SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 04 | Apr 2021 www.irjet.net p-ISSN: 2395-0072
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 25
Proximity Detection Warning System using Ray Casting
Prof. Sneha Vanjari1, Gayatri Kulkarni2, Ashutosh Bhorde3, Bhakti banne4, Samiksha Kudale5
1Professor, Dept. of IT Engineering, Zeal College of Engineering and Research, Pune, India.
,3,4,5 UG Student, Dept. of IT Engineering, Zeal College of Engineering and Research, Pune, India.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In the current era of technology, we are seeing a
lot of objects which work autonomously. These include
drones, transportation vehicles, haulers, robots and many
more. When these things are being operated autonomously,
they need to learn their environment by detecting threats so
human workers can work safely.
The proximity detection analysis has importance for various
working such as logistics, transportation, operation
management, network and mining line. The shortest path
analysis is an artificial intelligence concept which has
significance of developing the capability about think cause
and effect, learning and thinking like a human being.
Heuristic technique is a method for solving a drag which
gets a result or not. The solution based on this technique
may return unexpected value which varies according to the
given problem. In the 3D game industry, real-time
strategists use shortest path analysis control for movement
of character, vehicle, and animals. Heuristic algorithms
increase efficiency to avoid barrier objects on maps and
search for the shortest path for the operator in an
environment. Thus, Heuristic Search Algorithms are core
algorithms used for artificial intelligence applications like
games, robotics, astronomy and network control. This
research proposes two essences, detecting obstacles
beforehand and finding an optimal shortest path for the
user to navigate freely in an environment. Our project aims
on developing a prototype system to give an early indication
using ray casting and pathfinding algorithms.
Key Words: Proximity detection, Raycasting, Pathfinding
Algorithm, Heuristic technique, Artificial intelligence
1. INTRODUCTION
Nowadays, we are seeing a lot of objects which work
autonomously. These include drones, transportation
vehicles, haulers, robots and many more. When these
things are being operated autonomously, they need to
learn their environment by detecting threats so they can
work safely. In this project, we are using raycasting[5] to
anticipate potential collisions before they happen, so these
autonomous objects can traverse around without getting
damaged.
While experiencing Collision may be a negligible event to
most beings, some objects are so fragile that even a slight
collision could be catastrophic.
Our method for detection is based upon vector algebra
results on “Ray Casting “using mesh colliders which is
provided by Unity game engine to each object present in
the game scene.
We have developed and implemented a collision detection
method whose pre-processing step is to construct a
decomposition of free space into a 3D scene and obstacles
map, marking the facets that correspond to obstacle
boundaries.
In this paper, we give details of our algorithm, and we
describe the experiments that we have conducted to test
the efficiency of this method. A primary goal of our study
was to determine if, indeed, the methods based on
computational vector algebra have a practical impact on
the collision detection[2]problem.
Our method for detection is based upon vector algebra
results on “Ray Casting “using mesh colliders which is
provided by Unity game engine to each object present in
the game scene. A practical contribution of this project is
our work on systematic experimentation for the Collision
detection problem.
The system we are going to design will use RayCasting
Concept to address proximity of objects in an
environment.
The first phase of the project is going to be to design a
prototype scene where all kinds of movable and
immovable obstacles will be placed along with the user.
Then we will use vector algebra to calculate the distance
and proximity between the obstacle and the user to send
an early warning to the operator that a potential threat is
near our reach.
In the last phase we will calculate optimal and shortest
path using A * algorithm which is one of the most accurate
heuristic pathfinding algorithms.[6]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 04 | Apr 2021 www.irjet.net p-ISSN: 2395-0072
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 26
2. LITERATURE SURVEY
The purpose of the literature review was to cover collision
awareness and proximity detection and research based
recommendations for providing obstacle fewer
environments. Articles reviewed focused on efficient
proximity detection. Special attention was paid to learn
more about ray casting algorithms. More than 10 articles,
publications (including reports, manuals and guidance
materials) and 2 online training modules for Unity game
engine and fact sheets were reviewed. The system uses
object recognition information to augment existing object
recognition algorithms. Its performance should thus
continue to improve as researchers develop better
recognition software, and roboticists develop better PDS
(Proximity Detection System) software. We design
algorithms with a fixed radius for the client and server
respectively, with the purpose of reducing unnecessary
collision with the user. That is we will place the objects
randomly to create an environment and the user will
dodge and review the proximity of the object far from him.
The problem of proximity detection is often encountered
in massively multiplayer online games and in network
applications. The implementation is carried out using
Unity Game Engine and Ray tracing Algorithms. Object
detection and classification are major challenges where
applications are based on robotic advancements.
Navigation, detection, calculating proximity are based on
the ability to recognize objects. Object detection
algorithms are expected to detect and classify all instances
of an object. They should be detected even if there are
variations of position, scale and environment variations
such as intensity.
3. PROBLEM STATEMENT
These days, we are seeing a lot of objects which work
without human interaction. When these things are being
operated autonomously, they need to adapt the
information about them on the go by detecting threats so
they can work safely.
While experiencing collisions may be a negligible event to
most beings, some objects are so fragile that even a slight
collision could be dangerous for the situation.
Our method for detection is based upon vector algebra
results on “Ray Casting “using mesh colliders which is
provided by Unity game engine to each object present in
the game scene.
Therefore, the need for us to build and implement a
proximity detection[1] system that will preemptively
detect threats to autonomous objects and will allow them
to traverse in a safe manner by avoiding collisions has
arrived.
4. SYSTEM ARCHITECTURE
**diagram**
As the objective of the project is to make sure the primary
object reaches the destination without colliding with
anything. Most of the code in the project basically keeps
running until the outcome is achieved. Following are the
major modules in the project:
Object detection - As soon as the program is initiated, we
start using ray casting to detect all the foreign objects in
the vicinity of the primary object. The primary object will
usually have a range within which we will be able to detect
all the objects and the objects outside of the range will be
ignored.
Data Preprocessing - Once we receive basic information
about all the objects around the primary object, we will
check if any of them are threats or not based on the
distance to the primary object. We will also try to detect if
a foreign object is on the move. All the information will be
stored in the memory of the primary object. The primary
object will also use steering behaviors[3] of the threats to
detect what type of threat the object is dealing with.
Keeping track of the objects - Every render frame of the
application, Object detection, and Data processing steps
will run until the primary object reaches its destination.
This will allow us to get the updated information about the
environment of the primary object. Regardless of whether
a foreign object is a static object or not, if it is a threat, we
can add it to the unsafe list. All the objects in the unsafe
list will be treated as if they will cause some damage to the
primary object.[4]
Route calculation - In this step, based on the data we
collected so far, we will calculate a safe route for our
primary object. The system will be using A* algorithm, as
it will provide us with heuristics so we can calculate the
fastest route to the destination. To calculate the safest
route, the system uses the collected data and will make
sure that the primary object will be out of range of the
potential collisions with the threats.
5. ALGORITHM
A) Ray Casting
1. Gather basic information about all surrounding objects
2. Cast a ray into the environment
3. If the collides with one of the objects
Then check if any of them are threats
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 04 | Apr 2021 www.irjet.net p-ISSN: 2395-0072
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 27
4. calculate distance from current position to the said
obstacle
5. alert the operator about current situation
B) Pathfinding Algorithm (A* Algorithm)
The A* ("A star") algorithm[7] has three important
properties:
It will always return the least expensive path if a path
exists to the destination, other algorithms may find a path
faster but it is not necessarily the "best" path we can take.
A* uses a heuristic (a "guess") to search nodes considered
more likely to lead to the destination first, allowing us to
often find the best path without having to search the
entire map and making the algorithm much faster.
A* is based on the idea that each node has some cost
associated with it. If the costs for all nodes are the same
then the best path returned by A* will also be the shortest
path but A* can easily allow us to add different costs to
moving through each node.
Analysis of A-Star (A*) Algorithm: -
A* is a graph search algorithm that finds the least-cost
path from a given initial node to one goal node (out of one
or more possible goals). It uses a distance-plus-cost
heuristic function (usually denoted f(x)) to determine the
order in which the search visits nodes in the tree. The
distance plus-cost heuristic is a sum of two functions: the
path-cost function (usually denoted g(x), which may or
may not be a heuristic) and an admissible heuristic
estimate of the distance to the goal. The path-cost function
g(x) is the cost from the starting node to the current node.
A-Star Algorithm Pseudo Code
1. Create Start Node with Current Position
2. Add Start Node to Queue
3. While Queue Not Empty
4. Sort Node Queue byf(N) Value in Ascending
5. Get First Node From Queue call Node “N”
6. If N is Goal Then Found and Exit Loop
7. Else
8. Mark N Node as Visited
9. Expand each reachable Node from N call Node
“Next N”
10. f(Next N) = g(Next N) + h(Next N)
11. Loop
6. PROPOSED OUTCOME: -
This proposed system should have a primary object which
will autonomously move around in a 3D environment. The
primary object will be able to detect proximity with
objects within its vicinity based on the line of sight it has
available. The primary object will also have some
destination information which will be used to calculate the
fastest path to the destination. Once the path is calculated
the primary object will try to learn its surroundings using
raycasting and will try to avoid all possible collisions to
reduce any damage.
7. EXPECTED RESULTS
This Proximity Detection system will be able to detect
obstacles beforehand.
The real-time information gathered from the detection
system will be sent to the report generator which will
provide a detailed output of the happening surroundings,
shortest path and proximity of the obstacles on the screen.
The system should also assess the situation and generate
an early level indication to indicate the operator about
incoming threat. This is how an operator will be able to
decide whether to change the current path or to continue
with the same path.
8. CONCLUSIONS
This proximity detection application will let autonomous
objects traverse safely in an unsafe environment. By
avoiding collisions, a lot of resources can be saved while
performing autonomous tasks. This will solve safety-
related problems for many applications like automated
mining carts.
In the future, the system can be upgraded with many new
features. If a collision is imminent, then we can implement
a system to try to detect the damage profile and reduce it
despite colliding with foreign objects. In addition to that,
after the collision happens, the primary object will try to
stabilize its orientation and calculate a new path to its
safety. Also, if possible, the primary object will try to clear
the threat by itself if possible.
For further development of the study, we always need to
develop more heuristic techniques, as Heuristic algorithms
are never complete as they are based on Logic which is
based on Hope that “This solution must be the answer of
my question”. As they are developed on the basis of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 04 | Apr 2021 www.irjet.net p-ISSN: 2395-0072
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 28
resources and previous results available, they will try to
provide the best solution available.
REFERENCES
1. https://ieeexplore.ieee.org/document/8904257/
(proximity detection)
2. https://ieeexplore.ieee.org/abstract/document/8
835462 (Threat prediction )
3. https://www.red3d.com/cwr/steer/gdc99/
(Steering Behaviors)
4. https://www.researchgate.net/publication/2652
36262_Towards_Obstacle_Avoidance_and_Autonomous_U
AV_Operation (obstacle avoidance)
5. https://ieeexplore.ieee.org/document/6851204 (Ray
casting )
6. https://ieeexplore.ieee.org/document/6324627 (Path
finding algorithm)
7. https://ieeexplore.ieee.org/document/7550934 (A*
algorithm)

More Related Content

What's hot

IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET Journal
 
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUDPROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUDIAEME Publication
 
rpaper
rpaperrpaper
rpaperimu409
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET Journal
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET Journal
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET Journal
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET Journal
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensorijtsrd
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
 

What's hot (20)

C6524029320
C6524029320C6524029320
C6524029320
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUDPROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
 
rpaper
rpaperrpaper
rpaper
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
43 automatic
43 automatic43 automatic
43 automatic
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Ijcet 06 07_002
Ijcet 06 07_002Ijcet 06 07_002
Ijcet 06 07_002
 
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 

Similar to IRJET- Proximity Detection Warning System using Ray Casting

Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemSanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemIRJET Journal
 
Object Detection and Tracking AI Robot
Object Detection and Tracking AI RobotObject Detection and Tracking AI Robot
Object Detection and Tracking AI RobotIRJET Journal
 
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET Journal
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueIRJET Journal
 
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedObject and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedIRJET Journal
 
Multiple Sensor Fusion for Moving Object Detection and Tracking
Multiple Sensor Fusion  for Moving Object Detection and TrackingMultiple Sensor Fusion  for Moving Object Detection and Tracking
Multiple Sensor Fusion for Moving Object Detection and TrackingIRJET Journal
 
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)cscpconf
 
IRJET - Military Spy Robot with Intelligentdestruction
IRJET - Military Spy Robot with IntelligentdestructionIRJET - Military Spy Robot with Intelligentdestruction
IRJET - Military Spy Robot with IntelligentdestructionIRJET Journal
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionIRJET Journal
 
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...IRJET Journal
 
Intrusion Detection System Using Face Recognition
Intrusion Detection System Using Face RecognitionIntrusion Detection System Using Face Recognition
Intrusion Detection System Using Face RecognitionIRJET Journal
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTIRJET Journal
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET Journal
 
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET Journal
 
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)csandit
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET Journal
 
IRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using YoloIRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using YoloIRJET Journal
 
Social Distance Monitoring and Mask Detection Using Deep Learning Techniques
Social Distance Monitoring and Mask Detection Using Deep Learning TechniquesSocial Distance Monitoring and Mask Detection Using Deep Learning Techniques
Social Distance Monitoring and Mask Detection Using Deep Learning TechniquesIRJET Journal
 
Drishyam - Virtual Eye for Blind
Drishyam - Virtual Eye for BlindDrishyam - Virtual Eye for Blind
Drishyam - Virtual Eye for BlindIRJET Journal
 

Similar to IRJET- Proximity Detection Warning System using Ray Casting (20)

Sanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance SystemSanjaya: A Blind Assistance System
Sanjaya: A Blind Assistance System
 
Object Detection and Tracking AI Robot
Object Detection and Tracking AI RobotObject Detection and Tracking AI Robot
Object Detection and Tracking AI Robot
 
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
IRJET- Threat Detection in Hostile Environment with Deep Learning based on Dr...
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
 
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedObject and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
 
Multiple Sensor Fusion for Moving Object Detection and Tracking
Multiple Sensor Fusion  for Moving Object Detection and TrackingMultiple Sensor Fusion  for Moving Object Detection and Tracking
Multiple Sensor Fusion for Moving Object Detection and Tracking
 
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
 
IRJET - Military Spy Robot with Intelligentdestruction
IRJET - Military Spy Robot with IntelligentdestructionIRJET - Military Spy Robot with Intelligentdestruction
IRJET - Military Spy Robot with Intelligentdestruction
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
 
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
INDOOR AND OUTDOOR NAVIGATION ASSISTANCE SYSTEM FOR VISUALLY IMPAIRED PEOPLE ...
 
Intrusion Detection System Using Face Recognition
Intrusion Detection System Using Face RecognitionIntrusion Detection System Using Face Recognition
Intrusion Detection System Using Face Recognition
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
 
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection System
 
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
 
IRJET-Cleaner Drone
IRJET-Cleaner DroneIRJET-Cleaner Drone
IRJET-Cleaner Drone
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
 
IRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using YoloIRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using Yolo
 
Social Distance Monitoring and Mask Detection Using Deep Learning Techniques
Social Distance Monitoring and Mask Detection Using Deep Learning TechniquesSocial Distance Monitoring and Mask Detection Using Deep Learning Techniques
Social Distance Monitoring and Mask Detection Using Deep Learning Techniques
 
Drishyam - Virtual Eye for Blind
Drishyam - Virtual Eye for BlindDrishyam - Virtual Eye for Blind
Drishyam - Virtual Eye for Blind
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

IRJET- Proximity Detection Warning System using Ray Casting

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 04 | Apr 2021 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 25 Proximity Detection Warning System using Ray Casting Prof. Sneha Vanjari1, Gayatri Kulkarni2, Ashutosh Bhorde3, Bhakti banne4, Samiksha Kudale5 1Professor, Dept. of IT Engineering, Zeal College of Engineering and Research, Pune, India. ,3,4,5 UG Student, Dept. of IT Engineering, Zeal College of Engineering and Research, Pune, India. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In the current era of technology, we are seeing a lot of objects which work autonomously. These include drones, transportation vehicles, haulers, robots and many more. When these things are being operated autonomously, they need to learn their environment by detecting threats so human workers can work safely. The proximity detection analysis has importance for various working such as logistics, transportation, operation management, network and mining line. The shortest path analysis is an artificial intelligence concept which has significance of developing the capability about think cause and effect, learning and thinking like a human being. Heuristic technique is a method for solving a drag which gets a result or not. The solution based on this technique may return unexpected value which varies according to the given problem. In the 3D game industry, real-time strategists use shortest path analysis control for movement of character, vehicle, and animals. Heuristic algorithms increase efficiency to avoid barrier objects on maps and search for the shortest path for the operator in an environment. Thus, Heuristic Search Algorithms are core algorithms used for artificial intelligence applications like games, robotics, astronomy and network control. This research proposes two essences, detecting obstacles beforehand and finding an optimal shortest path for the user to navigate freely in an environment. Our project aims on developing a prototype system to give an early indication using ray casting and pathfinding algorithms. Key Words: Proximity detection, Raycasting, Pathfinding Algorithm, Heuristic technique, Artificial intelligence 1. INTRODUCTION Nowadays, we are seeing a lot of objects which work autonomously. These include drones, transportation vehicles, haulers, robots and many more. When these things are being operated autonomously, they need to learn their environment by detecting threats so they can work safely. In this project, we are using raycasting[5] to anticipate potential collisions before they happen, so these autonomous objects can traverse around without getting damaged. While experiencing Collision may be a negligible event to most beings, some objects are so fragile that even a slight collision could be catastrophic. Our method for detection is based upon vector algebra results on “Ray Casting “using mesh colliders which is provided by Unity game engine to each object present in the game scene. We have developed and implemented a collision detection method whose pre-processing step is to construct a decomposition of free space into a 3D scene and obstacles map, marking the facets that correspond to obstacle boundaries. In this paper, we give details of our algorithm, and we describe the experiments that we have conducted to test the efficiency of this method. A primary goal of our study was to determine if, indeed, the methods based on computational vector algebra have a practical impact on the collision detection[2]problem. Our method for detection is based upon vector algebra results on “Ray Casting “using mesh colliders which is provided by Unity game engine to each object present in the game scene. A practical contribution of this project is our work on systematic experimentation for the Collision detection problem. The system we are going to design will use RayCasting Concept to address proximity of objects in an environment. The first phase of the project is going to be to design a prototype scene where all kinds of movable and immovable obstacles will be placed along with the user. Then we will use vector algebra to calculate the distance and proximity between the obstacle and the user to send an early warning to the operator that a potential threat is near our reach. In the last phase we will calculate optimal and shortest path using A * algorithm which is one of the most accurate heuristic pathfinding algorithms.[6]
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 04 | Apr 2021 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 26 2. LITERATURE SURVEY The purpose of the literature review was to cover collision awareness and proximity detection and research based recommendations for providing obstacle fewer environments. Articles reviewed focused on efficient proximity detection. Special attention was paid to learn more about ray casting algorithms. More than 10 articles, publications (including reports, manuals and guidance materials) and 2 online training modules for Unity game engine and fact sheets were reviewed. The system uses object recognition information to augment existing object recognition algorithms. Its performance should thus continue to improve as researchers develop better recognition software, and roboticists develop better PDS (Proximity Detection System) software. We design algorithms with a fixed radius for the client and server respectively, with the purpose of reducing unnecessary collision with the user. That is we will place the objects randomly to create an environment and the user will dodge and review the proximity of the object far from him. The problem of proximity detection is often encountered in massively multiplayer online games and in network applications. The implementation is carried out using Unity Game Engine and Ray tracing Algorithms. Object detection and classification are major challenges where applications are based on robotic advancements. Navigation, detection, calculating proximity are based on the ability to recognize objects. Object detection algorithms are expected to detect and classify all instances of an object. They should be detected even if there are variations of position, scale and environment variations such as intensity. 3. PROBLEM STATEMENT These days, we are seeing a lot of objects which work without human interaction. When these things are being operated autonomously, they need to adapt the information about them on the go by detecting threats so they can work safely. While experiencing collisions may be a negligible event to most beings, some objects are so fragile that even a slight collision could be dangerous for the situation. Our method for detection is based upon vector algebra results on “Ray Casting “using mesh colliders which is provided by Unity game engine to each object present in the game scene. Therefore, the need for us to build and implement a proximity detection[1] system that will preemptively detect threats to autonomous objects and will allow them to traverse in a safe manner by avoiding collisions has arrived. 4. SYSTEM ARCHITECTURE **diagram** As the objective of the project is to make sure the primary object reaches the destination without colliding with anything. Most of the code in the project basically keeps running until the outcome is achieved. Following are the major modules in the project: Object detection - As soon as the program is initiated, we start using ray casting to detect all the foreign objects in the vicinity of the primary object. The primary object will usually have a range within which we will be able to detect all the objects and the objects outside of the range will be ignored. Data Preprocessing - Once we receive basic information about all the objects around the primary object, we will check if any of them are threats or not based on the distance to the primary object. We will also try to detect if a foreign object is on the move. All the information will be stored in the memory of the primary object. The primary object will also use steering behaviors[3] of the threats to detect what type of threat the object is dealing with. Keeping track of the objects - Every render frame of the application, Object detection, and Data processing steps will run until the primary object reaches its destination. This will allow us to get the updated information about the environment of the primary object. Regardless of whether a foreign object is a static object or not, if it is a threat, we can add it to the unsafe list. All the objects in the unsafe list will be treated as if they will cause some damage to the primary object.[4] Route calculation - In this step, based on the data we collected so far, we will calculate a safe route for our primary object. The system will be using A* algorithm, as it will provide us with heuristics so we can calculate the fastest route to the destination. To calculate the safest route, the system uses the collected data and will make sure that the primary object will be out of range of the potential collisions with the threats. 5. ALGORITHM A) Ray Casting 1. Gather basic information about all surrounding objects 2. Cast a ray into the environment 3. If the collides with one of the objects Then check if any of them are threats
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 04 | Apr 2021 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 27 4. calculate distance from current position to the said obstacle 5. alert the operator about current situation B) Pathfinding Algorithm (A* Algorithm) The A* ("A star") algorithm[7] has three important properties: It will always return the least expensive path if a path exists to the destination, other algorithms may find a path faster but it is not necessarily the "best" path we can take. A* uses a heuristic (a "guess") to search nodes considered more likely to lead to the destination first, allowing us to often find the best path without having to search the entire map and making the algorithm much faster. A* is based on the idea that each node has some cost associated with it. If the costs for all nodes are the same then the best path returned by A* will also be the shortest path but A* can easily allow us to add different costs to moving through each node. Analysis of A-Star (A*) Algorithm: - A* is a graph search algorithm that finds the least-cost path from a given initial node to one goal node (out of one or more possible goals). It uses a distance-plus-cost heuristic function (usually denoted f(x)) to determine the order in which the search visits nodes in the tree. The distance plus-cost heuristic is a sum of two functions: the path-cost function (usually denoted g(x), which may or may not be a heuristic) and an admissible heuristic estimate of the distance to the goal. The path-cost function g(x) is the cost from the starting node to the current node. A-Star Algorithm Pseudo Code 1. Create Start Node with Current Position 2. Add Start Node to Queue 3. While Queue Not Empty 4. Sort Node Queue byf(N) Value in Ascending 5. Get First Node From Queue call Node “N” 6. If N is Goal Then Found and Exit Loop 7. Else 8. Mark N Node as Visited 9. Expand each reachable Node from N call Node “Next N” 10. f(Next N) = g(Next N) + h(Next N) 11. Loop 6. PROPOSED OUTCOME: - This proposed system should have a primary object which will autonomously move around in a 3D environment. The primary object will be able to detect proximity with objects within its vicinity based on the line of sight it has available. The primary object will also have some destination information which will be used to calculate the fastest path to the destination. Once the path is calculated the primary object will try to learn its surroundings using raycasting and will try to avoid all possible collisions to reduce any damage. 7. EXPECTED RESULTS This Proximity Detection system will be able to detect obstacles beforehand. The real-time information gathered from the detection system will be sent to the report generator which will provide a detailed output of the happening surroundings, shortest path and proximity of the obstacles on the screen. The system should also assess the situation and generate an early level indication to indicate the operator about incoming threat. This is how an operator will be able to decide whether to change the current path or to continue with the same path. 8. CONCLUSIONS This proximity detection application will let autonomous objects traverse safely in an unsafe environment. By avoiding collisions, a lot of resources can be saved while performing autonomous tasks. This will solve safety- related problems for many applications like automated mining carts. In the future, the system can be upgraded with many new features. If a collision is imminent, then we can implement a system to try to detect the damage profile and reduce it despite colliding with foreign objects. In addition to that, after the collision happens, the primary object will try to stabilize its orientation and calculate a new path to its safety. Also, if possible, the primary object will try to clear the threat by itself if possible. For further development of the study, we always need to develop more heuristic techniques, as Heuristic algorithms are never complete as they are based on Logic which is based on Hope that “This solution must be the answer of my question”. As they are developed on the basis of
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 04 | Apr 2021 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 28 resources and previous results available, they will try to provide the best solution available. REFERENCES 1. https://ieeexplore.ieee.org/document/8904257/ (proximity detection) 2. https://ieeexplore.ieee.org/abstract/document/8 835462 (Threat prediction ) 3. https://www.red3d.com/cwr/steer/gdc99/ (Steering Behaviors) 4. https://www.researchgate.net/publication/2652 36262_Towards_Obstacle_Avoidance_and_Autonomous_U AV_Operation (obstacle avoidance) 5. https://ieeexplore.ieee.org/document/6851204 (Ray casting ) 6. https://ieeexplore.ieee.org/document/6324627 (Path finding algorithm) 7. https://ieeexplore.ieee.org/document/7550934 (A* algorithm)