young call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Service
Paper (smart bomb)
1. SMART BOMB USING WIRELESS SENSOR NETWORK
Pavithra. P
St. joseph’s institute of technology
Electronics and communication engineering
Anna University
Email: pavi.giri1601@gmail.com
Jessilin percis. T
St. Joseph’s institute of technology
Electronics and communication
engineering
Anna University
Email: jessilinpercis@gmail.com
Abstract—. Wireless sensor network is a network of devices
that can communicate with the information gathered from
a monitored field through wireless links then the data is
forwarded to the controller for further processing. We can
connect multiple sensor to a number of controllers of choice.
We can switch ON and OFF selective sensors with the help
of the controller. This sensor can be implemented in bobby
trap for military purpose, the bobby trap can be turned ON
and turned OFF using the controller, the boots of the soldier
has a sensor and small vibrating component, the signal
produced by the sensor present in the boot of the soldier is
transmitted to some range of distance if that signal is
received by the bobby trap then bobby trap automatically
turns OFF similarly in the absence of the signal from boot
can turns ON the bobby trap automatically likewise the
signal from the bobby trap can turn ON the vibrating
component present in the boot which indicates the soldier
about the presence of the bobby trap. From this we can
easily identify active bobby trap or aborted bobby trap in
the arena this also gives the soldier about the presence of
bobby trap using the vibrating component in the boot, with
the help of the controller we can turn ON and turn OFF the
bomb at any time. Therefore, by using wireless sensor
network we can find many applications in many fields such
as military, medicine, industries and so on.
KEYWORD: NFC =Near Field Communication, WIMAX =
Worldwide Interoperability for microwave access
I. INTRODUCTION
Here we use microcontroller to control the ON and OFF of the
BOBBY TRAP. We connect a sensorin the BOBBY TRAP and
a WIMAX module for the wireless communication or we can
use even WIFI module here, but it does cover large area, so we
go for WIMAX module it has better coverage than the Wi-Fi.
here the boots of the soldier have an NFC tag which is used for
near field communication. it is very cheap when compared to
Other sensors .and it is mainly weight less so this is the biggest
advantage in achieving the objective of this smart bomb. When
soldier goes near to this bobby trap this NFC tag will give a
signal which is identified by the bobby trap .and the bobby trap
will not explode even when this person keeps his /her leg on the
trap.
.
II BLOCK DIAGRAM
Here from the block Diagram we can understand the working
of this device. The BOBBY TRAP is connected to the WIMAX
module and a sensor through the micro controller. the code is
dumped into the micro controller. On the other hand, the boots
of the soldier have an NFC tag which requires very less energy
for operation.IT is a near field communication tag. So, this is a
good choice for applying in this idea. The main advantage is the
2. less weight of the tag .so it is easy to carry and easy to
implement and also easy to hide in the boots of the soldiers.
II. PRODUCT DISCRIPTION
A. bobby trap
A booby trap is a device or setup that is intended to kill,
harm, or surprise a person or animal, unknowingly triggered
by the presence or actions of the victim. As the word trap
implies, they sometimes have some form of bait designed to
lure the victim towards it. At other times, the trap is set to act
upon trespassers that violate personal or restricted areas. The
device can be triggered when the victim performs some type
of everyday action, e.g., opening a door, picking something
up, or switching something on. They can also be triggered by
vehicles driving along a road, as in the case of victim-
operated improvised explosive devices (IEDs).
Booby traps should not be confused with mantraps which are
designed to catch a person.Lethal booby traps are often used
in warfare, particularly guerrilla warfare, and traps designed to
cause injury or pain are also sometimes used by criminals
wanting to protect drugs or other illicit property, and by some
owners of legal property who wish to protect it from theft.
B. micro_contoller
A microcontroller (MCU for microcontrollerunit,
or UC for μ-controller)is a small computer on a
single integrated circuit. In modern terminology, it is similar
to, but less sophisticated than,a systemon a chip (SoC); an
SoC may include a microcontroller as one of its components.
A microcontroller contains one or more CPUs (processor
cores) along with memory and programmable output
peripherals. Program memory in the form of ferroelectric
RAM, NOR flash or OTP ROM is also often included on chip,
as well as a small amount of RAM. Microcontrollers are
designed for embedded applications, in contrast to
the microprocessors used in computers or other general
purpose applications consisting of various discrete chips.
Microcontrollers are used in automatically controlled products
and devices,such as automobile engine control systems,
implantable medical devices, remote controls, office
machines, appliances, power tools,toys and other embedded
systems.By reducing the size and cost compared to a design
that uses a separate microprocessor, memory, and input/output
devices, microcontrollers make it economical to digitally
control even more devices and processes. Mixed
signal microcontrollers are common, integrating analog
components needed to control non-digital electronic systems.
In the context of the internet of things, microcontrollers are an
economical and popular means of data
collection, sensing and actuating the physical world as edge
devices.
Some microcontrollers may use four-bit words and operate at
frequencies as low as 4 kHz, for low power
consumption (single-digit milliwatts or microwatts). They
generally have the ability to retain functionality
while waiting for an event such as a button press or
other interrupt; power consumption while sleeping (CPU clock
and most peripherals off) may be just nanowatts,making
many of them well suited for long lasting battery applications.
Other microcontrollers may serve performance-critical roles,
where they may need to act more like a digital signal
processor(DSP), with higher clock speeds and power
consumption.
ATmega328P in 28-pin narrow dual in-line package (DIP-
28N)
ATmega328P in 32-pin thin quad flat pack (TQFP-32)
3. C. WiMAX module
WiMAX (Worldwide Interoperability for Microwave
Access) is a family of wireless broadband communication
standards based on the IEEE 802.16 set of standards,which
provide multiple physical layer (PHY) and Media Access
Control (MAC) options.
The name "WiMAX" was created by the WiMAX Forum,
which was formed in June 2001 to promote conformity and
interoperability of the standard,including the definition of
predefined systemprofiles for commercial vendors.[1] The
forum describes WiMAX as "a standards-based technology
enabling the delivery of last mile wireless broadband access as
an alternative to cable and DSL".[2] IEEE 802.16m or Wireless
MAN-Advanced was a candidate for the 4G, in competition
with the LTE Advanced standard.
WiMAX was initially designed to provide 30 to 40 megabit-
per-second data rates,[3] with the 2011 update providing up to
1 Gbit/s[3] for fixed stations.
The latest version of WiMAX, WiMAX release 2.1, popularly
branded as/known as WiMAX 2+, is a smooth, backwards-
compatible transition from previous WiMAX generations.It is
compatible and inter-operable with TD-LTE.
D. NFC tag
NFC is a lot like RFID, only it's a more up-close-and-personal
type of wireless. Whereas RFID can be used from a distance,
NFC readers work at a maximum range of about 4 inches (10
centimeters). NFC readers aren't suitable for RFID-style
inventory tracking; their range is too short. So, NFC tags will
appear in a flood of products and promotional items where bits
of digitized information might come in handy.
NFC (near field communication) is a wireless technology
which allows for the transfer of data such as text or numbers
between two NFC enabled devices....Nectary refer to NFC
Tags in terms of NFCstickers, labels or inlays.
Other NFC items such as wristbands, key fobs or even drinks
mat we refer to as NFC products.
III. WORKING
In this method we operate the bomb electronically with help of
NFC tag and WIMAX module. when the boots with the NFC
tag comes in contact with the bomb, the bomb will not explode
because the NFC tag present in the bomb will not allow the
bomb to explode even though the person unknowingly apply
the pressure on the bomb. But when the boots without NFC tag
or the unauthorized person comes in contact with the bomb the
bomb will explode. this will kill that person or harm the person
severely.
4. IV. CONCLUSION
In this paperwe can understand the working of the bobby trap
electronically. here we use microcontroller to control the
switching ON and OFF of the bomb. this can save the person to
whom the bomb is belongs to. this can also avoid the problem
of remembering the presence of bomb where it is buried.
REFERENCES
[1] Wikipedia.org article, adapted under
https://creativecommons.org/licenses/...license.
[2] ece-
research.unm.edu/schamiloglu/EdlPDF/SpectrumArtic le.pdf
[3] The Electromagnetic Bomb - a Weapon of Electrical Mass
Destruction - APA Mirror
[4] International Journal of Engineering, Education and
Technology (ARDIJEET) www.ardigitech.in ISSN 2320-883X,
VOLUME 3, ISSUE 2, 01/04/2015
[5] Abrams, Michael, “Dawn of the E-bomb”, IEEE spectrum,
November 2003.
[6] Kopp, C., “A doctrine for the use of electromagnetic pulse
bombs”, Air Power Studies Centre, Paper No. 15, 1993.
[7] Kopp, C., “An introduction to the technical and operational
aspects of the electromagnetic bomb”, Air Power Studies
Centre, Paper No.-50,