutorial] building machine learning models for predictive maintenance applic...
[Tutorial] building machine learning models for predictive maintenance applic...
 
Online travel booikng
Online travel booikngOnline travel booikng
Online travel booikng
 
周士云的简历
周士云的简历周士云的简历
周士云的简历
 
SasikumarManickam_9 Yrs Exp
SasikumarManickam_9 Yrs ExpSasikumarManickam_9 Yrs Exp
SasikumarManickam_9 Yrs Exp
 
CV-05.04.16
CV-05.04.16CV-05.04.16
CV-05.04.16
 
Build, Train, and Deploy ML Models at Scale
Build, Train, and Deploy ML Models at ScaleBuild, Train, and Deploy ML Models at Scale
Build, Train, and Deploy ML Models at Scale
 
Resume
ResumeResume
Resume
 
Resume_RB
Resume_RBResume_RB
Resume_RB
 
Resume_Kaveri_Bijjargi
Resume_Kaveri_BijjargiResume_Kaveri_Bijjargi
Resume_Kaveri_Bijjargi
 
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF AlgorithmEnhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
 

Resume_updated

  • 1. DHANANJAY SINGH +1(469)233 5696 | danny12690@gmail.com | LinkedIn URL: https://www.linkedin.com/in/dhananjay-singh-9aa6328b Education: --------------------------------------------------------------------------------------------------------------------------------------------------- Masters in Computer Science : GPA3.61 / 4 Jan’15 – Dec’16 University of Texas at Dallas(UTD) , Dallas, Texas, USA Bachelor in Engineering (Information Sciences) :GPA8.43/10 Sep’08 – Jun’12 M.S.Ramaiah Institute of Technology, Bangalore,India Skills: ---------------------------------------------------------------------------------------------------------------------------------------------------------- Tools : AutoDesk maya, mudbox, 3DsMax, CryEngine 3, Unreal Engine 4, Unity3D, Rapid Miner, Abinitio, Gruff, Jena Languages: C++, C#, Java,JavaScript, PERL/CGI, Unix Shell Scripting Portfolio: https://www.patreon.com/tgxscavenger Github: https://github.com/danny12690 Coursework: Computer Graphics | Computer Animation and Gaming | Semantic Web Technologies | UI Design | Implementation of algorithms | Analysis and Design of Algorithms |Database Design | Video Analytics | Multimedia Systems| Object Oriented Analysis and Design| Software Testing | Projects: ---------------------------------------------------------------------------------------------------------------------------------------------------  Unity3D Multiplayer Game with voice and gesture based controls: (C#,C++)  A multiplayer death match game.  The player can control his/her character using voice commands as well as using head movements using the openCV C++ library.  Link: Video  Link: Video  Fall of Five (Unity 3D) tower activation game: (C#)  A game based on the unity engine wherein enemies spawn at random intervals at random positions and each enemy is faster than the previous one.  To win, activate 5 towers that also spawn randomly, while surviving the enemy onslaught.  Link: Video  Procedural Skin and Mesh Generation (Unity3D): (C#)  Geometry shapes and key frame values and their in-tangent and out-tangent values are given in a text file.  My algorithm reads these values and renders the mesh as well as its associated animations on the screen.  Link: Video  Android Break Out Game (JAVA,XML)  Break out game with gyro controls.  Tetris with triangles (JAVA)  Z-Buffer Algorithm Simulation in JAVA (JAVA)  Fractals Simulation for a tree in JAVA (JAVA)  Facial Emotion detection (C++)  Real time emotion detection for a face being read from the web cam by using Haar Cascades,Eigen Faces.  The predictive model is trained using SVM (Support Vector Machine).  77 STASM facial points and their displacement over certain frames to make the model more accurate.  Character Modeling using Autodesk Mudbox: Created a high-detailed humanoid character.  Color Based Object Detection: (C++)
  • 2.  Using HSV color space, detect an object in the scene and compute its dimensions using the dimensions of an already measured object, in the scene.  Library Management System: (JAVA,SQL)  Using JDBC as front end and SQL as back end, designed a simple library management system.  Android Contact Manager (JAVA,XML)  Inventory management using pattern recognition (Data Mining) (JAVA, Rapid miner)  Used the Apriori all algorithm for pattern recognition, came up with a support based pattern matching for books issued by each student in each department.  Devised a support count with these patterns and used the resulting trend to predict what book a particular student tries to borrow next.  PERL/CGI based web application (Perl/CGI,HTML/CSS, C++)  A simple web based application focused on providing transparency in monetary dealings within the farming community.  A user can either sign in as a farmer or a broker and options will be populated on the screen on that basis. Brokers have options to lend money, provide equipment, provide quotations for each commodity that he desires.  Each quotation has to be approved by an administrator before the farmer can see it on his screen.  Farmer has the options of rejecting a quotation, buying equipment, providing his own crop output information etc. Work Experience: ---------------------------------------------------------------------------------------------------------------------------------------------------------- Systems Engineer, Infosys Technologies Ltd.[Server Administrator for Capital Group of Companies] Sept 2012-Jan 2014 Education Support, Make A Difference [Educator for under-privileged Children] Sept 2013-Dec 2015 Public Relations Team Member, Make A Difference [Content Writer] Sept 2013-Dec 2015 Activities: ---------------------------------------------------------------------------------------------------------------------------------------------------------- Student Coordinator for annual technical fest “IGNITE” in the year 2010 and 2011. Competitive Gaming (Active member of Tactical Gaming for Titanfall and Titanfall2)