SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2318
Military Spy Robot with Intelligent Destruction
T. SWETHA 1, V. KEREN MELINDA 2, M. HANNAH SHARON3, G. KAVIYA4
1Assistant Professor, Department of Electronics and Communication Engineering, Panimalar Institute of
Technology Chennai, Tamil Nadu, India
2,3,4Department of Electronics and Communication Engineering, Panimalar Institute of Technology Chennai,
Tamil Nadu, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract -Nowadays, the surveillance of the military border areas is an arduous task. The border guarding forces are
safeguarding the border seriously, but it is very difficult to watch the border at every moment and often leads to the terrible
death of the army soldier, so to overcome these consequences we use a RPA robot which automatically detects the trespassers,
that is placed on the surface plan the control areas. It encrypts a unique code via camera authorised for the trespassers and
compares the unique id with the database that interprets and differentiate from the unauthorised trespassers. If this unique
code mismatches, then the signal is sent to the Arduino through relay whereby it automatically activates the bomb and
destructs the trespassers. The aim of this paper is to reduce the loss of army men at the line of control on the border areas by
replacing with the intelligent destructible automated robots which also safeguard our country by not allowing the
unauthorised trespassers and another source of any harmed army vehicle to pass through the targeted borders. This project is
more compact so to make it cost efficient. The Robot’s default instructions that are present in the database, set by the Military
Force.
Key Words: Border security, Military spy robot, Line of control, Database, Relay, Camera.
1. INTRODUCTION
In recent generations, it has been proved that the world is moving towards innovation with the automation of robots and
they not only help in the day to day life needs but also play an essential role in the defence workforce by replacing humans.
In-order to save mankind, they are really easy to implement and work at a much faster rate compared to a human with all
its essential components .Robots are much better at surveillance and destruction especially in the army field. It is done by
default preset programs on software with desired optimisations. Here the camera is used as main hardware as input to
extract the trespasser view of the image. The camera installations are widely flexible and much purposeful in direction
with all angles. With unstructured border line of control to survey the path of the borders to obtain the trespassers
through image acquisition and comparing the set values of the default from the database finally interpreting as two
platforms authorised and unauthorised. This type of combining software and hardware is involved in this thesis of Mil. Spy
robot with intelligent destruction, so- called embedded system.
1.1 SYSTEMOVERVIEW
The proposed conformity is a smart border surveillance system which can prove to be helpful in the Line of Control. It can
provide round the clock surveillance at the places at both, where the human deployment is possible and not possible due
to geographical, climatic or some other reasons. Multiple responses are possible depending upon the position of the
intruder concerning the border fence. as we have shown three different filters., (i.e. Gobar Filter, GLCM Filtering and also
Histogram)in different responses. At first, we use the Gobar filter. The significance of this principle is that the accuracy
with which one can measure a signal in one domain limits the attainable accuracy of the measurement in the other domain.
In simple, it also attains the optimal (lower bound) compromise between the localization in the time and frequency
domains; notice that the Gaussian function is an instance of a Gabor filter with centre frequency ω0 =0.Secondly, we use
the GLCM(Grey Level Co-Occurrence Matrix); they are the earliest techniques used for image texture analysis. The
Analytical procedure of assessing texture that considers the spatial relationship of pixels; is the grey-level co-occurrence
matrix, also called as the grey-level spatial dependence matrix. Thirdly, we use the Histogram. A good feature makes the
classifier’s job as easy as possible: It removes what is irrelevant to classification, such as the colors of clothing, shadows,
and whether the person wears a hat, but keeps all that distinguishes a person from somethingelse.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2319
FIGURE1: Block Diagram of overall system
FIGURE 2: The design flow chart of Mil Spy Robot and intelligent destruction
2. LITERATUREREVIEW
Implementation of spy robot for a surveillance system using internet protocol of raspberry pi. 2017 2nd IEEE
International Conference On Recent Trends In Electronics Information &Communication Technology, May19-20,
2017.
This spy robot system comprises the RaspberryPi (small single board computer),night vision pi camera and sensors. Here
the information regarding the detection of living objects by a PIR sensor is sent to the users through the web server,and
the pi camera captures the moving Object which is posted inside the webpage . This image then controls the user in the
control room, able to access the robot with wheel drive control buttons on the webpage. Finally, the movement of a robot
is also controlled automatically through obstacle detecting sensors to avoid the collision.
3. HARDWARE DESIGN ANDIMPLEMENTATION
Here in this project, we use the cost-efficient Arduino UNO R3. It is a microcontroller board which is based on the
ATmega328 (datasheet). It is inbuilt with 14 digital input/output pins (of which six can be used as PWM outputs), six
analogue inputs, a 16 MHz ceramic resonator, a USB connection. It also has a power jack, an ICSP header, and a reset
button. It contains all the necessary components which support the microcontroller; USB cable is used to connect it to the
computer with an AC-DC adapter or battery to get started. All other preceding boards differ from Arduino UNO in that it
does not use the FTDI USB-to-serial driver chip. Instead, it was featured by the Atmega16U2 (Atmega8U2 up to version R2)
programmed as a USB-to-serial converter. We also use here relay which is an electrically operated switch. It consists of a
set of operating contactterminals and also set of input terminals for single or multiple control signals, Here in this project,
once we find out whether it is authorised or unauthorised trespasser using unique code stored in Matlab, it sends a signal
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2320
to Arduino board through a relay. When it is unauthorised trespasser the relays switch indicates the Arduino to turn on
thealerting Buzzer(here the buzzer in this project indicates the bomb destructor)
FIGURE 3: Arduino UNO R-3 front and back
4. SOFTWARE DESIGN ANDIMPLEMENTATION
A. MATLAB
MATLAB (matrix laboratory) is used in this thesis to implement software computation also considered as programming
language. It is developed by MathWorks, always allows matrix manipulations, other plotting of functions and data,
implementation of math algorithms, create user interfaces, and interfacing the output .It uses simulink to show and
implement the sequence by programming Arduino.
B. Histograms of Oriented Gradients
In order to recognize the face and other possible image to detect the basic functions over the image the histogram of
oriented gradients is used. These algorithms are called object detectors. Possible tight bound one of the instances of
interest. For example, if you take detecting a pedestrian walking by a camera, you could start with a window that is
128pixelstall and 64 pixels wide enough: if the 2 to 1 aspect ratio of a rectangle is a literally a compromise between the
exact aspect ratio of a person viewed from the front and one viewed from the side with legs fully extended during a step
by step process. Getting the size of the window using many of 64 is a literally a convenience that reflects the assumption
that if the image of the person is significantly smaller than that then resolution will be insufficient to detect it so it is not
even worth trying it. The object detector then slides such a window over every image of the pyramid, perhaps in
increments of a few pixels—the increment is called the stride of the detector. Here the feature is fed to the classifier,
which tells whether the window contains a pedestrian. Where the answer is likely to be positive for a set of windows that
overlap the person’s image, so the detector then chooses a single pixel to represent each connected set of positive
classifier outputs. Here this note describes one way to construct a feature vector from a fixed-size window [1]. Whereby
the feature is specifically tuned to pedestrians. Where this leads to humans are important subjects in imagery, and is
therefore natural that the detection of humans in still images and video has drawn much attention in the literature.
FIGURE 4: Histogram of an image
C. GREY LEVEL CO-OCCURRENCE MATRICES
Finally, here the results that indicate that trace features outperform Haralick features when applied to CBIR.
FIGURE 5: Grey level co-occurrence
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2321
Figure 6: Project Image
5. CONCLUSION
The proposed system would be a great help in enhancing the security of our border areas, especially the regions facing
climatic or terrain conditions where human deployment is a major peril. Although the system may not be able to provide
advanced border security, it can surely provide solutions to border security surveillance on a smaller scale. As the system
detects intruders (unauthorised), it destructs an area around 100m. The smart border surveillance system, cannot only
assist the defense forces in enhancing the security of border areas but also it can help to save the lifespan of a soldier. It
involves the use of advanced technology; keeping in mind the cost effectiveness of the constituent modules of the system
with a goal that any infiltration recognized at results can be destroyed immediately. Appropriate exploitation of the system
may help our border security forces to control those unnecessary and suspicious activities in a better and accurate way. In
future, we can design this system on a larger scale. As with the passing time, the technology is constantly improving; the
system can be equipped with more advanced and sophisticated hardware. The camera, the object detection mechanism
and response mechanism, if made using the state-of-the-art technology, can make the working of the proposed system
even more exact and time-saving. As of now, this research will further be made longer to design and develop, the
surveillance system based on the proposed architecture. Also, the experiments will be conducted, and the results will be
recorded for furtherbetterment.
ACKNOWLEDGMENT
The authors who are pursuing U.G. are wishes to acknowledge the dedicated effort of supporting faculties at the
Department of Electronics and Communication Systems, Panimalar Institute of Technology, Chennai for their participation
in the field experiments.
REFERENCES
1)J. Zhang, G. Song, G. Qiao, T. Meng and H. Sun, "An indoor security system with a jumping robot as the surveillance
terminal," in IEEE Transactions on Consumer Electronics, vol. 57, no. 4, pp. 1774-1781, November2011.
2)G. Song, Z. Wei, W. Zhang and A. Song, "A Hybrid Sensor Network System for Home Monitoring Applications," in IEEE
Transactions on Consumer Electronics, vol. 53, no. 4, pp. 1434-1439, Nov.2007.
3) W. Lao, J. Han and P. H. n. De With, "Automatic video-based human motion analyzer for consumer surveillance
system," in IEEE Transactions on Consumer Electronics, vol. 55, no. 2, pp. 591-598, May2009.
4)C. Micheloni, G. L. Foresti, C. Piciarelliand L. Cinque, "An Autonomous Vehicle for Video Surveillance of Indoor
Environments," in IEEE Transactions on Vehicular Technology, vol. 56, no. 2, pp. 487-498.
5)K. S. Kumar, S. Prasad, P. K. Saroj and R. C. Tripathi, "Multiple Cameras Using Real Time Object Tracking for
Surveillance and Security System,"2010 3rd International Conference on Emerging Trends in Engineering and
Technology, Goa, 2010, pp.213-218.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2322
6)M. S. MukundaSwamy and G. L. Bhat, "Embedded controller based wireless power monitoring and controlling,"2015
International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT),
Mandya, 2015, pp.392-397.
7)R. Ikhankar, V. Kuthe, S. Ulabhaje, S. Balpande and M.Dhadwe, "Pibot: The raspberry pi controlled multi-
environment robot for surveillance & live streaming,"2015 International Conference on Industrial
Instrumentation and Control (ICIC), Pune, 2015, pp.1402-1405.
8)A. Imteaj, T. Rahman, M. K. Hossain and S. Zaman, "IoT based autonomous percipient irrigation system using
raspberry Pi,"2016 19th International Conference on Computer and Information Technology (ICCIT), Dhaka, 2016,
pp. 563-568.
9)A. Jaiswal, S. Domanal and G. R. M. Reddy, "Enhanced Framework for IoT Applications on Python Based Cloud
Simulator (PCS),"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM),
Bangalore, 2015, pp.104-108.
10) R. Karthikeyan, S. Karthik, Prasanna Vishal TR and S. Vignesh, "Snitch: Design and development of a mobile robot
for surveillance and reconnaissance,"2015 International Conference on Innovations in Information, Embedded
and Communication Systems (ICIIECS), Coimbatore, 2015, pp.1-4.
11) W. F. Abaya, J. Basa, M. Sy, A. C. Abad and E. P. Dadios, "Low cost smart security camera with night vision capability
using Raspberry Pi and OpenCV,"2014 International Conference on Humanoid, Nanotechnology, Information
Technology, Communication and Control, Environment and Management (HNICEM), Palawan, 2014, pp.1-6.
12) A. U. Bokade and V. R. Ratnaparkhe, "Video surveillance robot control using smartphone and Raspberry pi,"2016
International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, 2016, pp.2094-2097.
13) S.Agamah and L.Ekonomou, "A PHP Application Library for Web- Based Power Systems Analysis,"2015 IEEE
European Modelling Symposium (EMS), Madrid, 2015, pp.353-358.
14) A nest of Pythons," in Computing in Science & Engineering, vol. 7, no.6, pp. 81-84, Nov.-Dec.2005.
15) M.Arun, R.Prathipa, Priyanka S, AkshayaAnand, Chandrika, Smart Agriculture Robot, International Journal of Pure
and Applied Mathematics,Volume 119 No. 15 2018, PP. 1901-1906,2018

More Related Content

What's hot

2D mapping using omni-directional mobile robot equipped with LiDAR
2D mapping using omni-directional mobile robot equipped with LiDAR2D mapping using omni-directional mobile robot equipped with LiDAR
2D mapping using omni-directional mobile robot equipped with LiDAR
TELKOMNIKA JOURNAL
 
30 ball
30 ball30 ball
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtIAEME Publication
 
Smart Surveillance Bot with Low Power MCU
Smart Surveillance Bot with Low Power MCUSmart Surveillance Bot with Low Power MCU
Smart Surveillance Bot with Low Power MCU
IRJET Journal
 
Combined IOT and Cloud Computing Solution for Railway Accident Avoidance
Combined IOT and Cloud Computing Solution for Railway Accident AvoidanceCombined IOT and Cloud Computing Solution for Railway Accident Avoidance
Combined IOT and Cloud Computing Solution for Railway Accident Avoidance
IRJET Journal
 
Travsafe-An Electronic Security Monitoring System Using GPS-GSM and RF Commun...
Travsafe-An Electronic Security Monitoring System Using GPS-GSM and RF Commun...Travsafe-An Electronic Security Monitoring System Using GPS-GSM and RF Commun...
Travsafe-An Electronic Security Monitoring System Using GPS-GSM and RF Commun...
IJLT EMAS
 
High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0
Journal Papers
 
Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...
Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...
Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...
ijtsrd
 
Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3
IOSR Journals
 
Visual pattern recognition in robotics
Visual pattern recognition in roboticsVisual pattern recognition in robotics
Visual pattern recognition in robotics
IAEME Publication
 
Auto Traffic Management System
Auto Traffic Management SystemAuto Traffic Management System
Auto Traffic Management System
vivatechijri
 
Automatic Robot System In Industries Using Rf Module
Automatic Robot System In Industries Using Rf Module Automatic Robot System In Industries Using Rf Module
Automatic Robot System In Industries Using Rf Module
iosrjce
 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET Journal
 
Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network
IJERA Editor
 
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET-  	  Personal Assistant for Visually Impaired People in MallsIRJET-  	  Personal Assistant for Visually Impaired People in Malls
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET Journal
 
Development of a portable community video surveillance system
Development of a portable community video surveillance systemDevelopment of a portable community video surveillance system
Development of a portable community video surveillance system
IJECEIAES
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7
IRJET Journal
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
IRJET Journal
 
Ijsartv6 i336124
Ijsartv6 i336124Ijsartv6 i336124
Ijsartv6 i336124
aissmsblogs
 
356 358,tesma411,ijeast
356 358,tesma411,ijeast356 358,tesma411,ijeast
356 358,tesma411,ijeast
aissmsblogs
 

What's hot (20)

2D mapping using omni-directional mobile robot equipped with LiDAR
2D mapping using omni-directional mobile robot equipped with LiDAR2D mapping using omni-directional mobile robot equipped with LiDAR
2D mapping using omni-directional mobile robot equipped with LiDAR
 
30 ball
30 ball30 ball
30 ball
 
Robust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwtRobust invisible qr code image watermarking in dwt
Robust invisible qr code image watermarking in dwt
 
Smart Surveillance Bot with Low Power MCU
Smart Surveillance Bot with Low Power MCUSmart Surveillance Bot with Low Power MCU
Smart Surveillance Bot with Low Power MCU
 
Combined IOT and Cloud Computing Solution for Railway Accident Avoidance
Combined IOT and Cloud Computing Solution for Railway Accident AvoidanceCombined IOT and Cloud Computing Solution for Railway Accident Avoidance
Combined IOT and Cloud Computing Solution for Railway Accident Avoidance
 
Travsafe-An Electronic Security Monitoring System Using GPS-GSM and RF Commun...
Travsafe-An Electronic Security Monitoring System Using GPS-GSM and RF Commun...Travsafe-An Electronic Security Monitoring System Using GPS-GSM and RF Commun...
Travsafe-An Electronic Security Monitoring System Using GPS-GSM and RF Commun...
 
High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0
 
Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...
Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...
Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...
 
Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3
 
Visual pattern recognition in robotics
Visual pattern recognition in roboticsVisual pattern recognition in robotics
Visual pattern recognition in robotics
 
Auto Traffic Management System
Auto Traffic Management SystemAuto Traffic Management System
Auto Traffic Management System
 
Automatic Robot System In Industries Using Rf Module
Automatic Robot System In Industries Using Rf Module Automatic Robot System In Industries Using Rf Module
Automatic Robot System In Industries Using Rf Module
 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
 
Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network
 
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET-  	  Personal Assistant for Visually Impaired People in MallsIRJET-  	  Personal Assistant for Visually Impaired People in Malls
IRJET- Personal Assistant for Visually Impaired People in Malls
 
Development of a portable community video surveillance system
Development of a portable community video surveillance systemDevelopment of a portable community video surveillance system
Development of a portable community video surveillance system
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
 
Ijsartv6 i336124
Ijsartv6 i336124Ijsartv6 i336124
Ijsartv6 i336124
 
356 358,tesma411,ijeast
356 358,tesma411,ijeast356 358,tesma411,ijeast
356 358,tesma411,ijeast
 

Similar to IRJET - Military Spy Robot with Intelligentdestruction

IRJET- Robust and Fast Detection of Moving Vechiles in Aerial Videos usin...
IRJET-  	  Robust and Fast Detection of Moving Vechiles in Aerial Videos usin...IRJET-  	  Robust and Fast Detection of Moving Vechiles in Aerial Videos usin...
IRJET- Robust and Fast Detection of Moving Vechiles in Aerial Videos usin...
IRJET Journal
 
IRJET- Smart Bus Transportation System
IRJET- Smart Bus Transportation SystemIRJET- Smart Bus Transportation System
IRJET- Smart Bus Transportation System
IRJET Journal
 
IRJET- Survey Paper on Human Following Robot
IRJET- Survey Paper on Human Following RobotIRJET- Survey Paper on Human Following Robot
IRJET- Survey Paper on Human Following Robot
IRJET Journal
 
IRJET - Floor Cleaning Robot with Vision
IRJET - Floor Cleaning Robot with VisionIRJET - Floor Cleaning Robot with Vision
IRJET - Floor Cleaning Robot with Vision
IRJET Journal
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET Journal
 
DYNAMIC ENERGY MANAGEMENT USING REAL TIME OBJECT DETECTION
DYNAMIC ENERGY MANAGEMENT USING REAL TIME OBJECT DETECTIONDYNAMIC ENERGY MANAGEMENT USING REAL TIME OBJECT DETECTION
DYNAMIC ENERGY MANAGEMENT USING REAL TIME OBJECT DETECTION
IRJET Journal
 
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial IntelligenceCamouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
IRJET Journal
 
IRJET- Wearable Sensor based Fall Detection System
IRJET- Wearable Sensor based Fall Detection SystemIRJET- Wearable Sensor based Fall Detection System
IRJET- Wearable Sensor based Fall Detection System
IRJET Journal
 
Arduino Based Hand Gesture Controlled Robot
Arduino Based Hand Gesture Controlled RobotArduino Based Hand Gesture Controlled Robot
Arduino Based Hand Gesture Controlled Robot
IRJET Journal
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
IRJET Journal
 
Spy Robot with Wireless Camera using GSM
Spy Robot with Wireless Camera using GSMSpy Robot with Wireless Camera using GSM
Spy Robot with Wireless Camera using GSM
IRJET Journal
 
IRJET- Automatic Gate Crossing and IoT based Train Track Crack Detection Syst...
IRJET- Automatic Gate Crossing and IoT based Train Track Crack Detection Syst...IRJET- Automatic Gate Crossing and IoT based Train Track Crack Detection Syst...
IRJET- Automatic Gate Crossing and IoT based Train Track Crack Detection Syst...
IRJET Journal
 
IRJET - Cardless ATM
IRJET -  	  Cardless ATMIRJET -  	  Cardless ATM
IRJET - Cardless ATM
IRJET Journal
 
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...
IRJET Journal
 
IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNN
IRJET Journal
 
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind AssistanceIRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind Assistance
IRJET Journal
 
Bluetooth Controlled Garbage Collection Robot Arm
Bluetooth Controlled Garbage Collection Robot ArmBluetooth Controlled Garbage Collection Robot Arm
Bluetooth Controlled Garbage Collection Robot Arm
IRJET Journal
 
Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection Bot
IRJET Journal
 
Detection of Zebra Crossing Violation by Automotive using IoT automation
Detection of Zebra Crossing Violation by Automotive using IoT automationDetection of Zebra Crossing Violation by Automotive using IoT automation
Detection of Zebra Crossing Violation by Automotive using IoT automation
IRJET Journal
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET Journal
 

Similar to IRJET - Military Spy Robot with Intelligentdestruction (20)

IRJET- Robust and Fast Detection of Moving Vechiles in Aerial Videos usin...
IRJET-  	  Robust and Fast Detection of Moving Vechiles in Aerial Videos usin...IRJET-  	  Robust and Fast Detection of Moving Vechiles in Aerial Videos usin...
IRJET- Robust and Fast Detection of Moving Vechiles in Aerial Videos usin...
 
IRJET- Smart Bus Transportation System
IRJET- Smart Bus Transportation SystemIRJET- Smart Bus Transportation System
IRJET- Smart Bus Transportation System
 
IRJET- Survey Paper on Human Following Robot
IRJET- Survey Paper on Human Following RobotIRJET- Survey Paper on Human Following Robot
IRJET- Survey Paper on Human Following Robot
 
IRJET - Floor Cleaning Robot with Vision
IRJET - Floor Cleaning Robot with VisionIRJET - Floor Cleaning Robot with Vision
IRJET - Floor Cleaning Robot with Vision
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
 
DYNAMIC ENERGY MANAGEMENT USING REAL TIME OBJECT DETECTION
DYNAMIC ENERGY MANAGEMENT USING REAL TIME OBJECT DETECTIONDYNAMIC ENERGY MANAGEMENT USING REAL TIME OBJECT DETECTION
DYNAMIC ENERGY MANAGEMENT USING REAL TIME OBJECT DETECTION
 
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial IntelligenceCamouflage Surveillance Robot In Defense Using Artificial Intelligence
Camouflage Surveillance Robot In Defense Using Artificial Intelligence
 
IRJET- Wearable Sensor based Fall Detection System
IRJET- Wearable Sensor based Fall Detection SystemIRJET- Wearable Sensor based Fall Detection System
IRJET- Wearable Sensor based Fall Detection System
 
Arduino Based Hand Gesture Controlled Robot
Arduino Based Hand Gesture Controlled RobotArduino Based Hand Gesture Controlled Robot
Arduino Based Hand Gesture Controlled Robot
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
 
Spy Robot with Wireless Camera using GSM
Spy Robot with Wireless Camera using GSMSpy Robot with Wireless Camera using GSM
Spy Robot with Wireless Camera using GSM
 
IRJET- Automatic Gate Crossing and IoT based Train Track Crack Detection Syst...
IRJET- Automatic Gate Crossing and IoT based Train Track Crack Detection Syst...IRJET- Automatic Gate Crossing and IoT based Train Track Crack Detection Syst...
IRJET- Automatic Gate Crossing and IoT based Train Track Crack Detection Syst...
 
IRJET - Cardless ATM
IRJET -  	  Cardless ATMIRJET -  	  Cardless ATM
IRJET - Cardless ATM
 
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...
 
IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNN
 
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind AssistanceIRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind Assistance
 
Bluetooth Controlled Garbage Collection Robot Arm
Bluetooth Controlled Garbage Collection Robot ArmBluetooth Controlled Garbage Collection Robot Arm
Bluetooth Controlled Garbage Collection Robot Arm
 
Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection Bot
 
Detection of Zebra Crossing Violation by Automotive using IoT automation
Detection of Zebra Crossing Violation by Automotive using IoT automationDetection of Zebra Crossing Violation by Automotive using IoT automation
Detection of Zebra Crossing Violation by Automotive using IoT automation
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 

Recently uploaded (20)

Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 

IRJET - Military Spy Robot with Intelligentdestruction

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2318 Military Spy Robot with Intelligent Destruction T. SWETHA 1, V. KEREN MELINDA 2, M. HANNAH SHARON3, G. KAVIYA4 1Assistant Professor, Department of Electronics and Communication Engineering, Panimalar Institute of Technology Chennai, Tamil Nadu, India 2,3,4Department of Electronics and Communication Engineering, Panimalar Institute of Technology Chennai, Tamil Nadu, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract -Nowadays, the surveillance of the military border areas is an arduous task. The border guarding forces are safeguarding the border seriously, but it is very difficult to watch the border at every moment and often leads to the terrible death of the army soldier, so to overcome these consequences we use a RPA robot which automatically detects the trespassers, that is placed on the surface plan the control areas. It encrypts a unique code via camera authorised for the trespassers and compares the unique id with the database that interprets and differentiate from the unauthorised trespassers. If this unique code mismatches, then the signal is sent to the Arduino through relay whereby it automatically activates the bomb and destructs the trespassers. The aim of this paper is to reduce the loss of army men at the line of control on the border areas by replacing with the intelligent destructible automated robots which also safeguard our country by not allowing the unauthorised trespassers and another source of any harmed army vehicle to pass through the targeted borders. This project is more compact so to make it cost efficient. The Robot’s default instructions that are present in the database, set by the Military Force. Key Words: Border security, Military spy robot, Line of control, Database, Relay, Camera. 1. INTRODUCTION In recent generations, it has been proved that the world is moving towards innovation with the automation of robots and they not only help in the day to day life needs but also play an essential role in the defence workforce by replacing humans. In-order to save mankind, they are really easy to implement and work at a much faster rate compared to a human with all its essential components .Robots are much better at surveillance and destruction especially in the army field. It is done by default preset programs on software with desired optimisations. Here the camera is used as main hardware as input to extract the trespasser view of the image. The camera installations are widely flexible and much purposeful in direction with all angles. With unstructured border line of control to survey the path of the borders to obtain the trespassers through image acquisition and comparing the set values of the default from the database finally interpreting as two platforms authorised and unauthorised. This type of combining software and hardware is involved in this thesis of Mil. Spy robot with intelligent destruction, so- called embedded system. 1.1 SYSTEMOVERVIEW The proposed conformity is a smart border surveillance system which can prove to be helpful in the Line of Control. It can provide round the clock surveillance at the places at both, where the human deployment is possible and not possible due to geographical, climatic or some other reasons. Multiple responses are possible depending upon the position of the intruder concerning the border fence. as we have shown three different filters., (i.e. Gobar Filter, GLCM Filtering and also Histogram)in different responses. At first, we use the Gobar filter. The significance of this principle is that the accuracy with which one can measure a signal in one domain limits the attainable accuracy of the measurement in the other domain. In simple, it also attains the optimal (lower bound) compromise between the localization in the time and frequency domains; notice that the Gaussian function is an instance of a Gabor filter with centre frequency ω0 =0.Secondly, we use the GLCM(Grey Level Co-Occurrence Matrix); they are the earliest techniques used for image texture analysis. The Analytical procedure of assessing texture that considers the spatial relationship of pixels; is the grey-level co-occurrence matrix, also called as the grey-level spatial dependence matrix. Thirdly, we use the Histogram. A good feature makes the classifier’s job as easy as possible: It removes what is irrelevant to classification, such as the colors of clothing, shadows, and whether the person wears a hat, but keeps all that distinguishes a person from somethingelse.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2319 FIGURE1: Block Diagram of overall system FIGURE 2: The design flow chart of Mil Spy Robot and intelligent destruction 2. LITERATUREREVIEW Implementation of spy robot for a surveillance system using internet protocol of raspberry pi. 2017 2nd IEEE International Conference On Recent Trends In Electronics Information &Communication Technology, May19-20, 2017. This spy robot system comprises the RaspberryPi (small single board computer),night vision pi camera and sensors. Here the information regarding the detection of living objects by a PIR sensor is sent to the users through the web server,and the pi camera captures the moving Object which is posted inside the webpage . This image then controls the user in the control room, able to access the robot with wheel drive control buttons on the webpage. Finally, the movement of a robot is also controlled automatically through obstacle detecting sensors to avoid the collision. 3. HARDWARE DESIGN ANDIMPLEMENTATION Here in this project, we use the cost-efficient Arduino UNO R3. It is a microcontroller board which is based on the ATmega328 (datasheet). It is inbuilt with 14 digital input/output pins (of which six can be used as PWM outputs), six analogue inputs, a 16 MHz ceramic resonator, a USB connection. It also has a power jack, an ICSP header, and a reset button. It contains all the necessary components which support the microcontroller; USB cable is used to connect it to the computer with an AC-DC adapter or battery to get started. All other preceding boards differ from Arduino UNO in that it does not use the FTDI USB-to-serial driver chip. Instead, it was featured by the Atmega16U2 (Atmega8U2 up to version R2) programmed as a USB-to-serial converter. We also use here relay which is an electrically operated switch. It consists of a set of operating contactterminals and also set of input terminals for single or multiple control signals, Here in this project, once we find out whether it is authorised or unauthorised trespasser using unique code stored in Matlab, it sends a signal
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2320 to Arduino board through a relay. When it is unauthorised trespasser the relays switch indicates the Arduino to turn on thealerting Buzzer(here the buzzer in this project indicates the bomb destructor) FIGURE 3: Arduino UNO R-3 front and back 4. SOFTWARE DESIGN ANDIMPLEMENTATION A. MATLAB MATLAB (matrix laboratory) is used in this thesis to implement software computation also considered as programming language. It is developed by MathWorks, always allows matrix manipulations, other plotting of functions and data, implementation of math algorithms, create user interfaces, and interfacing the output .It uses simulink to show and implement the sequence by programming Arduino. B. Histograms of Oriented Gradients In order to recognize the face and other possible image to detect the basic functions over the image the histogram of oriented gradients is used. These algorithms are called object detectors. Possible tight bound one of the instances of interest. For example, if you take detecting a pedestrian walking by a camera, you could start with a window that is 128pixelstall and 64 pixels wide enough: if the 2 to 1 aspect ratio of a rectangle is a literally a compromise between the exact aspect ratio of a person viewed from the front and one viewed from the side with legs fully extended during a step by step process. Getting the size of the window using many of 64 is a literally a convenience that reflects the assumption that if the image of the person is significantly smaller than that then resolution will be insufficient to detect it so it is not even worth trying it. The object detector then slides such a window over every image of the pyramid, perhaps in increments of a few pixels—the increment is called the stride of the detector. Here the feature is fed to the classifier, which tells whether the window contains a pedestrian. Where the answer is likely to be positive for a set of windows that overlap the person’s image, so the detector then chooses a single pixel to represent each connected set of positive classifier outputs. Here this note describes one way to construct a feature vector from a fixed-size window [1]. Whereby the feature is specifically tuned to pedestrians. Where this leads to humans are important subjects in imagery, and is therefore natural that the detection of humans in still images and video has drawn much attention in the literature. FIGURE 4: Histogram of an image C. GREY LEVEL CO-OCCURRENCE MATRICES Finally, here the results that indicate that trace features outperform Haralick features when applied to CBIR. FIGURE 5: Grey level co-occurrence
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2321 Figure 6: Project Image 5. CONCLUSION The proposed system would be a great help in enhancing the security of our border areas, especially the regions facing climatic or terrain conditions where human deployment is a major peril. Although the system may not be able to provide advanced border security, it can surely provide solutions to border security surveillance on a smaller scale. As the system detects intruders (unauthorised), it destructs an area around 100m. The smart border surveillance system, cannot only assist the defense forces in enhancing the security of border areas but also it can help to save the lifespan of a soldier. It involves the use of advanced technology; keeping in mind the cost effectiveness of the constituent modules of the system with a goal that any infiltration recognized at results can be destroyed immediately. Appropriate exploitation of the system may help our border security forces to control those unnecessary and suspicious activities in a better and accurate way. In future, we can design this system on a larger scale. As with the passing time, the technology is constantly improving; the system can be equipped with more advanced and sophisticated hardware. The camera, the object detection mechanism and response mechanism, if made using the state-of-the-art technology, can make the working of the proposed system even more exact and time-saving. As of now, this research will further be made longer to design and develop, the surveillance system based on the proposed architecture. Also, the experiments will be conducted, and the results will be recorded for furtherbetterment. ACKNOWLEDGMENT The authors who are pursuing U.G. are wishes to acknowledge the dedicated effort of supporting faculties at the Department of Electronics and Communication Systems, Panimalar Institute of Technology, Chennai for their participation in the field experiments. REFERENCES 1)J. Zhang, G. Song, G. Qiao, T. Meng and H. Sun, "An indoor security system with a jumping robot as the surveillance terminal," in IEEE Transactions on Consumer Electronics, vol. 57, no. 4, pp. 1774-1781, November2011. 2)G. Song, Z. Wei, W. Zhang and A. Song, "A Hybrid Sensor Network System for Home Monitoring Applications," in IEEE Transactions on Consumer Electronics, vol. 53, no. 4, pp. 1434-1439, Nov.2007. 3) W. Lao, J. Han and P. H. n. De With, "Automatic video-based human motion analyzer for consumer surveillance system," in IEEE Transactions on Consumer Electronics, vol. 55, no. 2, pp. 591-598, May2009. 4)C. Micheloni, G. L. Foresti, C. Piciarelliand L. Cinque, "An Autonomous Vehicle for Video Surveillance of Indoor Environments," in IEEE Transactions on Vehicular Technology, vol. 56, no. 2, pp. 487-498. 5)K. S. Kumar, S. Prasad, P. K. Saroj and R. C. Tripathi, "Multiple Cameras Using Real Time Object Tracking for Surveillance and Security System,"2010 3rd International Conference on Emerging Trends in Engineering and Technology, Goa, 2010, pp.213-218.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2322 6)M. S. MukundaSwamy and G. L. Bhat, "Embedded controller based wireless power monitoring and controlling,"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), Mandya, 2015, pp.392-397. 7)R. Ikhankar, V. Kuthe, S. Ulabhaje, S. Balpande and M.Dhadwe, "Pibot: The raspberry pi controlled multi- environment robot for surveillance & live streaming,"2015 International Conference on Industrial Instrumentation and Control (ICIC), Pune, 2015, pp.1402-1405. 8)A. Imteaj, T. Rahman, M. K. Hossain and S. Zaman, "IoT based autonomous percipient irrigation system using raspberry Pi,"2016 19th International Conference on Computer and Information Technology (ICCIT), Dhaka, 2016, pp. 563-568. 9)A. Jaiswal, S. Domanal and G. R. M. Reddy, "Enhanced Framework for IoT Applications on Python Based Cloud Simulator (PCS),"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, 2015, pp.104-108. 10) R. Karthikeyan, S. Karthik, Prasanna Vishal TR and S. Vignesh, "Snitch: Design and development of a mobile robot for surveillance and reconnaissance,"2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2015, pp.1-4. 11) W. F. Abaya, J. Basa, M. Sy, A. C. Abad and E. P. Dadios, "Low cost smart security camera with night vision capability using Raspberry Pi and OpenCV,"2014 International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), Palawan, 2014, pp.1-6. 12) A. U. Bokade and V. R. Ratnaparkhe, "Video surveillance robot control using smartphone and Raspberry pi,"2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, 2016, pp.2094-2097. 13) S.Agamah and L.Ekonomou, "A PHP Application Library for Web- Based Power Systems Analysis,"2015 IEEE European Modelling Symposium (EMS), Madrid, 2015, pp.353-358. 14) A nest of Pythons," in Computing in Science & Engineering, vol. 7, no.6, pp. 81-84, Nov.-Dec.2005. 15) M.Arun, R.Prathipa, Priyanka S, AkshayaAnand, Chandrika, Smart Agriculture Robot, International Journal of Pure and Applied Mathematics,Volume 119 No. 15 2018, PP. 1901-1906,2018