Professional Documents
Culture Documents
Technical Paper Reading and Writing Skills: MTT-1 Presentation On Literature Review
Technical Paper Reading and Writing Skills: MTT-1 Presentation On Literature Review
Technical Paper Reading and Writing Skills: MTT-1 Presentation On Literature Review
Maharashtra
Work done (max 100 In this research paper they have tried to calculate the intensity by taking real time video of a person which
words) would give an new idea for calculation of emotion intensity
Type of Input Used In this research paper they used dataset of fer2013, it is open-source dataset, which is the standard data shared
for a Kaggle database website
Output Observed The emotional intensity for seven emotions of human have been calculated successfully.Even the percentage of
the emotional intensity in real time vedio was calculated successfully
Hardware/Software/ Convolutional Neural Network (CNN), Artificial Neural Networks
Platform used
Future work The application can be used in the medical field for patients in ICU who cannot convey their emotions.There
feelings can be calculated by their facial expression intensity.
Mukesh Patel School of Technology Management & Engineering Shirpur
Maharashtra
Title of paper Face Detection And Recognition For Automatic Attendance System
Work done (max 100 In this paper they attempted to implement attendance management system in lecture or laboratory by which
words) the lecturer can record students attendance and save time
Type of Input Used In this research paper the face database consists of templates of face images of individual students that was
collected and stored by an enrolment process
Output Observed In this research paper Face is detected and recognized and Template Matching is done where Source and
Template are matched.
Hardware/Software/ Raspberry pi, Open CV Library
Platform used
Future work The application can be used in managing office attendance
Mukesh Patel School of Technology Management & Engineering Shirpur
Maharashtra
Author/Affiliation R. A. JARVIS
Work done (max 100 This paper surveys a Variety of approaches to generalized range finding and presents a perspective on their
words) applicability and shortcomings in the context of computer vision studies.
Type of Input Used In this research paper the database was collected by using the infrared range detection component from cannon
AF 35cm camera
Output Observed In this research paper they found out that catching the third aspect through nonimage-based reach finding is of
extraordinary utility in three dimensional scene investigation since large numbers of the ambiguities of
interpretation emerging from infrequent absence of correspondence between object limits and inhomogeneities
of force, surface, furthermore shading can be subsequently inconsequentially settled
Work done (max 100 The objective of this research study is to investigate and analytically evaluate applications of machine learning
words) in computer vision.
Type of Input Used In this research paper the database searched includes Google scholar applying advanced search techniques with
respect to keywords- “machine learning”, “computer vision”, “Deep learning”, and “Artificial intelligence”.
Output Observed In this research paper they have identified the successful implementation of machine learning applications in
computer vision for weather forecasting, biological science, expression reading, food security, species
classification, sports, monitoring the traffic flows, and predictive maintenance in industries. The biological
science, human activity interpretation, traffics management, and professional sports are the emerging areas.
Work done (max 100 This paper provides a detailed explanation to the algorithms and methodologies for the color detection and
virtual mouse.
words)
Type of Input Used the model is developed using computer vision where the color variation is used for the mouse identification
and movement and input is provided to the camera feed.
Output Observed The created mask is converted from RGB background to a black and white that will be used for the detection
of the green objects that will help for the movement of the mouse. Same way we can observe the things like
clicking which is formed form combining both the figures. So the working of this is based on the circle that is
formed combining two rectangles that is formed from the detection of the green color in front of the camera
Hardware/Software/ The system working conditions are based on Anaconda Environment interface design, with OpenCV, wx,
Numpy libraries and some of the sub packages of these libraries.
Platform used
Future work The Models can be developed in different ways by using some latest packages like ‘pyauto GUI’ that will help
us to give commands which will identify an input and perform some function on the system with ease.
Mukesh Patel School of Technology Management & Engineering Shirpur
Maharashtra
Title of paper Vehicle Theft Tracking, Detecting And Locking System Using Open CV
Work done (max 100 The implementation of vehicle tracking and locking systems by using open CV is executed.
words)
Type of Input Used Vehicle locking & detection device is installed in the vehicle. By using mobile application to recognize the face
and compares his face with their database to check whether he is an automated driver or not. If the condition
is true, unlock the vehicle.
Output Observed A vehicle track system can be inserted in the vehicle at some hidden place, no one can easily find out. If
someone tries to break the system the buzzer turns on automatically.
Hardware/Software/ The GSM and GPS is based on remote monitoring system has been implemented. The software and the
Platform used hardware components of GSM and GPS can be interfacing with the external world and its based on
microcontroller system
Title of paper Open CV Pattern Based Smart Bank Security System With Theft & Identification Using Android
Work done (max 100 the object tracking using the open CV system was successfully implemented and the user is provided with high
words) level authentication for banking, the theft alerts are intimated to bank authorities with message from the
GSM module.
Type of Input Used In this proposed system the pattern is collected in the form of dataset, stored and is maintained in the bank's
server. A camera is in build in the machine which captures the data
Output Observed The step by step access by the user is monitored successfully .The entire process is controlled by PIC
microcontroller connected with GSM Module and Bluetooth, Controller is interfaced with system. As final
result the DC motor rotates indicating the opening of the bank locker.
Hardware/Software/ use of Numpy, which is a highly optimized library for numerical operations with MA TLAB-style syntax. All the
Platform used Open CV array structures are converted to and from Numpy arrays. This method also makes it easier to
integrate with all other libraries that make use Numpy such as SciPy and Matplotlib.
Future work In addition to the authentication of user there is another system to identify the user before that RFID tag
checking is Password entry through mobile phone is needed for another level of security. This can be done by
using Bluetooth and also authentication is checked by verification through UIN number
Mukesh Patel School of Technology Management & Engineering Shirpur
Maharashtra
Work done (max 100 The system in research paper helps us ensure the proper social distancing in crowded places and highlights the
words) violations of these norms in real-time.
Type of Input Used The system will take a live feed from established video recorders and will make a counter of violations
eventually highlighting the areas of highest criticality on basis of the number of violations.
Output Observed The system works on a per-frame as bedrock enabling the highest accuracy, a frame is fetched the
objects(humans) to be considered is detected, the distance between the detected objects are computed, and
if this comes less than the acceptable intervention, it's marked as a violation. All this happens in real-time
making it aberrant.
Work done (max 100 In this paper, extracting the legal information from captured cheque image is obtained by preprocessing the
words) image, extracting required information and then recognizing and verifying the handwritten fields.
Type of Input Used in Image acquisition the recognition system takes a scanned image as an input image. The image should have
a specific format as JPEG. This image is taken through a scanner or a camera.
Output Observed The automated system given will extract information from cheques, validate the information and keep record
of all the information present that can be used by financial institutes to reduce human efforts in verification of
signature which is done manually as well as it will keep a record of all the transactions
Hardware/Software/ tesseract library in Python, OCR, pandas,opencv, Image processing techniques like thinning, median filtering,
Platform used dilation, and verification techniques are also employed in this approach.
Future work After verification, By using Pandas, the data obtained can be stored in the form of excel sheet.
Mukesh Patel School of Technology Management & Engineering Shirpur
Maharashtra
Work done (max 100 This paper includes introduction to gesture recognition, its various areas, working of gesture recognition
words) system, applications, the proposed idea with its hardware & software implementation tools, the various
technologies applied on the idea, benefits of idea, its shortcomings and future scope of gesture recognition
system
Type of Input Used in Image acquisition the recognition system takes a scanned image as an input image. The image should have
a specific format as JPEG. This image is taken through a scanner or a camera.
Output Observed The automated system given will extract information from cheques, validate the information and keep record
of all the information present that can be used by financial institutes to reduce human efforts in verification of
signature which is done manually as well as it will keep a record of all the transactions
Problem Formulation
The problem proposed for research in this is that throughout the most recent ten years face
location and acknowledgment have risen above from exclusive to well known areas of
examination in PC vision and one of the better also fruitful utilizations of picture examination
and calculation based understanding. In light of the inherent nature of the issue, it isn't just a
software engineering area of research, yet additionally the object of neuroscientific and mental
investigations moreover, due to the overall assessment that advances in PC picture handling
and getting research will give bits of knowledge into how our mind work as well as the other
way around.
Mukesh Patel School of Technology Management & Engineering Shirpur
Maharashtra
Research Gap
Reference List
Reference List
[1] Popoola, J. A., and C. O. Yinka-Banjo. "Comparative analysis of selected facial recognition
algorithms." Nigerian Journal of Technology 39.3 (2020): 896-904.
[2] Alharbi, Alhasan Ali, Mukta Dhopeshwarkar, and Shubhashree Savant. "Detection of Emotion
Intensity Using Face Recognition." International Conference on Recent Trends in Image Processing
and Pattern Recognition. Springer, Singapore, 2020.
[3] AmulyaS,Nisarga,Sunil M P. “Face Detection And Recognition For Automatic Attendence
System”,June 2018,vol.4
[4] Jarvis, Ray A. "A perspective on range finding techniques for computer vision." IEEE Transactions
on Pattern Analysis and Machine Intelligence 2 (1983): 122-139.
[5] Khan, Asharul Islam, and Salim Al-Habsi. "Machine learning in computer vision." Procedia
Computer Science 167 (2020): 1444-1451.
Mukesh Patel School of Technology Management & Engineering Shirpur
Maharashtra
Reference List
Reference List
[6] Varun, Kollipara Sai, I. Puneeth, and T. Prem Jacob. "Virtual Mouse Implementation using Open
CV." 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE,
2019.
[7] Mohanasundaram, S., V. Krishnan, and V. Madhubala. "Vehicle theft tracking, detecting and locking
system using open CV." 2019 5th International Conference on Advanced Computing & Communication
Systems (ICACCS). IEEE, 2019.
[8] George, Allan Mary. "Open cv pattern based smart bank security system with theft & identification
using android." 2016 2nd International Conference on Applied and Theoretical Computing and
Communication Technology (iCATccT). IEEE, 2016.
Mukesh Patel School of Technology Management & Engineering Shirpur
Maharashtra
Reference List
Reference List
[9] Sharma, Mudit. "Open-CV Social Distancing Intelligent System." 2020 2nd International
Conference on Advances in Computing, Communication Control and Networking (ICACCCN). IEEE,
2020
[10] Dhanawade, Aniket, et al. "Open CV based Information Extraction from Cheques." 2020 Fourth
International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 2020.
[11] Khan, Mohd Baqir, Kavya Mishra, and Mohammed Abdul Qadeer. "Gesture recognition using
Open-CV." 2017 7th International Conference on Communication Systems and Network Technologies
(CSNT). IEEE, 2017.
Mukesh Patel School of Technology Management & Engineering Shirpur
Maharashtra
Thank You…