Submit Search
Upload
IRJET- Proximity Detection Warning System using Ray Casting
•
0 likes
•
67 views
IRJET Journal
Follow
https://www.irjet.net/archives/V8/i4/IRJET-V8I406.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET Journal
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET Journal
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
IRJET Journal
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET Journal
Irjet v7 i4693
Irjet v7 i4693
aissmsblogs
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
Recommended
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET Journal
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET Journal
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
IRJET Journal
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET Journal
Irjet v7 i4693
Irjet v7 i4693
aissmsblogs
IRJET - Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
IRJET Journal
Ijsrdv8 i10355
Ijsrdv8 i10355
aissmsblogs
C6524029320
C6524029320
aissmsblogs
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET Journal
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
IAEME Publication
rpaper
rpaper
imu409
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET Journal
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET Journal
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET Journal
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
IRJET Journal
Survey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Journals
43 automatic
43 automatic
aissmsblogs
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
Survey mobile app
Survey mobile app
eSAT Journals
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
eSAT Publishing House
Ijcet 06 07_002
Ijcet 06 07_002
IAEME Publication
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
IJET - International Journal of Engineering and Techniques
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET Journal
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
IJECEIAES
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
ijtsrd
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET Journal
Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance System
IRJET Journal
Object Detection and Tracking AI Robot
Object Detection and Tracking AI Robot
IRJET Journal
More Related Content
What's hot
C6524029320
C6524029320
aissmsblogs
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET Journal
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
IAEME Publication
rpaper
rpaper
imu409
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET Journal
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET Journal
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET Journal
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
IRJET Journal
Survey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Journals
43 automatic
43 automatic
aissmsblogs
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
Survey mobile app
Survey mobile app
eSAT Journals
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
eSAT Publishing House
Ijcet 06 07_002
Ijcet 06 07_002
IAEME Publication
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
IJET - International Journal of Engineering and Techniques
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET Journal
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
IJECEIAES
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
ijtsrd
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET Journal
What's hot
(20)
C6524029320
C6524029320
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
rpaper
rpaper
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
Survey on cloud computing security techniques
Survey on cloud computing security techniques
43 automatic
43 automatic
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
Survey mobile app
Survey mobile app
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
Ijcet 06 07_002
Ijcet 06 07_002
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
Similar to IRJET- Proximity Detection Warning System using Ray Casting
Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance System
IRJET Journal
Object Detection and Tracking AI Robot
Object Detection and Tracking AI Robot
IRJET Journal
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET Journal
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
IRJET Journal
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
IRJET Journal
Multiple Sensor Fusion for Moving Object Detection and Tracking
Multiple Sensor Fusion for Moving Object Detection and Tracking
IRJET Journal
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
cscpconf
IRJET - Military Spy Robot with Intelligentdestruction
IRJET - Military Spy Robot with Intelligentdestruction
IRJET Journal
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
IRJET Journal
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
IRJET Journal
Intrusion Detection System Using Face Recognition
Intrusion Detection System Using Face Recognition
IRJET Journal
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
IRJET Journal
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
IRJET Journal
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection System
IRJET Journal
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
csandit
IRJET-Cleaner Drone
IRJET-Cleaner Drone
IRJET Journal
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
IRJET Journal
IRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using Yolo
IRJET Journal
Social Distance Monitoring and Mask Detection Using Deep Learning Techniques
Social Distance Monitoring and Mask Detection Using Deep Learning Techniques
IRJET Journal
Drishyam - Virtual Eye for Blind
Drishyam - Virtual Eye for Blind
IRJET Journal
Similar to IRJET- Proximity Detection Warning System using Ray Casting
(20)
Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance System
Object Detection and Tracking AI Robot
Object Detection and Tracking AI Robot
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
Multiple Sensor Fusion for Moving Object Detection and Tracking
Multiple Sensor Fusion for Moving Object Detection and Tracking
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
IRJET - Military Spy Robot with Intelligentdestruction
IRJET - Military Spy Robot with Intelligentdestruction
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
Intrusion Detection System Using Face Recognition
Intrusion Detection System Using Face Recognition
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection System
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
IRJET-Cleaner Drone
IRJET-Cleaner Drone
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using Yolo
Social Distance Monitoring and Mask Detection Using Deep Learning Techniques
Social Distance Monitoring and Mask Detection Using Deep Learning Techniques
Drishyam - Virtual Eye for Blind
Drishyam - Virtual Eye for Blind
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Recently uploaded
(20)
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
IRJET- Proximity Detection Warning System using Ray Casting
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 04 | Apr 2021 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 25 Proximity Detection Warning System using Ray Casting Prof. Sneha Vanjari1, Gayatri Kulkarni2, Ashutosh Bhorde3, Bhakti banne4, Samiksha Kudale5 1Professor, Dept. of IT Engineering, Zeal College of Engineering and Research, Pune, India. ,3,4,5 UG Student, Dept. of IT Engineering, Zeal College of Engineering and Research, Pune, India. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In the current era of technology, we are seeing a lot of objects which work autonomously. These include drones, transportation vehicles, haulers, robots and many more. When these things are being operated autonomously, they need to learn their environment by detecting threats so human workers can work safely. The proximity detection analysis has importance for various working such as logistics, transportation, operation management, network and mining line. The shortest path analysis is an artificial intelligence concept which has significance of developing the capability about think cause and effect, learning and thinking like a human being. Heuristic technique is a method for solving a drag which gets a result or not. The solution based on this technique may return unexpected value which varies according to the given problem. In the 3D game industry, real-time strategists use shortest path analysis control for movement of character, vehicle, and animals. Heuristic algorithms increase efficiency to avoid barrier objects on maps and search for the shortest path for the operator in an environment. Thus, Heuristic Search Algorithms are core algorithms used for artificial intelligence applications like games, robotics, astronomy and network control. This research proposes two essences, detecting obstacles beforehand and finding an optimal shortest path for the user to navigate freely in an environment. Our project aims on developing a prototype system to give an early indication using ray casting and pathfinding algorithms. Key Words: Proximity detection, Raycasting, Pathfinding Algorithm, Heuristic technique, Artificial intelligence 1. INTRODUCTION Nowadays, we are seeing a lot of objects which work autonomously. These include drones, transportation vehicles, haulers, robots and many more. When these things are being operated autonomously, they need to learn their environment by detecting threats so they can work safely. In this project, we are using raycasting[5] to anticipate potential collisions before they happen, so these autonomous objects can traverse around without getting damaged. While experiencing Collision may be a negligible event to most beings, some objects are so fragile that even a slight collision could be catastrophic. Our method for detection is based upon vector algebra results on “Ray Casting “using mesh colliders which is provided by Unity game engine to each object present in the game scene. We have developed and implemented a collision detection method whose pre-processing step is to construct a decomposition of free space into a 3D scene and obstacles map, marking the facets that correspond to obstacle boundaries. In this paper, we give details of our algorithm, and we describe the experiments that we have conducted to test the efficiency of this method. A primary goal of our study was to determine if, indeed, the methods based on computational vector algebra have a practical impact on the collision detection[2]problem. Our method for detection is based upon vector algebra results on “Ray Casting “using mesh colliders which is provided by Unity game engine to each object present in the game scene. A practical contribution of this project is our work on systematic experimentation for the Collision detection problem. The system we are going to design will use RayCasting Concept to address proximity of objects in an environment. The first phase of the project is going to be to design a prototype scene where all kinds of movable and immovable obstacles will be placed along with the user. Then we will use vector algebra to calculate the distance and proximity between the obstacle and the user to send an early warning to the operator that a potential threat is near our reach. In the last phase we will calculate optimal and shortest path using A * algorithm which is one of the most accurate heuristic pathfinding algorithms.[6]
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 04 | Apr 2021 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 26 2. LITERATURE SURVEY The purpose of the literature review was to cover collision awareness and proximity detection and research based recommendations for providing obstacle fewer environments. Articles reviewed focused on efficient proximity detection. Special attention was paid to learn more about ray casting algorithms. More than 10 articles, publications (including reports, manuals and guidance materials) and 2 online training modules for Unity game engine and fact sheets were reviewed. The system uses object recognition information to augment existing object recognition algorithms. Its performance should thus continue to improve as researchers develop better recognition software, and roboticists develop better PDS (Proximity Detection System) software. We design algorithms with a fixed radius for the client and server respectively, with the purpose of reducing unnecessary collision with the user. That is we will place the objects randomly to create an environment and the user will dodge and review the proximity of the object far from him. The problem of proximity detection is often encountered in massively multiplayer online games and in network applications. The implementation is carried out using Unity Game Engine and Ray tracing Algorithms. Object detection and classification are major challenges where applications are based on robotic advancements. Navigation, detection, calculating proximity are based on the ability to recognize objects. Object detection algorithms are expected to detect and classify all instances of an object. They should be detected even if there are variations of position, scale and environment variations such as intensity. 3. PROBLEM STATEMENT These days, we are seeing a lot of objects which work without human interaction. When these things are being operated autonomously, they need to adapt the information about them on the go by detecting threats so they can work safely. While experiencing collisions may be a negligible event to most beings, some objects are so fragile that even a slight collision could be dangerous for the situation. Our method for detection is based upon vector algebra results on “Ray Casting “using mesh colliders which is provided by Unity game engine to each object present in the game scene. Therefore, the need for us to build and implement a proximity detection[1] system that will preemptively detect threats to autonomous objects and will allow them to traverse in a safe manner by avoiding collisions has arrived. 4. SYSTEM ARCHITECTURE **diagram** As the objective of the project is to make sure the primary object reaches the destination without colliding with anything. Most of the code in the project basically keeps running until the outcome is achieved. Following are the major modules in the project: Object detection - As soon as the program is initiated, we start using ray casting to detect all the foreign objects in the vicinity of the primary object. The primary object will usually have a range within which we will be able to detect all the objects and the objects outside of the range will be ignored. Data Preprocessing - Once we receive basic information about all the objects around the primary object, we will check if any of them are threats or not based on the distance to the primary object. We will also try to detect if a foreign object is on the move. All the information will be stored in the memory of the primary object. The primary object will also use steering behaviors[3] of the threats to detect what type of threat the object is dealing with. Keeping track of the objects - Every render frame of the application, Object detection, and Data processing steps will run until the primary object reaches its destination. This will allow us to get the updated information about the environment of the primary object. Regardless of whether a foreign object is a static object or not, if it is a threat, we can add it to the unsafe list. All the objects in the unsafe list will be treated as if they will cause some damage to the primary object.[4] Route calculation - In this step, based on the data we collected so far, we will calculate a safe route for our primary object. The system will be using A* algorithm, as it will provide us with heuristics so we can calculate the fastest route to the destination. To calculate the safest route, the system uses the collected data and will make sure that the primary object will be out of range of the potential collisions with the threats. 5. ALGORITHM A) Ray Casting 1. Gather basic information about all surrounding objects 2. Cast a ray into the environment 3. If the collides with one of the objects Then check if any of them are threats
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 04 | Apr 2021 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 27 4. calculate distance from current position to the said obstacle 5. alert the operator about current situation B) Pathfinding Algorithm (A* Algorithm) The A* ("A star") algorithm[7] has three important properties: It will always return the least expensive path if a path exists to the destination, other algorithms may find a path faster but it is not necessarily the "best" path we can take. A* uses a heuristic (a "guess") to search nodes considered more likely to lead to the destination first, allowing us to often find the best path without having to search the entire map and making the algorithm much faster. A* is based on the idea that each node has some cost associated with it. If the costs for all nodes are the same then the best path returned by A* will also be the shortest path but A* can easily allow us to add different costs to moving through each node. Analysis of A-Star (A*) Algorithm: - A* is a graph search algorithm that finds the least-cost path from a given initial node to one goal node (out of one or more possible goals). It uses a distance-plus-cost heuristic function (usually denoted f(x)) to determine the order in which the search visits nodes in the tree. The distance plus-cost heuristic is a sum of two functions: the path-cost function (usually denoted g(x), which may or may not be a heuristic) and an admissible heuristic estimate of the distance to the goal. The path-cost function g(x) is the cost from the starting node to the current node. A-Star Algorithm Pseudo Code 1. Create Start Node with Current Position 2. Add Start Node to Queue 3. While Queue Not Empty 4. Sort Node Queue byf(N) Value in Ascending 5. Get First Node From Queue call Node “N” 6. If N is Goal Then Found and Exit Loop 7. Else 8. Mark N Node as Visited 9. Expand each reachable Node from N call Node “Next N” 10. f(Next N) = g(Next N) + h(Next N) 11. Loop 6. PROPOSED OUTCOME: - This proposed system should have a primary object which will autonomously move around in a 3D environment. The primary object will be able to detect proximity with objects within its vicinity based on the line of sight it has available. The primary object will also have some destination information which will be used to calculate the fastest path to the destination. Once the path is calculated the primary object will try to learn its surroundings using raycasting and will try to avoid all possible collisions to reduce any damage. 7. EXPECTED RESULTS This Proximity Detection system will be able to detect obstacles beforehand. The real-time information gathered from the detection system will be sent to the report generator which will provide a detailed output of the happening surroundings, shortest path and proximity of the obstacles on the screen. The system should also assess the situation and generate an early level indication to indicate the operator about incoming threat. This is how an operator will be able to decide whether to change the current path or to continue with the same path. 8. CONCLUSIONS This proximity detection application will let autonomous objects traverse safely in an unsafe environment. By avoiding collisions, a lot of resources can be saved while performing autonomous tasks. This will solve safety- related problems for many applications like automated mining carts. In the future, the system can be upgraded with many new features. If a collision is imminent, then we can implement a system to try to detect the damage profile and reduce it despite colliding with foreign objects. In addition to that, after the collision happens, the primary object will try to stabilize its orientation and calculate a new path to its safety. Also, if possible, the primary object will try to clear the threat by itself if possible. For further development of the study, we always need to develop more heuristic techniques, as Heuristic algorithms are never complete as they are based on Logic which is based on Hope that “This solution must be the answer of my question”. As they are developed on the basis of
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 04 | Apr 2021 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 28 resources and previous results available, they will try to provide the best solution available. REFERENCES 1. https://ieeexplore.ieee.org/document/8904257/ (proximity detection) 2. https://ieeexplore.ieee.org/abstract/document/8 835462 (Threat prediction ) 3. https://www.red3d.com/cwr/steer/gdc99/ (Steering Behaviors) 4. https://www.researchgate.net/publication/2652 36262_Towards_Obstacle_Avoidance_and_Autonomous_U AV_Operation (obstacle avoidance) 5. https://ieeexplore.ieee.org/document/6851204 (Ray casting ) 6. https://ieeexplore.ieee.org/document/6324627 (Path finding algorithm) 7. https://ieeexplore.ieee.org/document/7550934 (A* algorithm)
Download now