To develop an Application to visualize the key board of computer with the concept of image processing. The virtual
keyboard should be accessible and functioning. The keyboard must give input to computer. With the help of camera, image
of keyboard will be fetched. The typing will be captured by camera, as we type on cardboard simply drawn on paper. Camera
will capture finger movement while typing. So basically this is giving the virtual keyboard.
As the technology advances, more and more systems are introduced which will look after the users comfort. Few
years before hard switches were used as keys. Traditional QWERTY keyboards are bulky and offer very little in terms of
enhancements. Now-a-days soft touch keypads are much popular in the market. These keypads give an elegant look and a
better feel. Currently keyboards are static and their interactivity and usability would increase if they were made dynamic and
adaptable. Various on-screen virtual keyboards are available but it is difficult to accommodate full sized keyboard on the
screen as it creates hindrance to see the documents being typed. Virtual Keyboard has no physical appearance. Although
other forms of Virtual Keyboards exist; they provide solutions using specialized devices such as 3D cameras. Due to this, a
practical implementation of such keyboards is not feasible. The Virtual Keyboard that we propose uses only a standard web
camera, with no additional hardware. Thus we see that the new technology always has more Benefits and is more userfriendly.
Notes for Mechanical and Computer science Students,
In the Notes Including the Basic to algo and transformation in Computer grafics Pixels, it is a important topic
Notes for Mechanical and Computer science Students,
In the Notes Including the Basic to algo and transformation in Computer grafics Pixels, it is a important topic
Build Your Own 3D Scanner: 3D Scanning with Swept-PlanesDouglas Lanman
Build Your Own 3D Scanner:
3D Scanning with Swept-Planes
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
This ppt's introduced Basics of computer graphics, which helps to diploma in computer engineering, DCA BCA, BE computer science student's to improve study in computer graphics.
Computer Graphics and its applications, Elements of a Graphics, Graphics Systems: Video Display Devices, Raster Scan Systems, Random Scan Systems, Input devices.
: Introduction of Rendering, Raytracing, Antialiasing, Fractals
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted information ...
Build Your Own 3D Scanner: The Mathematics of 3D TriangulationDouglas Lanman
Build Your Own 3D Scanner:
The Mathematics of 3D Triangulation
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
rring of useable data, for example a sensor in a room to monitor and control the temperature. It is estimated
that by 2020 there will be about 50 billion internet-enabled devices. The Internet of things presently is being used
in the fields of automobiles, agriculture, security surveillance, building management, smart-homes, and health
care. The IOT expects to use low-cost computing devices where there is less energy consumption impact to the environment[1]. and limited
This paper aims to describe a way for giving security to IT companies, scouting units, business organizations and
volunteer groups. Among the person identification methods, face recognition is known to be the most natural
ones, since the face modality is the modality that uses to identify people in everyday lives. This face detection
differentiates faces from non-faces and is therefore essential for accurate security. The other strategy involves face
recognition for marking the employees. The Raspberry pi module is used for face detection & recognition. The
camera will be connected to the Raspberry pi module. The employees database is collected. The database includes
name of the employees, there images & ID number[2].
This RFID reader module will be installed at the front side of organizations in such a way that all employees
provided by the RFID cards. Raspberry pi system have the database of the employees so comparing the database if
employees details are matched employ can entered into company. Thus with the help of this system, time will be
saved and it is so convenient to record employees. And the details of the employees will be sent to the
corresponding head of organization using IOT technology
In real world applications, most of the optimization problems involve more than one objective to
be optimized. The objectives in most of engineering problems are often conflicting, i.e., maximize
performance, minimize cost, maximize reliability, etc. In the case, one extreme solution would not satisfy
both objective functions and the optimal solution of one objective will not necessary be the best solution
for other objective(s). Therefore different solutions will produce trade-offs between different objectives
and a set of solutions is required to represent the optimal solutions of all objectives. Multi-objective
formulations are realistic models for many complex engineering optimization problems. Customized
genetic algorithms have been demonstrated to be particularly effective to determine excellent solutions to
these problems. A reasonable solution to a multi-objective problem is to investigate a set of solutions, each
of which satisfies the objectives at an acceptable level without being dominated by any other solution. In
this paper, an overview is presented describing various multi objective genetic algorithms developed to
handle different problems with multiple objectives.
Build Your Own 3D Scanner: 3D Scanning with Swept-PlanesDouglas Lanman
Build Your Own 3D Scanner:
3D Scanning with Swept-Planes
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
This ppt's introduced Basics of computer graphics, which helps to diploma in computer engineering, DCA BCA, BE computer science student's to improve study in computer graphics.
Computer Graphics and its applications, Elements of a Graphics, Graphics Systems: Video Display Devices, Raster Scan Systems, Random Scan Systems, Input devices.
: Introduction of Rendering, Raytracing, Antialiasing, Fractals
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted information ...
Build Your Own 3D Scanner: The Mathematics of 3D TriangulationDouglas Lanman
Build Your Own 3D Scanner:
The Mathematics of 3D Triangulation
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
rring of useable data, for example a sensor in a room to monitor and control the temperature. It is estimated
that by 2020 there will be about 50 billion internet-enabled devices. The Internet of things presently is being used
in the fields of automobiles, agriculture, security surveillance, building management, smart-homes, and health
care. The IOT expects to use low-cost computing devices where there is less energy consumption impact to the environment[1]. and limited
This paper aims to describe a way for giving security to IT companies, scouting units, business organizations and
volunteer groups. Among the person identification methods, face recognition is known to be the most natural
ones, since the face modality is the modality that uses to identify people in everyday lives. This face detection
differentiates faces from non-faces and is therefore essential for accurate security. The other strategy involves face
recognition for marking the employees. The Raspberry pi module is used for face detection & recognition. The
camera will be connected to the Raspberry pi module. The employees database is collected. The database includes
name of the employees, there images & ID number[2].
This RFID reader module will be installed at the front side of organizations in such a way that all employees
provided by the RFID cards. Raspberry pi system have the database of the employees so comparing the database if
employees details are matched employ can entered into company. Thus with the help of this system, time will be
saved and it is so convenient to record employees. And the details of the employees will be sent to the
corresponding head of organization using IOT technology
In real world applications, most of the optimization problems involve more than one objective to
be optimized. The objectives in most of engineering problems are often conflicting, i.e., maximize
performance, minimize cost, maximize reliability, etc. In the case, one extreme solution would not satisfy
both objective functions and the optimal solution of one objective will not necessary be the best solution
for other objective(s). Therefore different solutions will produce trade-offs between different objectives
and a set of solutions is required to represent the optimal solutions of all objectives. Multi-objective
formulations are realistic models for many complex engineering optimization problems. Customized
genetic algorithms have been demonstrated to be particularly effective to determine excellent solutions to
these problems. A reasonable solution to a multi-objective problem is to investigate a set of solutions, each
of which satisfies the objectives at an acceptable level without being dominated by any other solution. In
this paper, an overview is presented describing various multi objective genetic algorithms developed to
handle different problems with multiple objectives.
This study aims to enlighten the researchers about the details of process mining. As process mining is a new research area, it includes process modelling and process analysis, as well as business intelligence and data mining. Also it is used as a tool that gives information about procedures. In this paper classification of process mining techniques, different process mining algorithms, challenges and area of application have been explained.Therefore, it was concluded that process mining can be a useful technique with faster results and ability to check conformance and compliance.
Software keyloggers are a fast growing class of invasive software often used to harvest confidential
information. One of the main reasons for this rapid growth is the possibility for unprivileged programs
running in user space to eavesdrop and record all thekeystrokes typed by the users of a system. The ability
to run in unprivileged mode facilitates their implementation and distribution, but,at the same time, allows
one to understand and model their behavior in detail. Leveraging this characteristic, we propose a new
detection technique that simulates carefully crafted keystroke sequences in input and observes the behavior
of the keylogger in output to unambiguously identify it among all the running processes. We have
prototyped our technique as an unprivileged application, hence matching the same ease of deployment of a
keylogger executing in unprivileged mode. We have successfully evaluated the underlying technique
against the most common free keyloggers. This confirms the viability of our approach in practical
scenarios. We have also devised potential evasion techniques that may be adopted to circumvent our
approach and proposed a heuristic to strengthen the effectiveness of our solution against more elaborated
attacks. Extensive experimental results confirm that our technique is robust to both false positives and
false negatives in realistic settings.
As the rising of transportation system design, so many data logger design was developed for safety. In our country, there are
many accidents on highways. Both driver’s faults and road construction cause accidents. To reduce these condition some safety
system such as obstacle detection system, vehicle declination alarm system, temperature and smoke level display unit,
signboard warning on road sides should be used for both driver and passengers. In addition data logger system for whole
vehicle must be equipped for safety. With the implementation of PIC microcontroller as an Embedded device, this logger
design was constructed with many sensors and C# service-based database. Using Arduino boards, vehicle detection sensing
circuit, Check point radio signal sensing circuit for dangerous road sector, hall-effect magnetic wheel revolution sensing circuit
were designed to be connected with main PIC microcontroller and Personal Computer. Real time result was displayed on C#
Graphical User Interface and Vehicle data log could be easily exported to Microsoft Excel report.
Keywords -Arduino, alarm and alert system,C# service-based database, PC based control system, Vehicle data
logger.
Free Space Optics is a medium with high bandwidth which has maximum data rate. Demand for
large data speed capacity has been increasing exponentially due to the massive spread of internet
So with the growing transmission rate and demand in the field of optical communication, the electronic
regeneration has become more expensive. With the introduction of power optical amplifiers the cost of
converting optical signals to electronic
combinations of hybrid amplifiers have been studied and emerged in FSO system. Their performances
have been compared on the basis of transmission distance
The content based Image Retrieval is the restoration of images with respect to the visual appearances
like texture, shape and color.The methods, components and the algorithms adopted in this content based
retrieval of images were commonly derived from the areas like pattern identification, signal progressing
and the computer vision. Moreover the shape and the color features were abstracted in the course of
wavelet transformation and color histogram. Thus the new content based retrieval is proposed in this
research paper.In this paper the algorithms were required to propose with regards to the shape, shade and
texture feature abstraction .The concept of discrete wavelet transform to be implemented in order to
compute the Euclidian distance.The calculation of clusters was made with the help of the modified KMeans
clustering technique. Thus the analysis is made in among the query image and the database
image.The MATLAB software is implemented to execute the queries. The K-Means of abstraction is
proposed by performing fragmentation and grid-means module, feature extraction and K- nearest neighbor
clustering algorithms to construct the content based image retrieval system.Thus the obtained result are
made to compute and compared to all other algorithm for the retrieval of quality image features
This paper intends to construct and design of the fuel monitoring and electronics control of dispenser for fuel station. It
consists of two sections; hardware implementation for control section and software implementation section. Some fuel stations
which used the flow rate sensors cannot get satisfactions both customers and dealers. The reason is that the fuel volume can
increase or decrease due to the temperature changes depending on the places and times. The system can solve the
disadvantages of it. The system controls for the compensation in volume flow rate with controller. In order to solve this
problem, PIC16F877A is used as a controller to control the time taken for each data representation customer requests from the
keypad and LCD (liquid crystal display) is also used as display unit in this system. And then computer is also used as a control
station by using VB.Net. The status of the fuel levels is also monitored from the computer. MikroC is used for software
implementation of the system In order to control time taken.
Keywords — fuel compensation system, volume flow rate, controller, and software.
Osteoarthritis (OA) is the most common form of arthritis seen in aged or older populations. It is caused
because of a degeneration of articular cartilage, which functions as shock absorption cushion in knee joint. OA
also leads sliding of bones together, cause swelling, pain, eventually and loss of motion. Nowadays, magnetic
resonance imaging (MRI) technique is widely used in the progression of osteoarthritis diagnosis due to the ability
to display the contrast between bone and cartilage. Usually, analysis of MRI image is done manually by a
physician which is very unpredictable, subjective and time consuming. Hence, there is need to develop automated
system to reduce the processing time. In this paper, a new automatic knee OA detection system based on feature
extraction and artificial neural network is developed. The different features viz GLCM texture, statistical, shape
etc. is extracted by using different image processing algorithms. This detection system consists of 4 stages, which
are pre-processing with ROI cropping, segmentation, feature extraction, and classification by neural network. This
technique results 98.5% of classification accuracy at training stage and 92% at testing stage.
Keywords — Artificial Neural Network (ANN), Gray Level Co-occurrence Matrix (GLCM),Knee
Joint, Magnetic Resonance Imaging (MRI), Osteoarthritis(OA).
The classical or traditional information system provides answer after a user submits a complete query. It is even
noticed that presently, almost all the relational database systems rely on the query which has syntax and semantics
defined completely to access data. But often it is the case that we are willing to use vague terms in our query. The main
objective of database management system is to provide an environment that is both convenient and efficient for people
to use in storing and retrieving information. A recent trend of supporting auto complete is a first step to cope up with
this problem. We can have design of both classical and fuzzy database and can use effectively fuzzy queries on these
databases. Fuzzy databases are developed to manipulate the incomplete, unclear and vague data such as low, fast, very
high, about etc. The primary focus of fuzzy logic is on the natural language. This Paper provides the users the flexibility
or freedom to query database using natural language. Here this paper implements “interactive fuzzy search”. This
framework for interactive fuzzy search permits the user to explore the data as they type even in the presence of some
minor errors. This paper applies fuzzy queries on relational database so that it is possible to have the precise result as
well as the output for the uncertain terms we generally use based on some membership function
Abstract:
E-commerce stands for electronic commerce. E-commerce is doing business online and electronically. This paper attempts to highlight the different challenges faced by e-commerce in India and to understand the essential growth factors required for e-commerce. This paper describes the different services and opportunities offered by E-commerce to business, Producers, Distributers and Customers.
Keywords: - E-commerce, Challenges, Growth Factors.
As Diabetes Mellitus combined with other ailments will become a deadly combination, hence there
is an urgent need to break the link between diabetes and its related complications. For this purpose image
processing based analysis can potentially be helpful for earlier detection, education and treatment. Medical
image analysis of Diabetic patients with its related complications such as DR, CVD & Diabetic
Myonecrosis (i.e. on Retinal Images, Coronary angiographs, Electron micrographs, MRI etc) is to be the
aprioristic because of its more prevalence. Thus the main work of this paper is on literature review about
Diabetes and Imaging such as the Prevalence, Classification, Causes and Medical Imaging & Survey of
Image processing methods applied on Diabetic Related Causes.
Keywords — Image, segmentation, retinopathy, Myonecrosis,
This research paper presents a new technique for the synthesis of complex planar mechanisms. The author
calls this technique ‘nomogram-based synthesis’ since it depends on a kinematic nomogram facilitating the
synthesis of complex planar mechanisms without need to complex optimization procedures. A procedure of five
steps is presented to synthesize the mechanism under study for time ratio up to 4.3, normalized stroke up to 3.33.
The nomogram based synthesis can maintain transmission angle to be within a range from 94 to 120 degrees
indicating the effectiveness of the synthesis approach presented.
Keywords — Nomogram-based mechanism synthesis, 6 bar-2 sliders planar mechanism, successful
mechanism performance.
This study investigate the characteristics of a gear system including contact stresses, bending
stresses, and the transmission errors of gears in mesh. Gearing is one of most critical component in
mechanical power transmission systems. The bending stresses in the tooth root were examined using 3D
model.
Current methods of calculating gear contact stresses use Hertz’s equations and Lewis Equation
which were originally derived for contact between two cylinders. To enable the investigation of contact
problems with FEM, the stiffness relationship between the two contact areas is usually established
through a spring placed between the two contacting areas. This can be achieve by inserting a contact
element in between the two areas where contact occurs. The results of the three dimensional FEM analysis
from ANSYS are presented. These stresses were compared with theoretical values. Both results agree very
well. This indicates that the FEM model is accurate.
This report also considers the variations of the whole body stiffness arising from gear body
rotation due to bending deflection, shearing displacement and contact deformation. Many different
positions within the meshing cycle were investigated. Investigation of contact and bending stress
characteristics of spur gears continues to be immense attention to both engineers and researchers in spite
of many studies in the past.
This is because of the advances in the engineering technology that demands for gears with ever
increasing load capacities and speeds with high reliability, the designers need to be able to accurately
predict the stresses experienced the stresses by the loaded gears.
Recently technological and population development, the usage of vehicles is rapidly increasing and at the
same time the occurrence accident is also increased. Hence, the value of human life is ignored. No one can prevent
the accident, but can save their life by expediting the ambulance to the hospital in time. The objective of this
scheme is to minimize the delay caused by traffic congestion and to provide the smooth flow of emergency
vehicles. The concept of this scheme is to green the traffic signal in the path of ambulance automatically so that
the ambulance can reach the spot in time and human life can be saved. The main server finds the ambulance
through mail. At the same time, it controls the traffic light according to the ambulance location and thus arriving at
the hospital safely. This scheme is fully automated, thus it locates emergency vehicle and controls the traffic
lights, provide the shortest path to reach the hospital in time.
For Image Authentication Problem using Encryption Technique and LDPC Source Coding is necessary in Content
Delivery via unsecure medium, Like Peer-To-Peer (P2P) File Sharing. These transferring Digital Files from one Computer to
another. Images are the Most Important Utility of our life. They are used in many applications. There are Two Main Goals of
Image Security: Image Encryption and Authentication. More different encoded versions of the original image available.In
addition, unsecure medium might tamper with the contents.. We propose an efficient, accurate, reliable process using
encryption and LDPC source coding for the image authentication problem. The key idea is to provide a Slepian-Wolf encoded
as authentication data which is encrypted using cryptography key before ready to send. The key used for encryption is usually
independent of the Plain-Image. This can be decoded with side information of an authentic image.
Generally the prediction of behaviour of material at high temperature is very difficult. During design of
components which are subjected to or working at high temperature must consider the testing at elevated
temperature. Hot tensile testing (HTT) is the method of tensile testing of material at elevated temperature. The
materials used for automotive or aerospace applications are mostly subject to cyclic loading, high temperature
and sometimes involve high frequency vibrations. High strength aluminium alloys are one class of materials that
are widely used in the automotive and aerospace industries .In this work I test A413 material for HTT at different
temperature and strain rate, which can be used for piston.
Keywords — HTT, high temperature, strain rate, piston, automotive or aerospace.
A mediator person is required for communication between deaf person and a second person. But a
mediator should know the sign language used by deaf person. But this is also not possible always since there are
multiple sign languages for multiple languages. It is difficult for a deaf person to understand what a second
person speaks. And therefore deaf person should keep track of lip movements of second person in order to know
what he is speaking. But the lip movements do not give proper efficiency and accuracy since the facial
expressions and speech might not match. To overcome the above problems we have proposed a system, an
Android Application for recognizing sign language using hand gesture with the facility for user to define and
upload their own sign language into the system. The features of this system are the real time conversion of
gesture to text and speech. For two-way communication between deaf person and second person, the speech of
second person is converted into text. The processing steps include: gesture extraction, gesture matching and
conversion of text to speech and vice-versa. The system is not only useful for deaf community but can also be
used by common people who migrate to different regions and do not know local language.
This paper presents the maneuver of mouse pointer and performs various mouse operations such as left
click, right click, double click, drag etc using gestures recognition technique. Recognizing gestures is a
complex task which involves many aspects such as motion modeling, motion analysis, pattern recognition
and machine learning.
Keeping all the essential factors in mind a system has been created which recognizes the movement of
fingers and various patterns formed by them. Color caps have been used for fingers to distinguish it from
the background color such as skin color. Thus recognizing the gestures various mouse events have been
performed. The application has been created on MATLAB environment with operating system as windows
7.
An efficient VLSI architecture implementation for barrel distortion correction in surveillance camera images is presented. The distortion correction model is based on least squares estimation method. To reduce the computing complexity, an odd-order polynomial to approximate the back-mapping expansion polynomial is used. By algebraic transformation, the approximated polynomial becomes a monomial form which can be solved by Horner’s algorithm. The proposed VLSI architecture can achieve frequency 218MHz with 1490 logic elements by using 0.18μm technology. Compared with previous techniques, the circuit reduces the hardware cost and the requirement of memory usage.
Hand Gesture Controls for Digital TV using Mobile ARM Platformijsrd.com
This paper presents a new approach for controlling digital television using a real-time camera. Proposed method uses a camera, a mobile ARM platform and computer vision technology, such as image segmentation and gesture recognition, to control TV operations such as changing channels, increasing or decreasing volume etc. For this we have used an ARM based mobile platform with OMAP processor. For processing the images we implemented the code using OpenCV library. Hand detection is one of the important stages for applications such as gesture recognition and hand tracking. In this paper, it proposes a new method to extract hand region and consequently the fingertips from color images.
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input (MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
3D reconstruction is a technique used in computer vision which has a wide range of applications in areas like object recognition, city modelling, virtual reality, physical simulations, video games and special effects. Previously, to perform a 3D reconstruction, specialized hardwares were required. Such systems were often very expensive and was only available for industrial or research purpose. With the rise of the availability of high-quality low cost 3D sensors, it is now possible to design inexpensive complete 3D scanning systems. The objective of this work was to design an acquisition and processing system that can perform 3D scanning and reconstruction of objects seamlessly. In addition, the goal of this work also included making the 3D scanning process fully automated by building and integrating a turntable alongside the software. This means the user can perform a full 3D scan only by a press of a few buttons from our dedicated graphical user interface. Three main steps were followed to go from acquisition of point clouds to the finished reconstructed 3D model. First, our system acquires point cloud data of a person/object using inexpensive camera sensor. Second, align and convert the acquired point cloud data into a watertight mesh of good quality. Third, export the reconstructed model to a 3D printer to obtain a proper 3D print of the model.
3D reconstruction is a technique used in computer vision which has a wide range of applications in areas like object recognition, city modelling, virtual reality, physical simulations, video games and special effects. Previously, to perform a 3D reconstruction, specialized hardwares were required. Such systems were often very expensive and was only available for industrial or research purpose. With the rise of the availability of high-quality low cost 3D sensors, it is now possible to design inexpensive complete 3D scanning systems. The objective of this work was to design an acquisition and processing system that can perform 3D scanning and reconstruction of objects seamlessly. In addition, the goal of this work also included making the 3D scanning process fully automated by building and integrating a turntable alongside the software. This means the user can perform a full 3D scan only by a press of a few buttons from our dedicated graphical user interface. Three main steps were followed to go from acquisition of point clouds to the finished reconstructed 3D model. First, our system acquires point cloud data of a person/object using inexpensive camera sensor. Second, align and convert the acquired point cloud data into a watertight mesh of good quality. Third, export the reconstructed model to a 3D printer to obtain a proper 3D print of the model.
Similar to [IJET-V1I5P13] Authors: Ayesha Shaikh, Antara Kanade,Mabel Fernandes, Shubhangi Chikhalthane (20)
These days we have an increased number of heart diseases including increased risk of heart attacks. Our proposed system users sensors that allow to detect heart rate of a person using heartbeat sensing even if the person is at home. The sensor is then interfaced to a microcontroller that allows checking heart rate readings and transmitting them over internet. The user may set the high as well as low levels of heart beat limit. After setting these limits, the system starts monitoring and as soon as patient heart beat goes above a certain limit, the system sends an alert to the controller which then transmits this over the internet and alerts the doctors as well as concerned users. Also the system alerts for lower heartbeats. Whenever the user logs on for monitoring, the system also displays the live heart rate of the patient. Thus concerned ones may monitor heart rate as well get an alert of heart attack to the patient immediately from anywhere and the person can be saved on time.This value will continue to grow if no proper solution is found. Internet of Things (IoT) technology developments allows humans to control a variety of high-tech equipment in our daily lives. One of these is the ease of checking health using gadgets, either a phone, tablet or laptop. we mainly focused on the safety measures for both driver and vehicle by using three types of sensors: Heartbeat sensor, Traffic light sensor and Level sensor. Heartbeat sensor is used to monitor heartbeat rate of the driver constantly and prevents from the accidents by controlling through IOT.
ABSTRACT The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Public key encryption with keyword search applies only to the certain circumstances that keyword cipher text can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes and supports multi-keyword search. Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend on a trusted third party with interactive search protocols or need cumbersome key management. To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption to enable attribute-based keyword search (ABKS
Cloud computing is the one of the emerging techniques to process the big data. Large collection of set or large
volume of data is known as big data. Processing of big data (MRI images and DICOM images) normally takes
more time compare with other data. The main tasks such as handling big data can be solved by using the concepts
of hadoop. Enhancing the hadoop concept it will help the user to process the large set of images or data. The
Advanced Hadoop Distributed File System (AHDF) and MapReduce are the two default main functions which
are used to enhance hadoop. HDF method is a hadoop file storing system, which is used for storing and retrieving
the data. MapReduce is the combinations of two functions namely maps and reduce. Map is the process of
splitting the inputs and reduce is the process of integrating the output of map’s input. Recently, in medical fields
the experienced problems like machine failure and fault tolerance while processing the result for the scanned
data. A unique optimized time scheduling algorithm, called Advanced Dynamic Handover Reduce Function
(ADHRF) algorithm is introduced in the reduce function. Enhancement of hadoop and cloud introduction of
ADHRF helps to overcome the processing risks, to get optimized result with less waiting time and reduction in
error percentage of the output image
Text mining has turned out to be one of the in vogue handle that has been joined in a few research
fields, for example, computational etymology, Information Retrieval (IR) and data mining. Natural
Language Processing (NLP) methods were utilized to extricate learning from the textual text that is
composed by people. Text mining peruses an unstructured form of data to give important
information designs in a most brief day and age. Long range interpersonal communication locales
are an awesome wellspring of correspondence as the vast majority of the general population in this
day and age utilize these destinations in their everyday lives to keep associated with each other. It
turns into a typical practice to not compose a sentence with remedy punctuation and spelling. This
training may prompt various types of ambiguities like lexical, syntactic, and semantic and because of
this kind of indistinct data; it is elusive out the genuine data arrange. As needs be, we are directing
an examination with the point of searching for various text mining techniques to get different
textual requests via web-based networking media sites. This review expects to depict how
contemplates in online networking have utilized text investigation and text mining methods to
identify the key topics in the data. This study concentrated on examining the text mining
contemplates identified with Facebook and Twitter; the two prevailing web-based social networking
on the planet. Aftereffects of this overview can fill in as the baselines for future text mining research.
Colorectal cancer (CRC) has potential to spread within the peritoneal cavity, and this transcoelomic
dissemination is termed “peritoneal metastases” (PM).The aim of this article was to summarise the current
evidence regarding CRC patients at high risk of PM. Colorectal cancer is the second most common cause of cancer
death in the UK. Prompt investigation of suspicious symptoms is important, but there is increasing evidence that
screening for the disease can produce significant reductions in mortality.High quality surgery is of paramount
importance in achieving good outcomes, particularly in rectal cancer, but adjuvant radiotherapy and chemotherapy
have important parts to play. The treatment of advanced disease is still essentially palliative, although surgery for
limited hepatic metastases may be curative in a small proportion of patients.
Heat transfer in pipes is a distinctive kind of procedure employed in heat exchanger which transfers great
deal of heat because of the impact of capillary action and phase change heat transfer principle. Late improvement
in the heat pipe incorporates high thermal conductivity liquids like Nano liquids, fixed inside to extricate the most
extreme heat. This paper audits, impact of different factors, for example, thermal pipe tilt edge, charged measure
of working liquid, nano particles sort, size, and mass/volume part and its impact on the change of thermal
proficiency, thermal exchange limit and decrease in thermal protection. The Nano liquid arrangement and the
examination of its thermal attributes likewise have been investigated. The retained sun oriented vitality is
exchanged to the working liquid streaming in the pipe. The execution of the framework is affected by thermal
exchange from tube to working liquid, with least convective misfortunes, which must be considered as one of the
essential plan factor. In tube and channel streams, to improve the rate of heat exchange to the working liquid,
detached enlargement methods, for example, contorted tapes and swirl generators are employed from the fluid
flow path. The variation of heat transfer coefficient and pressure drop in the pipe flow for water and water based
Al2O3 Nano fluids at different volume concentrations and twisted tapes are studied.
Now-a-day’s pedal powered grinding machine is used only for grinding purpose. Also, it requires lots of efforts
and limited for single application use. Another problem in existing model is that it consumed more time and also has
lower efficiency. Our aim is to design a human powered grinding machine which can also be used for many purposes
like pumping, grinding, washing, cutting, etc. it can carry water to a height 8 meter and produces 4 ampere of electricity
in most effective way. The system is also useful for the health conscious work out purpose. The purpose of this technical
study is to increase the performance and output capacity of pedal powered grinding machine.
This project proposes a distributed control approach to coordinate multiple energy storage units
(ESUs) to avoid violation of voltage and network load constraints ESU as a buffer can be a promising
solution which can store surplus power during the peak generation periods and use it in peak load
periods.In ESU converters both active and reactive power are used to deal with the power quality
issues in distribution network ESU’s reactive power is proposed to be used for voltage support, while
the active power is to be utilized in managing network loading.
The steady increase in non-linear loads on the power supply network such as, AC variable speed drives,
DC variable Speed drives, UPS, Inverter and SMPS raises issues about power quality and reliability. In this
subject, attention has been focused on harmonics . Harmonics overload the power system network and cause
reliability problems on equipment and system and also waste energy. Passive and active harmonic filters are
used to mitigate harmonic problems. The use of both active and passive filter is justified to mitigate the
harmonics. The difficulty for practicing engineers is to select and deploy correct harmonic filters , This paper
explains which solutions are suitable when it comes to choosing active and passive harmonic filters and also
explains the mistakes need to be avoided.
This Paper is aimed at analyzing the few important Power System equipment failures generally
occurring in the Industrial Power Distribution system. Many such general problems if not resolved it may
lead to huge production stoppage and unforeseen equipment damages. We can improve the reliability of
Power system by simply applying the problem solving tool for every case study and finding out the root cause
of the problem, validation of root cause and elimination by corrective measures. This problem solving
approach to be practiced by every day to improve the power system reliability. This paper will throw the light
and will be a guide for the Practicing Electrical Engineers to find out the solution for every problem which
they come across in their day to day maintenance activity.
More from IJET - International Journal of Engineering and Techniques (20)
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Immunizing Image Classifiers Against Localized Adversary Attacks
[IJET-V1I5P13] Authors: Ayesha Shaikh, Antara Kanade,Mabel Fernandes, Shubhangi Chikhalthane
1. International Journal of Engineering and Techniques - Volume 1 Issue 5, October 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 75
Review Of Virtual Keyboard
Ayesha Shaikh1
, Antara Kanade2
,Mabel Fernandes3
, Shubhangi Chikhalthane4
1,2,3,4
(Computer Department, Modern Education Society’s College of Engineering, and Pune)
I. INTRODUCTION
As the demand for computing environment evolves, new
human-computer interfaces have been implemented to provide
multiform interactions between users and machines.
Nevertheless, the basis for most human-to-computer
interactions remains the binomial keyboard/mouse. We are
presenting here a next generation technology, which is the
Virtual Keypad. As the name suggests the virtual keypad has
no physical appearance. Virtual keyboard is an application
which virtualizes hardware keyboard with different layouts
hence allowing user to change the layout based on application.
E.g. user can select different language for editor or select a
specialized layout for gaming applications. User can even
design his own layout in hardware version.
A. Fingertips Detection
In this step, we estimate the locations of the user’s
fingertips (in image-space) based on geometrical
features of the contours and regions obtained from
the last step. We represent a contour ˜ γ as a
sequence of positions {p1 = (x1, y1), p2 =(x2, y2)}
in image-space. Given a contour, one can derive
several other sequences of geometrical significance
and use these to locate the fingertips. The previous
processing step gives us a contour ˜ γ consisting of
pixel locations pi such that the Euclidean distance
between pi and pi+1 is 1 for all i, and the angle in
between the displacement vectors pi+1 − pi and
pi−1 − pi is in {−π/2,0,π/2,π}. This angular
information does not give a very good idea of how
the contour bends around the hand, so we consider
a subsequence γ in which the points of the contour
are spaced further apart. In experiments, we took γ
to be every tenth point of ˜ γ. We then define a
sequence of angles in (in (−π, π]) from γ as we did
with ˜ γ, by considering the angle between
displacement vectors. A second important property
we derive from γ is curvature. Curvature can most
easily be understood in the situation where γ is
parameterized by arc length. In this situation, the
acceleration vector γ00 (t) is always perpendicular
to the contour. The curvature K (t) is simply the
magnitude of γ00 (t), with larger values indicating
that the curve is bending more severely. The data
RESEARCH ARTICLE OPEN ACCESS
Abstract:
To develop an Application to visualize the key board of computer with the concept of image processing. The virtual
keyboard should be accessible and functioning. The keyboard must give input to computer. With the help of camera, image
of keyboard will be fetched. The typing will be captured by camera, as we type on cardboard simply drawn on paper. Camera
will capture finger movement while typing. So basically this is giving the virtual keyboard.
As the technology advances, more and more systems are introduced which will look after the users comfort. Few
years before hard switches were used as keys. Traditional QWERTY keyboards are bulky and offer very little in terms of
enhancements. Now-a-days soft touch keypads are much popular in the market. These keypads give an elegant look and a
better feel. Currently keyboards are static and their interactivity and usability would increase if they were made dynamic and
adaptable. Various on-screen virtual keyboards are available but it is difficult to accommodate full sized keyboard on the
screen as it creates hindrance to see the documents being typed. Virtual Keyboard has no physical appearance. Although
other forms of Virtual Keyboards exist; they provide solutions using specialized devices such as 3D cameras. Due to this, a
practical implementation of such keyboards is not feasible. The Virtual Keyboard that we propose uses only a standard web
camera, with no additional hardware. Thus we see that the new technology always has more Benefits and is more user-
friendly.
Keywords — Image Display, Image Processing software, Digitization and Image Capture, Camera
Calibration, Edge and feature detection, Pixel classification, Colour, Motion, Shape.
2. International Journal of Engineering and
ISSN: 2395-1303
we use to represent γ does not parameterize the
contour by arc length, but the authors of
there is still a formula for calculating K (t)
Given this geometrical data, we have two
approaches for locating the finger tips in an image.
The first approach is to calculate the sequence of
angles in, and associate finger tips with points
where in is maximized. The second approach is to
calculate the curvature values Ki and associate
finger tips with positions where Ki is maximized.
Naturally, both approaches require non
suppression or other post-processing to b
Both of these approaches are described in and we
compare their performance.
B. Touch Detection
In this phase of processing, we are given as input
the estimated positions of the user’s fingertips and
must output which of those tips are estimated
in contact with the keyboard-mat. We used a
technique called shadow analysis, described in
solve this problem. The first step in shadow
analysis is to extract the shadow of the user’s
hands from the scene. We accomplish this by
thresholding the image in 8-bit HLS colorspace
coordinates. From examining many test images,
we found that a threshold of L < 0.30·255
produced a binary image S that clearly depicts the
shadows in the image.4 For each fingertip position
p, we examine square 20×20 neighbourho
in the binary image S. If the percentage of shadow
pixels in the neighbourhood is smaller than a
percentage s, we conclude that the fingertip is in
contact with the table. We refer to
shadow threshold. In the experimental section,
investigate the elect of varying this threshold
C. Mapping Touch Points to Keystrokes
The previous phase of processing yields a list of
image-space coordinates that estimate where the
user has touched the keyboard. In this section, we
International Journal of Engineering and Techniques - Volume 1 Issue 5, October 2015
http://www.ijetjournal.org
does not parameterize the
c length, but the authors of report
lculating K (t)
Given this geometrical data, we have two
tips in an image.
first approach is to calculate the sequence of
tips with points
where in is maximized. The second approach is to
and associate
is maximized.
Naturally, both approaches require non-maximum
processing to be effective.
Both of these approaches are described in and we
In this phase of processing, we are given as input
fingertips and
must output which of those tips are estimated to be
mat. We used a
hadow analysis, described in, to
first step in shadow
analysis is to extract the shadow of the user’s
hands from the scene. We accomplish this by
bit HLS colorspace
coordinates. From examining many test images,
we found that a threshold of L < 0.30·255
produced a binary image S that clearly depicts the
fingertip position
p, we examine square 20×20 neighbourhood of p
in the binary image S. If the percentage of shadow
pixels in the neighbourhood is smaller than a fixed
fingertip is in
it as as the
shadow threshold. In the experimental section, we
ect of varying this threshold.
The previous phase of processing yields a list of
space coordinates that estimate where the
user has touched the keyboard. In this section, we
describe how we translate those image
coordinates to rectilinear keyboard
coordinates, and then to actual keystrokes,
correcting for perspective. The perspective
correction technique we used did not appear in any
reference we read, instead we derived it from i
in the lecture on stereo vision. An image captured
by the camera in our system is a perspective
projection of a three dimensional scene. Our
system assumes the layout of the keyboard is
known at compile time and that the keyboard
given to the user has several control points printed
on it, arranged in a rectangle of known height and
width. For test purposes, our keyboard consisted of
a square-shaped grid with 25 keys, as depicted in
Figure 3. We designate the four control point’s c0,
c1, c2, c3. Each point ci = (xi, yi,zi) is a point in
the plane of the keyboard mat. We assume our
camera is a pinhole camera of focal length d, and
carry out all of our calculations in “camera
coordinates”, so that the camera’s aperture is at the
origin with its optical axis pointing in the
direction, with no rotation about the z
simplicity, we assume all of our length
variables have the same units. To obtain the
positions of the control-points in image
begin by thresholding an 8-bit RGB tes
captured at the beginning of processing with the
inequality B < 100. The resulting binary image has
four connected components, we assume that the
keyboard-mat is aligned so that the vectors c1
c0and c2 − c3 are parallel to the x
w and the vectors c3 − c0and c2 − c1 are
perpendicular to the x-axis, with length h. Thus,
under the perspective projection, the keyboard
looks like the image in Figure.
Fig.1An example of the keyboard mat, under perspective projection
October 2015
Page 76
translate those image-space
coordinates to rectilinear keyboard-space
coordinates, and then to actual keystrokes,
correcting for perspective. The perspective
correction technique we used did not appear in any
reference we read, instead we derived it from ideas
in the lecture on stereo vision. An image captured
by the camera in our system is a perspective
projection of a three dimensional scene. Our
system assumes the layout of the keyboard is
known at compile time and that the keyboard-mat
has several control points printed
on it, arranged in a rectangle of known height and
width. For test purposes, our keyboard consisted of
shaped grid with 25 keys, as depicted in
Figure 3. We designate the four control point’s c0,
h point ci = (xi, yi,zi) is a point in
the plane of the keyboard mat. We assume our
camera is a pinhole camera of focal length d, and
carry out all of our calculations in “camera
coordinates”, so that the camera’s aperture is at the
axis pointing in the −z
direction, with no rotation about the z-axis. For
simplicity, we assume all of our length-valued
variables have the same units. To obtain the
points in image-space, we
bit RGB test image
captured at the beginning of processing with the
inequality B < 100. The resulting binary image has
we assume that the
mat is aligned so that the vectors c1 −
− c3 are parallel to the x-axis with length
− c0and c2 − c1 are
axis, with length h. Thus,
under the perspective projection, the keyboard-mat
Fig.1An example of the keyboard mat, under perspective projection.
3. International Journal of Engineering and Techniques - Volume 1 Issue 5, October 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 77
D. Problem Defination
Recent years have marked a sharp increase in the
number of ways in which people interact with
computers. Where the keyboard and mouse were
once the primary interfaces for controlling a
computer, users now utilize touchscreens, infrared
cameras (like Microsoft’s Kinect), and
accelerometers (for example, within the iPhone) to
interact with their technology. In light of these
changes and the proliferation of small cameras in
many phones and tablets, human computer interface
researchers have investigated the possibility of
implementing a keyboard-style interface using a
camera as a substitute for actual keyboard hardware.
Broadly speaking, these researchers envision the
following scenario: A camera observes the user’s
hands, which rest on a flat surface. The camera may
observe the hands from above the surface, or at an
angle. The virtual keyboard’s software analyses
those images in real-time to determine the sequence
of keystrokes chosen by the user. These researchers
envision several applications for this technology: in
some countries (for example, India), users speak
many different languages, which makes producing
physical keyboards for many different
orthographies expensive. A camera-based keyboard
can easily support many languages, Smart-phone
and tablet users may occasionally want to use a full-
sized keyboard with their device, but are unwilling
to carry a physical keyboard. Since most mobile
devices are equipped with a camera, a camera-
based keyboard could provide a software-based
solution for this problem.
The objective of this semester project was to
implement a virtual keyboard using the image
analysis techniques described. In the system we
implemented, a single low-quality camera captures
RGB images of a user’s. Hands, which touch a
patterned surface,or keyboard-mat, in order to
select keystrokes. Based upon this information and
an initial calibration image of the keyboard-mat, the
system produces a discrete sequence of keystrokes
that can be used to control other software. We
examine the performance of each of the three main
phases of image analysis and compare the
efficiency of two techniques for locating the user’s
fingertips in an image. We also analyse the degree
to which our system is sensitive to changes in
lighting and frame rate.
II. SYSTEM ARCHITECTURE DESIGN
1.We describe the image analysis techniques
used to convert the user’s surface-touches into
keystrokes. Most state-of-the-art camera-
based virtual keyboard schemes, including,
are implemented using the following sequence
of image analysis techniques:
2.The system’s camera captures an image I for
processing. By performing skin segmentation
on I, we obtain a binary image with a region
H representing the hand(s) in the scene.
3.H is analysed to determine the locations of
the user’s fingertips. The references listed
above determine contours that parameterize
the boundary of H. They associate fingertips
with the points on the contours that optimize
certain geometric quantities (for example,
curvature). We consider two of these
geometric approaches to finding the fingertips
and compare their performance.
4.Given the estimated fingertip positions, one
must calculate which fingertips are touching
the keyboard’s keys. Propose a technique
called shadow analysis to solve this problem.
5.To map touch points to key presses, we
assume the keys of the virtual keyboard are
described as rectangles in R2. We assume the
layout of the keyboard is known at compile
time and the keyboard-mat has control points
from which we can derive a perspective
correction transformation. We then apply a
simple formula to convert the keyboard-space
coordinates of the touch points to key presses.
4. International Journal of Engineering and Techniques - Volume 1 Issue 5, October 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 78
III. LITERATURE
[1]Contain the following Points:
1.Basics Idea of Touch Detection-
We use shape characteristics like click or touch
in touch detection. The shape of projected
interactive element is distorted by the fingers when
we touch it. Detecting the distortion of the
interactive element is an important way to monitor
the touch.
2.Touch Detection in Virtual Keyboard-
Detect the average offset Hoffset and select
candidate keys with button’s distortion width K.
Then determine which key distortion are caused by
fingertip from candidates. Judge wether the
fingertip touch the key or not.
3.Touch Detection with the help of Camera
We used Paper for Virtual Keyboard
Implementation.
In[2] we learn an image processing filter is applied
the input image to improve it for further processing.
Here we either blur the image in case it’s too sharp.
Else we sharpen.
In[3]This paper describes that How to Map Touch
Point to Keystrokes
In[5] This IEEE Paper describes that how current
Virtual Keyboard implementation done and
describes shadow analysis, edge detection,
keyboard detection, tip detection to solve these
problems.
From[11]we got idea about How Drag and type
method used for secure and accurate password entry
on the small touch screen for security purpose.
[13]represent a novel mono-vision virtual keyboard
design for consumers of mobile and portable
computing devices such as PDA’s, mobile phones
etc.
IV. ALGORITHIMS
We have used different algorithms such as :
1. Video Input a constant video feed is
obtained from the webcam connected to the
PC. A webcam interface control / API is
used for this.
2. Frame Grab At regular intervals (about 10 to
15 times every second), the current frame
from video is copied as image to some other
image control wherein we can read or
manipulate pixels from that image.
3. Pre-Processing an image processing filter is
applied the input image to improve it for
further processing. Here we either blur the
image in case it’s too sharp. Else we sharpen
the image in case the video feed is too
blurred. Hence either sharpening or
Gaussian blur filter is used based on quality
of feed..
4. Selective RGB the image pixels are filtered
based on their colour components (R, G and
B values). The threshold ranges for these
colours are specified by used initially. The
ranges have to be specified based on the
colour of the symbols.
5. RGB to HSV Conversion HSV model
stands Hue, Value, and Saturation. Hue
represents colour type. It can be described in
term of angle on the above circle. Saturation
represents vibrancy of colour. Value
represents brightness of colour.
6. Histogram:A binary histogram for
individual characters is constructed.
Histogram is the frequency count for .the
pixels (which will be either completely
black or completely white after
Thresholding).
7. Pattern Matching and Pattern Recognition:A
number of steps are applied to match the
pattern being stored and recognize the exact
pattern with the input given by user.
8. Output keystrokes using the Robot API, the
output keystroke is analysed.
V. CONCLUSIONS
In this project, we implemented a virtual
keyboard by using Camera and Image Processing.
Implementing a virtual keyboard system gave us
a better understanding of the trade one must
consider when choosing image analysis techniques
in the context of a larger system.
We are try to characterize what typing tasks users
currently perform on their touchscreens and then
5. International Journal of Engineering and Techniques - Volume 1 Issue 5, October 2015
ISSN: 2395-1303 http://www.ijetjournal.org Page 79
examine whether those tasks can be performed
effectively with a virtual keyboard.
ACKNOWLEDGMENT
It gives us great pleasure in presenting the
preliminary project report on ‘VIRTUAL
KEYBOARD’.
I would like to take this opportunity to thank my
internal guide Prof. S. S. Raskar for giving me all
the help and guidance I needed. I am really grateful
to them for their kind support. Their valuable
suggestions were very helpful.
I am also grateful to Dr. N. F. Shaikh ,Head of
Computer Engineering Department, M E S College
of Engineering for his indispensable support,
suggestions.
In the end our special thanks to the college for
providing various resources such as laboratory with
all needed software platforms, continuous Internet
connection, for Our Project.
REFERENCES
1. Bare-fingers Touch Detection by the
Button’s Distortion in a Projector–Camera
System Jun Hu, Guolin Li, Xiang Xie,
Zhong Lv, and Zhihua Wang, Senior
Member, IEEE APRIL 2014.
2. Int. Journal of Engineering Research Paper
and Applications www.ijera.com ISSN:
2248-9622, Vol. 4, Issue 4 (Version 4),
pp.129-130, April 2014.
3. A Camera Based Virtual Keyboard with
Touch Detection by Shadow Analysis,
Joseph Thomas, December 10, 2013.
4. E.Psner, N.Starzicki, & E.Katz. A single
camera based floating virtual keyboard with
improved touch detection. In Electrical
Electronics Engineers in Israel(IEEEI),
2012 IEEE 27th Convention of, Page 1 to 5,
2012.
5. Y. Adajania, J. Gosalia, A. Kanade, H.
Mehta, Prof. N. Shekokar, “Virtual
Keyboard Using Shadow Analysis”,Third
International Conference on Emerging
Trends in Engineering and Technology,
2010.
6. H. Du, T. Oggier, F. Lustenberger and E.
Charbon, “A virtual keyboard based on
true3D optical ranging,” Proc. British
Machine Vision Conference (BMVC),
Oxford, pp. 220-229, Sept. 2013
7. M. Hagara and J. Pucik. Fingertip detection
for virtual keyboard based on camera. In
Radioelektronika
(RADIOELEKTRONIKA), 2013 23rd
International Conference, page 356 to 360,
2013.
8. Sumit Srivastava and Ramesh Chandra
Tripathi. Real time mono-vision based
customizable virtual keyboard using finger
tip speed analysis. In Masaaki Kurosu,
editor, Human-Computer Interaction.
Interaction Modalities and Techniques,
volume 8007 of Lecture Notes in Computer
Science, page 497 to 505. Springer Berlin
Heidelberg, 2013.
9. Wijewantha N. S.“,Vista Key: A Keyboard
Without A Keyboard – A Type Of Virtual
Keyboard” Final year project hesis,
Informatics Institute of Technology,
Wellawatta, Sri Lanka, April 20012.
10.YouTube Videos For Virtual Keyboard
using Image Processing.
11.Drag-and-Type: A New Method for Typing
with Virtual Keyboards on Small
Touchscreens
12.Taekyoung Kwon, Member, IEEE, Sarang
Na, Student Member, IEEE, and Sang-ho
Park, Non-member, IEEE
13.“Real Time Mono Vision Gesture Based Virtual
Keyboard System” Contributed Paper Manuscript
received October 15, 2006 IEEE Hafiz Adnan
Habib, Muid Mufti, Member.