Professional Documents
Culture Documents
Submitted By
NISARGA R [1JV20CS009]
SUNIL V [1JV20CS014]
VAISHNAVI H N [1JV20CS016]
RAKESH JAGANNANAVAR [1JV21CS401]
CERTIFICATE
Certified that the Project Phase-1 work entitled “CAMOUFLAGE ROBOT FOR MILITARY
APPLICATIONS” carried out by NISARGA R [1JV20CS009], SUNIL V [1JV20CS014],
VAISHNAVI H N [1JV20CS016], RAKESH JAGANNANAVAR [1JV21CS401] are
bonafide students of Jnana Vikas Institute of Technology in partial fulfilment for the award
of the degree of Bachelor of Engineering in Computer Science and Engineering of the
Visvesvaraya Technological University, Belagavi during the year 2023-24. It is certified that
all corrections/suggestions indicated for Internal Assessment have been incorporated in the
report deposited in the department library. The project report has been approved as it satisfies
the academic requirement in respect of project work prescribed for the said degree.
1. ________________ _________________
2. ________________ _________________
JNANAVIKAS INSTITUTE OF TECHNOLOGY
BIDADI-562109
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
DECLARATION
We, NISARGA R [1JV20CS009], SUNIL V [1JV20CS014], VAISHNAVI H N
[1JV20CS016], RAKESH JAGANNANAVAR [1JV21CS401] students of 7th semester B.E
in Computer Science And Engineering, Jnana Vikas Institute of Technology, Bidadi,
hereby declare that the Project Phase-1 work entitled “CAMOUFLAGE ROBOT FOR
MILITARY APPLICATIONS” has been carried out by us and submitted in partial fulfilment
of the course requirements for the award of degree of Bachelor of Engineering, from
Visvesvaraya Technological University during 2023-2024 is a record of an original work done
by us under the guidance of RAGHAVENDRA S, Assistant Professor in Department of
Computer Science and Engineering, JVIT, Bidadi. The results embodied in this work has not
submitted to any other University or Institute for the award of any degree.
NISARGA R
USN: 1JV20CS009
Department of Computer Science and Engineering,
Jnana Vikas Institute of Technology
Bengaluru-562109 Signature of the Student
SUNIL V
USN: 1JV20CS014
Department of Computer Science and Engineering,
Jnana Vikas Institute of Technology
Bengaluru-562109 Signature of the Student
VAISHNAVI H N
USN: 1JV20CS016
Department of Computer Science and Engineering,
Jnana Vikas Institute of Technology
Bengaluru-562109 Signature of the Student
RAKESH JAGANNANAVAR
USN: 1JV21CS401
Department of Computer Science and Engineering,
Jnana Vikas Institute of Technology
Bengaluru-562109 Signature of the Student
ACKNOWLEDGEMENT
A Project work is a job of great enormity and it cannot accomplish by an individual all by
them.Eventually We are grateful to a number of individuals whose professional guidance,
assistance and encouragement have made it a pleasant endeavour to undertake this seminar
work.
We have great pleasure in expressing my deep sense of gratitude to founder Sir C.M
Lingappa, Chairman for having provided us with a great infrastructure and well- furnished
labs.
We would like to thank to my Family and Friends for their unforgettable support and
encouragement.
NISARGA R [1JV20CS009]
SUNIL V [1JV20CS014]
VAISHNAVI H N [1JV20CS016]
RAKESH JAGANNANAVAR [1JV21CS401]
i
ABSTRACT
In this modern era, huge capital of the country has been spent for the defence field to
deploy primitive and high security measures and safeguard the border security forces from the
trespassers. Some defence organizations utilize robotics in the defence field and the efficiency
of robots are very high when compared to the human forces. Camouflage Robot plays a vital
role in saving human loses as well as the damages that occur during disasters. Thus, it will gain
more importance in the upcoming era. The robot basically consists of a vehicle mounted with
one camera, which captures the images and detects colour accordingly as a part of the
camouflaging feature. The robot can quietly enter into enemy area and send information via
camera to the controller. The main motive of this paper is to make the defence stronger by using
the robots, which will help defence to safeguard the human lives. This paper has proposed the
system using the Arduino, metal detectors, which help the robot to do multi functionalities to
do rescue operations.
ii
TABLE OF CONTENTS
DETAILS Page No.
ACKNOWLEDGEMENT i
ABSTRACT ii
TABLE OF CONTENTS iii
LIST OF FIGURES iv
Chapter 1 INTRODUCTION 1
1.1 Introduction 1
1.2 Objectives 3
1.3 Problem Statement 3
REFERENCES
iii
LIST OF FIGURES
Figure No. Name of the Figure Page No.
1.1.1 Mobile Security Robot on Prowl for Trespasses 1
3.1.1 Block Diagram of Camouflage Robot 6
4.2.1 Architecture Diagram of Camouflage Robot 8
4.3.1 Data flow Diagram 9
4.4.1 Class Diagram 10
4.5.1 Use Case Diagram 10
4.6.1 Sequence Diagram 11
iv
CAMOUFLAGE ROBOT FOR MILITARY APPLICATIONS 2023-24
CHAPTER 1
INTRODUCTION
1.1 INTRODUCTION
Ensuring security across border region is considered as an important aspect for any
country. It provides protection to the country at the same time it incurs huge expenses for a
country. Many systems are developed by researchers to provide a solution for efficient
monitoring of borders. A mechanized robot controlled by embedded system is reported. This
system employs a group of sensors and a web camera; data from these sensors transmitted
wirelessly to a mobile application. The robot consists of Wi-Fi enabled communication
between the robot and the user. Metal and smoke sensors transmit the information. A
camouflage system that uses a colour sensor that can detect the surrounding colours and change
the colour of the robot is also discussed in this section. The mobile application is responsible
for controlling the motion of the robot.
Mobile robotics play an increasingly important role in military matters, from patrol to
dealing with potential explosives. “With suitable sensors and cameras to perform different
missions, mobile robots are operated remotely for reconnaissance patrol and relay back video
images to an operator,” says Dr. Andrew Goldenberg, PhD, Chief Executive Officer and
President of Engineering Services Inc. (ESI, Toronto Ontario, Canada) “Robots can neutralize
suspicious objects that may explode. The platform has a robot arm to pick up explosives or
suspected hazards in military or civilian settings.” Goldenberg goes on to say, “The mobile
robotic platform is mounted on a rectangular box with electronic equipment. The platform
moves on wheels or tracks, or both, and is usually battery-powered. Communication equipment
and sensors can detect images, sounds, gases and other hazards. The communication systems
read sensors and relay that information to the operator.”
According to Goldenberg, the United States military recently began equipping mobile
robotic platforms to carry small and medium-size firearms. “Instead of having people get close
to hazards such as unattended objects or car bombs, robots are used. The robot could neutralize
that object by shooting to detonate it,” Goldenberg says. “Mobile robots detect and explode in-
ground mines or improvised explosive devices.” These same mobile robotic systems are used
for neutralizing or exploding forgotten ordnance and mines after conflicts cease.
Keeping tabs on temperature is of special importance to server farms and other sensitive
electronic systems, LaSelle says. “A key area of activity for mobile robotic platforms is
patrolling vacant properties and warehouses due to the reliability and low costs attributed to
autonomous vehicles,” adds LaSelle. Goldenberg’s and LaSelle’s portrayals of tasks carried
out by mobile robotic platforms is echoed by Sean Thompson, Applications Engineer with
MICROMO. (Clearwater, Florida) “Ground-based systems use robotics for surveillance. These
platforms are equipped with weapons and cameras.
A robot acts like a pack mule, is fully autonomous, and carries a large number of
supplies.” Thompson speaks of robotics to help inspect and maintain nuclear weapons. “Mobile
robotic systems inspect nuclear missiles. Commonly, such inspection systems were large,
requiring several people in protective suits going into containment systems. Now, smaller self-
guided robotic systems require only one person in a protective suit going to a certain point and
letting the robot go.” The robot is remotely operated outside the containment system, reducing
the number of people and the amount of time people are exposed to relatively high radiation
levels, Thompson concludes.
1.2 OBJECTIVES
➢ Previously many technologies come like ZigBee, Lora, RF, Bluetooth etc.., But all the
devices communication ranges very low so we go with a latest booming technology
called IOT.
➢ An IOT ecosystem consists of web-enabled smart devices that use embedded processors,
sensors and communication hardware to collect, send and act on data they acquire from
their environments.
➢ IOT devices share the sensor data they collect by connecting to an IOT gateway or other
edge device where data is either sent to the cloud to be analysed or analysed locally.
➢ Sometimes, these devices communicate with other related devices and act on the
information they get from one another.
➢ The devices do most of the work without human intervention, although people can
interact with the devices for instance, to set them up, give them instructions or access the
data.
➢ The connectivity, networking and communication protocols used with these web-enabled
devices largely depend on the specific IOT applications deployed.
CHAPTER 2
LITERATURE SURVEY
The proposed system is a part of the panchendriya framework, only for detecting a
human intruder in the border region covered by dry leaves. This framework aims to reduce
the work force and cost of the traditional border surveillance by integrating multiple
sensors and various wireless technologies. Microphone sensor is used to detect the
presence of human intruder in dry leaves through footstep signal detection and surveillance
camera sensor is used for getting clear evidence of the intrusion in the border region
through visual information. The overall system performance is enhanced by integrating
these sensors into a microcontroller development board with high computational
capability. Once the human intrusion in border region covered with dry leaves is detected,
then the system initiates early alerts.
[2] A Novel Approach for Border Security; Surveillance Drone with Live Intrusion
Monitoring” Ekra Bin Syed Mojib; A.K.M. BahalulHaque; Md. NafisRaihan;
Mahbubur Rahman; Fahad Bin Alam IEEE 2019.
[3] Persistent mobile aerial surveillance platform using intelligent battery health
management and drone swapping Alexander Williams; Oleg Yakimenko IEEE 2019.
[4] A survey in adaptive hybrid wireless Sensor Network for military operations Wichai
Pawgasame IEEE 2019.
A Sensor Network is the primary source for acquiring information in today's military
operations that require situation awareness (SA) of a battlefield. There are several types of
sensor nodes, and each type of sensors has limited capability. The requirement for
gathering and analysing information about the field cannot be fulfilled by one type of
sensor. Several sensors are needed to be networked and provide distributed sensing in such
the way that the complete information about the field can be achieved. With current sensor
and wireless technologies, a large number of heterogeneous sensor nodes can be rapidly
deployed and wirelessly networked in a battlefield. These sensor nodes can perform
distributed sensing tasks in collaborative and cooperative manner in order to extract
features of the event in the field. Unlike any typical network, military wireless sensor
network is operating under the harsh condition of a battlefield. Hence, the resources are
constrained in terms of energy, bandwidth, and computing power, which limit the sensing
capability of the wireless sensor network. In addition, a network is prone to attack by
enemies.
CHAPTER 3
SYSTEM ANALYSIS
3.1 PROPOSED SYSTEM
There are various sensors such as Smoke Sensor: detects for toxic gases, IR Sensor:
Detects motion, Metal detector: searches for underground mines, L293D IC: for driving the dc
motors for motion control. ESP32 module collects data from these sensors and sends to Google
firebase where it is temporarily stored and sent to MIT app in your smartphone. Through the
MIT app the motion of the robot can be controlled When the IR sensor is triggered, the ESP32
cam takes a picture and sends it to telegram app as a notification.
Basically, Army Robot is capable of performing tasks such as locomotion, sensing the
harmful gas, sensing the humans beneath the surface, metal detection. Army robot is an
autonomous robot comprising of wireless camera which can be used as a spy and Bluetooth
used to control it wireless. The existing systems suffered many problems like high cost to set
up communication between robot and rescue control unit, noisy wireless communication link
between robot and control unit which ultimately stopped robot to function etc. In these systems,
distance is a limiting factor because the Bluetooth has a specified range that cannot be
increased.
Fundamentally, Military Robot is equipped for performing errands, for example, motion,
detecting the hurtful gas, detecting the people underneath the surface, metal identification.
Armed force robot is an independent robot involving remote camera which can be utilized as a
government agent and Bluetooth used to control it remote.
CHAPTER 4
SYSTEM DESIGN
4.1 SYSTEM DESIGN
System architecture is a conceptual model that defines the structure and behaviour of the
system. It comprises of the system components and the relationships describing how they work
together to implement the overall system.
A DFD shows what kind of information will be input to and output from the system, how
the data will advance through the system, and where the data will be stored. It does not show
information about the timing of process or information about whether processes will operate in
sequence or in parallel unlike a flowchart which also shows this information.
Fig 4.3 represents the data flow diagram of the camouflage army robot. It contains four
sensors. An obstacle sensor, PIR sensor, Colour sensor, Metal detector and a gas sensor. In the
course of robot movement if any obstacle is sensed then first it detected the colour by using
colour sensor and that particular colour is displayed in the RGB colour matrix. If any human
comes that is detected by PIR sensor and as soon as the human is detected camera and GPS
turns on and that particular live video is sent to the android app.
If any landmines are present then metal detector detects it and through GPS information
will be sent to the android app. If any leakage of gas is present then those gases are detected by
gas sensor and that particular information is sent to the android app.
Class diagram is a static diagram. It represents the static view of an application. Class
diagram is not only used for visualizing, describing, and documenting different aspects of a
system but also for constructing executable code of the software application. Class diagram
shows a collection of classes, interfaces, associations, collaborations, and constraints. It is also
known as a structural diagram.
A use case diagram at its simplest is a representation of a user's interaction with the system
that shows the relationship between the user and the different use cases in which the user is
involved. A use case diagram can identify the different types of users of a system and the
different use cases and will often be accompanied by other types of diagrams as well.
While a use case itself might drill into a lot of detail about every possibility, a use case
diagram can help provide a higher-level view of the system. It has been said before that "Use
case diagrams are the blueprints for your system". They provide the simplified and graphical
representation of what the system must actually do.
A sequence diagram shows object interactions arranged in time sequence. It depicts the
objects and classes involved in the scenario and the sequence of messages exchanged between
the objects needed to carry out the functionality of the scenario. Sequence diagrams are
typically associated with use case realizations in the Logical View of the system under
development. Sequence diagrams are sometimes called event diagrams or event scenarios.
Sending data
Tx of data
Broadcasts information
[2] “Development of a Framework for Effective Surveillance and Human Intrusion Detection
in Border regions covered with Dry leaves” D Arjun; P K Indukala; K A Unnikrishna
Menon, 2020 Fourth International Conference on Inventive Systems and Control (ICISC)
Year: 2020 | Conference Paper | Publisher: IEEE.
[3] “A Novel Approach for Border Security; Surveillance Drone with Live Intrusion
Monitoring” Ekra Bin Syed Mojib; A.K.M. Bahalul Haque; Md. Nafis Raihan; Mahbubur
Rahman; Fahad Bin Alam, 2019 IEEE International Conference on Robotics, Automation,
Artificial-intelligence and Internet-of-Things (RAAICON) Year: 2019 | Conference Paper
| Publisher: IEEE.
[4] “Maritime Border Security using Sensors, Processing, and Platforms to Detect Dark
Vessels” Ross S. Eaton; Stan German; Arjuna Balasuriya, 2018 IEEE International
Symposium on Technologies for Homeland Security (HST) Year: 2018 | Conference Paper
| Publisher: IEEE.
[5] S. Ren, K. He, R. Girshick, and J. Sun, “Faster R-CNN: Towards Real-Time Object
Detection with Region Proposal Networks,” IEEE Trans. Pattern Anal. Mach. Intell., vol.
39, no. 6, pp. 1137–1149, Jun. 2017.
[6] Arunpreet Kaur, Dilip Kumar “Wireless Multifunctional Robot for Military Applications”
2015 IEEE 2nd international conference on recent advances in engineering and
computational sciences April 2017.
[7] Joshi, Shreedhar A., Sunil Poojari, Tushar Chougale, Subrahmanya Shetty, and M. K.
Sandeep. "Home automation system using wireless network." In 2017 2nd International
Conference on Communication and Electronics Systems (ICCES), pp. 803-807. IEEE,
2017.