Digital Reconstruction of Submerged objects under Ocean using Image Enhancement and 3D photogrammetry techniques
The proposed work has been conceived to achieve the exact measurement of objects underwater for archeological study of exploring the vanished cities like Poombuhar and Dwarka. 3D photogrammetry is one of the fabulous work which can be used for measuring any object by keeping reference object with it. SFM (Structure from Motion) is the algorithm used for generating 3D model of target object using dataset. The target object will be taken by multiple snaps in almost 360 degree axis using the ROV (Remotely Operated Vehicle). After Image enhancement of dataset, 3D mapping of target object will be generated. Using the reference object, the target object can be measured easily in terms of length, width and volume. This proposed work help the archeological people for exploring the vanished traditional cities.
Reverse Engineering in Manufacturing Industry to Capture Global Markets
To capture global markets, organizations need to produce products that can be easily configured to offer distinctive capabilities compared to the competition. In globalization, the automotive, telecom, banking and oil sectors which are under control of major developed nations have benefited most. The developing countries gained less when compared to the loss in farm and agricultural sectors. Some countries like China, Taiwan, South Korea, Malaysia, and Singapore took the advantage of globalization in such a way that they are now having world class manufacturing hubs for leading MNCs. The emergence of appropriate technologies like CAD, CAM, Reverse Engineering and Rapid Prototyping make significant improvements in productivity and product quality. The role of government policies in application of these technologies in manufacturing industry, limitations, applicable areas for developing countries are presented in this paper. The related IPR, patent issues are discussed.
Prospective of Ag0- Chitosan - Silty Clay Disinfecting Material for Low Cost Point of Use Applications
In this research work, a hybrid mixture of Au metal nanoparticles, Silty clay and Chitosan polymer (Au-SC-CP) has been investigated for long term low cost point of use water purification. Hybrid material when treated with the household water, releases Au+3 ions at an exact limit that in turn decontaminate the microbial pathogens, Silty clay play a role of an ion exchanger for water softening and decontamination and Chitosan polymer is used as water purifier by adsorbing toxic heavy metals. Also sorption studies of hyper toxic Cd+2 ions were investigated from pretreated and post treated Chitosan polymer. In the batch experiments, the change of initial metal ion concentration, pH, temperature and contact time was tested which showed that the (Au-SC-CP) composite has excellent removal efficiency because of increased active sites and surface area by chitosan polymer. Disinfecting microbial tests were carried in a 5 Liter sample container indicating low quantity of both gram positive and negative bacteria signifying their broad spectrum antibiotic ability. These finding proposed that Au metal nanoparticles, Silty clay and Chitosan polymer (Au-SC-CP) hybrid martial is an alternate to decontaminate waterbodies.
Developing a Multi-Agent Class Timetabling for Higher Educational Institutions
In a university setting, class scheduling is vital for teaching and learning process. Educational institutions rely on time tables in their day to day activities. Multi-agent systems can be applied in solving University Course Timetabling problem where the advantages of using multi agent systems based approach could include increasing the independency of scheduling each department, independence of departments in scheduling, scalability in a distributed environment and to prevent collision among events/resources and unplanned allocation by negotiation among agents in a distributed environment. Class timetabling in most of the Higher Educational Institutions is being done manually which is a very difficult and time-consuming task. The main aim of the study is to develop a multiple agent class timetabling system that automates the process of class scheduling of Higher Educational Institutions (HEIs). The design to be used is the developmental research. The proponent used Prometheus methodology in developing the system. Adopting Prometheus methodology in developing the multi-agent system resulted to a detailed and complete system in the sense of covering all the stages of software development as applied to agent systems
Health assessment of an EHV Earthing System
Earthing is the important criteria in an EHV substation for the timely operation of the protective devices and to limit the safe parameters like safe touch and step potentials. The earthing is done at the time of construction of substation with input parameters of soil resistivity, fault current of the design. In course of time the system fault level increases and the extension of bays may happen and still the earth grid will remain the same only with an addition of extra grid for the bay. Audit of all the equipment will be done time to time in order to ensure the proper and timely operation of the devices but for audit of earthing system, only earth grid/pit resistance will be measured to check whether they are in limits. However, by having low grid resistance will not be considered as safe and the earthing system needs to checked for the integrity of risers connecting the equipment to grid, ground grid integrity from corner to corner and the safe touch & step potentials. The aim of this paper is how to verify the earthing system of a live EHV substation for the integrity along with the safe parameters and validating with software modelling without actual shutting down of substation for the testing
TransFare: Development of Mobile Contactless Solution Using Near Field Communication (NFC)-Based Transport Payment System Through Haversine Algorithm
The advent of global interoperability between Near Field Communication (NFC) smartphones and existing contactless technology can be a game changer for public transport infrastructure. A key application of NFC can be found in the field of contactless payment ecosystem. It can drastically change current systems of isolated technologies in public transport by providing new approaches for a national or international interoperable fare management scheme. In this study, a development of mobile contactless solution using NFC-based transport payment system through Haversine algorithm” was designed and developed to support public transport system and passengers deploy NFC solutions that can enhance the efficiency of public transport system by allowing NFC-enabled mobile phone to emulate NFC card which will calculate the passenger’s fare according to the distance travelled using the Haversine algorithm and GPS. NFC enabled smartphone act as the contactless reader or a Ticket Vending Machine connected with the back end server that could provide online top-ups directly to the NFC card via payment gateway. Specifically, this research focuses on the NFC technology processes in terms of: Registration, Provision, Access Control and Inspection. The cloud-based application using Google cloud server was used to manage the computations of the encryption process and store sensitive data securely.
Design analyses, construction and control of hand held 2 axis camera gimbal
The design analyses, manufacturing and testing of handheld 2 axis camera gimbal is discussed. The existing system is too expensive and is not suitable for lightweight cameras. The existing gimbal are prone to harmonic oscillation. The problem found in commercially available gimbal is inability to change the control method, thus making a camera gimbal from scratch. Data from CAD drawing will be used to model the gimbal and code will be will be written for sensors reading and actuators for a microcontroller to test the gimbal. The control system will be discussed. Gyro stabilization will be used for gimbal. Gimbal’s movement will be tested against the user’s movement and check any error. Methodology will be discussed to solve if any limitation is found. All of this will be discussed keeping cost in mind
Color Based Object Detection and Tracking using Open CV
A system to detect and track an object of a specific color is presented. It is proposed that a robust and reliable object tracking system in a fast pace environment, such as sports, can be implemented using cheap and easily available components. Evidence of such systems can be found for a variety of applications. For this system, implementation was achieved using a raspberry pi, webcam and servo motor, and the software was open cv. Testing revealed that the current system is reliable in detecting and tracking a specific object, however, it requires stringent operating conditions. Improvements in software and hardware can be made to improve the robustness of the system in the future.
Intruder Detection and Recognition using Different Image Processing Techniques for a Proactive Surveillance
In order to innovate a proactive surveillance camera, there is a need for an efficient and robust face detection and recognition algorithm. The researcher used one of the well-known, fastest and efficacious approaches in face detection, the viola-jones algorithm. The researcher also used different image processing techniques to identify if the face detected is an intruder or not. The goal of the research is to recognize the fastest way on how the home owners will be informed if there is an intruder or burglar enters in their home using proactive surveillance device. This device was programmed based on the different recognition algorithm and a criteria evaluation framework that could recognize intruders and burglars. The research design use was developmental research to satisfy the research problem. The researcher used Viola-Jones Algorithm for face detection and five algorithms for face recognition (eigenfaces, fisher faces, local binary pattern, template matching, and deep learning algorithm). The criteria evaluation was used to identify the best face recognition algorithm that is suited to any scenario of recognition. It is concluded that the system can recognize the intruders entered in the house and proactively notify the household members using the mobile applications and activate the alarm system of the house.