You are on page 1of 5

ANDROID BASED AUTONOMOUS

INTELIGENT POD FOR BORDER SECURITY


USING RPi
1
Srishti Singh, 2 Syed Arham Iftekhar, 3Diya Banerjee, 4Aman Gautam,
5
Sreenivasa Babu
1, 2, 3,4, Student, Department of Electronics and Communication Engineering
5 Professor , Department of Electronics and Communication Engineering
1, 2, 3, 4, 5 RNS Institute of Technology, Bangalore, Karnataka, India
1rn19ec180.srishti@gmail.com,1rn19ec151.syedarhamiftekhar@gmail.com ,
1rn19ec042.diyabanerjee@gmail.com , 1rn19ec173.amangautam@gmail.com

Abstract— The Indian border military force is spying purposes. This system makes use of robotic
facing a huge destruction from Pakistan, China, vehicle which helps not only to enter an area involving
Myanmar, Sri-lanka and Bangladesh. Tensions high risk. The whole system is controlled via android
rise between nuclear neighbors after deadly raid application. Thus this application involves robotic
on army base close to disputed border with vehicle so that the system can be used to enter a high
Pakistan. Highly trained militants are on risk area, move around place wherever it wants to.
essentially suicide missions – died in the three-
hour assault on the base at Uri. Seven Indian An Internet-based intelligent pod security system,
soldiers killed in attack on army base, Nagrota. In “iBotGuard” in detects trespassers using face
Kashmir, near the militarized “line of control” recognition algorithm. System can detect a trespasser
that divides Kashmir from the Pakistan-controlled
using intruder detection subsystem which relies on
side. The Pathankot attack was a terrorist attack
invariant face recognition and it tracks the trespasser
committed on 2 January 2016 by a heavily armed
team which attacked the Pathankot air force using intruder tracking subsystem based on streaming
station, part of the western air command of the technology.
Indian air force. The recent news is almost many
soldiers were killed by Pakistani army and merely Intruder detection subsystem captures images
about soldiers injured, some critically. periodically when it detects trespasser in a secure area
and verifies whether the object detected is human using
➢ INTRODUCTION invariant face recognition.
Almost all the military organizations take the help of Android Based Autonomous Intelligent Pod for Border
military robots to carry many risky jobs that cannot be Security, which identifies trespassers using PIR motion
handled manually by soldier. We have also seen a great sensor, alerts security personnel by E-mail using GSM
development in military robots when compared to and captures image of trespassers using Raspberry Pi
military robots in earlier period. At present, different camera in android device and mail this image to
military robots are used by many military corresponding email ID using android based
organizations. This innovative system is made for application.
operations which involve high risk for humans to enter
and may be proved very beneficial for military area for
versa in other cases. This is true especially for ➢ METHODOLOGY
regions such as hallux, medial forefoot and heel. On A. Components required
a flat surface, PPD on the hindfoot (heel) and hallux
is the highest.
Raspberry Pi
Studies indicated that providing Camera
pressure feedback might reduce plantar
pressures, with an emerging potential use of DC motor
smart technology. Further pressure analyses, DCmotordriver
across all weight‐bearing activities, referring Power Supply
to location‐specific pressures are required to PIR sensor
improve our understanding of pressures Buzzer
resulting in improved effectiveness of
interventions. Laser
Android device
E-mail

➢ OBJECTIVES
• We are detecting enemy army
soldiers using PIR sensor.
• We are giving the feature of live
video streaming across border
to defence.
• We are providing automated
firing feature. B. Specifications

Raspberry pie:

➢ LITERATURE
SURVEY
adjust their walking style according to the terrain they are
In 2008, Md.Masum Billah, Mohiuddin Ahmed, and walking on. This same logic is tried in these robots.
Soheli Farhana states that many walking robots were
compared and advantages of hexapod systems against • Broadcom BCM2837 Arm7 Quad Core Processor
wheeled robots are described. These hexapod robots is powered Single Board Computer running at 900MHz
mainly considered for efficient navigation method in
different terrain using apposite gait of locomotion, which • 1GB RAM
make it faster and at the same time energy efficient to
navigate and negotiate difficult terrain. Hexapod is used • 40pin extended GPIO
for the purpose of disaster recovery. In any disaster, the
• 4 x USB 2 ports
elementary tasks at hand are: (i) to reach the affected field
(ii) to find and get information about victims, and (iii) to • 4 pole Stereo output and Composite video port
rescue as many of them as possible.
• Full size HDMI
In 2013, Graeme Best, Peyman Moghadam, Navinda
Kottege, Lindsay Kleeman have discussed about the • CSI camera port for connecting the Raspberry Pi
effectiveness of a legged robot’s gait. It is highly camera
dependent on the ground cover of the terrain it traversing.
The robot is able to detect and classify the type of ground • DSI display port for connecting the Raspberry Pi
cover it is traversing. To achieve this they present a novel touch screen display
approach for ground cover classification which utilizes
position measurements of the leg servos to estimate the • Micro SD port for loading your operating system and
errors between commanded and actual positions of each storing data
joint.
• Micro USB power source
In addition to this, they also employ a multi-class
Support Vector Machine with a required dimensional
feature space consisting of features in gait-phase and
frequency domains. They have implemented this algorithm
in the Robot Operating System (ROS).Humans naturally
typically 200 to 400A.
Camera:
• . One cell has a nominal output of 2.1V,
but lead- acid cells are often used in a
• The cost of the camera module is 20 EUR series combination of three for a 6-V
in Europe. and supports 1080p, 720p, battery and six for a 12-V battery.
640x480p video. The footprint dimensions
are 25 mm x 20 mm x 9 mm.
PIR Sensor:
• The Raspberry Pi camera board v.1 has a
5M Pixel sensor, and connects via a ribbon
cable to the CSI connector on the Pin Name Function
Raspberry Pi. A User's Guide describes
setup and use. - GND Connects to Ground or Vss
• The "Pi NoIR" version of the v.1 camera + V+ Connects to +5 VDC or Vdd
was released. It has the same sensor with
the IR filter removed, and a black PCB. OUT Output Connects to an I/O pin set to
With no IR filter, it can see near-IR INPUT mode
wavelengths (700 - 1000 nm) like a
security camera, with the tradeoff of poor
color rendition. It is otherwise the same
and uses the same software as the normal
Pi camera.

• The "Pi Camera v2.1" was released in both


normal and NoIR versions. It uses the
Sony IMX219 8-megapixel sensor with a
slightly wider (62 degrees H) and faster
(f/2.0) lens. The board is the same 25 x 24
mm size and is intended as a drop-in
replacement for the previous camera.

Power Supply:

• An AC to DC adaptor as been used to get


DC input for the mother board. In mother
board, we have developed a 5V regulator
circuit, which is needed for microcontroller
as supply voltage.

• IR transmitters are also connected to 5V


supply, so that they always transmit high
signal. LM7805 is used for 5V regulated
supply.

Led Acid Battery:

• The electrolyte is a dilute solution of


sulphuric acid (H₂SO₄).

• In the application of battery power to start


the engine in an auto mobile, for example,
the load current to the starter motor is
➢ WORKING PRINCIPLE ➢ RESULT
Basic principle of the system is waiting for the The PIR Sensor detects the intruder and informs the raspberry pi.
reflected signal from the intruder. To rotate the The camera turns on and captures the image which in turn is sent
POD, DC motor is used. Two-geared DC motor is to the registered e-mail id. There is a feature of live streaming
used for the movement of POD. The movement of and controlling the pod manually implemented on a vehicle by
pod is enabled by our mobile phone. ARM. We have included features like laser detection and bullet
firing and also the vehicle move automatically.

Here we are using an android device for controlling


the movement of POD and the Raspberry Pi camera REFERENCES
for video surveillance. Then a PIR sensor is used
for detecting the trespasser. The sensor is activated [1] Android based intelligent robot for border security
[2014], IJISET, Vol.1 issue 5,malanad college of
40secs after the activation of the device, as it wants engineering, Karnataka
to cope up with the surroundings. If an intruder is
detected, the output of PIR sensor is being sent to [2] Study of android operating system and its versions,
IJSEAS, Vol.2, Issue-2, February 2016 MPhil scholar,
the Raspberry Pi and then the Wi-Fi module in the
PSG College of Arts & Science, Coimbatore, India.
Raspberry Pi sends an information signal to the
control room. [3] Minni Mohan, Department of electronics and
communication, M.A College of Engineering,
Kothamangalam,BorderSecurityRobot,IJCI,vol.5.no.2,A
pril 2016,A P J Abdul Kalam Technological University,
If an intruder is detected a laser gun is provided for Kerala, India.
further purposes. The movement of laser can be
[4] "BorderSense: Border patrol through advanced wireless
controlled as per the directions given by the control sensor networks”, Zhi Sun, Pu Wang, Mehmet
room. If necessary, laser gun can be used for C,Vuran,Mznah A. Al-Rodhaan,Abdullah M.Al-
shooting or firing the intruder Dhelaan,Ian F.Akyildiz Ad Hoc Networks 9 pp. 468–477
[5] R. Siegwart and I. Nourbakhsh, “Introduction to
Autonomous Mobile Robots”, Cambridge, MA: MIT
Press,2004.
[6] James N. K. Liu, M, Meng Wang, “ iBotGuard: An
Internet-Based Intelligent Robot Security System Using
Invariant Face Recognition Against Intruder”, IEEE
Transactions on Systems, Man, & Cybernetics Part C:
Applications and Reviews, Vol. 35, No.1 February,2005.
[7] Guangming Song et. al., “A Surveillance Robot with
Hopping Capabilities for Home Security”, IEEE
Transactions on Consumer Electronics, Vol. 55,No.4,
NOVEMBER,2009.
[8] Margaret Butler, “Android: Changing the Mobile
Landscape”, PERVASIVE computing, Published by the
IEEE CS, 1536-1268, 2011.
[9] Theodoros Theodoridis and Huosheng Hu, Toward
Intelligent Security Robots: A Survey, IEEE
Transactions on Systems, Man, & Cybernetics Part C:
Applications and Reviews, Vol. 42, No. 6,
November,2012.
[10] Senthil Kumar.M & Padmavathy.N, “Android Based
Security and Remote Surveillance System”, Graduate
Flowchart for overall working of the system Research in Engineering and Technology (GRET): An
International Journal, 2011.

You might also like