SlideShare a Scribd company logo
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
120
Surveillance Robot for Military Application
Using ARM
Kamalesh.V
Sri Ramakrishna Engineering College,
Department of ECE,
Kamalesh.1102075@srec.ac.in
KarthickRaj.C
Sri Ramakrishna Engineering College,
Department of ECE,
Karthickraj.1102067@srec.ac.in
Abstract— In the modern day robotics development in many field as too that enrich in military applications also as per that this robot
SURVEILLANCE MONITORING ROBOT FOR MILITARY APPLCATION USING ARM monitor the defense area that is in our
country borders. It is an forest area and every time commanders were not available in same area they move over different places at that
time terrorist can easily enter into our nation. This robot perform main role there that PIR sensor in the robot will send the intimation
and danger warning to the control room that unauthorized person entering that time we alert our soldiers to move to that place this
operation were control using ARM7 controller. Another important component GPS exactly say which position the robot is now
monitoring then it will be easy to soldiers to survey the area soon.And for communicating between control room and robot we are
using ZIGBEE.Another one sensor TEMPERATURE SENSOR LM35 is used to monitor temperature in that area that is used to
intimate us what is the temperature level in that area if any BOMB BLAST OR FIRE ACCIDENT in that area.
Index Terms—ARM7(LPC2148),PIR,ZIGBEE, GPS,TEMPERATURE SENSOR LM35,IR SENSOR.
INTRODUCTION
A robot may define as an electro-mechanical device, which is
capable of sensing its surrounding and taking its decision
(command).In general, robot must be able to move (by mechanical
movement), it must be able to sense (by transducer) and it should be
take decision (by remote control or artificial intelligence).A robo
vehicle which perform similar function as a soldiers.
A robot vehicle plays a vital role in a defense area to MONITOR
the DEFENCE AREA and send information to the control room.Its
bring our defense area more stronger. It also survey the forest area
from BOMB BLAST and FIRE ACCIDENT.We can also
operate.robot vehicle from our control room which brings more
advantage to defense area. The main goal of this paper is to make
more strong the defense area and save our nation from terrorist
attacks
2. RELATED WORK
Today, there are a number of robotic vehicle used in ARMY
with unique features and design criteria. In this section, brief of some
recent widely-used and/or Influential robotic vehicle is given.
Few popular vehicle are
2.1.110 First Look
Route/Building Clearance
The regimented and thorough sweep of a route between
points or in a specific area or building is based on predictive
intelligence and the ability to identify risks and threats as quickly as
possible.
Unmanned ground vehicle technology from iRobot is equipped
with a mature set of cameras, two-way audio capabilities and can be
configured with numerous external sensors and tools to provide
much needed predictive intelligence in the sweep of a route or
building and saves time on-task for responders
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
121
Fig. 1.First Look
2.2.510 PackBot
Bomb Disposal/ Explosive Ordnance Disposal (EOD)
Unmanned ground vehicle systems have integrated into military
and public safety teams to increase the safe-distance for the operator
and enable the controlled neutralization of the device.
Each of iRobot’s unmanned ground vehicle systems are able to
perform Bomb Disposal/EOD actions and have been deployed for
the safe detonation of devices by the military and Public Safety
Bomb Disposal and Bomb Squad teams. Each of our tactical robots
support a variety ofdisruptors with secure firing circuits, or deliver
charges to neutralize the risk.
Fig. 2.PackBot
II. HARDWARE ARCHITECTURE
TABLE 1 - COMPARISON OF LOCALIZATION
METHODS
A. Wireless Communication Platform
WPIR system is a system-on-chip for wireless sensor
networkingZigBeeIEEE 802.15.4 solutions. Texas Instrument
(TI) CC2431 is suitable for systems, where ultralow power
consumption is required.
B. Pyroelectric Sensor Module
The PIR sensor transforms incident IR radiation into an
electricalsignal. Fig. 3 shows that PIR detects changes in temperature
coinciding with movement of a person (or object) in the
detection area. A human walking through a PIR sensor detecting
region and the corresponding output signal is shown in Fig. 3.
Fig. 3. Operation of a pyroelectric motion sensor.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
122
Fig. 4. Experimental platform integrated with CC2431 and a PIR
sensor.
C. Wireless and Pyroelectric Sensor System
In this study, we develop a WPIR system with a CC2431
wirelesstransceivermodule and a PIR sensor, as shown in Fig. 4.
Further details of the design principle can be found in [24].
3. MICROCONTROLLER
ARM 7 TDMI microcontroller is used as hardware platform.It is
controlling unit to all
othercomponents(GPS,motors,ZIGBEE,LM35,PIR,IR SENSOR)
are interfaced.Two microcontrollers are used in this project one at
Transmitting end(PIC) and one at Receving end (ARM).
Fig. 4. Pin Diagram LPC2148
4. ZIGBEE MODULE
ZigBee is a specification for a suite of high-level
communication protocols used to create personal area networks built
from small, low-power digital radios. ZigBee is based on an IEEE
802.15 standard though its low powerconsumption limits
transmission distances to 10–100 meters line-of-sight depending on
power output and environmental characteristics, ZigBee devices can
transmit data over long distances by passing data through a mesh
network of intermediate devices to reach more distant ones. ZigBee
is typically used in low data rate applications that require long
battery life and secure networking (ZigBee networks are secured by
128 bit symmetric encryption keys.) ZigBee has a defined rate of 250
Kbit/s, best suited for intermittent data transmissions from a sensor
or input device
APPLICATIONS
 Home Entertainment and Control
 Wireless sensor networks
 Industrial control
 Embedded sensing
 Medical data collection
 Smoke and intruder warning
 Building automation
Fig. 5. Pin Diagram Zigbee Module
5. GPS MODULE
A GPS navigation device is a device that accurately
calculates geographical location by receiving information from GPS
satellites. Initially it was used by the United States military, but now
most receivers are in automobiles and smartphones.The Global
Positioning System (GPS) is a satellite-based navigation system
made up of a network of 24 satellites placed into orbit by the U.S.
Department of Defense. Military actions was the original intent for
GPS, however in the 1980s, the U.S. government decided to allow
the GPS program to be used by civilians. The satellite data is free
and works anywhere in theworld.
6.TEMPERATURE SENSOR(LM 35)
LM35 is a precision IC temperature sensor with its output
proportional to the temperature (in oC). The sensor circuitry is sealed
and therefore it is not subjected to oxidation and other processes.
With LM35, temperature can be measured more accurately than with
a thermistor. It also possess low self heating and does not cause more
than 0.1 oC temperature rise in still air. The operating temperature
range is from -55°C to 150°C. The output voltage varies by 10mV in
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
123
response to every oC rise/fall in ambient temperature, i.e., its scale
factor is 0.01V/ oC.
Fig. 6. Pin Diagram LM 35
7. CONTROL ROOM SETUP
In the control room normal pc is used to communicate with
robot using interface of pic and Zigbeeand simple .net coding is
return for simple user inter face and that screen consist of
 Motor control
 Camera rotation control
 Temperature status
 Location of robot
Fig. 7. Control Room Screen.
8.RF LOCALIZATION SYSTEM
A. Received Signal Strength
RSS is defined as the voltage measured from RSS indicator
circuit. RSS signals can be measured via the receiver without
additional energy requirements while communication is
established. RSS measurement is a relatively inexpensive and
easy implementation method. It is very useful in localization
research.
1)Statistical Model: The most widely used signal propagation
model is based on a variety of empirical results [25]–[28]
and analyses of evidence [29]:
  XddnpPdPd  0/log10 __________(1).
as path loss exponent typically between 2 and 4 [25], and Xσis
a Gaussian random variable with zero mean and σ2 variance.
The d and d0 in (1) is defined as estimated distance and
reference distance, respectively.
2) Cram´er–Rao Bound Formulation:The Cram´er–Rao
bound (CRB) calculates a lower bound on the covariance of
any unbiased location estimator, which is useful to the developer.
The CRB can be used to test localization algorithms and
the bound’s functional dependence. A detailed derivation of the
CRBis provided in [30]. The most notable advantage of theCRB
is that the lower bound on estimation variance can be calculated.
All that is required is to calculate a CRB of the random
measurements.
The CRB can be written as follows:
      1^/2^/2^   ZInfECov _____(2).
whereCov(ˆθ) is the covariance of the estimator, E[・] indicates
expected value, f(Z|θ) is the probability density function, Z is
the random measurement, and θ are the parameters that are to
be estimated from the measurements.
9. PIR DETECTION SYSTEM
The operation principle of PIR sensor is to detect the thermal
variation in its detection region. We test several scenarios and
record the response of the PIR sensor while the human or robot
moves under its detection region. The horizontal axis is time
stamps and vertical axis is the voltage response from the PIR
sensor, as shown in Figs. 3–5.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
124
Fig. 8. Human movement testing result. (a) Slow walk (0.5 m/s). (b)
Faster walk (1 m/s). (c) Run (2m/s).
Fig. 9. Robot movement testing result. (a) 20 cm/s. (b) 40 cm/s.
(c) 70 cm/s.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
125
10. CONCLUSION
Thus our paper brings our army more stronger in defense area. And
protect our nation and to save our country people and soldiers. Many
interfacing devices may give research opportunity. This type of
vehicle brings more stronger for the military and effective in
searching the TERRORIST with the help of army man. The below
diagrams shows the tracking in human with the help of PIR sensor
and multi level tracking are also available.
Fig. 10. RF error bound.
Fig.9. PIR sensing system.
Fig. 8. Find CoG from WPIR system.
REFERENCES
[1] H. Koyuncu and S. H. Yan, ―A survey of indoor positioning and
object
locating systems,‖ IJCSNS Int. J. Comput. Sci. Netw. Security, vol.
10,
no. 5, pp. 121–128, May 2010.
[2] Y. Gu, A. Lo, and I. Niemegeers, ―A survey of indoor positioning
systems
for wireless personal networks,‖ IEEE Commun. Surveys Tutorials,
vol. 11, no. 1, pp. 13–32, First Quarter 2009.
[3] H. S. Ahn and K. H. Ko, ―Simple pedestrian localization
algorithms based
on distributed wireless sensor networks,‖ IEEE Trans. Ind. Electron.,
vol. 56, no. 10, pp. 4296–4302, Oct. 2009.
[4] H. Chen, D. Sun, J. Yang, and J. Chen, ―Localization for
multirobot
formations in indoor environment,‖ IEEE/ASME Trans.
Mechatronics,
vol. 15, no. 4, pp. 561–574, Aug. 2010.
[5] H.Mehrjerdi,M. Saad, and J. Ghommam, ―Hierarchical fuzzy
cooperative
control and path following for a team of mobile robots,‖
IEEE/ASME
Trans. Mechatronics, vol. 16, no. 5, pp. 907–917, Oct. 2011.
[6] L. Vachhani, A. D. Mahindrakar, and K. Sridharan, ―Mobile
robot navigation
through a hardware-efficient implementation for control-lawbased
construction of generalized Voronoi diagram,‖ IEEE/ASME Trans.
Mechatronics, vol. 16, no. 6, pp. 1083–1095, Dec. 2011.
[7] M. Collotta, G. Nicolosi, E. Toscano, and O. Mirabella, ―A
ZigBee-based
network for home heating control,‖ in Proc. 34th Annu. Conf. IEEE
Ind.
Electron. Soc., Nov., 2008, pp. 2724–2729.
[8] K. C. Lee and H. H Lee, ―Network-based fire-detection system
via controller
area network for smart home automation,‖ IEEE Trans. Consumer
Electron., vol. 50, no. 4, pp. 1093–1100, Nov. 2004.
[9] M. Hazas, J. Scott, and J. Krumm, ―Location-aware computing
comes of
age,‖ IEEE Computer, vol. 37, no. 2, pp. 95–97, Feb. 2004.

More Related Content

What's hot

Wireless robot ppt
Wireless robot pptWireless robot ppt
Wireless robot pptVarun B P
 
War robot with night vision camera android application
War robot with night vision camera  android applicationWar robot with night vision camera  android application
War robot with night vision camera android application
Dheeraj Kumar
 
Wireless bomb disposal robot ppt
Wireless bomb disposal robot pptWireless bomb disposal robot ppt
Wireless bomb disposal robot pptAbhishek Gupta
 
Cell Phone Operated Robot
Cell Phone Operated RobotCell Phone Operated Robot
Cell Phone Operated Robot
Aniket Bhor
 
Ppt
PptPpt
REMOTE OPERATED SPY ROBO PPT
REMOTE OPERATED SPY ROBO PPTREMOTE OPERATED SPY ROBO PPT
REMOTE OPERATED SPY ROBO PPTkiran bansod
 
Robotics
RoboticsRobotics
Robotics
PREMKUMAR
 
BOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPSBOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPS
JOLLUSUDARSHANREDDY
 
Wireless Bomb Disposal Robot
Wireless Bomb Disposal RobotWireless Bomb Disposal Robot
Wireless Bomb Disposal RobotAbhishek Gupta
 
Project on gsm based mobile controlling robot
Project on gsm based mobile controlling robotProject on gsm based mobile controlling robot
Project on gsm based mobile controlling robot
Anwarul Islam Mithu
 
Zigbee based metal detecting robot to assist bomb detection and rescue team
Zigbee based metal detecting robot to assist bomb detection and rescue teamZigbee based metal detecting robot to assist bomb detection and rescue team
Zigbee based metal detecting robot to assist bomb detection and rescue team
shiva kumar cheruku
 
Human Detection Robot
Human Detection RobotHuman Detection Robot
Human Detection Robot
Samiul Bapon
 
Android controlled robot
Android controlled robotAndroid controlled robot
Android controlled robot
Satyendra Gupta
 
Increasing Safety Bomb Disposal missions
Increasing Safety Bomb Disposal missions  Increasing Safety Bomb Disposal missions
Increasing Safety Bomb Disposal missions
charan gotte
 
surveillance and metal detecting robot
surveillance and metal detecting robotsurveillance and metal detecting robot
surveillance and metal detecting robotDeepshika Reddy
 
Cell Phone Controlled Robotic Vehicle
Cell Phone Controlled Robotic VehicleCell Phone Controlled Robotic Vehicle
Cell Phone Controlled Robotic Vehicle
Edgefxkits & Solutions
 
War Field Spying Robot with Fire Fighting Alarm.
War Field Spying Robot with Fire Fighting Alarm.War Field Spying Robot with Fire Fighting Alarm.
War Field Spying Robot with Fire Fighting Alarm.
vansh_raheja
 
Bluetooth Controlled Robot/Car
Bluetooth Controlled Robot/CarBluetooth Controlled Robot/Car
Bluetooth Controlled Robot/Car
Varun A M
 

What's hot (20)

Wireless robot ppt
Wireless robot pptWireless robot ppt
Wireless robot ppt
 
War robot with night vision camera android application
War robot with night vision camera  android applicationWar robot with night vision camera  android application
War robot with night vision camera android application
 
Wireless bomb disposal robot ppt
Wireless bomb disposal robot pptWireless bomb disposal robot ppt
Wireless bomb disposal robot ppt
 
Cell Phone Operated Robot
Cell Phone Operated RobotCell Phone Operated Robot
Cell Phone Operated Robot
 
Ppt
PptPpt
Ppt
 
REMOTE OPERATED SPY ROBO PPT
REMOTE OPERATED SPY ROBO PPTREMOTE OPERATED SPY ROBO PPT
REMOTE OPERATED SPY ROBO PPT
 
Robotics
RoboticsRobotics
Robotics
 
BOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPSBOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPS
 
Wireless Bomb Disposal Robot
Wireless Bomb Disposal RobotWireless Bomb Disposal Robot
Wireless Bomb Disposal Robot
 
Project on gsm based mobile controlling robot
Project on gsm based mobile controlling robotProject on gsm based mobile controlling robot
Project on gsm based mobile controlling robot
 
Zigbee based metal detecting robot to assist bomb detection and rescue team
Zigbee based metal detecting robot to assist bomb detection and rescue teamZigbee based metal detecting robot to assist bomb detection and rescue team
Zigbee based metal detecting robot to assist bomb detection and rescue team
 
Flying robot
Flying robot Flying robot
Flying robot
 
Human Detection Robot
Human Detection RobotHuman Detection Robot
Human Detection Robot
 
Android controlled robot
Android controlled robotAndroid controlled robot
Android controlled robot
 
Major
MajorMajor
Major
 
Increasing Safety Bomb Disposal missions
Increasing Safety Bomb Disposal missions  Increasing Safety Bomb Disposal missions
Increasing Safety Bomb Disposal missions
 
surveillance and metal detecting robot
surveillance and metal detecting robotsurveillance and metal detecting robot
surveillance and metal detecting robot
 
Cell Phone Controlled Robotic Vehicle
Cell Phone Controlled Robotic VehicleCell Phone Controlled Robotic Vehicle
Cell Phone Controlled Robotic Vehicle
 
War Field Spying Robot with Fire Fighting Alarm.
War Field Spying Robot with Fire Fighting Alarm.War Field Spying Robot with Fire Fighting Alarm.
War Field Spying Robot with Fire Fighting Alarm.
 
Bluetooth Controlled Robot/Car
Bluetooth Controlled Robot/CarBluetooth Controlled Robot/Car
Bluetooth Controlled Robot/Car
 

Viewers also liked

Rover+ +a+wi fi+video+surveillance+remote+robot++powered+by+pcduino-2
Rover+ +a+wi fi+video+surveillance+remote+robot++powered+by+pcduino-2Rover+ +a+wi fi+video+surveillance+remote+robot++powered+by+pcduino-2
Rover+ +a+wi fi+video+surveillance+remote+robot++powered+by+pcduino-2Trust Marongedze
 
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
nurul ain
 
Development Of An Internet Controlled Surveillance Mobile Robot Part1
Development Of An Internet Controlled Surveillance Mobile Robot Part1Development Of An Internet Controlled Surveillance Mobile Robot Part1
Development Of An Internet Controlled Surveillance Mobile Robot Part1mimi
 
Surveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the InternetSurveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the Internet
SHOEB SHAH
 
Bomb Identification & Detection
Bomb Identification & DetectionBomb Identification & Detection
Bomb Identification & Detection
jhaymz02
 
Android controlled robot
Android controlled robotAndroid controlled robot
Android controlled robotBen Johnke
 

Viewers also liked (6)

Rover+ +a+wi fi+video+surveillance+remote+robot++powered+by+pcduino-2
Rover+ +a+wi fi+video+surveillance+remote+robot++powered+by+pcduino-2Rover+ +a+wi fi+video+surveillance+remote+robot++powered+by+pcduino-2
Rover+ +a+wi fi+video+surveillance+remote+robot++powered+by+pcduino-2
 
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
Development Of An Internet Controlled Surveillance Mobile Robot (Student2)
 
Development Of An Internet Controlled Surveillance Mobile Robot Part1
Development Of An Internet Controlled Surveillance Mobile Robot Part1Development Of An Internet Controlled Surveillance Mobile Robot Part1
Development Of An Internet Controlled Surveillance Mobile Robot Part1
 
Surveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the InternetSurveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the Internet
 
Bomb Identification & Detection
Bomb Identification & DetectionBomb Identification & Detection
Bomb Identification & Detection
 
Android controlled robot
Android controlled robotAndroid controlled robot
Android controlled robot
 

Similar to Surveillance Robot for Military Application Using ARM

IRJET- Wireless Controlled Robot for Bomb Detection and Defusion
IRJET- Wireless Controlled Robot for Bomb Detection and DefusionIRJET- Wireless Controlled Robot for Bomb Detection and Defusion
IRJET- Wireless Controlled Robot for Bomb Detection and Defusion
IRJET Journal
 
Robots for surveillance in military applications
Robots for surveillance in military applicationsRobots for surveillance in military applications
Robots for surveillance in military applications
IAEME Publication
 
Defense Robotic Model For War Field Using XBee (REPORT)
Defense Robotic Model For War Field Using XBee  (REPORT)Defense Robotic Model For War Field Using XBee  (REPORT)
Defense Robotic Model For War Field Using XBee (REPORT)
WizApsProjects
 
Smart Security System Using ARM And XBee For Boarder Areas (REPORT)
Smart Security System  Using ARM And XBee For Boarder Areas  (REPORT)Smart Security System  Using ARM And XBee For Boarder Areas  (REPORT)
Smart Security System Using ARM And XBee For Boarder Areas (REPORT)
WizApsProjects
 
White Line Follower Using Fire Bird V Robot
White Line Follower Using Fire Bird V RobotWhite Line Follower Using Fire Bird V Robot
White Line Follower Using Fire Bird V Robot
IJSRD
 
Jun 13 ijbi_002
Jun 13 ijbi_002Jun 13 ijbi_002
Jun 13 ijbi_002
anuj87420
 
Jun 13 ijbi_002
Jun 13 ijbi_002Jun 13 ijbi_002
Jun 13 ijbi_002
Anuj Raj
 
IRJET- Wireless Multifunctional Robot for Military Applications
IRJET-  	  Wireless Multifunctional Robot for Military ApplicationsIRJET-  	  Wireless Multifunctional Robot for Military Applications
IRJET- Wireless Multifunctional Robot for Military Applications
IRJET Journal
 
IRJET- Unmanned Ground Vehicle for Military Assistance
IRJET-  	  Unmanned Ground Vehicle for Military AssistanceIRJET-  	  Unmanned Ground Vehicle for Military Assistance
IRJET- Unmanned Ground Vehicle for Military Assistance
IRJET Journal
 
IRJET- Intelligent Robot for Surveillance
IRJET- Intelligent Robot for SurveillanceIRJET- Intelligent Robot for Surveillance
IRJET- Intelligent Robot for Surveillance
IRJET Journal
 
IRJET - High Frequency Landmine Detection Robot
IRJET -  	  High Frequency Landmine Detection RobotIRJET -  	  High Frequency Landmine Detection Robot
IRJET - High Frequency Landmine Detection Robot
IRJET Journal
 
Implementation of flex sensor for hand gesture based wireless automation of j...
Implementation of flex sensor for hand gesture based wireless automation of j...Implementation of flex sensor for hand gesture based wireless automation of j...
Implementation of flex sensor for hand gesture based wireless automation of j...
eSAT Journals
 
Live Human Detecting Robot for Earthquake Rescue Operation
Live Human Detecting Robot for Earthquake Rescue OperationLive Human Detecting Robot for Earthquake Rescue Operation
Live Human Detecting Robot for Earthquake Rescue Operation
ijcnes
 
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Designing of Smart Rescue Robotics System
Designing of Smart Rescue  Robotics  SystemDesigning of Smart Rescue  Robotics  System
Designing of Smart Rescue Robotics System
IRJET Journal
 
Paper robot
Paper robotPaper robot
Paper robot
Akhil Ajith
 
IRJET- Implementation of Cloud Robotics using Raspberry PI to Monitor Product...
IRJET- Implementation of Cloud Robotics using Raspberry PI to Monitor Product...IRJET- Implementation of Cloud Robotics using Raspberry PI to Monitor Product...
IRJET- Implementation of Cloud Robotics using Raspberry PI to Monitor Product...
IRJET Journal
 
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
ijsrd.com
 
Machine Vision Based Fire Flame Detection using Multi Features
Machine Vision Based Fire Flame Detection using Multi FeaturesMachine Vision Based Fire Flame Detection using Multi Features
Machine Vision Based Fire Flame Detection using Multi Features
IRJET Journal
 

Similar to Surveillance Robot for Military Application Using ARM (20)

IRJET- Wireless Controlled Robot for Bomb Detection and Defusion
IRJET- Wireless Controlled Robot for Bomb Detection and DefusionIRJET- Wireless Controlled Robot for Bomb Detection and Defusion
IRJET- Wireless Controlled Robot for Bomb Detection and Defusion
 
Robots for surveillance in military applications
Robots for surveillance in military applicationsRobots for surveillance in military applications
Robots for surveillance in military applications
 
Defense Robotic Model For War Field Using XBee (REPORT)
Defense Robotic Model For War Field Using XBee  (REPORT)Defense Robotic Model For War Field Using XBee  (REPORT)
Defense Robotic Model For War Field Using XBee (REPORT)
 
Smart Security System Using ARM And XBee For Boarder Areas (REPORT)
Smart Security System  Using ARM And XBee For Boarder Areas  (REPORT)Smart Security System  Using ARM And XBee For Boarder Areas  (REPORT)
Smart Security System Using ARM And XBee For Boarder Areas (REPORT)
 
White Line Follower Using Fire Bird V Robot
White Line Follower Using Fire Bird V RobotWhite Line Follower Using Fire Bird V Robot
White Line Follower Using Fire Bird V Robot
 
Jun 13 ijbi_002
Jun 13 ijbi_002Jun 13 ijbi_002
Jun 13 ijbi_002
 
Jun 13 ijbi_002
Jun 13 ijbi_002Jun 13 ijbi_002
Jun 13 ijbi_002
 
PERSON ALIVE DETECTION
PERSON ALIVE DETECTIONPERSON ALIVE DETECTION
PERSON ALIVE DETECTION
 
IRJET- Wireless Multifunctional Robot for Military Applications
IRJET-  	  Wireless Multifunctional Robot for Military ApplicationsIRJET-  	  Wireless Multifunctional Robot for Military Applications
IRJET- Wireless Multifunctional Robot for Military Applications
 
IRJET- Unmanned Ground Vehicle for Military Assistance
IRJET-  	  Unmanned Ground Vehicle for Military AssistanceIRJET-  	  Unmanned Ground Vehicle for Military Assistance
IRJET- Unmanned Ground Vehicle for Military Assistance
 
IRJET- Intelligent Robot for Surveillance
IRJET- Intelligent Robot for SurveillanceIRJET- Intelligent Robot for Surveillance
IRJET- Intelligent Robot for Surveillance
 
IRJET - High Frequency Landmine Detection Robot
IRJET -  	  High Frequency Landmine Detection RobotIRJET -  	  High Frequency Landmine Detection Robot
IRJET - High Frequency Landmine Detection Robot
 
Implementation of flex sensor for hand gesture based wireless automation of j...
Implementation of flex sensor for hand gesture based wireless automation of j...Implementation of flex sensor for hand gesture based wireless automation of j...
Implementation of flex sensor for hand gesture based wireless automation of j...
 
Live Human Detecting Robot for Earthquake Rescue Operation
Live Human Detecting Robot for Earthquake Rescue OperationLive Human Detecting Robot for Earthquake Rescue Operation
Live Human Detecting Robot for Earthquake Rescue Operation
 
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
 
Designing of Smart Rescue Robotics System
Designing of Smart Rescue  Robotics  SystemDesigning of Smart Rescue  Robotics  System
Designing of Smart Rescue Robotics System
 
Paper robot
Paper robotPaper robot
Paper robot
 
IRJET- Implementation of Cloud Robotics using Raspberry PI to Monitor Product...
IRJET- Implementation of Cloud Robotics using Raspberry PI to Monitor Product...IRJET- Implementation of Cloud Robotics using Raspberry PI to Monitor Product...
IRJET- Implementation of Cloud Robotics using Raspberry PI to Monitor Product...
 
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
 
Machine Vision Based Fire Flame Detection using Multi Features
Machine Vision Based Fire Flame Detection using Multi FeaturesMachine Vision Based Fire Flame Detection using Multi Features
Machine Vision Based Fire Flame Detection using Multi Features
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
IJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
IJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
IJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
IJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
IJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
IJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
IJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
IJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
IJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
IJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
IJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
IJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
IJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
IJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
IJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 

Surveillance Robot for Military Application Using ARM

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 120 Surveillance Robot for Military Application Using ARM Kamalesh.V Sri Ramakrishna Engineering College, Department of ECE, Kamalesh.1102075@srec.ac.in KarthickRaj.C Sri Ramakrishna Engineering College, Department of ECE, Karthickraj.1102067@srec.ac.in Abstract— In the modern day robotics development in many field as too that enrich in military applications also as per that this robot SURVEILLANCE MONITORING ROBOT FOR MILITARY APPLCATION USING ARM monitor the defense area that is in our country borders. It is an forest area and every time commanders were not available in same area they move over different places at that time terrorist can easily enter into our nation. This robot perform main role there that PIR sensor in the robot will send the intimation and danger warning to the control room that unauthorized person entering that time we alert our soldiers to move to that place this operation were control using ARM7 controller. Another important component GPS exactly say which position the robot is now monitoring then it will be easy to soldiers to survey the area soon.And for communicating between control room and robot we are using ZIGBEE.Another one sensor TEMPERATURE SENSOR LM35 is used to monitor temperature in that area that is used to intimate us what is the temperature level in that area if any BOMB BLAST OR FIRE ACCIDENT in that area. Index Terms—ARM7(LPC2148),PIR,ZIGBEE, GPS,TEMPERATURE SENSOR LM35,IR SENSOR. INTRODUCTION A robot may define as an electro-mechanical device, which is capable of sensing its surrounding and taking its decision (command).In general, robot must be able to move (by mechanical movement), it must be able to sense (by transducer) and it should be take decision (by remote control or artificial intelligence).A robo vehicle which perform similar function as a soldiers. A robot vehicle plays a vital role in a defense area to MONITOR the DEFENCE AREA and send information to the control room.Its bring our defense area more stronger. It also survey the forest area from BOMB BLAST and FIRE ACCIDENT.We can also operate.robot vehicle from our control room which brings more advantage to defense area. The main goal of this paper is to make more strong the defense area and save our nation from terrorist attacks 2. RELATED WORK Today, there are a number of robotic vehicle used in ARMY with unique features and design criteria. In this section, brief of some recent widely-used and/or Influential robotic vehicle is given. Few popular vehicle are 2.1.110 First Look Route/Building Clearance The regimented and thorough sweep of a route between points or in a specific area or building is based on predictive intelligence and the ability to identify risks and threats as quickly as possible. Unmanned ground vehicle technology from iRobot is equipped with a mature set of cameras, two-way audio capabilities and can be configured with numerous external sensors and tools to provide much needed predictive intelligence in the sweep of a route or building and saves time on-task for responders
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 121 Fig. 1.First Look 2.2.510 PackBot Bomb Disposal/ Explosive Ordnance Disposal (EOD) Unmanned ground vehicle systems have integrated into military and public safety teams to increase the safe-distance for the operator and enable the controlled neutralization of the device. Each of iRobot’s unmanned ground vehicle systems are able to perform Bomb Disposal/EOD actions and have been deployed for the safe detonation of devices by the military and Public Safety Bomb Disposal and Bomb Squad teams. Each of our tactical robots support a variety ofdisruptors with secure firing circuits, or deliver charges to neutralize the risk. Fig. 2.PackBot II. HARDWARE ARCHITECTURE TABLE 1 - COMPARISON OF LOCALIZATION METHODS A. Wireless Communication Platform WPIR system is a system-on-chip for wireless sensor networkingZigBeeIEEE 802.15.4 solutions. Texas Instrument (TI) CC2431 is suitable for systems, where ultralow power consumption is required. B. Pyroelectric Sensor Module The PIR sensor transforms incident IR radiation into an electricalsignal. Fig. 3 shows that PIR detects changes in temperature coinciding with movement of a person (or object) in the detection area. A human walking through a PIR sensor detecting region and the corresponding output signal is shown in Fig. 3. Fig. 3. Operation of a pyroelectric motion sensor.
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 122 Fig. 4. Experimental platform integrated with CC2431 and a PIR sensor. C. Wireless and Pyroelectric Sensor System In this study, we develop a WPIR system with a CC2431 wirelesstransceivermodule and a PIR sensor, as shown in Fig. 4. Further details of the design principle can be found in [24]. 3. MICROCONTROLLER ARM 7 TDMI microcontroller is used as hardware platform.It is controlling unit to all othercomponents(GPS,motors,ZIGBEE,LM35,PIR,IR SENSOR) are interfaced.Two microcontrollers are used in this project one at Transmitting end(PIC) and one at Receving end (ARM). Fig. 4. Pin Diagram LPC2148 4. ZIGBEE MODULE ZigBee is a specification for a suite of high-level communication protocols used to create personal area networks built from small, low-power digital radios. ZigBee is based on an IEEE 802.15 standard though its low powerconsumption limits transmission distances to 10–100 meters line-of-sight depending on power output and environmental characteristics, ZigBee devices can transmit data over long distances by passing data through a mesh network of intermediate devices to reach more distant ones. ZigBee is typically used in low data rate applications that require long battery life and secure networking (ZigBee networks are secured by 128 bit symmetric encryption keys.) ZigBee has a defined rate of 250 Kbit/s, best suited for intermittent data transmissions from a sensor or input device APPLICATIONS  Home Entertainment and Control  Wireless sensor networks  Industrial control  Embedded sensing  Medical data collection  Smoke and intruder warning  Building automation Fig. 5. Pin Diagram Zigbee Module 5. GPS MODULE A GPS navigation device is a device that accurately calculates geographical location by receiving information from GPS satellites. Initially it was used by the United States military, but now most receivers are in automobiles and smartphones.The Global Positioning System (GPS) is a satellite-based navigation system made up of a network of 24 satellites placed into orbit by the U.S. Department of Defense. Military actions was the original intent for GPS, however in the 1980s, the U.S. government decided to allow the GPS program to be used by civilians. The satellite data is free and works anywhere in theworld. 6.TEMPERATURE SENSOR(LM 35) LM35 is a precision IC temperature sensor with its output proportional to the temperature (in oC). The sensor circuitry is sealed and therefore it is not subjected to oxidation and other processes. With LM35, temperature can be measured more accurately than with a thermistor. It also possess low self heating and does not cause more than 0.1 oC temperature rise in still air. The operating temperature range is from -55°C to 150°C. The output voltage varies by 10mV in
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 123 response to every oC rise/fall in ambient temperature, i.e., its scale factor is 0.01V/ oC. Fig. 6. Pin Diagram LM 35 7. CONTROL ROOM SETUP In the control room normal pc is used to communicate with robot using interface of pic and Zigbeeand simple .net coding is return for simple user inter face and that screen consist of  Motor control  Camera rotation control  Temperature status  Location of robot Fig. 7. Control Room Screen. 8.RF LOCALIZATION SYSTEM A. Received Signal Strength RSS is defined as the voltage measured from RSS indicator circuit. RSS signals can be measured via the receiver without additional energy requirements while communication is established. RSS measurement is a relatively inexpensive and easy implementation method. It is very useful in localization research. 1)Statistical Model: The most widely used signal propagation model is based on a variety of empirical results [25]–[28] and analyses of evidence [29]:   XddnpPdPd  0/log10 __________(1). as path loss exponent typically between 2 and 4 [25], and Xσis a Gaussian random variable with zero mean and σ2 variance. The d and d0 in (1) is defined as estimated distance and reference distance, respectively. 2) Cram´er–Rao Bound Formulation:The Cram´er–Rao bound (CRB) calculates a lower bound on the covariance of any unbiased location estimator, which is useful to the developer. The CRB can be used to test localization algorithms and the bound’s functional dependence. A detailed derivation of the CRBis provided in [30]. The most notable advantage of theCRB is that the lower bound on estimation variance can be calculated. All that is required is to calculate a CRB of the random measurements. The CRB can be written as follows:       1^/2^/2^   ZInfECov _____(2). whereCov(ˆθ) is the covariance of the estimator, E[・] indicates expected value, f(Z|θ) is the probability density function, Z is the random measurement, and θ are the parameters that are to be estimated from the measurements. 9. PIR DETECTION SYSTEM The operation principle of PIR sensor is to detect the thermal variation in its detection region. We test several scenarios and record the response of the PIR sensor while the human or robot moves under its detection region. The horizontal axis is time stamps and vertical axis is the voltage response from the PIR sensor, as shown in Figs. 3–5.
  • 5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 124 Fig. 8. Human movement testing result. (a) Slow walk (0.5 m/s). (b) Faster walk (1 m/s). (c) Run (2m/s). Fig. 9. Robot movement testing result. (a) 20 cm/s. (b) 40 cm/s. (c) 70 cm/s.
  • 6. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 125 10. CONCLUSION Thus our paper brings our army more stronger in defense area. And protect our nation and to save our country people and soldiers. Many interfacing devices may give research opportunity. This type of vehicle brings more stronger for the military and effective in searching the TERRORIST with the help of army man. The below diagrams shows the tracking in human with the help of PIR sensor and multi level tracking are also available. Fig. 10. RF error bound. Fig.9. PIR sensing system. Fig. 8. Find CoG from WPIR system. REFERENCES [1] H. Koyuncu and S. H. Yan, ―A survey of indoor positioning and object locating systems,‖ IJCSNS Int. J. Comput. Sci. Netw. Security, vol. 10, no. 5, pp. 121–128, May 2010. [2] Y. Gu, A. Lo, and I. Niemegeers, ―A survey of indoor positioning systems for wireless personal networks,‖ IEEE Commun. Surveys Tutorials, vol. 11, no. 1, pp. 13–32, First Quarter 2009. [3] H. S. Ahn and K. H. Ko, ―Simple pedestrian localization algorithms based on distributed wireless sensor networks,‖ IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4296–4302, Oct. 2009. [4] H. Chen, D. Sun, J. Yang, and J. Chen, ―Localization for multirobot formations in indoor environment,‖ IEEE/ASME Trans. Mechatronics, vol. 15, no. 4, pp. 561–574, Aug. 2010. [5] H.Mehrjerdi,M. Saad, and J. Ghommam, ―Hierarchical fuzzy cooperative control and path following for a team of mobile robots,‖ IEEE/ASME Trans. Mechatronics, vol. 16, no. 5, pp. 907–917, Oct. 2011. [6] L. Vachhani, A. D. Mahindrakar, and K. Sridharan, ―Mobile robot navigation through a hardware-efficient implementation for control-lawbased construction of generalized Voronoi diagram,‖ IEEE/ASME Trans. Mechatronics, vol. 16, no. 6, pp. 1083–1095, Dec. 2011. [7] M. Collotta, G. Nicolosi, E. Toscano, and O. Mirabella, ―A ZigBee-based network for home heating control,‖ in Proc. 34th Annu. Conf. IEEE Ind. Electron. Soc., Nov., 2008, pp. 2724–2729. [8] K. C. Lee and H. H Lee, ―Network-based fire-detection system via controller area network for smart home automation,‖ IEEE Trans. Consumer Electron., vol. 50, no. 4, pp. 1093–1100, Nov. 2004. [9] M. Hazas, J. Scott, and J. Krumm, ―Location-aware computing comes of age,‖ IEEE Computer, vol. 37, no. 2, pp. 95–97, Feb. 2004.