In the modern day robotics development in many field as too that enrich in military applications also as per that this robot SURVEILLANCE MONITORING ROBOT FOR MILITARY APPLCATION USING ARM monitor the defense area that is in our country borders. It is an forest area and every time commanders were not available in same area they move over different places at that time terrorist can easily enter into our nation. This robot perform main role there that PIR sensor in the robot will send the intimation and danger warning to the control room that unauthorized person entering that time we alert our soldiers to move to that place this operation were control using ARM7 controller. Another important component GPS exactly say which position the robot is now monitoring then it will be easy to soldiers to survey the area soon.And for communicating between control room and robot we are using ZIGBEE.Another one sensor TEMPERATURE SENSOR LM35 is used to monitor temperature in that area that is used to intimate us what is the temperature level in that area if any BOMB BLAST OR FIRE ACCIDENT in that area.
This project is about controlling the wireless camera mounted robot through PC using RF module at the same thin to pick any light object & place it.
-Zeenat Saba Khan
The present condition in Industry is that they are using the crane system to carry the parcels from one place to another, including harbors. Some times the lifting of big weights may cause the breakage of lifting materials and will cause damage to the parcels too. Application of the proposed system is for industries. The robot movement depends on the track. Use of this robot is to transport the materials from one place to another place in the industry.
A robot is a machine designed to execute one or more tasks repeatedly, with speed and precision. There are as many different types of robots as there are tasks for them to perform. A robot can be controlled by a human operator, sometimes from a great distance. In such type of applications wireless communication is more important.
In robotic applications, generally we need a remote device to control. If we use IR remote device, it is just limited to meters distance and also if any obstacle is in between its path then there will be no communication. If we consider, RF modules for remote operations there is no objection whether an obstacle is present in its path. So that it is very helpful to control robot.
RF modules itself can generates its carrier frequency which is around 2.4 GHz. We need to generate serial data using micro controller and fed to the RF transmitting module. On other side RF receiver receives sent data as RF signals and given to another micro controller. Here, RF receiver itself demodulates the data from carrier signal and generate serial data as output.
Cell Phone Operated Robot for Search and Research of an ObjectNikita Kaushal
Slide presented in 2013 10th International Conference on Wireless and Optical Communications Networks, IEEE Conference.
In this robot, an IR sensor detects an object robot’s arms pick up the object and keep in the carriage box this robot move with the help of cell phone by using DTMF technology, from arm the object is tested whether object is metallic or not, the operator get alert through SMS of object and its characteristics by using GSM technology.
This is kind of robot can be helpful for spying purpose in war fields. This project is designed to develop a robotic vehicle using RF technology for remote operation attached with wireless camera for monitoring purpose. The robot along with camera can wirelessly transmit real time video with night vision capabilities.
This project is about controlling the wireless camera mounted robot through PC using RF module at the same thin to pick any light object & place it.
-Zeenat Saba Khan
The present condition in Industry is that they are using the crane system to carry the parcels from one place to another, including harbors. Some times the lifting of big weights may cause the breakage of lifting materials and will cause damage to the parcels too. Application of the proposed system is for industries. The robot movement depends on the track. Use of this robot is to transport the materials from one place to another place in the industry.
A robot is a machine designed to execute one or more tasks repeatedly, with speed and precision. There are as many different types of robots as there are tasks for them to perform. A robot can be controlled by a human operator, sometimes from a great distance. In such type of applications wireless communication is more important.
In robotic applications, generally we need a remote device to control. If we use IR remote device, it is just limited to meters distance and also if any obstacle is in between its path then there will be no communication. If we consider, RF modules for remote operations there is no objection whether an obstacle is present in its path. So that it is very helpful to control robot.
RF modules itself can generates its carrier frequency which is around 2.4 GHz. We need to generate serial data using micro controller and fed to the RF transmitting module. On other side RF receiver receives sent data as RF signals and given to another micro controller. Here, RF receiver itself demodulates the data from carrier signal and generate serial data as output.
Cell Phone Operated Robot for Search and Research of an ObjectNikita Kaushal
Slide presented in 2013 10th International Conference on Wireless and Optical Communications Networks, IEEE Conference.
In this robot, an IR sensor detects an object robot’s arms pick up the object and keep in the carriage box this robot move with the help of cell phone by using DTMF technology, from arm the object is tested whether object is metallic or not, the operator get alert through SMS of object and its characteristics by using GSM technology.
This is kind of robot can be helpful for spying purpose in war fields. This project is designed to develop a robotic vehicle using RF technology for remote operation attached with wireless camera for monitoring purpose. The robot along with camera can wirelessly transmit real time video with night vision capabilities.
This project uses mobile technology and since mobile has very large range, the project also has very large range. But finally it depends on the coverage of the mobile network.
Robot which can be controlled remotely by an Android smartphone.
The robot works through a “AC Robot” android app. The app is designed by us and made available to open source. The app and source code can be downloaded from the url (http://tinyurl.com/kh7zgex).
Increasing Safety Bomb Disposal Missions, It Is a Robot which gives the Safety to the Humans /Soldiers by using its sensing Technology in Battlefields.
This is a simple DTMF based Cellphone controlled robotic vehicle using Microcontroller which is used for wide range of purposes in military and law enforcement, search and rescue operations and scientific purposes.
War Field Spying Robot with Fire Fighting Alarm.vansh_raheja
This is a project presentation on war field spying robot with fire fighting alarm. This presentation will helpful for those who want to make robots basically a Spy Robot. This will describes the hardware and the software requirements of the project. This will also describe the use of this project in different areas.
This project uses mobile technology and since mobile has very large range, the project also has very large range. But finally it depends on the coverage of the mobile network.
Robot which can be controlled remotely by an Android smartphone.
The robot works through a “AC Robot” android app. The app is designed by us and made available to open source. The app and source code can be downloaded from the url (http://tinyurl.com/kh7zgex).
Increasing Safety Bomb Disposal Missions, It Is a Robot which gives the Safety to the Humans /Soldiers by using its sensing Technology in Battlefields.
This is a simple DTMF based Cellphone controlled robotic vehicle using Microcontroller which is used for wide range of purposes in military and law enforcement, search and rescue operations and scientific purposes.
War Field Spying Robot with Fire Fighting Alarm.vansh_raheja
This is a project presentation on war field spying robot with fire fighting alarm. This presentation will helpful for those who want to make robots basically a Spy Robot. This will describes the hardware and the software requirements of the project. This will also describe the use of this project in different areas.
Defense Robotic Model For War Field Using XBee (REPORT)WizApsProjects
The face of war is changing, and it may no longer be a human one. Developing new technology has always been a cornerstone of a successful military force, but now those technologies are steadily moving human soldiers from combat to management positions. Virtually every major military power is working on robotic weapons. In short, we’re outsourcing more and more of war into the hands of robots and computers. Even the conventional foot soldier has robotic and biological augmentation in his/her future. Today, Singularity Hub is taking a wide-angle look at these changes and how they will change the nature of war and our world.
Military robots are autonomous robots or remote-controlled devices designed for military applications. Such systems are currently being researched by several militaries. The objective of this Robot is to minimize human casualties in terrorist attacks such as 26/11. The combat robot has been designed to tackle such cruel terror attacks. This robot is radio-operated, self-powered, and has all the controls like a normal car. This robot can be used in star hotels, shopping malls, jewelry showrooms, etc where there can be threats from intruders or terrorists. Since human life is always precious, these robots are the replacement for fighters against terrorists in war areas.
Smart Security System Using ARM And XBee For Boarder Areas (REPORT)WizApsProjects
Three U.S. Department of Homeland Security (DHS) component agencies carry out the majority of border-security missions: the U.S. Coast Guard (USCG), U.S. Customs and Border Protection (CBP), and Immigration and Customs Enforcement (ICE). A universal and more open world creates a growing need for more effective ways to control borders.
The soldiers may sometimes cross their area limit without their knowledge. This causes a lot of problems. They may be caught by other people. This project is developed for the soldiers to find out the border and to check whether the person is authorized or unauthorized. The main modules in this project are the RF transducer, ARM controller unit, and LCD. The Zigbee transmitter is connected to the border area. It transmits RF signals within a particular limit. The Zigbee receiver with the ARM controller unit will be under the control of the commander. When the soldier reaches a particular area, the RF signals are received by the receiver and given to the ARM controller unit. The ARM controller analyses the signal and sends the corresponding message to the LCD and the same information is transmitted to the commander via Zigbee. The receiver which is there at the commander receives the signal which was transmitted from the transmitter via Zigbee and displays proper information on the display. The ARM controller program is written in embedded c language and the microcontroller used is ARM7LPC2148.
Robotic technology has the origin from the year 1954 and has very vast application in the field like energy, health, agriculture, education, research, motion and space etc. The disadvantage of any autonomous robot is that, it is very difficult to maintain stability of its traverse condition. In this paper, we have introduced and achieved maximum stability for the traverse condition through white line following technique. Here we are using the Fire Bird V robotic technology as our robotic medium, which has the Atmega2560 as its microcontroller and where it uses Studio 4 as its controller’s software platform. The control dynamic to the robot is sent via the software platform which is embedded ‘C’ language and the traverse condition is maintained. This robot runs at step down voltage value of 9V AC supply and has also uses lithium 9v battery as a stand by back up.
Implementation of flex sensor for hand gesture based wireless automation of j...eSAT Journals
Abstract The project is totally based on automation. It has been made to contribute in the field industry. Many Projects have been undertaken previously to develop automatic JCB using various technology like Remote control, Zig bee control etc. But none have such Dual Mode feature like Flex Sensor control and DTMF control with LDR sensor, Flame Detector and IR sensor integrated on a single chip. This project will not require a worker sitting inside a JCB and can be run from outside with more comfortable and more accuracy and is also cost effective and requires low maintenance. It can be controlled by simple hand gestures. It employs a Flex sensor which controls the JCB’s movements like up-down and 360 degree clockwise and anticlockwise rotation by bending it and making our JCB move accordingly. Also if any problem occur in Flex Sensor then we can switch to other mode of operation which is DTMF. Using which we can easily control our JCB worldwide through cell phone. The entire core of the project lies in the microcontroller which is a device used to establish automation. The main aim of this paper is to implement a JCB with Dual mode of operation. It also includes other features like IR sensor to detect any obstacle in field work like excavation, LDR sensor to make our JCB work at night also by automatically illuminating the LED’s in the dark places. Flame Detector to detect fire when any kind of accident occur. Key Words: Flex sensor, DTMF control, IR sensor, Flame detector etc…
Live Human Detecting Robot for Earthquake Rescue Operationijcnes
Natural calamities do occur and they are unstoppable. But humans are becoming increasingly aware in the concept of intelligent rescue operations in such calamities so that precious life and material can be saved though calamities cannot be stopped. Still there are lots of disasters that occur all of a sudden and Earthquake is one such thing. Earthquakes produce a devastating effect and they see no difference between human and material. Hence a lot of times humans are buried among the debris and it become impossible to detect them. A timely rescue can only save the people who are buried and wounded.Detection by rescue workers becomes time consuming and due to the vast area that gets affected it becomes more difficult. So the project proposes an autonomous robotic vehicle that moves in the earthquake prone area and helps in identifying the alive people and rescue operations.
Our future battle field system will have more difficulties to maintain security, because of increasing military competitive. Ability to understand, predict and adopt the vast array of inter-networked things is very difficult. Unwanted fire, unauthorized human intervention and other object movement will play major important role for affecting military environment. This project aims to help our future military environment by introducing new technology LoRaWAN in IoT (Internet of Things). LoRaWAN (Long Range Wide Area Network) is a state -of- art commercial of the self (COTS) technology. This project consist of sensors, embedded microcontrollers equipped with LoRaWAN, embedded processors equipped with LoRaWAN and cloud technology. By introducing this new technology in our future military environment we can easily find out criminal activities and fire hazards.
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...ijsrd.com
In this paper, a new method of designing and development of a microcontroller based toxic gas detection system is proposed. If the toxic gas or fuel leakage has been detected, the system automatically alerts the driver through buzzer, opens the car door automatically and transmits the warning message to the authorized user through the GSM module attached. User can send SMS and receive SMS through GSM Modem, based on that message User can control some appliances in host section. This system aims to modify an existing safety model employed in automotive field. It can be used in any Vehicle like Car, Bus Van etc. The advantage of this automated detection/alarm system is that, it offers faster response time and accurate detection of an emergency in turn leading to faster diffusion of the situation, compared to manual methods. This is a very compelling reason that justifies designing such a safety system.
Beaglebone Black Webcam Server For SecurityIJTET Journal
Web server security using BeagleBone Black is based on ARM Cortex-A8 processor and Linux operating system
is designed and implemented. In this project the server side consists of BeagleBone Black with angstrom OS and interfaced
with webcam. The client can access the web server by proper authentication. The web server displays the web page forms
like home, video, upload, settings and about. The home web page describes the functions of Web Pages. The video Web page
displays the saved videos in the server and client can view or download the videos. The upload web page is used by the client
to upload the files to server. The settings web page is used to change the username, password and date if needed. The about web page provides the description of the project
Biometrics Authentication Using Raspberry PiIJTET Journal
Biometric authentication is one of the most popular and accurate technology. Nowadays, it is used in many real time
applications. However, recognizing fingerprints in Linux based embedded computers (raspberry pi) is still a very complex problem.
This entire work is done on the Linux based embedded computer called raspberry pi , in which database creation and management
using postgresql, web page creation using PHP language, fingerprint reader access, authentication and recognition using python were
entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the
fingerprints of individual and store that in database . Then I use the final fingerprint to match with others in fingerprints present in the
database (postgresql) to show the capability of this model.
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
Number of techniques has been planned supported packet secret writing to safeguard the
communication in MANETs. STARS functioning supported stastical characteristics of captured raw traffic.
STARS discover the relationships of offer to destination communication. To forestall STAR attack associate
offer hidding technique is introduced.The pattern aims to derive the source/destination probability distribution.
that's the probability for each node to entire traffic captured with link details message source/destination and
conjointly the end-to-end link probability distribution that's the probability for each strive of nodes to be
associate end-to-end communication strive. thence construct point-to-point traffic originate and then derive the
end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected against revelation attack.
Through this protective mechanism efficiency of traffic enlarged by ninety fifth from attacked traffic. For a lot of
sweetening to avoid overall attacks second shortest path is chosen.
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
The most necessary issue that has to be solved in coming up with an information transmission rule for
wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications
users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, it’s
conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the
information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power -
efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by
expeditiously choosing the energy economical path within the routing method. When supply finds route to
destination, it calculates α for every route. The worth α is predicated on largest minimum residual energy of the trail
and hop count of the trail. If a route has higher α, then that path is chosen for routing the information. The worth of α
are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is
lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any
transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours
of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the
node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power
of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated
through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated
through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend
delay.
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
In Manet the first demand is co-operative communication among nodes. The malicious nodes might cause security issues like grey hole and cooperative attacks. To resolve these attack issue planning Dynamic supply routing mechanism, that is referred as cooperative bait detection theme (CBDS) that integrate the advantage of each proactive and reactive defence design is used. In region attacks, a node transmits a malicious broadcast informing that it's the shortest path to the destination, with the goal of intercepting messages. During this case, a malicious node (so-called region node) will attract all packets by victimisation solid Route Reply (RREP) packet to incorrectly claim that “fake” shortest route to the destination then discard these packets while not forwarding them to the destination. In grey hole attacks, the malicious node isn't abs initio recognized in and of itself since it turns malicious solely at a later time, preventing a trust-based security resolution from detective work its presence within the network. It then by selection discards/forwards the info packets once packets undergo it. During this we have a tendency to focus is on detective work grey hole/collaborative region attacks employing a dynamic supply routing (DSR)-based routing technique.
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
Wireless detector nodes are a promising technology to play three-dimensional applications. Even it
will sight correct lead to could on top of ground and underground. In solid underground watching system makes
some challenges are there to propagating the signals. The detector node is moving entire the underground
pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is
unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially
designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay
node. If any relay node is unsuccessful within the network, the constellation can modification mechanically
supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending
the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
A low cost Internet-based attendance record embedded system for students which uses wireless technology to
transfer data between the client and server is designed. The proposed system consist of a Raspberry Pi which acts as a
client which stores the details of the students in the database by using user login system using web. When the user logs
into the database the data is sent through GPRS to the server machine which maintains the records of the employees and
the attendance is updated in the server database. The GPRS module provides a bidirectional real-time data transfer
between the client and server. This system can be implemented to any real time application so as to retrieve information
from a data source of the client system and send a file to the remote server through GPRS. The main aim is to avoid the
limitations in Ethernet connection and design a low cost and efficient attendance record system where the data is
transferred in a secure way from the client database and updated in the server database using GPRS technology
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
Data hiding can hide sensitive information into signals for covert communication. Most data hiding
techniques will distort the signal in order to insert additional messages. The distortion is often small; the irreversibility is
not admissible to some sensitive techniques. Most of the applications, lossless data hiding is desired to extract the
embedded data and the original host signal. The project proposes the enhancement of protection system for secret data
communication through encrypted data concealment in ECG signals of the patient. The proposed encryption technique
used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by
making the information inaccessible to any intruder having a random method. For that we use twelve square ciphering
techniques. The technique is used make the communication between the sender and the receiver to be authenticated is hash
function. To evaluate the effectiveness of ECG wave at the proposed technique, distortion measurement techniques of two
are used, the percentage residue difference (PWD) and wavelets weighted PRD. Proposed technique provides high security protection for patient data with low distortion is proven in this proposed system.
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
In this paper, a hybrid turbo decoding algorithm is used, in which the outer code, Cyclic Redundancy Check code is
not used for detection of errors as usual but for error correction and improvement. This algorithm effectively combines the iterative
decoding algorithm with Rate-Compatible Insertion Convolution Turbo Decoding, where the CRC code and the turbo code are
regarded as an integrated whole in the Decoding process. Altogether we propose an effective error detecting method based on
normalized Euclidean distance to compensate for the loss of error detection capability which should have been provided by CRC
code. Simulation results show that with the proposed approach, 0.5-2dB performance gain can be achieved for the code blocks
with short information length
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
In this paper a new technology is proposed with a replacement of conventional voltage source/current
source inverter with Improved Trans-Z-source inverter in automobile applications. The improved Trans-Z-source
inverter has a high boost inversion capability and continues input current. Also this new inverter can suppress the
resonant current at the startup; this resonant current in the startup may lead the device to permanent damage. In
improved Trans-Z-source inverter a couple inductor is needed, instead of this coupled inductor a transformer is used.
By using a transformer with sufficient turns ratio the size can be reduced. The turn’s ratio of the transformer decides
the input voltage of the inverter. In this paper operating principle, comparison with conventional inverters, working
with automobiles simulation results, THD analysis, Hardware implementation using ATMEGA 328 P are included.
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
This paper presents an analysis of a PMSG wind power system using T-Sourcethree phase matrix converter. PMSG using T-Source three phase matrix converterhas advantages that it can provide any desired AC output voltage regardless of DC input with regulation in shoot-through time. In this control system T-Source capacitor voltage can be kept stable with variations in the shoot-through time, maximum power from the wind turbine to be delivered. Inaddition, of a new future, the converter employs a safe-commutation strategy toconduct along a continuous current flow, which results in theelimination of voltage spikes on switches without the need for a snubber circuit. With the use of matrix converter the surely need forrectifier circuit and passive components to store energy arereduced. The MATLAB/Simulinkmodel of the overall system is carried out and theoretical wind energy conversion output load voltage calculations are madeand feasibility of the new topology has been verified and that theconverter can produce an output voltage and output current. This proposed method has greater efficiency and lower cost.
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol.
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
Query services have experienced terribly massive growth within past few years for that reason large usage of services need to balance outsourcing data management to Cloud service providers that provide query services to the client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be compromise the query processed performance. It is not significant to provide slow query services as the result of security along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR-Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query processing performance that also increases the user experience.
Foliage Measurement Using Image Processing TechniquesIJTET Journal
Automatic detection of fruit and leaf diseases is essential to automatically detect the symptoms of diseases as early as they appear on the growing stage. This system helps to detect the diseases on fruit during farming , right from plan and easily monitoring the diseases of grapes leaf and apple fruit. By using this system we can avoid the economical loss due to various diseases in agriculture production. K-means clustering technique is used for segmentation. The features are extracted from the segmented image and artificial neural network is used for training the image database and classified their performance to the respective disease categories. The experimental results express that what type of disease can be affected in the fruit and leaf .
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
This project suggest a sine-wave modulation technique is to achieve a low total harmonic distortion of Buck-Boost converter connected to a changing polarity inverter in a system. The suggested technique improves the harmonic content of the output. In addition, a proportional-resonant Integral controller is used along with harmonic compensation techniques for eliminating the DC component in the system. Also, the performance of the Proposed controller is analyzed when it connecting to the converter. The design of Buck-Boost converter is fed by modulated sine wave Pulse width modulation technique are proposed to mitigate the low order harmonics and to control the output current. So, that the output complies within the standard limit without use of low pass filter.
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
Natural draft cooling towers are very essential in modern days in thermal and nuclear power stations. These are the hyperbolic shells of revolution in form and are supported on inclined columns. Several types of shell supporting structures such as A,V,X,Y are being used for construction of NDCT’s. Wind loading on NDCT governs critical cases and requires attention. In this paper a comparative study on reinforcement details has been done on NDCT’s with X and Y shell supporting structures. For this purpose 166m cooling tower with X and Y supporting structures being analyzed and design for wind (BS & IS code methods), seismic loads using SAP2000.
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
The modeling of pressure distribution of fresh concrete poured in vertical formwork are rather dynamic than complex. Many researchers had worked on the pressure distribution modeling of concrete and formulated empirical relationship factors like formwork height, rate of pour, consistency classes of concrete. However, in the current scenario, most of high rise construction uses self compacting concrete(SCC) which is a special concrete which utilizes not only mineral and chemical admixtures but also varied aggregate proportions and hence modeling pressure distribution of SCC over other concrete in vertical formwork systems is necessitated. This research seeks to bridge the gap between the theoretical formulation of pressure distribution with the actual modeled (scaled) vertical formwork systems. The pressure distribution of SCC in the laboratory will be determined using pressure sensors, modeled and analyzed.
A Five – Level Integrated AC – DC ConverterIJTET Journal
This paper presents the implementation of a new five – level integrated AC – DC converter with high input power factor and reduced input current harmonics complied with IEC1000-3-2 harmonic standards for electrical equipments. The proposed topology is a combination of boost input power factor pre – regulator and five – level DC – DC converter. The single – stage PFC (SSPFC) approach used in this topology is an alternative solution to low – power and cost – effective applications.
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems.
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
Outrigger braced structures has efficient structural form consist of a central core, comprising braced frames with
horizontal cantilever ”outrigger” trusses or girders connecting the core to the outer column. When the structure is loaded
horizontally, vertical plane rotation of the core is restrained by the outriggers through tension in windward column and
compression in leeward column. The effective structural depth of the building is greatly increased, thus augmenting the lateral
stiffness of the building and reducing the lateral deflections and moments in core. In effect, the outriggers join the columns to the
core to make the structure behave as a partly composite cantilever. By providing eccentrically braced system in outrigger frame by
varying the size of links and analyzing it. Push over analysis is carried out by varying the link size using computer programs, Sap
2007 to understand their seismic performance. The ductile behavior of eccentrically braced frame is highly desirable for structures
subjected to strong ground motion. Maximum stiffness, strength, ductility and energy dissipation capacity are provided by
eccentrically braced frame. Studies were conducted on the use of outrigger frame for the high steel building subjected to
earthquake load. Braces are designed not to buckle, regardless of the severity of lateral loading on the frame. Thus eccentrically
braced frame ensures safety against collapse.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
A Survey of Techniques for Maximizing LLM Performance.pptx
Surveillance Robot for Military Application Using ARM
1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
120
Surveillance Robot for Military Application
Using ARM
Kamalesh.V
Sri Ramakrishna Engineering College,
Department of ECE,
Kamalesh.1102075@srec.ac.in
KarthickRaj.C
Sri Ramakrishna Engineering College,
Department of ECE,
Karthickraj.1102067@srec.ac.in
Abstract— In the modern day robotics development in many field as too that enrich in military applications also as per that this robot
SURVEILLANCE MONITORING ROBOT FOR MILITARY APPLCATION USING ARM monitor the defense area that is in our
country borders. It is an forest area and every time commanders were not available in same area they move over different places at that
time terrorist can easily enter into our nation. This robot perform main role there that PIR sensor in the robot will send the intimation
and danger warning to the control room that unauthorized person entering that time we alert our soldiers to move to that place this
operation were control using ARM7 controller. Another important component GPS exactly say which position the robot is now
monitoring then it will be easy to soldiers to survey the area soon.And for communicating between control room and robot we are
using ZIGBEE.Another one sensor TEMPERATURE SENSOR LM35 is used to monitor temperature in that area that is used to
intimate us what is the temperature level in that area if any BOMB BLAST OR FIRE ACCIDENT in that area.
Index Terms—ARM7(LPC2148),PIR,ZIGBEE, GPS,TEMPERATURE SENSOR LM35,IR SENSOR.
INTRODUCTION
A robot may define as an electro-mechanical device, which is
capable of sensing its surrounding and taking its decision
(command).In general, robot must be able to move (by mechanical
movement), it must be able to sense (by transducer) and it should be
take decision (by remote control or artificial intelligence).A robo
vehicle which perform similar function as a soldiers.
A robot vehicle plays a vital role in a defense area to MONITOR
the DEFENCE AREA and send information to the control room.Its
bring our defense area more stronger. It also survey the forest area
from BOMB BLAST and FIRE ACCIDENT.We can also
operate.robot vehicle from our control room which brings more
advantage to defense area. The main goal of this paper is to make
more strong the defense area and save our nation from terrorist
attacks
2. RELATED WORK
Today, there are a number of robotic vehicle used in ARMY
with unique features and design criteria. In this section, brief of some
recent widely-used and/or Influential robotic vehicle is given.
Few popular vehicle are
2.1.110 First Look
Route/Building Clearance
The regimented and thorough sweep of a route between
points or in a specific area or building is based on predictive
intelligence and the ability to identify risks and threats as quickly as
possible.
Unmanned ground vehicle technology from iRobot is equipped
with a mature set of cameras, two-way audio capabilities and can be
configured with numerous external sensors and tools to provide
much needed predictive intelligence in the sweep of a route or
building and saves time on-task for responders
2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
121
Fig. 1.First Look
2.2.510 PackBot
Bomb Disposal/ Explosive Ordnance Disposal (EOD)
Unmanned ground vehicle systems have integrated into military
and public safety teams to increase the safe-distance for the operator
and enable the controlled neutralization of the device.
Each of iRobot’s unmanned ground vehicle systems are able to
perform Bomb Disposal/EOD actions and have been deployed for
the safe detonation of devices by the military and Public Safety
Bomb Disposal and Bomb Squad teams. Each of our tactical robots
support a variety ofdisruptors with secure firing circuits, or deliver
charges to neutralize the risk.
Fig. 2.PackBot
II. HARDWARE ARCHITECTURE
TABLE 1 - COMPARISON OF LOCALIZATION
METHODS
A. Wireless Communication Platform
WPIR system is a system-on-chip for wireless sensor
networkingZigBeeIEEE 802.15.4 solutions. Texas Instrument
(TI) CC2431 is suitable for systems, where ultralow power
consumption is required.
B. Pyroelectric Sensor Module
The PIR sensor transforms incident IR radiation into an
electricalsignal. Fig. 3 shows that PIR detects changes in temperature
coinciding with movement of a person (or object) in the
detection area. A human walking through a PIR sensor detecting
region and the corresponding output signal is shown in Fig. 3.
Fig. 3. Operation of a pyroelectric motion sensor.
3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
122
Fig. 4. Experimental platform integrated with CC2431 and a PIR
sensor.
C. Wireless and Pyroelectric Sensor System
In this study, we develop a WPIR system with a CC2431
wirelesstransceivermodule and a PIR sensor, as shown in Fig. 4.
Further details of the design principle can be found in [24].
3. MICROCONTROLLER
ARM 7 TDMI microcontroller is used as hardware platform.It is
controlling unit to all
othercomponents(GPS,motors,ZIGBEE,LM35,PIR,IR SENSOR)
are interfaced.Two microcontrollers are used in this project one at
Transmitting end(PIC) and one at Receving end (ARM).
Fig. 4. Pin Diagram LPC2148
4. ZIGBEE MODULE
ZigBee is a specification for a suite of high-level
communication protocols used to create personal area networks built
from small, low-power digital radios. ZigBee is based on an IEEE
802.15 standard though its low powerconsumption limits
transmission distances to 10–100 meters line-of-sight depending on
power output and environmental characteristics, ZigBee devices can
transmit data over long distances by passing data through a mesh
network of intermediate devices to reach more distant ones. ZigBee
is typically used in low data rate applications that require long
battery life and secure networking (ZigBee networks are secured by
128 bit symmetric encryption keys.) ZigBee has a defined rate of 250
Kbit/s, best suited for intermittent data transmissions from a sensor
or input device
APPLICATIONS
Home Entertainment and Control
Wireless sensor networks
Industrial control
Embedded sensing
Medical data collection
Smoke and intruder warning
Building automation
Fig. 5. Pin Diagram Zigbee Module
5. GPS MODULE
A GPS navigation device is a device that accurately
calculates geographical location by receiving information from GPS
satellites. Initially it was used by the United States military, but now
most receivers are in automobiles and smartphones.The Global
Positioning System (GPS) is a satellite-based navigation system
made up of a network of 24 satellites placed into orbit by the U.S.
Department of Defense. Military actions was the original intent for
GPS, however in the 1980s, the U.S. government decided to allow
the GPS program to be used by civilians. The satellite data is free
and works anywhere in theworld.
6.TEMPERATURE SENSOR(LM 35)
LM35 is a precision IC temperature sensor with its output
proportional to the temperature (in oC). The sensor circuitry is sealed
and therefore it is not subjected to oxidation and other processes.
With LM35, temperature can be measured more accurately than with
a thermistor. It also possess low self heating and does not cause more
than 0.1 oC temperature rise in still air. The operating temperature
range is from -55°C to 150°C. The output voltage varies by 10mV in
4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
123
response to every oC rise/fall in ambient temperature, i.e., its scale
factor is 0.01V/ oC.
Fig. 6. Pin Diagram LM 35
7. CONTROL ROOM SETUP
In the control room normal pc is used to communicate with
robot using interface of pic and Zigbeeand simple .net coding is
return for simple user inter face and that screen consist of
Motor control
Camera rotation control
Temperature status
Location of robot
Fig. 7. Control Room Screen.
8.RF LOCALIZATION SYSTEM
A. Received Signal Strength
RSS is defined as the voltage measured from RSS indicator
circuit. RSS signals can be measured via the receiver without
additional energy requirements while communication is
established. RSS measurement is a relatively inexpensive and
easy implementation method. It is very useful in localization
research.
1)Statistical Model: The most widely used signal propagation
model is based on a variety of empirical results [25]–[28]
and analyses of evidence [29]:
XddnpPdPd 0/log10 __________(1).
as path loss exponent typically between 2 and 4 [25], and Xσis
a Gaussian random variable with zero mean and σ2 variance.
The d and d0 in (1) is defined as estimated distance and
reference distance, respectively.
2) Cram´er–Rao Bound Formulation:The Cram´er–Rao
bound (CRB) calculates a lower bound on the covariance of
any unbiased location estimator, which is useful to the developer.
The CRB can be used to test localization algorithms and
the bound’s functional dependence. A detailed derivation of the
CRBis provided in [30]. The most notable advantage of theCRB
is that the lower bound on estimation variance can be calculated.
All that is required is to calculate a CRB of the random
measurements.
The CRB can be written as follows:
1^/2^/2^ ZInfECov _____(2).
whereCov(ˆθ) is the covariance of the estimator, E[・] indicates
expected value, f(Z|θ) is the probability density function, Z is
the random measurement, and θ are the parameters that are to
be estimated from the measurements.
9. PIR DETECTION SYSTEM
The operation principle of PIR sensor is to detect the thermal
variation in its detection region. We test several scenarios and
record the response of the PIR sensor while the human or robot
moves under its detection region. The horizontal axis is time
stamps and vertical axis is the voltage response from the PIR
sensor, as shown in Figs. 3–5.
5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
124
Fig. 8. Human movement testing result. (a) Slow walk (0.5 m/s). (b)
Faster walk (1 m/s). (c) Run (2m/s).
Fig. 9. Robot movement testing result. (a) 20 cm/s. (b) 40 cm/s.
(c) 70 cm/s.
6. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
125
10. CONCLUSION
Thus our paper brings our army more stronger in defense area. And
protect our nation and to save our country people and soldiers. Many
interfacing devices may give research opportunity. This type of
vehicle brings more stronger for the military and effective in
searching the TERRORIST with the help of army man. The below
diagrams shows the tracking in human with the help of PIR sensor
and multi level tracking are also available.
Fig. 10. RF error bound.
Fig.9. PIR sensing system.
Fig. 8. Find CoG from WPIR system.
REFERENCES
[1] H. Koyuncu and S. H. Yan, ―A survey of indoor positioning and
object
locating systems,‖ IJCSNS Int. J. Comput. Sci. Netw. Security, vol.
10,
no. 5, pp. 121–128, May 2010.
[2] Y. Gu, A. Lo, and I. Niemegeers, ―A survey of indoor positioning
systems
for wireless personal networks,‖ IEEE Commun. Surveys Tutorials,
vol. 11, no. 1, pp. 13–32, First Quarter 2009.
[3] H. S. Ahn and K. H. Ko, ―Simple pedestrian localization
algorithms based
on distributed wireless sensor networks,‖ IEEE Trans. Ind. Electron.,
vol. 56, no. 10, pp. 4296–4302, Oct. 2009.
[4] H. Chen, D. Sun, J. Yang, and J. Chen, ―Localization for
multirobot
formations in indoor environment,‖ IEEE/ASME Trans.
Mechatronics,
vol. 15, no. 4, pp. 561–574, Aug. 2010.
[5] H.Mehrjerdi,M. Saad, and J. Ghommam, ―Hierarchical fuzzy
cooperative
control and path following for a team of mobile robots,‖
IEEE/ASME
Trans. Mechatronics, vol. 16, no. 5, pp. 907–917, Oct. 2011.
[6] L. Vachhani, A. D. Mahindrakar, and K. Sridharan, ―Mobile
robot navigation
through a hardware-efficient implementation for control-lawbased
construction of generalized Voronoi diagram,‖ IEEE/ASME Trans.
Mechatronics, vol. 16, no. 6, pp. 1083–1095, Dec. 2011.
[7] M. Collotta, G. Nicolosi, E. Toscano, and O. Mirabella, ―A
ZigBee-based
network for home heating control,‖ in Proc. 34th Annu. Conf. IEEE
Ind.
Electron. Soc., Nov., 2008, pp. 2724–2729.
[8] K. C. Lee and H. H Lee, ―Network-based fire-detection system
via controller
area network for smart home automation,‖ IEEE Trans. Consumer
Electron., vol. 50, no. 4, pp. 1093–1100, Nov. 2004.
[9] M. Hazas, J. Scott, and J. Krumm, ―Location-aware computing
comes of
age,‖ IEEE Computer, vol. 37, no. 2, pp. 95–97, Feb. 2004.