of any fully automatic system that analyzes the information contained in faces (e.g., identity, gender, expression, age, race, and pose). The current evolution in computer technology in recent years has facilitated the development of real-time computer human interaction. Examples can be found, particularly in biometrics and human computer interaction, as the information contained in faces needs to be analyzed for systems to react accordingly (Yang, 2009). Faces first need to be located and registered
Dharani L,Indumathi V,AshmitaRenu C J and Akshay Kumar S L Computer Science and Engineering, K S Rangasamy College of Technology, Tiruchengode, Tamilnadu, India dharanigowthami14@gmail.com Computer Science and Engineering, K S Rangasamy College of Technology, Tiruchengode, Tamilnadu, India induvarugiri@gmail.com Computer Science and Engineering, K S Rangasamy College of Technology, Tiruchengode, Tamilnadu, India ashmitharenu@gmail.com Computer Science and Engineering, K S Rangasamy College of Technology
classroom tries to provide learning space where there is nothing interrupted from outsider. There are many examples of classroom that allows for learning either indoor or outdoor types. A few examples of classroom are computer lab which are used for IT lessons, gymnasium for sports, and science laboratories for biology, chemistry and physics. Classroom can range from small group of five or six to big classroom with hundreds of students which is called a lecture
personal computer by my father, was something that changed my way of life. The natural tendency of fascination towards new things resulted in an inclination towards the world of computers. Along with the birthday present, my curriculum added fuel to my propensity for computers. During my high school, my cousin introduced me to the “SIXTH SENSE TECHNOLOGY” by Pranav Mistry. The thought of making it an “OPEN SOURCE” grabbed my attention. This made me to arrive at a juncture, where I decided Computer Science
EEC 584 : COMPUTER NETWORKS Phase-1 Report Team Members : Konathala Lokesh Kumar - 2642044 Guna sree Janapati - 2642414 Aditya Maduri - 2643495 Computing On Encrypted Data Abstract : On considering computer network secutity, there are several problems that can be addressed such as integrity, data secrecy, digital
from my childhood I have believed in working hard and giving my best in everything I did. My experiences in life have only strengthened my belief in this philosophy. Consider this. Computer Science was just another subject for me in School. When I began my UG, it was an area of high interest for me. At present, I see Computer Graphics, Java programming and a bunch of other subjects shaping my future career. I wish to see myself working hand in hand with people at EASports or UBSoft, producing some of
midst of a technological and computing revolution where each new day sees a spate of new concepts and applications and each passing day makes them obsolete, I desire to have the next higher level of education in such dynamic, advancing field like computer science and transcend new horizons. As I stand at the threshold of completing my undergraduate study, after prudently envisaging the different career choices open to me I have decided to go in for a graduate study that demands personal commitment and
My parents were astonished with my decision to build a career in the field of computers, because by then I already joined my under graduation course with civil engineering as my major. Their main concern is, if I will be able to excel in computer science with a major in a non-computers program. Why not? The world’s first programmable computer was invented by a civil engineer, Konrad Zuse. His work on Plankalkul (Plan calculus) and an attempt to devise an algorithmic language for the first time ever
To achieve collaborative tasks by a set of processes, many distributed algorithms have been proposed. The problem of mutual exclusion is one of fundamental problem in distributed systems, which are required for example, update of shared object consistently. By distributed mutual exclusion, it is guaranteed that the number of processes which updates the object is at most one at any time. Mutual exclusion in computer science is the
addition to all these, when the use of computer has become popular in late 20th century, it intensified my quest towards learning the mysteries that technology holds. That’s when I have decided to become an engineer. During my Under Graduation in electronics, I had subjects such as C and Computer science lab in our curriculum. Right from my childhood I have had strong basics of mathematics and science, this made me understand the logical concepts in computer science very easily. The way go about the