SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
353
SAFETY MONITORING TO PREVENT FALL ACCIDENTS AT
CONSTRUCTION SITE USING AUGMENTED REALITY
Petcharat Limsupreeyarat1
, Tanit Tongthong1
, Nobuyoshi Yabuki2
1
(Department of Civil Engineering, Chulalongkorn University, Bangkok, Thailand)
2
(Department of Civil Engineering, Chulalongkorn University, Bangkok, Thailand)
3
(Division of Sustainable Energy and Environmental Engineering, Osaka University, Osaka, Japan)
ABSTRACT
Safety monitoring is normally separated from the main construction processes and
relies on the site personnel’s knowledge and experiences. Most of project information is
presented based on a 2D paper format and is difficult to understand. The site personnel have
to convert the paper-based information and generate 3D mental pictures. They use the
converted information to track the safety measures, safety signs and workers in the actual
construction environment. This task is tedious and burdensome. Therefore, this paper
proposed the integrated and visualized system to assist the site personnel in safety monitoring
by using Augmented Reality (AR) technology. This technology can provide the specified
virtual information and superimpose into the real world scene. The safety protection for
preventing fall accidents is focused on. The prototype system was developed and tested in
both laboratory and real environment. The demonstrated results show the feasibility to
implement the proposed system in real construction project which the supervising personnel
can easily inspect and control the specified safety measures, safety signs, and personal
protective equipment.
Keywords: Augmented reality, construction safety, fall accident, safety monitoring
I. INTRODUCTION
Construction has its own characteristics that are different from the manufacturing.
Tasks and activities are always performed in an open area and exhibit variation in the
physical environment. Many tasks and activities are performed high from the ground
conditions. There is a potential for serious accidents in construction sites due to the following
causations: many people are close together, many activities are unpredictable, and the
INTERNATIONAL JOURNAL OF CIVIL ENGINEERING AND
TECHNOLOGY (IJCIET)
ISSN 0976 – 6308 (Print)
ISSN 0976 – 6316(Online)
Volume 4, Issue 2, March - April (2013), pp. 353-368
© IAEME: www.iaeme.com/ijciet.asp
Journal Impact Factor (2013): 5.3277 (Calculated by GISI)
www.jifactor.com
IJCIET
© IAEME
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
354
tolerance of risk is traditionally quite high, making the frequency and impact of unplanned
activities very high [1]. According to the cause codes of accidents in the construction industry
by OSHA, there are five basic cause codes, consisting of falls, being struck by an object,
caught in/between equipment or material, electric shock, and others [2]. The statistics on
occupational injuries and fatalities then show that falls and being struck by a moving or
flying/falling object are the top three accident causations in the construction industry [3]–[4].
In order to avoid accidents caused by falls or falling objects, preventive strategies such as
identifying the potential hazards, proper selection and use of safety protection system,
training in the workplace, and provision of adequate preventive equipment are necessary [5].
In order to prevent accidents and improve the level of safety in construction, various
safety management systems are implemented during project-execution phases. According to a
study of [6], safety management is the set of actions or procedures associated with health and
safety in the workplace. Three main tasks of safety management consist of hazard
identification, safety measure planning, and control. Not only these tasks, but safety
education and training are also other essential tasks for achieving a zero accident target.
However, in order to support construction personnel and to enhance the efficiency of safety
management, potential tools such as information technology are required. Therefore, many
previous studies have made an effort to suggest the implementation of information
technology in safety management processes.
II. SAFETY MONITORING
As mentioned above, the level of safety monitoring can be improved by implementing
the information technology, for example, reference [7] proposed automated monitoring and
control algorithms for detection of the guardrails in accordance with safety planning. The fall
hazards from the activities and areas in which these activities are performed were focused on.
The algorithms of the model were developed in a computer program written in VISUAL
BASIC (VB), AUTOCAD, and MS PROJECT. The outputs of this study showed that the
model can identify potential fall hazards and dangerous areas in real time and compare them
with the planning. Moreover, it can warn the site personnel regarding the existing safety
measures that have been missed or removed.
Reference [8] presented a real-time safety monitoring system which focused on the
reduction of fatal accidents caused by falls. This system consisted of a mobile sensing device,
transmitter sets and repeaters for sending the detected information to a receiver, and software
for interpreting the received information. In the experiment, when the workers entered a
defined dangerous area, the system automatically received the data and transmitted the
information to the main computer to inform the safety managers regarding hazardous
situations.
From the eleven construction sites observation in Thailand, superintendents normally
inspected working conditions and identified hazards based on their knowledge and
experience. Shop drawings and safety checklists sometimes were applied. If the worker wore
personnel protective equipment, the superintendents did not mention inspecting or providing
other safety measures. Most of the construction projects used their own checklist forms, such
as those for personnel protection equipment and safety system evaluation. However, these
forms contained rough details and were ineffective for monitoring safety at the construction
site. Normally, the site personnel used safety checklists to inspect their construction sites only
once a week. Nevertheless, this technique was not effective. It did not provide enough
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
355
information for safety execution and communication among project participants. Moreover, the
majority of the information is presented in a two-dimensional graphical or text-based paper
format. Construction personnel have to mentally interpret and understand the obtained project
information.
One of the advance visualization technologies is Augmented Reality (AR) which is
properly applied for information-intensive tasks which deal with information access and
communication [9]. This technology was deployed in many previous studies due to its potential
[10]-[12]. Therefore, this paper which proposes the innovative and visualized system to assist the
supervising personnel in the safety monitoring process for preventing fall accidents at
construction site, use the potential technology, called Augmented Reality.
III. PROPOSED SYSTEM ARCHITECTURE
The ideas to improve the monitoring process came from existing tools and documents
which were text based and rough description. To perform this task, it requires knowledge and
experience of site personnel to identify and track the safety protection system or personnel
protective equipment. The proposed system contained the purposes to assist the construction
personnel when they inspect the safety measures, signs, and workers at the actual construction
sites. Two important modules, which are monitoring module and augmented reality module, were
developed in the proposed system. Monitoring module consists of two following sub-modules
which are safe work area monitoring module and personal protection equipment module.
Database for storing 3D safety measures, safety signs, and worker information are also created.
The proposed system architecture is configured and shown in Fig. 1. This system provides
tangible safety information and combines it along with information about the current environment
by using augmented reality technology. The advantage of augmented reality is that visualization
of the virtual objects is superimposed with the actual environment in real time and at the real
location.
Fig.1 Proposed system architecture
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
356
The hardware components for developing this system consist of a laptop computer
and a web camera. The functionalities of each hardware component are described in Table 1.
Due to the specifications of Logitech B905, it was used in this study. The markers, which are
black square patterns, were prepared for tracking the process according to computer vision
algorithms. In order to develop the augmented reality application for the proposed system, the
following environments, Microsoft Visual Studio (C/C++ langage), ARToolKit [13],
DSVideo, GLUT, OpenVRML, OpenCV, IrrKlang, Freetype, and Directx, were required and
used. ARToolKit is a C and C++ language software library and is broadly used in academic
studies [14]–[15], for example, reference [16] presented the invisible height evaluation
system which can be used in the design process of future building to preserve the good
landscapes. This library allows programmers to easily develop augmented reality
applications. Moreover, it is low cost so that users can prepare only a simple web camera and
printed black square patterns. The ARToolKit uses computer vision techniques for
calculating the real camera position and orientation relative to marked cards, allowing the
programmers to overlay virtual objects onto these marked cards.
Table 1 Hardware components
Functionality Hardware component Specifications
Video capturing Web camera Logitech B905
Application
processing
Laptop Lenovo IdeaPad Y430
Processor: Intel Core 2 Duo T5800/2.0
GHz
Memory: 3.0 GB/4.0 GB(max)
Display type: 14.1 inch TFT active matrix
Graphic processor: Intel GMA 4500MHD
Dynamic Video Memory Technology 5.0
Audio: sound card
Video output Laptop screen
Sound output Laptop speaker
User input Laptop keyboard and
touchpad (mouse is
optional)
IV. 3D MODELS PREPARATION
Not only were computer graphics generated by using the OpenGL used in this
proposed system, but the 3D modeling created by other software was also applied. According
to the construction site survey, the supervising personnel produced the shop drawings of
safety measures by hand sketching, as shown in Fig. 2. These drawings only present the top
and side views of safety measures. In fact, the safety measure components comprise steel
frames, platforms, and top guardrails. The details of safety measures such as material and size
should also be presented. 3D modeling is implemented to develop safety measures which are
assigned to the location of working areas according to safety planning. Not only 3D models,
but also 2D images are developed to represent the essential caution signs at the construction
site. These virtual construction signs are arranged for the workplace, and the site personnel
can use the prototype system to inspect and compare them with real practices.
The 3D models of safety measures were generated by using CAD software called
“Autodesk Revit Architecture” according to the shop drawings. Currently, this software is
one of the famous software for creating building information modeling (BIM) and a fully-
parametric solid modeler. It can produce complex shapes. Fig. 3 shows an example of the 3D
safety measures which were created by using the Autodesk Revit Architecture. The user can
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
357
visualize the 3D models from many viewpoints. After creating the 3D models, they were
exported from the Revit format (.rfa file) to the CAD format (.dwg file).
Fig. 2 Example of shop drawing of safety measures
Fig. 3 Example of a 3D model of a safety measure generated with CAD software
The exported 3D models were imported into the 3D software such as “Autodesk 3D
Max.” This importing process was done in order to modify and add more information, such
as the color of the models and a description of the safety measures as shown in Fig. 4 and 5.
Fig. 5 presents an example of the 3D safety measures of a housing project, which was a
sample of real experiment testing. The 3D safety measures were created based on the
minimum requirements of Thailand’s laws and regulations. The height of the top handrail and
length of the guardrail were 0.95 m. and 3.40 m. respectively. Moreover, a middle guardrail
and toe board were also created. In order to use these 3D models in the AR application, they
required to be converted into the Virtual Reality Modeling Language (VRML) format (.wrl
file). VRML is a text file format where vertices and edges for a 3D polygon can be specified,
along with the surface color, shininess, transparency, and so on.
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
358
Fig. 4 Example of 3D model imported into Autodesk 3D Max
Fig. 5 Example of 3D model with description
V. PROTOTYPE DEVELOPMENT
As mentioned above, monitoring and control are among the main tasks of safety
management. Therefore, this system provides a monitoring module for helping the
construction personnel to effectively perform this task. The monitoring module was divided
into the following sub-modules: working area monitoring and personal protection equipment
monitoring, as shown in Fig. 6. The details of each sub-module are described as follows.
Fig. 6 User interface of monitoring module
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
359
5.1 Sub-module of safe work area monitoring
The first sub-module of the monitoring module was safe work area monitoring, which
was developed to assist the site personnel when they inspect safety at the construction site.
This sub-module was separated into two applications: monitoring for safety measures and
monitoring for safety signs as presented in Fig. 7.
In the first application, normally the construction personnel monitor the safety
measures at the construction site by using simple checklists according to the safety plan.
However, the safety measures are not specified in the checklists or drawings concerning type,
number, and size for assisting the site personnel in monitoring. Hence, the idea for improving
the monitoring process by providing efficient tools was initiated. The four steps for
developing the prototype application were done as shown in Fig. 8. In the preparation step,
the 3D models of safety measures were created as described in the previous section.
Simultaneously, the sets of markers were also prepared. Then text files containing the list of
markers and 3D models of safety measures were created and loaded into the prototype
application. Later, the application processes according to the ARToolKit steps and renders
the 3D models of the safety measures for the markers in accordance with the defined list. Fig.
9 presents the user interface of the safety measure monitoring where the user can press the
AR display button to view the output result. Additionally, the layout of marker was
displayed, as shown in Fig. 10, after the user pressed the button to view it.
Fig. 7 User interface of sub-module of safe work area monitoring
An example of an output window of safety measure monitoring is illustrated in Fig.
11. In this figure, 3D models of guardrails were rendered with information, such as shape and
size. Due to the requirements of the laws and regulations, not only should guardrails be
installed to protect against fall hazards, but toe boards should also be installed to prevent
falling object hazards, as demonstrated in the example.
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
360
Fig. 8 Flowchart of application of safety measure monitoring
Fig. 9 user interface of safety measure monitoring
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
361
Fig. 10 Example of marker layout on the 2nd floor plan of building
Fig. 11 Example of output window for safety measure monitoring
The second application of the safe work area monitoring sub-module is safety sign
monitoring. To prevent accidents at a construction site, providing safety measures are not the
only effective approach; providing safety signs also helps. As seen in the previous discussion,
the safety signs should be monitored by the supervising personnel to ensure that safety signs
are installed at the proper location to warn the involved personnel. These signs should be
particularly designated when safety planning is developed. Later, it is effortless for the safety
inspectors that check for and monitor unsafe conditions. Therefore, a prototype application
was developed for this purpose.
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
362
Similarly, four steps in developing the AR application for safety sign monitoring were
performed as presented in Fig.12. At the beginning, 2D image files representing each safety
sign were created in the preparation step. Each marker represented one image of a safety sign.
After detecting the marker and calculating the camera transformation, the 2D image of safety
sign was displayed in accordance with the pattern on the marker. The user interface for
running this application is presented in Fig. 13. The prototype application rendered the output
window as shown in Fig. 14. In this figure, three safety sign images (dangerous area,
construction area, and walkway) were displayed. After the safety inspectors see the virtual
safety signs, they can check the real safety signs in the area and also monitor the workers as
to whether they performed the tasks as the safety signs recommended.
Fig. 12 Flowchart of application for safety sign monitoring
Fig. 13 user interface of safety sign monitoring
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
363
Fig. 14 Example of output window for safety sign monitoring
5.2 Sub-module of personal protective equipment monitoring
Personal protective equipment monitoring was the second sub-module of monitoring
module developed for assisting the superintendents in monitoring the proper personal
protective equipment of the workers in the work areas. The workers can be instructed by the
supervisors to wear the appropriate equipment before starting or continuing their work. In this
prototype application, fall hazards when workers perform construction activities were mainly
focused on.
This application also consists of the following four steps: preparation, input, process,
and output, as shown in Fig. 15. For the preparation step, markers and 2D images containing
the workers’ information were prepared as with other applications. Furthermore, a database
containing information on the individual worker, such as injury records, training course,
current job and location, and required personal protective equipment for current job, was
created by using MySQL Workbench. Afterwards, a text file containing the list of marker
files and 2D image files were loaded while the database file was retrieved.
The markers were printed out and installed on the workers’ clothes. The user interface
of the personal protective equipment sub-module is presented in Fig. 16. The user could
update both marker file and database file by pressing the buttons in the interface. The
application processes for rendering the virtual information of the workers according to
ARToolKit steps were capturing the video input frame, detecting and identifying the markers,
calculating camera transformation, and loading 2D images files and worker information into
the database file. Then, the output windows were displayed, as shown in Fig. 17 and Fig.
18(a) to 18(d). Workers’ information, such as name, age, position, was also provided both in
the 2D image and the text information on the screen. The safety inspectors could compare the
photo of the worker and other information on the 2D image with the text information on the
screen to identify the worker.
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
364
Fig. 15 Flowchart of application for personal protective equipment monitoring
Fig. 16 User interface of personal protective equipment monitoring
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
365
Fig. 17 Example of output window for the sub-module of personal protection equipment
monitoring
(a) (b)
(c) (d)
Fig. 18 Example of output windows for presenting worker information
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
366
VI. TESTING
In the laboratory testing, the outputs of the prototype applications, such as safety
measure preparation and safety measure monitoring, were correctly rendered as expected.
However, the proposed system intended to provide the virtual objects in a real world scene to
support construction personnel in carrying out safety management at actual construction sites.
Therefore, the testing of the function for presenting the virtual objects was carried out.
The virtual objects were created as described in the previous section. The marker unit
in the text file and the scale of the virtual objects were points of concern. The marker size,
which used in the experiments, was 0.3 m. In Fig. 19, the guardrail with a toe board
containing information about the dimension was rendered in the output screen, and Fig. 20
demonstrates two options for a guardrail on the stairway.
Fig. 19 Example of 3D virtual guardrail with toe board
Fig. 20 Examples of 3D virtual guardrails in the required position
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
367
VII. CONCLUSIONS
Due to inherent hazards at the construction sites, safety monitoring is the important
tasks to prevent accidents. To perform this task, it requires knowledge and experience of site
personnel to identify and track the safety protection system or personnel protective
equipment. The innovative and visualized system, which is developed in this study, aims to
assist the site personnel to monitor working area and worker for preventing falling accidents.
The advance visualization technology, named Augmented Reality, was implemented to
provide the virtual information which is superimposed in the real world scene. Two main
modules in the proposed system consist of monitoring module and augmented reality module.
In monitoring module, there are two following sub-modules: 1) safe work area monitoring
and 2) personal protective equipment monitoring. The first sub-module presented the safety
measures and safety signs which should be installed in the specified area. In the second sub-
module, the worker information and required personal protective equipment for each worker
are illustrated. This prototype system was tested in laboratory and real environment. The
results show it is feasible to provide the required safety information and assist the site
personnel in the safety monitoring process.
VIII. ACKNOWLEDGEMENTS
This research is supported by the Faculty Development Scholarship of the
Commission on Higher Education of Thailand with collaboration of AUN/SEED-Net.
REFERENCES
[1] P. Fewings, Construction Project Management: an Integrated Approach (Taylor &
Francis, London, 2005).
[2] J. Hinze, C. Pederson, and J. Fredley, Identifying Root Causes of Construction
Injuries. Journal of Construction Engineering and Management, 124(1), 1998, 67–71.
[3] R. A. Haslam, et al., Contributing factors in construction accidents, Journal of
Applied Ergonomics, 36, 2005, 401-415.
[4] K. Srinavin, Characteristics of accidents on construction work in Thailand and
prevention guide, CIB World Building Congress ‘Construction for Development’, Cape
Town, South Africa, 2007.
[5] Janicak, C. A., Fall related deaths in the construction industry, Journal of Safety
Research, 29(1), 1998, 35-42.
[6] V. Benjaoran, and S. Bhokha, An integrated safety management with construction
management using 4D CAD model, Journal of Safety Science, 48(3), 2009, 395–403.
[7] R. Navon, and O. Kolton, Algorithms for automated monitoring and control of fall
hazards, Journal of computing in civil engineering, 21(1), 2007, 21-28.
[8] U. K. Lee, J. H. Kim, H. Cho, and K. I. Kang, Development of a mobile safety
monitoring system for construction sites, Journal of Automation in Construction, 18, 2009,
258–264.
[9] X., Wang, and P. S. Dunston, Compatibility issues in Augmented Reality Systems for
AEC: An Experimental Prototype Study, Journal of Automation in Construction, 15, 2006,
314-326
International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308
(Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME
368
[10] A. Webster, S. Feiner, B. MacIntyre, W. Massie, and T. Krueger, Augmented reality
in architectural construction, inspection, and renovation, Proc. ASCE Third Congress on
Computing in Civil Engineering. Anaheim, California, USA, 1996, 913-919.
[11] G. Schall, E. Mendez, and D. Schmalstieg, Virtual redlining for civil engineering in
real environments, IEEE International Symposium on Mixed and Augmented Reality,
Cambridge, UK, 2008.
[12] A. H.Behzadan, and V. R. Kamat, Interactive augmented reality visualization for
improved damage prevention and maintenance of underground infrastructure, Construction
Research Congress, 2009.
[13] HIT Lab., ARToolkit[Online], Available from: www.hitl.washington.edu/artoolkit/
[2009, November 20].
[14] N. Yabuki, and Z. Li, Cooperative reinforcing bar arrangement and checking by using
augmented reality, CDVE 2007, LNCS 4674, 2007, 50-57.
[15] N. Ota, N. Yabuki, T. Fukuda, Development of an accurate positioning method for
augmented reality using multiple markers, Proc. of the international conference on computing
in civil and building engineering – 2010, Nottingham, UK, 2010.
[16] N. Yabuki, K. Miyashita, and T. Fukuda, An invisible height evaluation system for
building height regulation to preserve good landscapes using augmented reality, Journal of
Automation in Construction, 20, 2011, 228-235.
[17] Prof. P. B. Alappanavar, Ankeeta Bhujbal and Shantanu Deshmukh, “Location Based
Services using Augmented Reality”, International journal of Computer Engineering &
Technology (IJCET), Volume 4, Issue 2, 2013, pp. 237 - 240, ISSN Print: 0976 – 6367, ISSN
Online: 0976 – 6375.
[18] Shaik Abdul Khader Jeelani, Dr.J.Karthikeyan and Dr.Adel S.Aldosary, “Performance
Evaluation of Design-Build (D-B) Projects with and without Agency Construction
Management”, International Journal of Civil Engineering & Technology (IJCIET), Volume 3,
Issue 2, 2012, pp. 265 - 278, ISSN Print: 0976 – 6308, ISSN Online: 0976 – 6316.

Weitere ähnliche Inhalte

Was ist angesagt?

Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...IRJET Journal
 
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET Journal
 
ANALYSIS MODEL OF MASTER PLAN FIRE PROTECTION SYSTEM IN BUILDING AND ENVIRONM...
ANALYSIS MODEL OF MASTER PLAN FIRE PROTECTION SYSTEM IN BUILDING AND ENVIRONM...ANALYSIS MODEL OF MASTER PLAN FIRE PROTECTION SYSTEM IN BUILDING AND ENVIRONM...
ANALYSIS MODEL OF MASTER PLAN FIRE PROTECTION SYSTEM IN BUILDING AND ENVIRONM...IAEME Publication
 
Leveraging ArcGIS to Enable Public Health Surveillance of Work-Related Injuries
Leveraging ArcGIS to Enable Public Health Surveillance of Work-Related InjuriesLeveraging ArcGIS to Enable Public Health Surveillance of Work-Related Injuries
Leveraging ArcGIS to Enable Public Health Surveillance of Work-Related InjuriesChristopher Bell, MSHI, CAPM, CHTS-IM
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...IRJET Journal
 
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET Journal
 
Additive Manufacturing - Cyber Security - Briefing
Additive Manufacturing - Cyber Security - BriefingAdditive Manufacturing - Cyber Security - Briefing
Additive Manufacturing - Cyber Security - BriefingMachine Tool Systems Inc.
 
IRJET- Disaster Management System using Web
IRJET-  	  Disaster Management System using WebIRJET-  	  Disaster Management System using Web
IRJET- Disaster Management System using WebIRJET Journal
 
Aplicación ergonómica metologia rosa Sonne et al., 2011
Aplicación ergonómica metologia rosa Sonne et al., 2011Aplicación ergonómica metologia rosa Sonne et al., 2011
Aplicación ergonómica metologia rosa Sonne et al., 2011Home
 
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionSecurity by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionIRJET Journal
 
BUILDING INFORMATICS: REVIEW OF SELECTED INFORMATICS PLATFORM AND VALIDATING ...
BUILDING INFORMATICS: REVIEW OF SELECTED INFORMATICS PLATFORM AND VALIDATING ...BUILDING INFORMATICS: REVIEW OF SELECTED INFORMATICS PLATFORM AND VALIDATING ...
BUILDING INFORMATICS: REVIEW OF SELECTED INFORMATICS PLATFORM AND VALIDATING ...IAEME Publication
 

Was ist angesagt? (12)

Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
 
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human Life
 
ANALYSIS MODEL OF MASTER PLAN FIRE PROTECTION SYSTEM IN BUILDING AND ENVIRONM...
ANALYSIS MODEL OF MASTER PLAN FIRE PROTECTION SYSTEM IN BUILDING AND ENVIRONM...ANALYSIS MODEL OF MASTER PLAN FIRE PROTECTION SYSTEM IN BUILDING AND ENVIRONM...
ANALYSIS MODEL OF MASTER PLAN FIRE PROTECTION SYSTEM IN BUILDING AND ENVIRONM...
 
Leveraging ArcGIS to Enable Public Health Surveillance of Work-Related Injuries
Leveraging ArcGIS to Enable Public Health Surveillance of Work-Related InjuriesLeveraging ArcGIS to Enable Public Health Surveillance of Work-Related Injuries
Leveraging ArcGIS to Enable Public Health Surveillance of Work-Related Injuries
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
 
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human Life
 
Additive Manufacturing - Cyber Security - Briefing
Additive Manufacturing - Cyber Security - BriefingAdditive Manufacturing - Cyber Security - Briefing
Additive Manufacturing - Cyber Security - Briefing
 
IRJET- Disaster Management System using Web
IRJET-  	  Disaster Management System using WebIRJET-  	  Disaster Management System using Web
IRJET- Disaster Management System using Web
 
Aplicación ergonómica metologia rosa Sonne et al., 2011
Aplicación ergonómica metologia rosa Sonne et al., 2011Aplicación ergonómica metologia rosa Sonne et al., 2011
Aplicación ergonómica metologia rosa Sonne et al., 2011
 
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionSecurity by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
 
BUILDING INFORMATICS: REVIEW OF SELECTED INFORMATICS PLATFORM AND VALIDATING ...
BUILDING INFORMATICS: REVIEW OF SELECTED INFORMATICS PLATFORM AND VALIDATING ...BUILDING INFORMATICS: REVIEW OF SELECTED INFORMATICS PLATFORM AND VALIDATING ...
BUILDING INFORMATICS: REVIEW OF SELECTED INFORMATICS PLATFORM AND VALIDATING ...
 
term paper 1
term paper 1term paper 1
term paper 1
 

Andere mochten auch

Framework for assessment of shear strength parameters of
Framework for assessment of shear strength parameters ofFramework for assessment of shear strength parameters of
Framework for assessment of shear strength parameters ofIAEME Publication
 
IJOAR Journal of Civil Engineering
IJOAR Journal of Civil EngineeringIJOAR Journal of Civil Engineering
IJOAR Journal of Civil EngineeringIJOAR
 
Effect of vertical cross sectional shape of foundation and soil reinforcement
Effect of vertical cross sectional shape of foundation and soil reinforcementEffect of vertical cross sectional shape of foundation and soil reinforcement
Effect of vertical cross sectional shape of foundation and soil reinforcementIAEME Publication
 
Feasibility study of metro transport case study madurai
Feasibility study of metro transport case study maduraiFeasibility study of metro transport case study madurai
Feasibility study of metro transport case study maduraiIAEME Publication
 
indian infrastructure and pune metro project (feasibility analysis)
indian infrastructure and pune metro project (feasibility analysis)indian infrastructure and pune metro project (feasibility analysis)
indian infrastructure and pune metro project (feasibility analysis)Gurjit Kaur Kaler
 
Ahmedabad Metro Project
Ahmedabad Metro ProjectAhmedabad Metro Project
Ahmedabad Metro ProjectASHISH SINGH
 

Andere mochten auch (8)

Framework for assessment of shear strength parameters of
Framework for assessment of shear strength parameters ofFramework for assessment of shear strength parameters of
Framework for assessment of shear strength parameters of
 
IJOAR Journal of Civil Engineering
IJOAR Journal of Civil EngineeringIJOAR Journal of Civil Engineering
IJOAR Journal of Civil Engineering
 
Effect of vertical cross sectional shape of foundation and soil reinforcement
Effect of vertical cross sectional shape of foundation and soil reinforcementEffect of vertical cross sectional shape of foundation and soil reinforcement
Effect of vertical cross sectional shape of foundation and soil reinforcement
 
Feasibility study of metro transport case study madurai
Feasibility study of metro transport case study maduraiFeasibility study of metro transport case study madurai
Feasibility study of metro transport case study madurai
 
indian infrastructure and pune metro project (feasibility analysis)
indian infrastructure and pune metro project (feasibility analysis)indian infrastructure and pune metro project (feasibility analysis)
indian infrastructure and pune metro project (feasibility analysis)
 
Ahmedabad Metro Project
Ahmedabad Metro ProjectAhmedabad Metro Project
Ahmedabad Metro Project
 
Feasibility Report of Hyd Metro
Feasibility Report of Hyd MetroFeasibility Report of Hyd Metro
Feasibility Report of Hyd Metro
 
Ijmet 07 06_005
Ijmet 07 06_005Ijmet 07 06_005
Ijmet 07 06_005
 

Ähnlich wie Safety monitoring to prevent fall accidents at construction site

IRJET- Effective Safety Management in Construction
IRJET-  	  Effective Safety Management in ConstructionIRJET-  	  Effective Safety Management in Construction
IRJET- Effective Safety Management in ConstructionIRJET Journal
 
Security Introspection for Software Reuse
Security Introspection for Software ReuseSecurity Introspection for Software Reuse
Security Introspection for Software ReuseIRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial deviceIJNSA Journal
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
Management of the building site
Management of the building siteManagement of the building site
Management of the building siteeSAT Journals
 
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOTSMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOTIRJET Journal
 
Internet of Things (Iot) Kit for Human Head Safety in Construction Project
Internet of Things (Iot) Kit for Human Head Safety in Construction ProjectInternet of Things (Iot) Kit for Human Head Safety in Construction Project
Internet of Things (Iot) Kit for Human Head Safety in Construction ProjectIRJET Journal
 
M0364073079
M0364073079M0364073079
M0364073079theijes
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...IJNSA Journal
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...IJNSA Journal
 
IoT Based Human Activity Recognition and Classification Using Machine Learning
IoT Based Human Activity Recognition and Classification Using Machine LearningIoT Based Human Activity Recognition and Classification Using Machine Learning
IoT Based Human Activity Recognition and Classification Using Machine LearningIRJET Journal
 
IRJET- Biometric Vehicle Starter and Security
IRJET-  	  Biometric Vehicle Starter and SecurityIRJET-  	  Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and SecurityIRJET Journal
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesRaja Ram
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...IRJET Journal
 
GYM MANAGEMENT SYSTEM USING AUGMENTED REALITY
GYM MANAGEMENT SYSTEM USING AUGMENTED REALITYGYM MANAGEMENT SYSTEM USING AUGMENTED REALITY
GYM MANAGEMENT SYSTEM USING AUGMENTED REALITYIRJET Journal
 
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...IJERDJOURNAL
 

Ähnlich wie Safety monitoring to prevent fall accidents at construction site (20)

IRJET- Effective Safety Management in Construction
IRJET-  	  Effective Safety Management in ConstructionIRJET-  	  Effective Safety Management in Construction
IRJET- Effective Safety Management in Construction
 
Security Introspection for Software Reuse
Security Introspection for Software ReuseSecurity Introspection for Software Reuse
Security Introspection for Software Reuse
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial device
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
Management of the building site
Management of the building siteManagement of the building site
Management of the building site
 
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOTSMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
SMART INDUSTRY MONITORING AND CONROLLING SYSTEM USING IOT
 
Internet of Things (Iot) Kit for Human Head Safety in Construction Project
Internet of Things (Iot) Kit for Human Head Safety in Construction ProjectInternet of Things (Iot) Kit for Human Head Safety in Construction Project
Internet of Things (Iot) Kit for Human Head Safety in Construction Project
 
PAVAN SEMINAR 001.pptx
PAVAN SEMINAR 001.pptxPAVAN SEMINAR 001.pptx
PAVAN SEMINAR 001.pptx
 
M0364073079
M0364073079M0364073079
M0364073079
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
 
IoT Based Human Activity Recognition and Classification Using Machine Learning
IoT Based Human Activity Recognition and Classification Using Machine LearningIoT Based Human Activity Recognition and Classification Using Machine Learning
IoT Based Human Activity Recognition and Classification Using Machine Learning
 
IRJET- Biometric Vehicle Starter and Security
IRJET-  	  Biometric Vehicle Starter and SecurityIRJET-  	  Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and Security
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 
GYM MANAGEMENT SYSTEM USING AUGMENTED REALITY
GYM MANAGEMENT SYSTEM USING AUGMENTED REALITYGYM MANAGEMENT SYSTEM USING AUGMENTED REALITY
GYM MANAGEMENT SYSTEM USING AUGMENTED REALITY
 
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Kürzlich hochgeladen (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Safety monitoring to prevent fall accidents at construction site

  • 1. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 353 SAFETY MONITORING TO PREVENT FALL ACCIDENTS AT CONSTRUCTION SITE USING AUGMENTED REALITY Petcharat Limsupreeyarat1 , Tanit Tongthong1 , Nobuyoshi Yabuki2 1 (Department of Civil Engineering, Chulalongkorn University, Bangkok, Thailand) 2 (Department of Civil Engineering, Chulalongkorn University, Bangkok, Thailand) 3 (Division of Sustainable Energy and Environmental Engineering, Osaka University, Osaka, Japan) ABSTRACT Safety monitoring is normally separated from the main construction processes and relies on the site personnel’s knowledge and experiences. Most of project information is presented based on a 2D paper format and is difficult to understand. The site personnel have to convert the paper-based information and generate 3D mental pictures. They use the converted information to track the safety measures, safety signs and workers in the actual construction environment. This task is tedious and burdensome. Therefore, this paper proposed the integrated and visualized system to assist the site personnel in safety monitoring by using Augmented Reality (AR) technology. This technology can provide the specified virtual information and superimpose into the real world scene. The safety protection for preventing fall accidents is focused on. The prototype system was developed and tested in both laboratory and real environment. The demonstrated results show the feasibility to implement the proposed system in real construction project which the supervising personnel can easily inspect and control the specified safety measures, safety signs, and personal protective equipment. Keywords: Augmented reality, construction safety, fall accident, safety monitoring I. INTRODUCTION Construction has its own characteristics that are different from the manufacturing. Tasks and activities are always performed in an open area and exhibit variation in the physical environment. Many tasks and activities are performed high from the ground conditions. There is a potential for serious accidents in construction sites due to the following causations: many people are close together, many activities are unpredictable, and the INTERNATIONAL JOURNAL OF CIVIL ENGINEERING AND TECHNOLOGY (IJCIET) ISSN 0976 – 6308 (Print) ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), pp. 353-368 © IAEME: www.iaeme.com/ijciet.asp Journal Impact Factor (2013): 5.3277 (Calculated by GISI) www.jifactor.com IJCIET © IAEME
  • 2. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 354 tolerance of risk is traditionally quite high, making the frequency and impact of unplanned activities very high [1]. According to the cause codes of accidents in the construction industry by OSHA, there are five basic cause codes, consisting of falls, being struck by an object, caught in/between equipment or material, electric shock, and others [2]. The statistics on occupational injuries and fatalities then show that falls and being struck by a moving or flying/falling object are the top three accident causations in the construction industry [3]–[4]. In order to avoid accidents caused by falls or falling objects, preventive strategies such as identifying the potential hazards, proper selection and use of safety protection system, training in the workplace, and provision of adequate preventive equipment are necessary [5]. In order to prevent accidents and improve the level of safety in construction, various safety management systems are implemented during project-execution phases. According to a study of [6], safety management is the set of actions or procedures associated with health and safety in the workplace. Three main tasks of safety management consist of hazard identification, safety measure planning, and control. Not only these tasks, but safety education and training are also other essential tasks for achieving a zero accident target. However, in order to support construction personnel and to enhance the efficiency of safety management, potential tools such as information technology are required. Therefore, many previous studies have made an effort to suggest the implementation of information technology in safety management processes. II. SAFETY MONITORING As mentioned above, the level of safety monitoring can be improved by implementing the information technology, for example, reference [7] proposed automated monitoring and control algorithms for detection of the guardrails in accordance with safety planning. The fall hazards from the activities and areas in which these activities are performed were focused on. The algorithms of the model were developed in a computer program written in VISUAL BASIC (VB), AUTOCAD, and MS PROJECT. The outputs of this study showed that the model can identify potential fall hazards and dangerous areas in real time and compare them with the planning. Moreover, it can warn the site personnel regarding the existing safety measures that have been missed or removed. Reference [8] presented a real-time safety monitoring system which focused on the reduction of fatal accidents caused by falls. This system consisted of a mobile sensing device, transmitter sets and repeaters for sending the detected information to a receiver, and software for interpreting the received information. In the experiment, when the workers entered a defined dangerous area, the system automatically received the data and transmitted the information to the main computer to inform the safety managers regarding hazardous situations. From the eleven construction sites observation in Thailand, superintendents normally inspected working conditions and identified hazards based on their knowledge and experience. Shop drawings and safety checklists sometimes were applied. If the worker wore personnel protective equipment, the superintendents did not mention inspecting or providing other safety measures. Most of the construction projects used their own checklist forms, such as those for personnel protection equipment and safety system evaluation. However, these forms contained rough details and were ineffective for monitoring safety at the construction site. Normally, the site personnel used safety checklists to inspect their construction sites only once a week. Nevertheless, this technique was not effective. It did not provide enough
  • 3. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 355 information for safety execution and communication among project participants. Moreover, the majority of the information is presented in a two-dimensional graphical or text-based paper format. Construction personnel have to mentally interpret and understand the obtained project information. One of the advance visualization technologies is Augmented Reality (AR) which is properly applied for information-intensive tasks which deal with information access and communication [9]. This technology was deployed in many previous studies due to its potential [10]-[12]. Therefore, this paper which proposes the innovative and visualized system to assist the supervising personnel in the safety monitoring process for preventing fall accidents at construction site, use the potential technology, called Augmented Reality. III. PROPOSED SYSTEM ARCHITECTURE The ideas to improve the monitoring process came from existing tools and documents which were text based and rough description. To perform this task, it requires knowledge and experience of site personnel to identify and track the safety protection system or personnel protective equipment. The proposed system contained the purposes to assist the construction personnel when they inspect the safety measures, signs, and workers at the actual construction sites. Two important modules, which are monitoring module and augmented reality module, were developed in the proposed system. Monitoring module consists of two following sub-modules which are safe work area monitoring module and personal protection equipment module. Database for storing 3D safety measures, safety signs, and worker information are also created. The proposed system architecture is configured and shown in Fig. 1. This system provides tangible safety information and combines it along with information about the current environment by using augmented reality technology. The advantage of augmented reality is that visualization of the virtual objects is superimposed with the actual environment in real time and at the real location. Fig.1 Proposed system architecture
  • 4. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 356 The hardware components for developing this system consist of a laptop computer and a web camera. The functionalities of each hardware component are described in Table 1. Due to the specifications of Logitech B905, it was used in this study. The markers, which are black square patterns, were prepared for tracking the process according to computer vision algorithms. In order to develop the augmented reality application for the proposed system, the following environments, Microsoft Visual Studio (C/C++ langage), ARToolKit [13], DSVideo, GLUT, OpenVRML, OpenCV, IrrKlang, Freetype, and Directx, were required and used. ARToolKit is a C and C++ language software library and is broadly used in academic studies [14]–[15], for example, reference [16] presented the invisible height evaluation system which can be used in the design process of future building to preserve the good landscapes. This library allows programmers to easily develop augmented reality applications. Moreover, it is low cost so that users can prepare only a simple web camera and printed black square patterns. The ARToolKit uses computer vision techniques for calculating the real camera position and orientation relative to marked cards, allowing the programmers to overlay virtual objects onto these marked cards. Table 1 Hardware components Functionality Hardware component Specifications Video capturing Web camera Logitech B905 Application processing Laptop Lenovo IdeaPad Y430 Processor: Intel Core 2 Duo T5800/2.0 GHz Memory: 3.0 GB/4.0 GB(max) Display type: 14.1 inch TFT active matrix Graphic processor: Intel GMA 4500MHD Dynamic Video Memory Technology 5.0 Audio: sound card Video output Laptop screen Sound output Laptop speaker User input Laptop keyboard and touchpad (mouse is optional) IV. 3D MODELS PREPARATION Not only were computer graphics generated by using the OpenGL used in this proposed system, but the 3D modeling created by other software was also applied. According to the construction site survey, the supervising personnel produced the shop drawings of safety measures by hand sketching, as shown in Fig. 2. These drawings only present the top and side views of safety measures. In fact, the safety measure components comprise steel frames, platforms, and top guardrails. The details of safety measures such as material and size should also be presented. 3D modeling is implemented to develop safety measures which are assigned to the location of working areas according to safety planning. Not only 3D models, but also 2D images are developed to represent the essential caution signs at the construction site. These virtual construction signs are arranged for the workplace, and the site personnel can use the prototype system to inspect and compare them with real practices. The 3D models of safety measures were generated by using CAD software called “Autodesk Revit Architecture” according to the shop drawings. Currently, this software is one of the famous software for creating building information modeling (BIM) and a fully- parametric solid modeler. It can produce complex shapes. Fig. 3 shows an example of the 3D safety measures which were created by using the Autodesk Revit Architecture. The user can
  • 5. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 357 visualize the 3D models from many viewpoints. After creating the 3D models, they were exported from the Revit format (.rfa file) to the CAD format (.dwg file). Fig. 2 Example of shop drawing of safety measures Fig. 3 Example of a 3D model of a safety measure generated with CAD software The exported 3D models were imported into the 3D software such as “Autodesk 3D Max.” This importing process was done in order to modify and add more information, such as the color of the models and a description of the safety measures as shown in Fig. 4 and 5. Fig. 5 presents an example of the 3D safety measures of a housing project, which was a sample of real experiment testing. The 3D safety measures were created based on the minimum requirements of Thailand’s laws and regulations. The height of the top handrail and length of the guardrail were 0.95 m. and 3.40 m. respectively. Moreover, a middle guardrail and toe board were also created. In order to use these 3D models in the AR application, they required to be converted into the Virtual Reality Modeling Language (VRML) format (.wrl file). VRML is a text file format where vertices and edges for a 3D polygon can be specified, along with the surface color, shininess, transparency, and so on.
  • 6. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 358 Fig. 4 Example of 3D model imported into Autodesk 3D Max Fig. 5 Example of 3D model with description V. PROTOTYPE DEVELOPMENT As mentioned above, monitoring and control are among the main tasks of safety management. Therefore, this system provides a monitoring module for helping the construction personnel to effectively perform this task. The monitoring module was divided into the following sub-modules: working area monitoring and personal protection equipment monitoring, as shown in Fig. 6. The details of each sub-module are described as follows. Fig. 6 User interface of monitoring module
  • 7. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 359 5.1 Sub-module of safe work area monitoring The first sub-module of the monitoring module was safe work area monitoring, which was developed to assist the site personnel when they inspect safety at the construction site. This sub-module was separated into two applications: monitoring for safety measures and monitoring for safety signs as presented in Fig. 7. In the first application, normally the construction personnel monitor the safety measures at the construction site by using simple checklists according to the safety plan. However, the safety measures are not specified in the checklists or drawings concerning type, number, and size for assisting the site personnel in monitoring. Hence, the idea for improving the monitoring process by providing efficient tools was initiated. The four steps for developing the prototype application were done as shown in Fig. 8. In the preparation step, the 3D models of safety measures were created as described in the previous section. Simultaneously, the sets of markers were also prepared. Then text files containing the list of markers and 3D models of safety measures were created and loaded into the prototype application. Later, the application processes according to the ARToolKit steps and renders the 3D models of the safety measures for the markers in accordance with the defined list. Fig. 9 presents the user interface of the safety measure monitoring where the user can press the AR display button to view the output result. Additionally, the layout of marker was displayed, as shown in Fig. 10, after the user pressed the button to view it. Fig. 7 User interface of sub-module of safe work area monitoring An example of an output window of safety measure monitoring is illustrated in Fig. 11. In this figure, 3D models of guardrails were rendered with information, such as shape and size. Due to the requirements of the laws and regulations, not only should guardrails be installed to protect against fall hazards, but toe boards should also be installed to prevent falling object hazards, as demonstrated in the example.
  • 8. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 360 Fig. 8 Flowchart of application of safety measure monitoring Fig. 9 user interface of safety measure monitoring
  • 9. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 361 Fig. 10 Example of marker layout on the 2nd floor plan of building Fig. 11 Example of output window for safety measure monitoring The second application of the safe work area monitoring sub-module is safety sign monitoring. To prevent accidents at a construction site, providing safety measures are not the only effective approach; providing safety signs also helps. As seen in the previous discussion, the safety signs should be monitored by the supervising personnel to ensure that safety signs are installed at the proper location to warn the involved personnel. These signs should be particularly designated when safety planning is developed. Later, it is effortless for the safety inspectors that check for and monitor unsafe conditions. Therefore, a prototype application was developed for this purpose.
  • 10. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 362 Similarly, four steps in developing the AR application for safety sign monitoring were performed as presented in Fig.12. At the beginning, 2D image files representing each safety sign were created in the preparation step. Each marker represented one image of a safety sign. After detecting the marker and calculating the camera transformation, the 2D image of safety sign was displayed in accordance with the pattern on the marker. The user interface for running this application is presented in Fig. 13. The prototype application rendered the output window as shown in Fig. 14. In this figure, three safety sign images (dangerous area, construction area, and walkway) were displayed. After the safety inspectors see the virtual safety signs, they can check the real safety signs in the area and also monitor the workers as to whether they performed the tasks as the safety signs recommended. Fig. 12 Flowchart of application for safety sign monitoring Fig. 13 user interface of safety sign monitoring
  • 11. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 363 Fig. 14 Example of output window for safety sign monitoring 5.2 Sub-module of personal protective equipment monitoring Personal protective equipment monitoring was the second sub-module of monitoring module developed for assisting the superintendents in monitoring the proper personal protective equipment of the workers in the work areas. The workers can be instructed by the supervisors to wear the appropriate equipment before starting or continuing their work. In this prototype application, fall hazards when workers perform construction activities were mainly focused on. This application also consists of the following four steps: preparation, input, process, and output, as shown in Fig. 15. For the preparation step, markers and 2D images containing the workers’ information were prepared as with other applications. Furthermore, a database containing information on the individual worker, such as injury records, training course, current job and location, and required personal protective equipment for current job, was created by using MySQL Workbench. Afterwards, a text file containing the list of marker files and 2D image files were loaded while the database file was retrieved. The markers were printed out and installed on the workers’ clothes. The user interface of the personal protective equipment sub-module is presented in Fig. 16. The user could update both marker file and database file by pressing the buttons in the interface. The application processes for rendering the virtual information of the workers according to ARToolKit steps were capturing the video input frame, detecting and identifying the markers, calculating camera transformation, and loading 2D images files and worker information into the database file. Then, the output windows were displayed, as shown in Fig. 17 and Fig. 18(a) to 18(d). Workers’ information, such as name, age, position, was also provided both in the 2D image and the text information on the screen. The safety inspectors could compare the photo of the worker and other information on the 2D image with the text information on the screen to identify the worker.
  • 12. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 364 Fig. 15 Flowchart of application for personal protective equipment monitoring Fig. 16 User interface of personal protective equipment monitoring
  • 13. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 365 Fig. 17 Example of output window for the sub-module of personal protection equipment monitoring (a) (b) (c) (d) Fig. 18 Example of output windows for presenting worker information
  • 14. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 366 VI. TESTING In the laboratory testing, the outputs of the prototype applications, such as safety measure preparation and safety measure monitoring, were correctly rendered as expected. However, the proposed system intended to provide the virtual objects in a real world scene to support construction personnel in carrying out safety management at actual construction sites. Therefore, the testing of the function for presenting the virtual objects was carried out. The virtual objects were created as described in the previous section. The marker unit in the text file and the scale of the virtual objects were points of concern. The marker size, which used in the experiments, was 0.3 m. In Fig. 19, the guardrail with a toe board containing information about the dimension was rendered in the output screen, and Fig. 20 demonstrates two options for a guardrail on the stairway. Fig. 19 Example of 3D virtual guardrail with toe board Fig. 20 Examples of 3D virtual guardrails in the required position
  • 15. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 367 VII. CONCLUSIONS Due to inherent hazards at the construction sites, safety monitoring is the important tasks to prevent accidents. To perform this task, it requires knowledge and experience of site personnel to identify and track the safety protection system or personnel protective equipment. The innovative and visualized system, which is developed in this study, aims to assist the site personnel to monitor working area and worker for preventing falling accidents. The advance visualization technology, named Augmented Reality, was implemented to provide the virtual information which is superimposed in the real world scene. Two main modules in the proposed system consist of monitoring module and augmented reality module. In monitoring module, there are two following sub-modules: 1) safe work area monitoring and 2) personal protective equipment monitoring. The first sub-module presented the safety measures and safety signs which should be installed in the specified area. In the second sub- module, the worker information and required personal protective equipment for each worker are illustrated. This prototype system was tested in laboratory and real environment. The results show it is feasible to provide the required safety information and assist the site personnel in the safety monitoring process. VIII. ACKNOWLEDGEMENTS This research is supported by the Faculty Development Scholarship of the Commission on Higher Education of Thailand with collaboration of AUN/SEED-Net. REFERENCES [1] P. Fewings, Construction Project Management: an Integrated Approach (Taylor & Francis, London, 2005). [2] J. Hinze, C. Pederson, and J. Fredley, Identifying Root Causes of Construction Injuries. Journal of Construction Engineering and Management, 124(1), 1998, 67–71. [3] R. A. Haslam, et al., Contributing factors in construction accidents, Journal of Applied Ergonomics, 36, 2005, 401-415. [4] K. Srinavin, Characteristics of accidents on construction work in Thailand and prevention guide, CIB World Building Congress ‘Construction for Development’, Cape Town, South Africa, 2007. [5] Janicak, C. A., Fall related deaths in the construction industry, Journal of Safety Research, 29(1), 1998, 35-42. [6] V. Benjaoran, and S. Bhokha, An integrated safety management with construction management using 4D CAD model, Journal of Safety Science, 48(3), 2009, 395–403. [7] R. Navon, and O. Kolton, Algorithms for automated monitoring and control of fall hazards, Journal of computing in civil engineering, 21(1), 2007, 21-28. [8] U. K. Lee, J. H. Kim, H. Cho, and K. I. Kang, Development of a mobile safety monitoring system for construction sites, Journal of Automation in Construction, 18, 2009, 258–264. [9] X., Wang, and P. S. Dunston, Compatibility issues in Augmented Reality Systems for AEC: An Experimental Prototype Study, Journal of Automation in Construction, 15, 2006, 314-326
  • 16. International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 – 6308 (Print), ISSN 0976 – 6316(Online) Volume 4, Issue 2, March - April (2013), © IAEME 368 [10] A. Webster, S. Feiner, B. MacIntyre, W. Massie, and T. Krueger, Augmented reality in architectural construction, inspection, and renovation, Proc. ASCE Third Congress on Computing in Civil Engineering. Anaheim, California, USA, 1996, 913-919. [11] G. Schall, E. Mendez, and D. Schmalstieg, Virtual redlining for civil engineering in real environments, IEEE International Symposium on Mixed and Augmented Reality, Cambridge, UK, 2008. [12] A. H.Behzadan, and V. R. Kamat, Interactive augmented reality visualization for improved damage prevention and maintenance of underground infrastructure, Construction Research Congress, 2009. [13] HIT Lab., ARToolkit[Online], Available from: www.hitl.washington.edu/artoolkit/ [2009, November 20]. [14] N. Yabuki, and Z. Li, Cooperative reinforcing bar arrangement and checking by using augmented reality, CDVE 2007, LNCS 4674, 2007, 50-57. [15] N. Ota, N. Yabuki, T. Fukuda, Development of an accurate positioning method for augmented reality using multiple markers, Proc. of the international conference on computing in civil and building engineering – 2010, Nottingham, UK, 2010. [16] N. Yabuki, K. Miyashita, and T. Fukuda, An invisible height evaluation system for building height regulation to preserve good landscapes using augmented reality, Journal of Automation in Construction, 20, 2011, 228-235. [17] Prof. P. B. Alappanavar, Ankeeta Bhujbal and Shantanu Deshmukh, “Location Based Services using Augmented Reality”, International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 237 - 240, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [18] Shaik Abdul Khader Jeelani, Dr.J.Karthikeyan and Dr.Adel S.Aldosary, “Performance Evaluation of Design-Build (D-B) Projects with and without Agency Construction Management”, International Journal of Civil Engineering & Technology (IJCIET), Volume 3, Issue 2, 2012, pp. 265 - 278, ISSN Print: 0976 – 6308, ISSN Online: 0976 – 6316.