SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3540
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
Prashanth C R1, Deepika S2, Jagruth S3, Jalaja M4, Rachana S L5
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Currently, the military federations are taking
assistance of robots within the risk-prone areas which aren't
effective when done by army men. In the proposed system the
idea is based on the chameleon’sCamouflagetechnique. Oneof
the most aims is to implement an autonomous camouflaged
technology-based wireless multifunctional robot that can be
controlled through a PC i.e., the camera captures the image
and the robot will change its color according to the
surrounding ground hue detected at the rear end. Camouflage
robot plays a huge role in saving human loses also the robot
can serenely enter into the enemy area and send information
via camera to the controller. The dark vision camera is used
for surveillance purposes. The scope lies within the enemygun
targeting to trace the intruders along with landmine
identification. The camouflage robot basically works as a
subsidy for the military. Thus, in the proposed model we
enforce an AI expert multi-sensor data fusion-based decision-
making system to track enemy movement and conduct
reconnaissance in unknown areas of a war zone.
Key Words: Camouflage, Artificial Intelligence, ZigBee
module, LED’s, Laser gun, Arduino Microprocessor
(ATMega 328).
1. INTRODUCTION
In the modern combat techniques employed by numerous
militant forces across the globe, stealth and the ability to
maneuver in inaccessible areas play a key role. Army robotis
an autonomous robot comprising of a wireless camera that
can be used as a spy.
The idea of the proposed system is to implement a
camouflagedtechnology-basedwirelessmultifunctionalarmy
robot capable of disguising itself to infiltrate the enemy
campsite embedded with AI features. The word robot means
"A machine which is capable of performing
complex seriesofactionsautomaticallythatisprogrammable
by a computer." These robots used in defense are usually
employed with integrated systems, including cameras,
sensors, and video screens. The main motive behind
Camouflage Robot is to substitute human losses in terrorist
attacks or military operations. Camouflage robot acts as a
virtual spy which may faintly enter into the enemy area and
send information via camera to the controller. Robots are
often made to interact and cooperate more closely with the
citizenry by incorporatingadditionalfeatureslikerobustness
and autonomy.
A versatile perception and recording of various parameters
duringthisrobotareaccomplishedemployingamulti-sensor
platform. In this system, an interfacing module is
incorporated to remotely sense the thing parameters using
IOT. Since it's exceptionallyhardtodetectitbyanunadorned
human eye, the Camouflage robot is often also won't test the
varied security systems developed within the market & act
as a measure to evaluate its efficiency. Engineering
camouflage aims is to form the detection and recognition
target difficult within the machine-assisted eye searching
target within the massive breadth background around.
The purpose is to implement the system (model) for a
particular face and distinguish it from a large number of
stored faces with some real-time deviations as well. This
model consists of a mobile robot, restrained by the web,
which features a camera mounted and a PIR sensor for
detecting the living bodies. The user will be able to control
the robot through the internet, thus, providing wireless
control of the robot.
Face recognition is one of the most promising fields in
computer vision plays an important role in conveying
identity and emotions. Face detection is a computer coding
technology that determines the location and size of human
faces in a given image format. It detects only the facial
features and ignores the rest.
Human capabilities are very good at recognizing and
remembering faces despite the passage of time. Hence, it is
essentially beneficial if the current computer technologies
become robust as humans in face detections.
Training a machine learning algorithm can take a great deal
of data to achieve maximum optimization and reduce error.
In this paper, we will try to differentiate between the
implementation of different algorithms in OpenCV. OpenCV
provides us the freedom to runonanyplatformthatsupports
the execution of python coding. It can be used on machines
with Windows, mac OS or, Linux. Here we discuss three
algorithms, Haar cascades and Local Binary Pattern
Histogram (LBPH) and, Eigen face. These algorithm
performances were evaluated based on some parameters.In
1Professor, Department of Telecommunication Engineering, Dr. Ambedkar Institute of Technology,
Bangalore, Karnataka, India
2, 3, 4, 5Undergraduate Student, Department of Telecommunication Engineering, Dr. Ambedkar Institute of
Technology, Bangalore, Karnataka, India
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3541
our simulationsinOpenCV,theexamplesshownarereal-time
and images are captured by using a USB camera.
Prem Kumar has proposed a reviewed systems used color
detection sensor which requires the object to be close to
detect the color of the object using Zigbee Technology[1].
Akshay Ravindran has proposed the camouflaging feature
makes it difficult to detect the robot by the unaided human
eye. The color sensor detects the color of surrounding
surfaces & determines the color of surroundings [2].
M.Jagtap has proposed the various techniques and
comparison of Machine Learningalgorithmsbasedoncertain
parameters and the performances of algorithms in face
detection for automation[3].
S.Bhargavi has explained an idea for automated border
control to represent one area in the digital transformation of
border control Additionally, it has been based on artificial
intelligence and the safety of the robot[4].
The unique property of face detection is quite robust despite
large variations in visual stimulusduetochangingconditions
such as environment, aging and, other natural factors
(beards, mustache, hairstyles and, spectacles). Facial
recognition can be practiced to a larger extent on video
footage in real-time for more people [5].
2. OBJECTIVE
Our main aim is to enhance the communication between
soldiers and military room by using advanced and highly
efficient, powerful systems.
 To design a camouflaging robot that uses face
recognition to detect entry of trespassers at the borders.
 Our robot should assist soldiers and try to prevent the
damage that mightarise due to terrorist attacks (intruders),
hidden ground bombs.
 Ability to change its color (LED’s) while in motion
according to the surrounding environment.
A Gun Targeting system isanAI-baseddetectionandtargets-
the living object or any movement in highly secured areas.
3. PROPOSED MODEL
This paper describes the working of thearmyrobotasshown
in Fig.3.1 and Fig.3.2. The principle is based on Artificial
Intelligence ,Surveillance, and Reconnaissance i.e. to track
enemy movement and conducting reconnaissance in
unknown areas of a war zone. The project aims is to design,
develop and, implementation of an autonomous smart
surveillance system with AI-assisted decision making and
camouflage using Haar-classifier and LBPH algorithm to
monitorthe trespassers. Theautomatic guntargetingsystem
will enhance border security using automation. Apart from
this, the main feature is the camouflage technique; i.e.it can
reproduce the color accordingly with the ground surface,
based on the hue color hence being camouflaged to the
outside world. We've used LEDs that will diffuse uniform
colors, coupled tosensorsthatwillpreciselyidentifythecolor
of the bottom. On the opposite hand, AI assisted common
operating picture would catalog and display a disposition of
friendly and enemy forces, automatically built and updated
through an enormous data approach. Here the model is
redesigned to compel the machine to perform multitask so
that along with checking for several parameters for
monitoring, it also carries out other significant tasks on its
own using IOT.
Block diagram comprises arduino, an open-source
electronics platform based on easy-to-use hardware and
software, camera for capturing the images, IR sensor to
sense the presence of humans, proximity metal sensor for
metal identification, the relay acts as a switch for both LED
and laser, DC motor for backward and forward direction
with H- Bridge and, Zigbee acts as an information trans-
receiver with a power supply.
Fig -3.1: Block Diagram of Camouflage Robot
Fig -3.2: Base Station
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3542
The camouflage robot uses arduino Microprocessor
(ATMega328) board and works on python language. Each of
the programming languages used in this robot has its
working process like (motorcontrol, camera movement,and
display control).
All the input and output actions are performed by the
developed robot whereas on the PC side all the image
processing is done. The robot is mounted with input devices
likea camera, obstacle sensorand,proximitysensortocollect
all the required data for processing. The computer then does
the processing of the received data using various algorithms
for image processing. HAAR Cascade algorithm and Local
Binary Pattern Histogram (LBPH) algorithm are primary
algorithm techniques used to determine the color of the
background and this data is transmitted to the robot. All the
transmission is completedseriallyusingaZigbeetransceiver.
The robot can output the receivedcolorbychangingthecolor
of LEDs covering the model. This is done by turning on oneof
the three relays present on the robot.
Fig -3.3: Circuit Schematic of Army Robot
4. METHOD
4.1 Haar-Cascade
Cascade classifier is one of the fewest ML object detection
algorithms where the speed of computation is high for face
detection to train the classifier to run in real-time. The key to
its high performance is the use of an integral image, which
only performs basic operations inaverylowprocessingtime.
This can be used in surveillance systems with distributed
cameras and a back-end server in which the detection takes
place. The speed of computation is high for face detection
where a lot of positive and negative images are used to train
the classifier. It lies on the principle of computing the
difference between the sum of white pixels and the sum of
black pixels. The main advantage of this method is the fast
sum computation using the integral image. Theyareadjacent
rectangles in a particular position of an image.
Fig -4.1.1: Haar-like features
This algorithm is achieved by creating the database, then
training the database, and finally, recognition is performed.
The integral image consists of having a small unit's
representation of a given image.
4.2 Local Binary Pattern Histogram
LBPH local binary pattern histogram algorithm is used for
front and side face recognition of the dataset. The first
computational step of the LBPH is to create an intermediate
image that describes theoriginalimagehighlightingthefacial
characteristics.
To do so, the algorithm uses a concept of a sliding window,
based on the parameters radius and neighbors.
Fig. -4.2.1: The basic LBPH operation
The original LBPH operator labels the pixels of an image by
keeping the 3x3 neighborhood or it can be also said as a
matrix. Each pixel has a value that can vary depending upon
the image and pixel quality. The middle pixel "90" is chosen
which has eight neighbors, subtract these neighbor values
with 90 if the value is less than zero put it as zero and if the
value is more than zero put it as one. Following the arrow
direction in figure 1.1, you will get the binary number as
00110101 i.e. 141 in a decimal system. Now, using the image
generated in the last step, we can use the Grid X and Grid Y
parameters to divide the image into multiple grids, as can be
seen in the following image:
Fig -4.2.2: Extracting the Histograms
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3543
We can use various approaches to compare the histograms
(calculate the distance between two histograms), for
example, Euclidean distance, chi-square, absolute value, etc.
In this example, we can use the Euclidean distance (which is
quite known) based on the following formula:
So the algorithm output is the ID from the image with the
closest histogram. The algorithm should also return the
calculated distance, which can be used as a ‘confidence’
measurement.
4.3 Eigen Face
A major problem that it faces is that the data is mostly noisy
(i.e. pose, angle, lighting condition). Random images are
chosen, but in such a manner that they have a face init,thatis
not in a truly random way. We define the characteristic
feature as eigenface, these characteristics include the
presence of objects like the nose, eye, mouth in a face as well
as the relative distance between objects. PCA (Principal
Component Analysis) which isamathematicaltoolisusedfor
the eigenface algorithm. It provides features to recreate and
rebuild any original image fromthetrainingsetbycombining
eigenfaces. That way only if a face adds in the right
proportional manner can we recapture an original face. The
images used as input should be of the same size in terms of
pixel and grayscale as that of trained images. One of PCA's
main advantages is its low sensitivity to noise and its ability
to reduce the dimension. The Euclidean distance method is
used to calculate the distance between the eigenvector
between eigenfaces. If the distance is small, then the subject
is identified, whereas too large distance indicates that the
model requires more training to identify the subject.
Fig -4.3.1: PCA Calculation on the image
The unique feature is computed by subtracting the average
face from each image vector. The Average human face
property is shown by the resultant matrix. Now we from the
result we find the covariance matrix. PCA is used in eigen
analysis. The result is in the form of the covariance matrix.
It has the highest variance as the first eigenvector and the
second eigenvector is in direction of thenexteigenvectorand
it is in 90 degrees of first and so on.Each column is
considered an image, duplicate face, and this is called
eigenface.
4.4 Camouflage Technique
The implementation of the Army Robot is based on
camouflage techniques and the flowchart explains the
schematic view. To achieve these goals, LED’s are used i.e.,
primarily RGB, which can diffuse uniform colors by using a
webcam followed by morphological transform and then
detection of the colors in real-time.
Fig -4.4.1: Camouflage Process Flowchart
Hence, this featuremakes itdifficult todetecttherobotbythe
naked human eye, can access all the important information
from other parties, and also helps inhiding from the enemy’s
insight
4.5 Land Mine Detection:
One of the most scathing problems faced by soldiers is the
identification or removal of landmines thatare present on or
under the ground during war fields, natural disasters, land
development. Therefore, it takes high priority to detect
landmines in the ground and remove them carefully with
sensors. For safe identification, non-touch-based detection
technologies are required. These methods help in the
detection of landmines in the signals obtained by non-touch-
based
sensors, such as proximity metal detectors. The robot will
stop and detects as soon as any metal is identified.
4.6 AI-based Gun Targeting:
In gun targeting, there are two separate operation modes:
Interactive and Motion Detection. Interactive playavitalrole
in controlling the dc motor remotely using computer and
motion detection uses OpenCV i.e., computer vision to track
living objects that move in front of the camera.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3544
Laser is used for gun targeting up to 360 degrees, if at all the
captured image sent for processing by the robot does not
match with the faces present in the database folder, robot
labels them as an intruder and per- forms gun targeting
action.
Fig-4.4.2: AI-based Gun Targeting Flowchart
The above flowchart illustrates the algorithm behind the
gun targeting using laser, which mimics face detection-
based gun action of the camouflage robot.
5. EXPERIMENTAL ANALYSIS AND PERFORMANCE
(1) Evaluating the PerformanceofEigenfaceandLocalBinary
Pattern Histogram-Based Facial Recognition Methods under
Various Weather Conditions.
Environment
constraints
Eigen
Face
LBPH
Rainy 95% 100%
Foggy 86.6% 96.6%
Cloudy 75% 85%
Sunny 90% 100%
Table -5.1: Algorithm Performance in Percentage
0
50
100
150
Eigenface
LBPH
Rainy
Foggy
Cloudly
Sunny
Chart -5.1: Algorithm Performance in an Unconstrained
Environment
Table -5.2: Accuracy result of Haar-cascade
Table -5.3: Accuracy result of LBPH result
The impact of rain on the image causesloss of imagecontrast
and color fidelity. As a result, it is difficult to make the image
visible with adequate quality. While there is evidence of
removing the effect of rain on video or data with multiple
frame images in literature. The overall accuracy of all facial
recognition (FR) methods was analyzed in foggy, cloudy,
rainy, sunny, and specific conditions (images captured when
the weather was not sunny or cloudy) Eigenface had the
lowest performanceintermsofaccuracy(86.60%).Similarly,
in cloudy weather, LBPH has the best performance (96.6%),
while Eigenface displayedthelowestperformanceintermsof
accuracy the experimental results show that facial
recognition(FR) in an unconstrained situation using
Eigenface(EF) and Local binary pattern histogram (LBPH) is
challenging. LBPH showed the highest accuracy on both
LUDB datasets (images captured in different weather) and
the dataset (containing unconstrained images).
Resolution Detected
faces
Recognition
rate
At 15 pixel 28/101 27.7%
At 20 pixel 54/101 53.4%
At 30 pixel 57/101 56.4%
At 35 pixel 89/101 88.1%
Resolution Detected faces Recognition rate
At 15 pixel 12/101 11.8%
At 20 pixel 38/101 37.5%
At 30 pixel 56/101 55.4%
At 35 pixel 76/101 75.2%
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3545
(2) Comparison of the pixel values of Haar & LBPH vs
Eigenface recognition rates
Pixel values Haar cascade
Accuracy
LBPH
Accuracy
At 15 pixel 27.7% 11.8%
At 20 pixel 53.4% 37.5%
At 30 pixel 56.4% 55.4%
At 35 pixel 88.1% 75.2%
At 45 pixel 94% 87.1%
Table -5.4: Haar cascade and LBPH
Chart -5.2: Comparison of Haar and LBPH of Pixel values
Vs Accuracy
As the detection rate was increasing the rate of recognition
for each pixel value increased. After the simulations of the
algorithms, Haar andLBPH usingOpencvaremoreaccurate
than Eigenface, From the above results, itshows that thehit
rate of Haar was 94% and LBPH was 87.1% compared to
Eigenface 59.4% at optimum lighting condition. If the light
intensity is equal to or above45 pixels,wegetthemaximum
accuracy rate. The result from the table shows that Haar
embedded with LBPH is more robust in achieving a high
recognition rate compared to eigenface. The percentage of
face detection using Haar was almost 8% more than the
LBPH algorithm.
6. RESULTS
This paper discussesthecamouflagingfeaturecataractingAI-
based algorithms that is been used for surveillance, face and
landmine detection, with automatic gun targeting Haar
features and Local Binary Patterns Histogram (LBPH). We
also observe that when we inculcate AI-based LBPH with
Haar cascade we get the best recognition rate compared to
eigenface by varying the light intensities accordingly in the
scope of our study. A Comparative study has shown that the
haar and LBPH algorithmsperformancerateishigh85-100%
in an unconstrained environment compared to the eigenface
(75-90%). The mobility of the defense bot with AI-like
features covers all aspects of traversing various terrains of
the all plane for a given altitude level of a tangible platform
meant for movements.
7. CONCLUSION
We have achieved our objective by designing a
multifunctional army robot that executes chameleon
camouflaging features with locomotion, landmine
identification, and performing gun targeting upon intruder
detection. We can see an AI expert multi-sensor data fusion-
based decision-making system to track enemy movement in
the border area. Real-time data processing is done using
Zigbee trans-receiver technology, making it low of cost to
rebuild. Based on overall results, it can be concluded that
Haar cascade and LBPH with the robot exhibit an overall
faster Recognition rate and detection speed. The percentage
of face detection inculcating Haar and LBPH is significantly
higher 27.7% - 34.6% than the eigenface algorithm. From
here, we can say that the AI-based Camouflage Robot face is
more accurate and reliable when played together compared
to other algorithms in the study for face detection. Thus, the
proposed autonomous systemassistsoursecurityforcesand
soldiers and keeps the nation away from the foe.
ACKNOWLEDGEMENT
We would like to express our sincere gratitude to the
Management, Principal, Dr. Ambedkar Institute of
Technology, Bengaluru for the facilities provided and their
support. Also we would like to thank the Head of the
Department, Telecommunication Engineering and faculties
for their encouragement and support.
REFERENCES
[1] Premkumar. M “Unmanned Multi-Functional Robot
Using ZigBee Adopter Network For Defense And
Application” International Journal ofAdvancedResearch in
Computer Engineering & Technology (IJARCET) volume 2,
issue 1, January 2015.
[2] Akash Ravindran and Akshay Premkumar “Camouflage
Technology” (IJETCSE) ISSN: 0976- 1353 Volume8,Issue 1
, April 2015.
[3] A.M. Jagtap , A Study of LBPH, Eigenface, Fisherface and
Haar-like features for Face recognition using OpenCV,
International Conference on Intelligent SustainableSystems
ICISS 2019.
[4] S.Bhargavi and S. Manjunath “Design of an Intelligent
Combat Robot for War Field" International Journal of
Advanced Computer Science and Application, volume 2,
no.8, 2011.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3546
[6] S. A Joshi, AparnaTondarkar, Krishna Solanke,
RohitJagtap, “Surveillance Robot for Military Application”,
International Journal Of Engineering And Computer
ScienceISSN:2319-7242, Volume.7, issue.5, May2018.
[7] Shantanu K. Dixit, “Design and Implementation of e-
surveillance Robot for Video Monitoring and Living Body
Detection”, International Journal of Scientific and Research
Publication, Volume 4, issue 4, April 2014, ISSN2250-3153.
[8] Kunal Borker1, Rohan Gaikwad2, Ajaysingh Rajput3,
“Wireless Controlled Surveillance Robot" International
Journal of Advanced Research in Computer Science and
Management Studies. ISSN: 2321-7782, volume.2, issue.2,
February2014.
[9] F. Xu, H. Li, C.-M. Pun. H. Hu, Y. Li, Y. Song, and H. Gao, "A
new global best guided artificial bee colony algorithm with
application in robot path planning." Applied Soft Computing,
vol. 88, p. 106037, 2020.
[10] Md Manjurul Ahsan, Yueqing Li, Jing Zhang, Md Tanvir
Ahad, Kishor Datta Gupta, “ Evaluating the Performance of
Eigenface, Fisherface, and Local Binary Pattern Histogram-
Based Facial Recognition Methods under Various Weather
Conditions” Technologies 2021.
BIOGRAPHIES
Dr. PRASHANTH C R
Professor, Department
of Telecommunication Engineering
Dr. Ambedkar Institute of Technology,
VTU, Bangalore.
DEEPIKA S
Undergraduate Student, Department
of Telecommunication Engineering,
Dr.Ambedkar Institute of Technology.
JAGRUTH S
Undergraduate Student, Department
of Telecommunication Engineering,
Dr.Ambedkar Institute of Technology.
JALAJA M
Undergraduate Student, Department
of Telecommunication Engineering,
Dr.Ambedkar Institute of Technology.
RACHANA S L
Undergraduate Student, Department
Of Telecommunication Engineering,
Dr.Ambedkar Institute of Technology.
[5] Shantanu K. Dixit, “Design and Implementation of e-
surveillance Robot for Video Monitoring and Living Body
Detection”, International Journal of Scientific and Research
Publication, volume 4, issue 4, April 2014, ISSN2250-3153.

More Related Content

Similar to Camouflage Surveillance Robot In Defense Using Artificial Intelligence

IRJET - Floor Cleaning Robot with Vision
IRJET - Floor Cleaning Robot with VisionIRJET - Floor Cleaning Robot with Vision
IRJET - Floor Cleaning Robot with Vision
IRJET Journal
 
IRJET- Multipurpose Military Spying Robot
IRJET- Multipurpose Military Spying RobotIRJET- Multipurpose Military Spying Robot
IRJET- Multipurpose Military Spying Robot
IRJET Journal
 
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET Journal
 
A Review On AI Vision Robotic Arm Using Raspberry Pi
A Review On AI Vision Robotic Arm Using Raspberry PiA Review On AI Vision Robotic Arm Using Raspberry Pi
A Review On AI Vision Robotic Arm Using Raspberry Pi
Angela Shin
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
IRJET Journal
 
Multipurpose Warfield Surveillance Robot Using IoT
Multipurpose Warfield Surveillance Robot Using IoTMultipurpose Warfield Surveillance Robot Using IoT
Multipurpose Warfield Surveillance Robot Using IoT
IRJET Journal
 
Robotic Virtual Telepresence with Raspberry pi
Robotic Virtual Telepresence with Raspberry piRobotic Virtual Telepresence with Raspberry pi
Robotic Virtual Telepresence with Raspberry pi
IRJET Journal
 
IRJET- Wireless Video Surveillance Robot
IRJET-  	  Wireless Video Surveillance RobotIRJET-  	  Wireless Video Surveillance Robot
IRJET- Wireless Video Surveillance Robot
IRJET Journal
 
Warfare Robot
Warfare RobotWarfare Robot
Warfare Robot
ijtsrd
 
Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...
Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...
Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...
Associate Professor in VSB Coimbatore
 
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTVEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
IRJET Journal
 
IRJET - Implementation of SDC: Self-Driving Car based on Raspberry Pi
IRJET - Implementation of SDC: Self-Driving Car based on Raspberry PiIRJET - Implementation of SDC: Self-Driving Car based on Raspberry Pi
IRJET - Implementation of SDC: Self-Driving Car based on Raspberry Pi
IRJET Journal
 
Material Handling Robot For Smart Manufacturing in Industries
Material Handling Robot For Smart Manufacturing in IndustriesMaterial Handling Robot For Smart Manufacturing in Industries
Material Handling Robot For Smart Manufacturing in Industries
dbpublications
 
The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9
IOSR Journals
 
IRJET - Voice Controlled Robot using NodeMCU
IRJET - Voice Controlled Robot using NodeMCUIRJET - Voice Controlled Robot using NodeMCU
IRJET - Voice Controlled Robot using NodeMCU
IRJET Journal
 
Obstacle Avoidance Robotic Vehicle Using Ultrasonic Sensor, Android and Bluet...
Obstacle Avoidance Robotic Vehicle Using Ultrasonic Sensor, Android and Bluet...Obstacle Avoidance Robotic Vehicle Using Ultrasonic Sensor, Android and Bluet...
Obstacle Avoidance Robotic Vehicle Using Ultrasonic Sensor, Android and Bluet...
IRJET Journal
 
amd xilinx robotics applications ebook.pdf
amd xilinx robotics applications ebook.pdfamd xilinx robotics applications ebook.pdf
amd xilinx robotics applications ebook.pdf
MariusBar3
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
IRJET Journal
 
Sensor Based Motion Control of Mobile Car Robot
Sensor Based Motion Control of Mobile Car RobotSensor Based Motion Control of Mobile Car Robot
Sensor Based Motion Control of Mobile Car Robot
ijtsrd
 
REVIEW ON WIRELESS VOICE CONTROLLED ROBOT
REVIEW ON WIRELESS VOICE CONTROLLED ROBOTREVIEW ON WIRELESS VOICE CONTROLLED ROBOT
REVIEW ON WIRELESS VOICE CONTROLLED ROBOT
IRJET Journal
 

Similar to Camouflage Surveillance Robot In Defense Using Artificial Intelligence (20)

IRJET - Floor Cleaning Robot with Vision
IRJET - Floor Cleaning Robot with VisionIRJET - Floor Cleaning Robot with Vision
IRJET - Floor Cleaning Robot with Vision
 
IRJET- Multipurpose Military Spying Robot
IRJET- Multipurpose Military Spying RobotIRJET- Multipurpose Military Spying Robot
IRJET- Multipurpose Military Spying Robot
 
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic System
 
A Review On AI Vision Robotic Arm Using Raspberry Pi
A Review On AI Vision Robotic Arm Using Raspberry PiA Review On AI Vision Robotic Arm Using Raspberry Pi
A Review On AI Vision Robotic Arm Using Raspberry Pi
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
 
Multipurpose Warfield Surveillance Robot Using IoT
Multipurpose Warfield Surveillance Robot Using IoTMultipurpose Warfield Surveillance Robot Using IoT
Multipurpose Warfield Surveillance Robot Using IoT
 
Robotic Virtual Telepresence with Raspberry pi
Robotic Virtual Telepresence with Raspberry piRobotic Virtual Telepresence with Raspberry pi
Robotic Virtual Telepresence with Raspberry pi
 
IRJET- Wireless Video Surveillance Robot
IRJET-  	  Wireless Video Surveillance RobotIRJET-  	  Wireless Video Surveillance Robot
IRJET- Wireless Video Surveillance Robot
 
Warfare Robot
Warfare RobotWarfare Robot
Warfare Robot
 
Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...
Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...
Design and Implementation of Soft-i-Robot for face Detection and Obstacle Avo...
 
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTVEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
 
IRJET - Implementation of SDC: Self-Driving Car based on Raspberry Pi
IRJET - Implementation of SDC: Self-Driving Car based on Raspberry PiIRJET - Implementation of SDC: Self-Driving Car based on Raspberry Pi
IRJET - Implementation of SDC: Self-Driving Car based on Raspberry Pi
 
Material Handling Robot For Smart Manufacturing in Industries
Material Handling Robot For Smart Manufacturing in IndustriesMaterial Handling Robot For Smart Manufacturing in Industries
Material Handling Robot For Smart Manufacturing in Industries
 
The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9The Wireless Remote Control Car Based On Arm9
The Wireless Remote Control Car Based On Arm9
 
IRJET - Voice Controlled Robot using NodeMCU
IRJET - Voice Controlled Robot using NodeMCUIRJET - Voice Controlled Robot using NodeMCU
IRJET - Voice Controlled Robot using NodeMCU
 
Obstacle Avoidance Robotic Vehicle Using Ultrasonic Sensor, Android and Bluet...
Obstacle Avoidance Robotic Vehicle Using Ultrasonic Sensor, Android and Bluet...Obstacle Avoidance Robotic Vehicle Using Ultrasonic Sensor, Android and Bluet...
Obstacle Avoidance Robotic Vehicle Using Ultrasonic Sensor, Android and Bluet...
 
amd xilinx robotics applications ebook.pdf
amd xilinx robotics applications ebook.pdfamd xilinx robotics applications ebook.pdf
amd xilinx robotics applications ebook.pdf
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
 
Sensor Based Motion Control of Mobile Car Robot
Sensor Based Motion Control of Mobile Car RobotSensor Based Motion Control of Mobile Car Robot
Sensor Based Motion Control of Mobile Car Robot
 
REVIEW ON WIRELESS VOICE CONTROLLED ROBOT
REVIEW ON WIRELESS VOICE CONTROLLED ROBOTREVIEW ON WIRELESS VOICE CONTROLLED ROBOT
REVIEW ON WIRELESS VOICE CONTROLLED ROBOT
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 

Recently uploaded (20)

PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 

Camouflage Surveillance Robot In Defense Using Artificial Intelligence

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3540 Camouflage Surveillance Robot In Defense Using Artificial Intelligence Prashanth C R1, Deepika S2, Jagruth S3, Jalaja M4, Rachana S L5 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Currently, the military federations are taking assistance of robots within the risk-prone areas which aren't effective when done by army men. In the proposed system the idea is based on the chameleon’sCamouflagetechnique. Oneof the most aims is to implement an autonomous camouflaged technology-based wireless multifunctional robot that can be controlled through a PC i.e., the camera captures the image and the robot will change its color according to the surrounding ground hue detected at the rear end. Camouflage robot plays a huge role in saving human loses also the robot can serenely enter into the enemy area and send information via camera to the controller. The dark vision camera is used for surveillance purposes. The scope lies within the enemygun targeting to trace the intruders along with landmine identification. The camouflage robot basically works as a subsidy for the military. Thus, in the proposed model we enforce an AI expert multi-sensor data fusion-based decision- making system to track enemy movement and conduct reconnaissance in unknown areas of a war zone. Key Words: Camouflage, Artificial Intelligence, ZigBee module, LED’s, Laser gun, Arduino Microprocessor (ATMega 328). 1. INTRODUCTION In the modern combat techniques employed by numerous militant forces across the globe, stealth and the ability to maneuver in inaccessible areas play a key role. Army robotis an autonomous robot comprising of a wireless camera that can be used as a spy. The idea of the proposed system is to implement a camouflagedtechnology-basedwirelessmultifunctionalarmy robot capable of disguising itself to infiltrate the enemy campsite embedded with AI features. The word robot means "A machine which is capable of performing complex seriesofactionsautomaticallythatisprogrammable by a computer." These robots used in defense are usually employed with integrated systems, including cameras, sensors, and video screens. The main motive behind Camouflage Robot is to substitute human losses in terrorist attacks or military operations. Camouflage robot acts as a virtual spy which may faintly enter into the enemy area and send information via camera to the controller. Robots are often made to interact and cooperate more closely with the citizenry by incorporatingadditionalfeatureslikerobustness and autonomy. A versatile perception and recording of various parameters duringthisrobotareaccomplishedemployingamulti-sensor platform. In this system, an interfacing module is incorporated to remotely sense the thing parameters using IOT. Since it's exceptionallyhardtodetectitbyanunadorned human eye, the Camouflage robot is often also won't test the varied security systems developed within the market & act as a measure to evaluate its efficiency. Engineering camouflage aims is to form the detection and recognition target difficult within the machine-assisted eye searching target within the massive breadth background around. The purpose is to implement the system (model) for a particular face and distinguish it from a large number of stored faces with some real-time deviations as well. This model consists of a mobile robot, restrained by the web, which features a camera mounted and a PIR sensor for detecting the living bodies. The user will be able to control the robot through the internet, thus, providing wireless control of the robot. Face recognition is one of the most promising fields in computer vision plays an important role in conveying identity and emotions. Face detection is a computer coding technology that determines the location and size of human faces in a given image format. It detects only the facial features and ignores the rest. Human capabilities are very good at recognizing and remembering faces despite the passage of time. Hence, it is essentially beneficial if the current computer technologies become robust as humans in face detections. Training a machine learning algorithm can take a great deal of data to achieve maximum optimization and reduce error. In this paper, we will try to differentiate between the implementation of different algorithms in OpenCV. OpenCV provides us the freedom to runonanyplatformthatsupports the execution of python coding. It can be used on machines with Windows, mac OS or, Linux. Here we discuss three algorithms, Haar cascades and Local Binary Pattern Histogram (LBPH) and, Eigen face. These algorithm performances were evaluated based on some parameters.In 1Professor, Department of Telecommunication Engineering, Dr. Ambedkar Institute of Technology, Bangalore, Karnataka, India 2, 3, 4, 5Undergraduate Student, Department of Telecommunication Engineering, Dr. Ambedkar Institute of Technology, Bangalore, Karnataka, India
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3541 our simulationsinOpenCV,theexamplesshownarereal-time and images are captured by using a USB camera. Prem Kumar has proposed a reviewed systems used color detection sensor which requires the object to be close to detect the color of the object using Zigbee Technology[1]. Akshay Ravindran has proposed the camouflaging feature makes it difficult to detect the robot by the unaided human eye. The color sensor detects the color of surrounding surfaces & determines the color of surroundings [2]. M.Jagtap has proposed the various techniques and comparison of Machine Learningalgorithmsbasedoncertain parameters and the performances of algorithms in face detection for automation[3]. S.Bhargavi has explained an idea for automated border control to represent one area in the digital transformation of border control Additionally, it has been based on artificial intelligence and the safety of the robot[4]. The unique property of face detection is quite robust despite large variations in visual stimulusduetochangingconditions such as environment, aging and, other natural factors (beards, mustache, hairstyles and, spectacles). Facial recognition can be practiced to a larger extent on video footage in real-time for more people [5]. 2. OBJECTIVE Our main aim is to enhance the communication between soldiers and military room by using advanced and highly efficient, powerful systems.  To design a camouflaging robot that uses face recognition to detect entry of trespassers at the borders.  Our robot should assist soldiers and try to prevent the damage that mightarise due to terrorist attacks (intruders), hidden ground bombs.  Ability to change its color (LED’s) while in motion according to the surrounding environment. A Gun Targeting system isanAI-baseddetectionandtargets- the living object or any movement in highly secured areas. 3. PROPOSED MODEL This paper describes the working of thearmyrobotasshown in Fig.3.1 and Fig.3.2. The principle is based on Artificial Intelligence ,Surveillance, and Reconnaissance i.e. to track enemy movement and conducting reconnaissance in unknown areas of a war zone. The project aims is to design, develop and, implementation of an autonomous smart surveillance system with AI-assisted decision making and camouflage using Haar-classifier and LBPH algorithm to monitorthe trespassers. Theautomatic guntargetingsystem will enhance border security using automation. Apart from this, the main feature is the camouflage technique; i.e.it can reproduce the color accordingly with the ground surface, based on the hue color hence being camouflaged to the outside world. We've used LEDs that will diffuse uniform colors, coupled tosensorsthatwillpreciselyidentifythecolor of the bottom. On the opposite hand, AI assisted common operating picture would catalog and display a disposition of friendly and enemy forces, automatically built and updated through an enormous data approach. Here the model is redesigned to compel the machine to perform multitask so that along with checking for several parameters for monitoring, it also carries out other significant tasks on its own using IOT. Block diagram comprises arduino, an open-source electronics platform based on easy-to-use hardware and software, camera for capturing the images, IR sensor to sense the presence of humans, proximity metal sensor for metal identification, the relay acts as a switch for both LED and laser, DC motor for backward and forward direction with H- Bridge and, Zigbee acts as an information trans- receiver with a power supply. Fig -3.1: Block Diagram of Camouflage Robot Fig -3.2: Base Station
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3542 The camouflage robot uses arduino Microprocessor (ATMega328) board and works on python language. Each of the programming languages used in this robot has its working process like (motorcontrol, camera movement,and display control). All the input and output actions are performed by the developed robot whereas on the PC side all the image processing is done. The robot is mounted with input devices likea camera, obstacle sensorand,proximitysensortocollect all the required data for processing. The computer then does the processing of the received data using various algorithms for image processing. HAAR Cascade algorithm and Local Binary Pattern Histogram (LBPH) algorithm are primary algorithm techniques used to determine the color of the background and this data is transmitted to the robot. All the transmission is completedseriallyusingaZigbeetransceiver. The robot can output the receivedcolorbychangingthecolor of LEDs covering the model. This is done by turning on oneof the three relays present on the robot. Fig -3.3: Circuit Schematic of Army Robot 4. METHOD 4.1 Haar-Cascade Cascade classifier is one of the fewest ML object detection algorithms where the speed of computation is high for face detection to train the classifier to run in real-time. The key to its high performance is the use of an integral image, which only performs basic operations inaverylowprocessingtime. This can be used in surveillance systems with distributed cameras and a back-end server in which the detection takes place. The speed of computation is high for face detection where a lot of positive and negative images are used to train the classifier. It lies on the principle of computing the difference between the sum of white pixels and the sum of black pixels. The main advantage of this method is the fast sum computation using the integral image. Theyareadjacent rectangles in a particular position of an image. Fig -4.1.1: Haar-like features This algorithm is achieved by creating the database, then training the database, and finally, recognition is performed. The integral image consists of having a small unit's representation of a given image. 4.2 Local Binary Pattern Histogram LBPH local binary pattern histogram algorithm is used for front and side face recognition of the dataset. The first computational step of the LBPH is to create an intermediate image that describes theoriginalimagehighlightingthefacial characteristics. To do so, the algorithm uses a concept of a sliding window, based on the parameters radius and neighbors. Fig. -4.2.1: The basic LBPH operation The original LBPH operator labels the pixels of an image by keeping the 3x3 neighborhood or it can be also said as a matrix. Each pixel has a value that can vary depending upon the image and pixel quality. The middle pixel "90" is chosen which has eight neighbors, subtract these neighbor values with 90 if the value is less than zero put it as zero and if the value is more than zero put it as one. Following the arrow direction in figure 1.1, you will get the binary number as 00110101 i.e. 141 in a decimal system. Now, using the image generated in the last step, we can use the Grid X and Grid Y parameters to divide the image into multiple grids, as can be seen in the following image: Fig -4.2.2: Extracting the Histograms
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3543 We can use various approaches to compare the histograms (calculate the distance between two histograms), for example, Euclidean distance, chi-square, absolute value, etc. In this example, we can use the Euclidean distance (which is quite known) based on the following formula: So the algorithm output is the ID from the image with the closest histogram. The algorithm should also return the calculated distance, which can be used as a ‘confidence’ measurement. 4.3 Eigen Face A major problem that it faces is that the data is mostly noisy (i.e. pose, angle, lighting condition). Random images are chosen, but in such a manner that they have a face init,thatis not in a truly random way. We define the characteristic feature as eigenface, these characteristics include the presence of objects like the nose, eye, mouth in a face as well as the relative distance between objects. PCA (Principal Component Analysis) which isamathematicaltoolisusedfor the eigenface algorithm. It provides features to recreate and rebuild any original image fromthetrainingsetbycombining eigenfaces. That way only if a face adds in the right proportional manner can we recapture an original face. The images used as input should be of the same size in terms of pixel and grayscale as that of trained images. One of PCA's main advantages is its low sensitivity to noise and its ability to reduce the dimension. The Euclidean distance method is used to calculate the distance between the eigenvector between eigenfaces. If the distance is small, then the subject is identified, whereas too large distance indicates that the model requires more training to identify the subject. Fig -4.3.1: PCA Calculation on the image The unique feature is computed by subtracting the average face from each image vector. The Average human face property is shown by the resultant matrix. Now we from the result we find the covariance matrix. PCA is used in eigen analysis. The result is in the form of the covariance matrix. It has the highest variance as the first eigenvector and the second eigenvector is in direction of thenexteigenvectorand it is in 90 degrees of first and so on.Each column is considered an image, duplicate face, and this is called eigenface. 4.4 Camouflage Technique The implementation of the Army Robot is based on camouflage techniques and the flowchart explains the schematic view. To achieve these goals, LED’s are used i.e., primarily RGB, which can diffuse uniform colors by using a webcam followed by morphological transform and then detection of the colors in real-time. Fig -4.4.1: Camouflage Process Flowchart Hence, this featuremakes itdifficult todetecttherobotbythe naked human eye, can access all the important information from other parties, and also helps inhiding from the enemy’s insight 4.5 Land Mine Detection: One of the most scathing problems faced by soldiers is the identification or removal of landmines thatare present on or under the ground during war fields, natural disasters, land development. Therefore, it takes high priority to detect landmines in the ground and remove them carefully with sensors. For safe identification, non-touch-based detection technologies are required. These methods help in the detection of landmines in the signals obtained by non-touch- based sensors, such as proximity metal detectors. The robot will stop and detects as soon as any metal is identified. 4.6 AI-based Gun Targeting: In gun targeting, there are two separate operation modes: Interactive and Motion Detection. Interactive playavitalrole in controlling the dc motor remotely using computer and motion detection uses OpenCV i.e., computer vision to track living objects that move in front of the camera.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3544 Laser is used for gun targeting up to 360 degrees, if at all the captured image sent for processing by the robot does not match with the faces present in the database folder, robot labels them as an intruder and per- forms gun targeting action. Fig-4.4.2: AI-based Gun Targeting Flowchart The above flowchart illustrates the algorithm behind the gun targeting using laser, which mimics face detection- based gun action of the camouflage robot. 5. EXPERIMENTAL ANALYSIS AND PERFORMANCE (1) Evaluating the PerformanceofEigenfaceandLocalBinary Pattern Histogram-Based Facial Recognition Methods under Various Weather Conditions. Environment constraints Eigen Face LBPH Rainy 95% 100% Foggy 86.6% 96.6% Cloudy 75% 85% Sunny 90% 100% Table -5.1: Algorithm Performance in Percentage 0 50 100 150 Eigenface LBPH Rainy Foggy Cloudly Sunny Chart -5.1: Algorithm Performance in an Unconstrained Environment Table -5.2: Accuracy result of Haar-cascade Table -5.3: Accuracy result of LBPH result The impact of rain on the image causesloss of imagecontrast and color fidelity. As a result, it is difficult to make the image visible with adequate quality. While there is evidence of removing the effect of rain on video or data with multiple frame images in literature. The overall accuracy of all facial recognition (FR) methods was analyzed in foggy, cloudy, rainy, sunny, and specific conditions (images captured when the weather was not sunny or cloudy) Eigenface had the lowest performanceintermsofaccuracy(86.60%).Similarly, in cloudy weather, LBPH has the best performance (96.6%), while Eigenface displayedthelowestperformanceintermsof accuracy the experimental results show that facial recognition(FR) in an unconstrained situation using Eigenface(EF) and Local binary pattern histogram (LBPH) is challenging. LBPH showed the highest accuracy on both LUDB datasets (images captured in different weather) and the dataset (containing unconstrained images). Resolution Detected faces Recognition rate At 15 pixel 28/101 27.7% At 20 pixel 54/101 53.4% At 30 pixel 57/101 56.4% At 35 pixel 89/101 88.1% Resolution Detected faces Recognition rate At 15 pixel 12/101 11.8% At 20 pixel 38/101 37.5% At 30 pixel 56/101 55.4% At 35 pixel 76/101 75.2%
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3545 (2) Comparison of the pixel values of Haar & LBPH vs Eigenface recognition rates Pixel values Haar cascade Accuracy LBPH Accuracy At 15 pixel 27.7% 11.8% At 20 pixel 53.4% 37.5% At 30 pixel 56.4% 55.4% At 35 pixel 88.1% 75.2% At 45 pixel 94% 87.1% Table -5.4: Haar cascade and LBPH Chart -5.2: Comparison of Haar and LBPH of Pixel values Vs Accuracy As the detection rate was increasing the rate of recognition for each pixel value increased. After the simulations of the algorithms, Haar andLBPH usingOpencvaremoreaccurate than Eigenface, From the above results, itshows that thehit rate of Haar was 94% and LBPH was 87.1% compared to Eigenface 59.4% at optimum lighting condition. If the light intensity is equal to or above45 pixels,wegetthemaximum accuracy rate. The result from the table shows that Haar embedded with LBPH is more robust in achieving a high recognition rate compared to eigenface. The percentage of face detection using Haar was almost 8% more than the LBPH algorithm. 6. RESULTS This paper discussesthecamouflagingfeaturecataractingAI- based algorithms that is been used for surveillance, face and landmine detection, with automatic gun targeting Haar features and Local Binary Patterns Histogram (LBPH). We also observe that when we inculcate AI-based LBPH with Haar cascade we get the best recognition rate compared to eigenface by varying the light intensities accordingly in the scope of our study. A Comparative study has shown that the haar and LBPH algorithmsperformancerateishigh85-100% in an unconstrained environment compared to the eigenface (75-90%). The mobility of the defense bot with AI-like features covers all aspects of traversing various terrains of the all plane for a given altitude level of a tangible platform meant for movements. 7. CONCLUSION We have achieved our objective by designing a multifunctional army robot that executes chameleon camouflaging features with locomotion, landmine identification, and performing gun targeting upon intruder detection. We can see an AI expert multi-sensor data fusion- based decision-making system to track enemy movement in the border area. Real-time data processing is done using Zigbee trans-receiver technology, making it low of cost to rebuild. Based on overall results, it can be concluded that Haar cascade and LBPH with the robot exhibit an overall faster Recognition rate and detection speed. The percentage of face detection inculcating Haar and LBPH is significantly higher 27.7% - 34.6% than the eigenface algorithm. From here, we can say that the AI-based Camouflage Robot face is more accurate and reliable when played together compared to other algorithms in the study for face detection. Thus, the proposed autonomous systemassistsoursecurityforcesand soldiers and keeps the nation away from the foe. ACKNOWLEDGEMENT We would like to express our sincere gratitude to the Management, Principal, Dr. Ambedkar Institute of Technology, Bengaluru for the facilities provided and their support. Also we would like to thank the Head of the Department, Telecommunication Engineering and faculties for their encouragement and support. REFERENCES [1] Premkumar. M “Unmanned Multi-Functional Robot Using ZigBee Adopter Network For Defense And Application” International Journal ofAdvancedResearch in Computer Engineering & Technology (IJARCET) volume 2, issue 1, January 2015. [2] Akash Ravindran and Akshay Premkumar “Camouflage Technology” (IJETCSE) ISSN: 0976- 1353 Volume8,Issue 1 , April 2015. [3] A.M. Jagtap , A Study of LBPH, Eigenface, Fisherface and Haar-like features for Face recognition using OpenCV, International Conference on Intelligent SustainableSystems ICISS 2019. [4] S.Bhargavi and S. Manjunath “Design of an Intelligent Combat Robot for War Field" International Journal of Advanced Computer Science and Application, volume 2, no.8, 2011.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3546 [6] S. A Joshi, AparnaTondarkar, Krishna Solanke, RohitJagtap, “Surveillance Robot for Military Application”, International Journal Of Engineering And Computer ScienceISSN:2319-7242, Volume.7, issue.5, May2018. [7] Shantanu K. Dixit, “Design and Implementation of e- surveillance Robot for Video Monitoring and Living Body Detection”, International Journal of Scientific and Research Publication, Volume 4, issue 4, April 2014, ISSN2250-3153. [8] Kunal Borker1, Rohan Gaikwad2, Ajaysingh Rajput3, “Wireless Controlled Surveillance Robot" International Journal of Advanced Research in Computer Science and Management Studies. ISSN: 2321-7782, volume.2, issue.2, February2014. [9] F. Xu, H. Li, C.-M. Pun. H. Hu, Y. Li, Y. Song, and H. Gao, "A new global best guided artificial bee colony algorithm with application in robot path planning." Applied Soft Computing, vol. 88, p. 106037, 2020. [10] Md Manjurul Ahsan, Yueqing Li, Jing Zhang, Md Tanvir Ahad, Kishor Datta Gupta, “ Evaluating the Performance of Eigenface, Fisherface, and Local Binary Pattern Histogram- Based Facial Recognition Methods under Various Weather Conditions” Technologies 2021. BIOGRAPHIES Dr. PRASHANTH C R Professor, Department of Telecommunication Engineering Dr. Ambedkar Institute of Technology, VTU, Bangalore. DEEPIKA S Undergraduate Student, Department of Telecommunication Engineering, Dr.Ambedkar Institute of Technology. JAGRUTH S Undergraduate Student, Department of Telecommunication Engineering, Dr.Ambedkar Institute of Technology. JALAJA M Undergraduate Student, Department of Telecommunication Engineering, Dr.Ambedkar Institute of Technology. RACHANA S L Undergraduate Student, Department Of Telecommunication Engineering, Dr.Ambedkar Institute of Technology. [5] Shantanu K. Dixit, “Design and Implementation of e- surveillance Robot for Video Monitoring and Living Body Detection”, International Journal of Scientific and Research Publication, volume 4, issue 4, April 2014, ISSN2250-3153.