SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 795
Intelligent Auto Horn System Using Artificial Intelligence
A Mohamed Wahid
Civil Engineer, 21, First Floor, Third Main Road, Vasanth Nagar, Bangalore – 560052, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The increasing levels of noise pollution pose a
major threat to human health and the environment. Blaring
unnecessarily close to neighbourhoods, schools signandclinics
is for the most part impacted and unequivocally wanted. We
propose a brand-new honking mechanism that would
substantially reduce horn blowing noise. The current
mechanism does not compromise the safety of individuals
inside and around the vehicle. The vehicle'sfixedhornsystemis
used in our proposed mechanism. Using artificial intelligence,
our horn system automatically adjusts the horn sound to the
distance between people, the width of the road, and the size of
the object. As a result, artificial intelligence will control the
horn's sound.
Key Words - Intelligent Vehicle Horn System
1. INTRODUCTION
Horn system is fitted with numerous sensors; cameras and
manual horn switch to generate massive amounts of
environmental data. All of these form the Digital Sensorium,
through which the independent vehicle can see and feel the
objects, road infrastructure, other vehicles and every other
object on/near the road, just like a human driver would pay
attention to the road while driving.
1.1 AI Data Collection & Communication Systems
This data is then processed with inbuilt chip and data
communication systems. These are used to Only push theon
switch, and it will automatically return to its original
position.
 The horn switch will operate for a period of five
seconds.
 We can't press the switch for more than a second at
a time.
 We can't change the horn system because doing so
would damage the entire device.
 The device won't function if people aren't on the
road or if animals cross or sleep.
 Finally, the horn will sound both horizontally and
vertically depending on the width of the road.
 Those who are walking alongside thevehicle,onthe
footpath, or inside the building cannot hear the
horn.
1.2 Mathematics:
D(x,y,σ)=(G(x,y,k σ) G(x,y, σ)) * I(x,y)
= L(x,y, kσ) L(x,y, σ)
Where * is the convolution operator,
G(x,y, σ) is a variable scale Gaussian,
I(x,y) is the input image D(x,y, σ)
is Difference of Gaussians with scale k times. [1]
2. HEADING
Fig -1: Proposed Horn System Diagram
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 796
Fig -2: The Data connection between objects
Fig -3: Horn Sound Blow out side 1.0 mtr Radius
3. SIFT ALGORITHM
Scale Invariant Feature Transform (SIFT) features are
features extracted from images to help in reliable matching
between different views of the same or different object. [6]
The extracted features are invariant to scaleandorientation,
and are highly distinctive of the image. They are extracted in
four steps. The first step distance sensor the locations of
potential interest points in the image by detecting the
maxima and minima of a set of Difference of Gaussian (DoG)
filters applied at different scales all over the image. Then,
these locations are refined by discarding points of low
contrast. An orientation is then assigned to each key point
based on local image features. Finally, a local feature
descriptor is computed at each key point. This descriptor is
based on the local image gradient, transformed according to
the distance of the key point to provide orientation
invariance. Every feature is a vector of dimension 128
distinctively identifying the neighborhood around the key
point. The following steps are involved in SIFT algorithm:
3.1 Scale-space Extreme Detection: The first stage of
computation searches over all scales and image
locations. It is implemented efficiently by using a
difference-of-Gaussian function to identify potential
interest points that are invariant to scale and direction.
3.2 Key point localization: At each object location, a
detailed model is fit to determine locationandscale.Key
points are selected based on measures of their stability.
3.3 Orientation assignment: One or more orientation is
assigned to each key point to achieve invariance to
image distance. A neighbourhood is taken around the
key point location depending on the scale, and the
gradient magnitude and direction is calculated in that
region.
3.4 Key point descriptor: The local image gradients are
measured at the selected scale intheregionaroundeach
key point. These are transformed into a representation
that allows forsignificant levels oflocalshapedistortion
and change in illumination. The first stage used
difference-of-Gaussian (DOG) function to identify
potential interest points, which were invariant to scale
and orientation. DOG was used instead of Gaussian to
improve the computation speed.
D(x,y,σ)=(G(x,y,k σ) G(x,y, σ)) * I(x,y)
= L(x,y, kσ) L(x,y, σ)
Where * is the convolution operator,
G(x,y, σ) is a variable scale Gaussian,
I(x,y) is the input image D(x,y, σ) is
Difference of Gaussians with scale k times.
For any object in an image, interesting points on the object
can be extracted to provide a "feature description" of the
object. This description, extracted from a training image, can
then be used to identify the object when attempting to locate
the object in a test image containing many other objects. To
perform reliable recognition,it is important that thefeatures
extracted [11] from the training image be detectable even
under changes in image scale, noise and illumination. Such
points usually lie on high-contrast regions of the image, such
as object edges and distance.
SIFT key points: [5] of objects are first extracted from a set
of reference images and stored in a database. An object is
recognized in a new image by individually comparing each
feature from the new image to this database and finding
person/object matching features based on Euclidean
distance of their featurevectors. From the fullsetofmatches,
subsets of key points thatagree on the object anditslocation,
scale, and orientation in the new image are identified tofilter
out good matches. The determinationofconsistentclustersis
performed rapidly by using an efficient . Each cluster of 3 or
more features that agree on an object and its pose is then
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 797
subject to further detailed model verification and
subsequently outliers are discarded. Finally the probability
that a particular set of features indicates the presence of an
object is computed, given the accuracy of fit and number of
probable false matches. Object matches that pass all these
tests can be identified as correct with high confidence.
3.5 Key point Matching: Key points between two
images are matched by identifying their nearest
neighbours. But in somecases,thesecondclosest-match
may be very near to the first. It may happen due to noise
or some other reasons.
Another important characteristic of these features is thatthe
relative positions between them in the original scene
shouldn't change from one image to another. For example, if
only the four corners of a road were used as features, they
would work regardless of the object position; but if points in
the frame were also used, the recognition would fail if the
road is long or closed. Similarly, features located in
articulated or flexible objects would typically not work ifany
change in their internal geometry happens between two
images in the set being processed. However, in practice SIFT
detects and uses a much larger number of features from the
images, which reduces the contribution of the errors caused
by these local variations in the average error of all feature
matching errors.
SIFT can robustly identify objects even among clutter and
under partial occlusion, because the SIFT feature descriptor
is invariant to uniform scaling, distance, and partially
invariant to affine distortion and illumination changes. This
section summarizes Lowe's object recognition method and
mentions a few competing techniques available for object
recognition under clutter and partial occlusion.
In the key point localization step, they are rejected the low
contrast points and eliminated the edge response. Hessian
matrix was used to compute the principal curvatures and
eliminate the key points that have a ratio between the
principal curvatures greater than the ratio. An orientation
histogram was formed from the gradient orientations of
sample points within a region around the key point in order
to get an orientation assignment. According to experiments,
the best results were achieved witha4x4arrayofhistograms
with 8 orientation bins in each. So the descriptor of SIFT that
was used is 4x4x8= 128 dimensions.
4. PCA-SIFT
PCA-SIFT: Principal Component Analysis(PCA)isastandard
technique fordimensionalityreduction and hasbeenapplied
to a broad class of computer vision problems, including
feature selection. PCA-SIFT can be summarized in the
following steps :
 Pre-compute an Eigen space to expressthegradient
images of local patches
 Given a patch, compute its local image gradient
 Project the gradient image vector using the Eigen
space to derive a compact feature vector.
The input vector is created by concatenating the horizontal
and vertical gradient maps for the 41x41 patch centered at
the key point. Thus, the input vector has 2x39x39=3042
elements. Then normalize this vector to unit magnitude to
minimize the impact of variations in illumination. Projecting
the gradientpatchontothelow-dimensionalspaceappearsto
retain the identity related variation while discarding the
distortions induced by other effects. Eigen space can be built
by running the first three stages of the SIFT algorithm on a
diverse collection of images and collected 21,000 patches.
Each was processed as described above to create a 3042-
element vector,andPCAwasappliedtothecovariancematrix
of these vectors. The matrix consisting of the top n
eigenvectors was stored on disk and used as the projection
matrix for PCA-SIFT. The images used in building the Eigen
space were discarded and not used in any of the matching
experiments [11].
5. SURF
A basic second order Hessian matrix approximation is used
for feature point detection. The approximation with box
filters is pushed to take place of second-order Gaussianfilter.
And a very low computational cost is obtained by using
integral images. The Hessian-matrix approximation lends
itself to the use of integral images, which is a very useful
technique. Hence, computation time is reduced drastically
[10]. In the construction of scale image pyramid in SURF
algorithm, the scale space is divided into octaves, and there
are 4 scale levels in each octave. Each octave represents a
series of filter response maps obtained by convolving the
same input image with a filter of increasing size. And the
minimum scale difference between subsequent scales
depends on the length of the positive or negative lobes of the
partial second order derivative in the direction of derivation.
6. OTSU’S ALGORITHM IN IMAGE SEGMENTATION
Threshold is one of the widely methods used for image
segmentation. It is useful in discriminating foreground from
the background. By selecting an adequate threshold value T,
the gray level image can be converted to binary image.
International Journal of Scientific & Engineering Research
Volume 8, Issue 5, May-2017
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 798
Fig. 4. The process of thresholding along with its
inputs And outputs
The binary image should contain all of the essential
Information about the position and shape of the objects of
interest (foreground).
If g(x, y) is a threshold version of f(x, y) at some global
Thres hold T it can be defined as [1],
g(x, y) = 1 if f(x, y) ≥ T=0 otherwise
Thres holding operation is defined as:
T = M [x, y, p(x, y), f (x, y)]
6.1 Global thresholding
When T depends only on f (x, y),onlyongray-levelvaluesand
the value of T solely relates to the character of pixels, this
thresholding technique is called global thresholding.
6.2 Local thresholding
If threshold T depends on f(x, y) and p(x, y), this
thresholding is called local thresholding. This method
divides an original image into several sub regions [12], and
chooses various thresholds T for eachsub region reasonably
[13].
Fig.5 Binarization by Global and Local Thresholding.
Read the two images.
I1 = imread('cameraman.tif');
Find the SURF features.
Points=detectSURFFeatures(I);
[features,valid_points]=extractFeatures(I,points);
Visualise
10 strongest SURF features including scale and orientation
which was determined during the descriptor extraction
process
Figure,imshow(I);hold on;
lot(valid_points.selectStrongest(10),’showOrientation’,true);
Fig -6: Block diagram showing the distance measuring
from the range sensor.
Fig -8: Single-sensor-based chord offset synchronizing
model
Fig -7: Vehicle Image showing the distance measuring
from the range sensor.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 799
Fig -9: Feature Point Detection using SIFT
7. HORN THEORY
The horn system includes the following terminology:
Impedance: Quantity impeding or reducing flow of energy.
Can be electrical, mechanical, or acoustical.
Acoustical Impedance: The ratio of sound pressure to
volume velocity of air. In a horn, the acoustical impedance
will increase when the cross-sectionofthehorndecreases,as
a decrease in cross section will limit the flow of air at a
certain pressure.
Volume Velocity: Flow of air through a surface in m3/s,
equals particle velocity times area.
Throat: The small end of the horn, where the driver is
attached. Mouth: The far end of the horn, which radiates into
the air.
Driver: Loudspeaker unit used for driving the horn.
c: The speed of sound, 344m/s at 20° C.
7.1 Volume and speed correction:
The hourly flow of each vehicle category (Veh/hr) and the
average speed of each category (km/hr) are used for
calculation of Leq value. Therefore this model incorporated
the volume speed correction that is applied for final Leq
value. The correction is given as:
Avs = 10 Log (DO V/S) -25
Where,
V = Volume for the category (Veh/hr)
S = Speed (km/hr)
DO = Reference distance ( m/s )
7.2 Distance correction:
When calculating distanceadjustmentthetypeofintervening
ground cover between the highway and reception point is
also considered.
AD = 10 Log 10 ( DO/ D) 1 + α]
Where,
DO = Reference distance given as 10 meters
D = Distance of measurement from center of each
Lane
α = Ground cover coefficient
8. EXPERIMENTAL RESULT
Scale Invariant FeatureTransform is used to extract features
from the ID. The implementation is done using MATLAB.
Feature extraction enables you to derive a set of feature
vectors, also called descriptors, from a set of detected
features. Computer Vision System Toolboxofferscapabilities
for feature detection and extraction.
SURF is used to detect blobs and regions. The SURF local
feature detector function is used to find the corresponding
points between different images that are near/farandscaled
with respect to each other.
In accordance with another preferred embodiment of the
invention, the positioning system further comprises
supplementary sensors, such as Tacho/ABS sensors or Gyro
sensors.
In accordance with another preferred embodiment of the
invention, the alarm is an audio alarm and/or an optical
alarm.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 800
According to the invention, at a location that honking is
forbidden or restricted, the horn of a vehicle is automatically
deactivated or the sound level is lowered, and/or the driver
receives an alarm that the horn should not be used. Thus,
horn noise will be effectively controlled in specified areas. In
addition, at a location that honking must be performed, the
horn of a vehicle is automaticallyoperatedtogeneratesound,
and/or the driver receives an alarm that the horn should be
operated to generate sound. Thus, traffic safety can be
improved.
The present invention in a second aspect provides an
automatic vehicle horn control method comprising: a)
acquiring information about horn operating regulation
related with current or concerned location and driving
direction of the vehicle; b) ifat current or concerned location
and in current or concerneddrivingdirectionitisnotallowed
to operate the horn to produce sound or the sound level is
not allowed to be higher than a certain level, then a honking
forbidden or restriction mode is initiatedinwhichthehornis
deactivated or the sound of the horn is controlled tobelower
than a certain level, and/or an alarm indicating the honking
forbidden or restriction requirement is generated,
CONCLUSIONS
Using a distance parameter between a person and other
objects, this device can monitor and control the sound of the
vehicle horn.
We can send these data to a faraway location around the
world to create a sound graph report.
When it is manufactured in large quantities, this device will
be relatively inexpensive.
If the sound of the vehicle horn goes away within five years,
this will have a good future and be a complete success.
ACKNOWLEDGEMENT
Despite the fact that the Earth has provided us with all of the
necessary resources for our existence. The numerous levels
and domains of life, as well as the biosphere, lithosphere,
atmosphere, and hydrosphere, are in perfect harmony. As a
result of this coordination and synchronization, we might be
able to live a long and healthy life here on Earth.
Numerous factors, including increasing sound, vibration,
heat,and climatechange,aredepletingEarth'sresources.The
depletion of our Earth's resources is evident in all of these
signs, and it is time to save our planet: The ice is going away;
woodlands are consuming; The fields are dry and empty;
oceans are unsteady; The water is imperfect andvibratesata
higher frequency. We can help ourselves by reducing the
earth's vibration.
Fig -10: Only One Earth
REFERENCES
[1] Priya M.S in honor of her Intelligence work on
Multilevel Image Thresholding using OTSU’s Algorithm
in Image SegmentationInternational Journal ofScientific
& Engineering Research Volume 8, Issue 5, May-2017
[2] Winfried Otto Schumann in honor of his seminal work
on global resonances in mid-1950s
[3] Intelligent Automotive Solutions, Huawei
[4] Michael Carlowicz Earth Book, NASA
[5] A.Annis Fathima, R. Karthik, V. Vaidehi, “ImageStitching
with Combined Moment Invariants and SIFT Features”,
Procedia Computer Science 19 ( 2013 ) 420 – 427.
[6] David G. Lowe. Distinctive image features from scale-
invariant keypoints. International journal of computer
vision, 60, 2004.
[7] Edouard Oyallon, Julien Rabin, "An Analysis and
Implementation of the SURF Method, and its
Comparison to SIFT", Image Processing On Line
[8] M.M. El-gayar, H. Soliman, N. meky, “A comparative
study of image low level feature extraction algorithms”,
Egyptian Informatics Journal (2013) 14, 175–181.
[9] Herbert Bay, Tinne Tuytelaars,andLucVanGool,“SURF:
Speeded Up Robust Features”, ETH Zurich, Katholieke
Universiteit Leuven
[10] Simranjeet Kaur, Gagandeep Singh Saini, Sandeep Kaur,
“Performance Evaluation of Fuzzy Sift and Canny
Feature Extraction”, IJARCSSE, Vol 5,Issue 7, July 2015.
[11] Yan Ke, Rahul Sukthankar, “PCA-SIFT: A More Distinctive
Representation for Local Image Descriptors”, School of
Computer Science, Carnegie Mellon University, Intel
Research Pittsburgh
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 801
[12] J. Gong, L. Li, and W. Chen, “Fast recursive algorithms
for two-dimensional thresholding,” Pattern
Recognition,vol. 31, no. 3,pp. 295–300, 1998.
[13] J.S. Weszka: A Survey of Threshold Selection
Techniques, Computer Graphics and Image Processing,
Vol. 7, pp. 259-265, 1978.

More Related Content

Similar to Intelligent Auto Horn System Using Artificial Intelligence

E017443136
E017443136E017443136
E017443136
IOSR Journals
 
Feature extraction based retrieval of
Feature extraction based retrieval ofFeature extraction based retrieval of
Feature extraction based retrieval of
ijcsity
 
IRJET - Face Recognition based Attendance System
IRJET -  	  Face Recognition based Attendance SystemIRJET -  	  Face Recognition based Attendance System
IRJET - Face Recognition based Attendance System
IRJET Journal
 
I010634450
I010634450I010634450
I010634450
IOSR Journals
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
iosrjce
 
Trajectory Based Unusual Human Movement Identification for ATM System
	 Trajectory Based Unusual Human Movement Identification for ATM System	 Trajectory Based Unusual Human Movement Identification for ATM System
Trajectory Based Unusual Human Movement Identification for ATM System
IRJET Journal
 
An Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded SurfaceAn Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded Surface
IJERA Editor
 
An Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded SurfaceAn Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded Surface
IJERA Editor
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
Kapil Tiwari
 
V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1
KARTHIKEYAN V
 
Literature Survey on Interest Points based Watermarking
Literature Survey on Interest Points based WatermarkingLiterature Survey on Interest Points based Watermarking
Literature Survey on Interest Points based Watermarking
Priyatham Bollimpalli
 
Computer Aided Design visual realism notes
Computer Aided Design visual realism notesComputer Aided Design visual realism notes
Computer Aided Design visual realism notes
KushKumar293234
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
IJECEIAES
 
A New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and RecognitionA New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and Recognition
IJECEIAES
 
Vf sift
Vf siftVf sift
Vf sift
e_mirsadeghi
 
Object tracking by dtcwt feature vectors 2-3-4
Object tracking by dtcwt feature vectors 2-3-4Object tracking by dtcwt feature vectors 2-3-4
Object tracking by dtcwt feature vectors 2-3-4
IAEME Publication
 
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
IOSR Journals
 
A Novel Approach for Moving Object Detection from Dynamic Background
A Novel Approach for Moving Object Detection from Dynamic BackgroundA Novel Approach for Moving Object Detection from Dynamic Background
A Novel Approach for Moving Object Detection from Dynamic Background
IJERA Editor
 
Video Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFTVideo Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFT
IRJET Journal
 
Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...
TELKOMNIKA JOURNAL
 

Similar to Intelligent Auto Horn System Using Artificial Intelligence (20)

E017443136
E017443136E017443136
E017443136
 
Feature extraction based retrieval of
Feature extraction based retrieval ofFeature extraction based retrieval of
Feature extraction based retrieval of
 
IRJET - Face Recognition based Attendance System
IRJET -  	  Face Recognition based Attendance SystemIRJET -  	  Face Recognition based Attendance System
IRJET - Face Recognition based Attendance System
 
I010634450
I010634450I010634450
I010634450
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
 
Trajectory Based Unusual Human Movement Identification for ATM System
	 Trajectory Based Unusual Human Movement Identification for ATM System	 Trajectory Based Unusual Human Movement Identification for ATM System
Trajectory Based Unusual Human Movement Identification for ATM System
 
An Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded SurfaceAn Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded Surface
 
An Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded SurfaceAn Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded Surface
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1
 
Literature Survey on Interest Points based Watermarking
Literature Survey on Interest Points based WatermarkingLiterature Survey on Interest Points based Watermarking
Literature Survey on Interest Points based Watermarking
 
Computer Aided Design visual realism notes
Computer Aided Design visual realism notesComputer Aided Design visual realism notes
Computer Aided Design visual realism notes
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
 
A New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and RecognitionA New Approach of Iris Detection and Recognition
A New Approach of Iris Detection and Recognition
 
Vf sift
Vf siftVf sift
Vf sift
 
Object tracking by dtcwt feature vectors 2-3-4
Object tracking by dtcwt feature vectors 2-3-4Object tracking by dtcwt feature vectors 2-3-4
Object tracking by dtcwt feature vectors 2-3-4
 
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
 
A Novel Approach for Moving Object Detection from Dynamic Background
A Novel Approach for Moving Object Detection from Dynamic BackgroundA Novel Approach for Moving Object Detection from Dynamic Background
A Novel Approach for Moving Object Detection from Dynamic Background
 
Video Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFTVideo Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFT
 
Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 

Recently uploaded (20)

Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 

Intelligent Auto Horn System Using Artificial Intelligence

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 795 Intelligent Auto Horn System Using Artificial Intelligence A Mohamed Wahid Civil Engineer, 21, First Floor, Third Main Road, Vasanth Nagar, Bangalore – 560052, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The increasing levels of noise pollution pose a major threat to human health and the environment. Blaring unnecessarily close to neighbourhoods, schools signandclinics is for the most part impacted and unequivocally wanted. We propose a brand-new honking mechanism that would substantially reduce horn blowing noise. The current mechanism does not compromise the safety of individuals inside and around the vehicle. The vehicle'sfixedhornsystemis used in our proposed mechanism. Using artificial intelligence, our horn system automatically adjusts the horn sound to the distance between people, the width of the road, and the size of the object. As a result, artificial intelligence will control the horn's sound. Key Words - Intelligent Vehicle Horn System 1. INTRODUCTION Horn system is fitted with numerous sensors; cameras and manual horn switch to generate massive amounts of environmental data. All of these form the Digital Sensorium, through which the independent vehicle can see and feel the objects, road infrastructure, other vehicles and every other object on/near the road, just like a human driver would pay attention to the road while driving. 1.1 AI Data Collection & Communication Systems This data is then processed with inbuilt chip and data communication systems. These are used to Only push theon switch, and it will automatically return to its original position.  The horn switch will operate for a period of five seconds.  We can't press the switch for more than a second at a time.  We can't change the horn system because doing so would damage the entire device.  The device won't function if people aren't on the road or if animals cross or sleep.  Finally, the horn will sound both horizontally and vertically depending on the width of the road.  Those who are walking alongside thevehicle,onthe footpath, or inside the building cannot hear the horn. 1.2 Mathematics: D(x,y,σ)=(G(x,y,k σ) G(x,y, σ)) * I(x,y) = L(x,y, kσ) L(x,y, σ) Where * is the convolution operator, G(x,y, σ) is a variable scale Gaussian, I(x,y) is the input image D(x,y, σ) is Difference of Gaussians with scale k times. [1] 2. HEADING Fig -1: Proposed Horn System Diagram
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 796 Fig -2: The Data connection between objects Fig -3: Horn Sound Blow out side 1.0 mtr Radius 3. SIFT ALGORITHM Scale Invariant Feature Transform (SIFT) features are features extracted from images to help in reliable matching between different views of the same or different object. [6] The extracted features are invariant to scaleandorientation, and are highly distinctive of the image. They are extracted in four steps. The first step distance sensor the locations of potential interest points in the image by detecting the maxima and minima of a set of Difference of Gaussian (DoG) filters applied at different scales all over the image. Then, these locations are refined by discarding points of low contrast. An orientation is then assigned to each key point based on local image features. Finally, a local feature descriptor is computed at each key point. This descriptor is based on the local image gradient, transformed according to the distance of the key point to provide orientation invariance. Every feature is a vector of dimension 128 distinctively identifying the neighborhood around the key point. The following steps are involved in SIFT algorithm: 3.1 Scale-space Extreme Detection: The first stage of computation searches over all scales and image locations. It is implemented efficiently by using a difference-of-Gaussian function to identify potential interest points that are invariant to scale and direction. 3.2 Key point localization: At each object location, a detailed model is fit to determine locationandscale.Key points are selected based on measures of their stability. 3.3 Orientation assignment: One or more orientation is assigned to each key point to achieve invariance to image distance. A neighbourhood is taken around the key point location depending on the scale, and the gradient magnitude and direction is calculated in that region. 3.4 Key point descriptor: The local image gradients are measured at the selected scale intheregionaroundeach key point. These are transformed into a representation that allows forsignificant levels oflocalshapedistortion and change in illumination. The first stage used difference-of-Gaussian (DOG) function to identify potential interest points, which were invariant to scale and orientation. DOG was used instead of Gaussian to improve the computation speed. D(x,y,σ)=(G(x,y,k σ) G(x,y, σ)) * I(x,y) = L(x,y, kσ) L(x,y, σ) Where * is the convolution operator, G(x,y, σ) is a variable scale Gaussian, I(x,y) is the input image D(x,y, σ) is Difference of Gaussians with scale k times. For any object in an image, interesting points on the object can be extracted to provide a "feature description" of the object. This description, extracted from a training image, can then be used to identify the object when attempting to locate the object in a test image containing many other objects. To perform reliable recognition,it is important that thefeatures extracted [11] from the training image be detectable even under changes in image scale, noise and illumination. Such points usually lie on high-contrast regions of the image, such as object edges and distance. SIFT key points: [5] of objects are first extracted from a set of reference images and stored in a database. An object is recognized in a new image by individually comparing each feature from the new image to this database and finding person/object matching features based on Euclidean distance of their featurevectors. From the fullsetofmatches, subsets of key points thatagree on the object anditslocation, scale, and orientation in the new image are identified tofilter out good matches. The determinationofconsistentclustersis performed rapidly by using an efficient . Each cluster of 3 or more features that agree on an object and its pose is then
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 797 subject to further detailed model verification and subsequently outliers are discarded. Finally the probability that a particular set of features indicates the presence of an object is computed, given the accuracy of fit and number of probable false matches. Object matches that pass all these tests can be identified as correct with high confidence. 3.5 Key point Matching: Key points between two images are matched by identifying their nearest neighbours. But in somecases,thesecondclosest-match may be very near to the first. It may happen due to noise or some other reasons. Another important characteristic of these features is thatthe relative positions between them in the original scene shouldn't change from one image to another. For example, if only the four corners of a road were used as features, they would work regardless of the object position; but if points in the frame were also used, the recognition would fail if the road is long or closed. Similarly, features located in articulated or flexible objects would typically not work ifany change in their internal geometry happens between two images in the set being processed. However, in practice SIFT detects and uses a much larger number of features from the images, which reduces the contribution of the errors caused by these local variations in the average error of all feature matching errors. SIFT can robustly identify objects even among clutter and under partial occlusion, because the SIFT feature descriptor is invariant to uniform scaling, distance, and partially invariant to affine distortion and illumination changes. This section summarizes Lowe's object recognition method and mentions a few competing techniques available for object recognition under clutter and partial occlusion. In the key point localization step, they are rejected the low contrast points and eliminated the edge response. Hessian matrix was used to compute the principal curvatures and eliminate the key points that have a ratio between the principal curvatures greater than the ratio. An orientation histogram was formed from the gradient orientations of sample points within a region around the key point in order to get an orientation assignment. According to experiments, the best results were achieved witha4x4arrayofhistograms with 8 orientation bins in each. So the descriptor of SIFT that was used is 4x4x8= 128 dimensions. 4. PCA-SIFT PCA-SIFT: Principal Component Analysis(PCA)isastandard technique fordimensionalityreduction and hasbeenapplied to a broad class of computer vision problems, including feature selection. PCA-SIFT can be summarized in the following steps :  Pre-compute an Eigen space to expressthegradient images of local patches  Given a patch, compute its local image gradient  Project the gradient image vector using the Eigen space to derive a compact feature vector. The input vector is created by concatenating the horizontal and vertical gradient maps for the 41x41 patch centered at the key point. Thus, the input vector has 2x39x39=3042 elements. Then normalize this vector to unit magnitude to minimize the impact of variations in illumination. Projecting the gradientpatchontothelow-dimensionalspaceappearsto retain the identity related variation while discarding the distortions induced by other effects. Eigen space can be built by running the first three stages of the SIFT algorithm on a diverse collection of images and collected 21,000 patches. Each was processed as described above to create a 3042- element vector,andPCAwasappliedtothecovariancematrix of these vectors. The matrix consisting of the top n eigenvectors was stored on disk and used as the projection matrix for PCA-SIFT. The images used in building the Eigen space were discarded and not used in any of the matching experiments [11]. 5. SURF A basic second order Hessian matrix approximation is used for feature point detection. The approximation with box filters is pushed to take place of second-order Gaussianfilter. And a very low computational cost is obtained by using integral images. The Hessian-matrix approximation lends itself to the use of integral images, which is a very useful technique. Hence, computation time is reduced drastically [10]. In the construction of scale image pyramid in SURF algorithm, the scale space is divided into octaves, and there are 4 scale levels in each octave. Each octave represents a series of filter response maps obtained by convolving the same input image with a filter of increasing size. And the minimum scale difference between subsequent scales depends on the length of the positive or negative lobes of the partial second order derivative in the direction of derivation. 6. OTSU’S ALGORITHM IN IMAGE SEGMENTATION Threshold is one of the widely methods used for image segmentation. It is useful in discriminating foreground from the background. By selecting an adequate threshold value T, the gray level image can be converted to binary image. International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 798 Fig. 4. The process of thresholding along with its inputs And outputs The binary image should contain all of the essential Information about the position and shape of the objects of interest (foreground). If g(x, y) is a threshold version of f(x, y) at some global Thres hold T it can be defined as [1], g(x, y) = 1 if f(x, y) ≥ T=0 otherwise Thres holding operation is defined as: T = M [x, y, p(x, y), f (x, y)] 6.1 Global thresholding When T depends only on f (x, y),onlyongray-levelvaluesand the value of T solely relates to the character of pixels, this thresholding technique is called global thresholding. 6.2 Local thresholding If threshold T depends on f(x, y) and p(x, y), this thresholding is called local thresholding. This method divides an original image into several sub regions [12], and chooses various thresholds T for eachsub region reasonably [13]. Fig.5 Binarization by Global and Local Thresholding. Read the two images. I1 = imread('cameraman.tif'); Find the SURF features. Points=detectSURFFeatures(I); [features,valid_points]=extractFeatures(I,points); Visualise 10 strongest SURF features including scale and orientation which was determined during the descriptor extraction process Figure,imshow(I);hold on; lot(valid_points.selectStrongest(10),’showOrientation’,true); Fig -6: Block diagram showing the distance measuring from the range sensor. Fig -8: Single-sensor-based chord offset synchronizing model Fig -7: Vehicle Image showing the distance measuring from the range sensor.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 799 Fig -9: Feature Point Detection using SIFT 7. HORN THEORY The horn system includes the following terminology: Impedance: Quantity impeding or reducing flow of energy. Can be electrical, mechanical, or acoustical. Acoustical Impedance: The ratio of sound pressure to volume velocity of air. In a horn, the acoustical impedance will increase when the cross-sectionofthehorndecreases,as a decrease in cross section will limit the flow of air at a certain pressure. Volume Velocity: Flow of air through a surface in m3/s, equals particle velocity times area. Throat: The small end of the horn, where the driver is attached. Mouth: The far end of the horn, which radiates into the air. Driver: Loudspeaker unit used for driving the horn. c: The speed of sound, 344m/s at 20° C. 7.1 Volume and speed correction: The hourly flow of each vehicle category (Veh/hr) and the average speed of each category (km/hr) are used for calculation of Leq value. Therefore this model incorporated the volume speed correction that is applied for final Leq value. The correction is given as: Avs = 10 Log (DO V/S) -25 Where, V = Volume for the category (Veh/hr) S = Speed (km/hr) DO = Reference distance ( m/s ) 7.2 Distance correction: When calculating distanceadjustmentthetypeofintervening ground cover between the highway and reception point is also considered. AD = 10 Log 10 ( DO/ D) 1 + α] Where, DO = Reference distance given as 10 meters D = Distance of measurement from center of each Lane α = Ground cover coefficient 8. EXPERIMENTAL RESULT Scale Invariant FeatureTransform is used to extract features from the ID. The implementation is done using MATLAB. Feature extraction enables you to derive a set of feature vectors, also called descriptors, from a set of detected features. Computer Vision System Toolboxofferscapabilities for feature detection and extraction. SURF is used to detect blobs and regions. The SURF local feature detector function is used to find the corresponding points between different images that are near/farandscaled with respect to each other. In accordance with another preferred embodiment of the invention, the positioning system further comprises supplementary sensors, such as Tacho/ABS sensors or Gyro sensors. In accordance with another preferred embodiment of the invention, the alarm is an audio alarm and/or an optical alarm.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 800 According to the invention, at a location that honking is forbidden or restricted, the horn of a vehicle is automatically deactivated or the sound level is lowered, and/or the driver receives an alarm that the horn should not be used. Thus, horn noise will be effectively controlled in specified areas. In addition, at a location that honking must be performed, the horn of a vehicle is automaticallyoperatedtogeneratesound, and/or the driver receives an alarm that the horn should be operated to generate sound. Thus, traffic safety can be improved. The present invention in a second aspect provides an automatic vehicle horn control method comprising: a) acquiring information about horn operating regulation related with current or concerned location and driving direction of the vehicle; b) ifat current or concerned location and in current or concerneddrivingdirectionitisnotallowed to operate the horn to produce sound or the sound level is not allowed to be higher than a certain level, then a honking forbidden or restriction mode is initiatedinwhichthehornis deactivated or the sound of the horn is controlled tobelower than a certain level, and/or an alarm indicating the honking forbidden or restriction requirement is generated, CONCLUSIONS Using a distance parameter between a person and other objects, this device can monitor and control the sound of the vehicle horn. We can send these data to a faraway location around the world to create a sound graph report. When it is manufactured in large quantities, this device will be relatively inexpensive. If the sound of the vehicle horn goes away within five years, this will have a good future and be a complete success. ACKNOWLEDGEMENT Despite the fact that the Earth has provided us with all of the necessary resources for our existence. The numerous levels and domains of life, as well as the biosphere, lithosphere, atmosphere, and hydrosphere, are in perfect harmony. As a result of this coordination and synchronization, we might be able to live a long and healthy life here on Earth. Numerous factors, including increasing sound, vibration, heat,and climatechange,aredepletingEarth'sresources.The depletion of our Earth's resources is evident in all of these signs, and it is time to save our planet: The ice is going away; woodlands are consuming; The fields are dry and empty; oceans are unsteady; The water is imperfect andvibratesata higher frequency. We can help ourselves by reducing the earth's vibration. Fig -10: Only One Earth REFERENCES [1] Priya M.S in honor of her Intelligence work on Multilevel Image Thresholding using OTSU’s Algorithm in Image SegmentationInternational Journal ofScientific & Engineering Research Volume 8, Issue 5, May-2017 [2] Winfried Otto Schumann in honor of his seminal work on global resonances in mid-1950s [3] Intelligent Automotive Solutions, Huawei [4] Michael Carlowicz Earth Book, NASA [5] A.Annis Fathima, R. Karthik, V. Vaidehi, “ImageStitching with Combined Moment Invariants and SIFT Features”, Procedia Computer Science 19 ( 2013 ) 420 – 427. [6] David G. Lowe. Distinctive image features from scale- invariant keypoints. International journal of computer vision, 60, 2004. [7] Edouard Oyallon, Julien Rabin, "An Analysis and Implementation of the SURF Method, and its Comparison to SIFT", Image Processing On Line [8] M.M. El-gayar, H. Soliman, N. meky, “A comparative study of image low level feature extraction algorithms”, Egyptian Informatics Journal (2013) 14, 175–181. [9] Herbert Bay, Tinne Tuytelaars,andLucVanGool,“SURF: Speeded Up Robust Features”, ETH Zurich, Katholieke Universiteit Leuven [10] Simranjeet Kaur, Gagandeep Singh Saini, Sandeep Kaur, “Performance Evaluation of Fuzzy Sift and Canny Feature Extraction”, IJARCSSE, Vol 5,Issue 7, July 2015. [11] Yan Ke, Rahul Sukthankar, “PCA-SIFT: A More Distinctive Representation for Local Image Descriptors”, School of Computer Science, Carnegie Mellon University, Intel Research Pittsburgh
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 11 | Nov 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 801 [12] J. Gong, L. Li, and W. Chen, “Fast recursive algorithms for two-dimensional thresholding,” Pattern Recognition,vol. 31, no. 3,pp. 295–300, 1998. [13] J.S. Weszka: A Survey of Threshold Selection Techniques, Computer Graphics and Image Processing, Vol. 7, pp. 259-265, 1978.