Table 2 -2. Techniques for point of contact. penetrates into other object (the object completely inside the other object) (Escande, Miossec et al. 2007). Zhang et al., (Zhang, Kim et al. 2007) provided a generalized penetration depth computation which is able to compute object penetration depth faster than other previous method mentioned in their research paper but depends heavily on pre-processing configuration with a lot of predefined (Shengzheng and Jie, 2009; Choi, Ryu et al. 2010; Zhang and Du, 2011; Zhi, Shiqiu et al. 2011; Heng, KunChao et al. 2012). Later, Hausdorff distance in (Tang, Lee et al. 2009; Barton, Hanniel et al. 2010) was used to calculate the penetration depth for polygon but depends on closed models (where there is no hole for the object) and well- defined inside and outside vertices points (Je, Tang et al. 2012; Jia, Chitta et al. 2012; Zhang, Kim et al. 2014). Table-3 summarized all our findings for penetration depth issues. Considering the last component of narrow phase collision detection, Gilbert (Gilbert, Johnson et al. 1988) proposed a fast procedure to handle penetration of narrow phase collision detection but sometimes the technique reports false positive result for potential primitives (Cameron, 1997; Ponamgi, Manocha et al. 1997). Lin- Canny technique does not offer penetrating handling technique well but with a simple technique to cover penetration depth where it involves calculating the total distance travel from one point into another point that penetrate the other object (Bergen, 2001; Kim, Otaduy ef al. 2003; Stephane and Lin, 2006). The technique itself could be a repeated cycle forever if penetration happens (Kim, Otaduy et al. 2003; Stephane and Lin, 2006; Zhang, Kim et al. 2007). Mirtich (Mirtich, 1998), developed a V- Clip complex technique that is capable to handle penetration but it is inefficient when the object completely