You are on page 1of 4

An Innovative Method using GPS Tracking,WINS

Technologies for Border Security and Tracking of


Vehicles
Prathusha Perugu,
Nandyal, Kurnool district, AP, India.
prathusha.p@rediffmail.com

Abstract - This paper proposes a new system that provides will be observed and the results will be sent to the satellite
security to the mother land by using concepts of Wireless communication system. The metal detection sensor system
Integrated Network Sensors, GPS tracking and object and metal first takes the images of that particular area where the actual
detection and tacking of vehicles with in the country. It provides detection takes place and it will collect the corresponding
a new monitoring and control capability for monitoring the images by the direction of the sensors. The identification of
borders of the country. Using this concept we can easily identify a the objects is made and these images are examined by the
stranger or any object crossing the border where the army system of image scanning and object detection of images .
cannot reach in regular. Using the satellite communication and Continuous sensor signal processing must be provided to
GPS tracking the area will be identified. By Object identification
enable constant monitoring of events in an environment.
system we will be able to get the pictures of that particular area
Distributed signal processing and decision making enables
where the strangers has come as well as the details of objects or
people who are present there. And later the metal detecting events to be identified at the remote sensor. Later in last step
sensors and bomb detection signals will detect the existence of this results will transmitted to the metal detecting sensors at
explosives and weapons(metals) with them. The border area is the server and get activated and it activates the corresponding
divided into number of nodes. Each node is in contact with each sensor near the objects. It detects the metals present there. In
other and with the main node. The noise produced by the foot- this paper we have concentrated in the most important
steps of the stranger is collected using the sensor. This sensed application Border Security and tracking of vehicles with in
signal then sends appropriate signals and the frequency the country.
measured by that sensor to the main node. Thus the stranger is
identified at the main node. Hence it is reasonably faster. On a II. WINS SYSTEM FOR AREA DETECTION
global scale, WINS will permit monitoring of land, water, and air
resources for environmental monitoring. With this we will be
able to identify the objects and the movement, direction of their Conventional wireless networks are supported by
movement and the kind of metals they have. After discussing complex protocols that are developed for voice and data
with the military authorities we will be able to plan the actions to transmission for handhelds and mobile terminals. These
be taken against them. Presently the Indian government is networks are also developed to support communication over
planning to implement the same technology for tracking the long range (up to 1km or more) with link bit rate over
vehicles with in the country which carry illegal commodities ( like 100kbps. In contrast to conventional wireless networks, the
government issued sugar , rice to be distributed among masses WINS network must support large numbers of sensors in a
but send to other states without legal permission). The vehicles local area with short range and low average bit rate
which carry explosive materials for industrial purposes can be communication (less than 1kbps). The network design must
tracked. The missing vehicles during transportation due to consider the requirement to service dense sensor distributions
various reasons(terrorists attacks) can be easily identified. with an emphasis on recovering environment information.
Multi hop communication yields large power and scalability
I. INTRODUCTION advantages for WINS networks. Multi hop communication,
therefore, provides an immediate advance in capability for the
WINS narrow Bandwidth devices. However, WINS Multi hop
Wireless Integrated Network Sensors (WINS) combine Communication networks permit large power reduction and
sensing, signal processing, decision capability, and wireless the implementation of dense node distribution. The multi hop
networking capability in a compact, low power system. . On a communication has been shown in the figure 2. The figure 1
local, wide-area scale, battlefield situational awareness will represents the general structure of the wireless integrated
provide personnel health monitoring and enhance security and network sensors (WINS) arrangement.
efficiency. Also, on a metropolitan scale, new traffic, security,
emergency, and disaster recovery services will be enabled by
WINS. Here first it identifies the node where the harmonic A.WINS Node architecture and identification of event
signals are produced by the strange objects and the intensity of
the signal will be collected .The signal will be sent to the The WINS node architecture (Fig . 1) is developed to
main node.The processing of the regular interval data from the enable continuous sensing, event detection, and event
nodes will be analyzed and based on the intensity of the identification at low power. Since the event detection process
signals and the direction of the detecting nodes gets changing must occur continuously, the sensor, data converter, data

978-1-4244-9182-7/10/$26.00 ©2010 IEEE 130


buffer, and spectrum analyzer must all operate at micro power
levels. In the event that an event is detected, the spectrum
analyzer output may trigger the microcontroller. The
microcontroller may then issue commands for additional
signal processing operations for identification of the event
signal. Protocols for node operation then determine whether a
remote user or neighboring WINS node should be alerted. The
WINS node then supplies an attribute of the identified event.
For the particular applications of military security, the
WINS sensor systems must operate at low power, sampling at
low frequency and with environmental background limited Figure 1: Accessing WSNs through Internet
sensitivity. The micro power interface circuits must sample at
dc or low frequency where “1/f” noise in these CMOS
interfaces is large. The micro power signal processing system III. GPS-GPRS BASED OBJECT TRACKING SYSTEM
must be implemented at low power and with limited word
length. In particular, WINS applications are generally tolerant Location and positioning information can also be obtained
to latency. The WINS node event recognition may be delayed through the global positioning system (GPS) or local
by 10 – 100 m sec, or longer. positioning algorithms. This information can be gathered
across the network and appropriately processed to construct a
B. Signal transmission global view of the monitoring phenomena or objects. The
The sensed signals are then routed to the major node. This system allows a user to view the present and the past positions
routing is done based on the shortest distance. That is the recorded of a target object on Google Map through the
distance between the nodes is not considered, but the traffic internet. The system reads the current position of the object
between the nodes is considered. using GPS. The data is sent via GPRS service from the GSM
network towards a web server using the POST method of the
HTTP protocol. The object’s position data is then stored in the
C. Signal processing architecture database for live and past tracking. A web application is
developed using PHP, JavaScript, Ajax and My SQL with the
If a stranger enters the border, his footsteps will generate Google Map embedded. Here the node which has identified
harmonic signals. It can be detected as a characteristic feature the particular signals will act as GPS tracking device. So the
in a signal power spectrum. Thus, a spectrum analyzer must be tracking device is referred as the node which has detected the
implemented in the WINS digital signal processing system. signals. The system has two parts the tracking device and the
The spectrum analyzer resolves the WINS input data into a database server as shown in Fig. 3. The device is attached with
lowresolution power spectrum Here the corresponding the moving object and gets the position from GPS satellite in
frequency levels of the signals will be examined and with this real-time. It then sends the position information with the
data the direction of their movement will be identified later the International Mobile Equipment Identity (IMEI) number as its
corresponding node addresses will be submitted to the satellite own identity to the server. The data is checked for validity and
communication network for identification of the location of the valid data is saved into the database. When a user wants to
the node. track the device, s/he logs into the service provider’s website
and gets the live position of the device on Google Map. A
custom report is also generated which includes a detailed
description of the vehicles status. Users can also see the
previous positions of the device.

IV. CAPTURING AND PROCESSING OF IMAGES

Based on the results given by this wins system we will


collect the corresponding images of that particular area where
the exact node has detected and the images of the surrounding
areas of that particular node will also be collected then the
images will be processed. Here the images will be taken by the
satellite and with our personnel system which has been
arranged that automatically collects the images from a long
Figure 2. WINS nodes
distance. A common operation is to do a "pan merge", which
combines low-resolution color band information with high-
resolution panchromatic images. This gives a color image with
better resolution than would otherwise be possible. There are a

131
number of standard ways do this merge operation, the simplest noise in an image better than a full-body person detector and is
being to use a HSV approach, where the Hue and able to detect partially occluded people and people who are
rotated in depth, without any additional modifications to the
system. A component-based detector looks for the constituent
components of a person and if one of these components is not
detected, due to an occlusion or because the person is rotated
into the plane of the image, the system can still detect the
person if the component detections are combined using an
appropriate hierarchical classifier.

A. Component-Based People Detection-Our Approach


The approach we have to detect people in static images
borrows ideas from the fields of object detection in images
and data classification. In particular, the system detects the
components of a person's body in an image, i.e., the head, the
left and right arms, and the legs, instead of the full body.
Figure-3 Tracking of a vehicle using GPS These images demonstrate some of the challenges involved
with detecting people in still images with cluttered
Saturation come from the color bands, and the Value backgrounds. People are non rigid objects and dress in a wide
comes from the panchromatic band. Here we should get the variety of colors and garment types. Additionally, people may
true images that give us proper details of the objects. Now the be rotated in depth, partially occluded, or in motion (i.e.,
processed images will be submitted to the object detection running or walking). System then checks to ensure that the
system which will detect the objects which are present in the detected components are in the proper geometric configuration
images. and then combines them using a classifier. This approach of
integrating components using a classifier promises to increase
accuracy based on the results of previous work in the field.
V. OBJECT DETECTION IN IMAGES BY B. System Details
COMPONENTS
The system starts detecting people in images by selecting
In this process, we present a general example-based a 128 X 64 pixel window from the top left corner of the image
framework for detecting objects in static images by as an input. This input is then classified as either a person or a
components. Here we will examine the images by satellite as nonperson, a process which begins by determining where and
well as with our personnel system; technique is demonstrated at which scales the components of a person, i.e., the head,
by developing a system that locates people in cluttered scenes. legs, left arm, and right arm, may be found within the window.
The system is structured with four distinct example-based All of these candidate regions are processed by the respective
detectors that are trained to separately find the four component detectors to find the strongest candidate
components of the human body: the head, legs, left arm, and components. The object in the images are found with this.
right arm. After ensuring that these components are present in
the proper geometric configuration, a second example-based VI . DETECTION OF METALS AND BOMBS
classifier combines the results of the component detectors to The people from the other enemy countries may carry
classify a pattern as either a person or a nonperson. We call explosives or weapons with them and cross the border area.
this type of hierarchical architecture, in which learning occurs We need to detect the kind of weapons and the metals that
at multiple stages, an Adaptive Combination of Classifiers they have with them. Dirty bombs are explosive devices
(ACC). We present results that show that this system performs infused with dangerous radio nuclides commonly available
significantly better than a similar full-body person detector. materials that can contaminate large areas and result in serious
This suggests that the improvement in performance is due to health risks. Here we will detect and identify candidate
the component-based approach and the ACC data radioactive materials used in making bombs and weapons of
classification architecture. The algorithm is also more robust mass destruction (WMD) hidden in moving vehicles, shipping
than the full-body person detection method in that it is capable containers, or on a person, even when heavily shielded. Nuclei
of locating partially occluded views of people and people within the explosive are momentarily aligned with the radio
whose body parts have little contrast with the background. We waves. A transmitter emits pulses of low-intensity radio
are using a component-based person detection system for waves. After each pulse, the nuclei emit a characteristic radio
static images that is able to detect frontal, rear, slightly rotated signal, like an echo. The signal is picked up, amplified and
(in depth) and partially occluded people in cluttered scenes analyzed. A computer issues a warning if it identifies a signal
without assuming any a priori knowledge concerning the that is emitted only by explosives. It provides a high
image. The framework described here is applicable to other probability of correct detection and identification of suspect
domains besides people, including faces and cars. A materials and very low probability of false results.
component based approach handles variations in lighting and

132
VII. CONCLUSION AND FUTURE ENHANCEMENT REFERENCES

In this paper we proposed a new automated approach for [1] G. J. Pottie, W. J. Kaiser, L. P. Clare, and H. O. Marcy,
the detection of the strangers or the objects which are entering “Wireless integrated network sensors,” submitted to IEEE
into our border. On a national scale, transportation systems, J.Selected Areas in Communications
and borders will be monitored for efficiency, safety, and [2] Text book “Information Processing and Routing in Wireless
security. Here our system not only monitors the area but also Sensor Networks”
recognizes the area and collects the images and process them. [3] G. Asada, M. Dong, T. S. Lin, F. Newberg, G. Pottie, H. O. Marcy,
After the identification of the object detection of metals we and W. J. Kaiser, "Wireless Integrated Network Sensors: Low
Power Systems on a Chip”, Proceedings of the 24th IEEE
will have an idea about animals or human beings or other European Solid-State Circuits Conference, 1998.
objects like tankers etc crossing the border area. So, finally we [4] G.J. Pottie and W.J. Kaiser, “Wireless integrated network sensors,”
can have a clear idea of the strangers or strange objects which Comm. ACM, vol. 43, No. 5, May 2000, pp. 51-58.
are entering into the border area. Here our future work is to [5] Nasa exploring the whole earth: http:// mynasa1.nasa. gov/
send the appropriate data that we have collected to the higher topics/earth/earthday/earthday_mall.html
authorities and after proper conformation of the strangers and
the capacity of the weapons with them relevant action will be
taken by using automatic war planes or automatic aiming
weapons when the detection has been made. We can even
find out the details of the strangers from the database of the
criminals available with the military authorities and protect
our country from such terrorists.

133

You might also like