You are on page 1of 19

VISVESVARAYA TECHNOLOGY UNIVERSITY

JNANA SANGAMA, BELAGAVI-590018, KARNATAKA

Project Phase-1 Report


on

“CAMOUFLAGE ROBOT FOR MILITARY APPLICATIONS”


A Phase-1 Project Report Submitted in partial fulfilment of the requirements for the Degree of
BACHELOR OF ENGINEERING
In
COMPUTER SCIENCE AND ENGINEERING

Submitted By
NISARGA R [1JV20CS009]
SUNIL V [1JV20CS014]
VAISHNAVI H N [1JV20CS016]
RAKESH JAGANNANAVAR [1JV21CS401]

Under the Guidance of


Mr. RAGHAVENDRA S
Assistant Professor
Dept. of Computer Science and Engineering
JVIT, Bidadi – 562109

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


JNANA VIKAS INSTITUTE OF TECHNOLOGY
Vidya Soudha, Padmashree G.D. Goyalgi Campus, Bangalore-Mysore Highway
BIDADI, BANGALORE – 562109.
JNANA VIKAS INSTITUTE OF TECHNOLOGY
BIDADI- 562109
(Affiliated to Visvesvaraya Technological University, Belagavi, Approved by AICTE, New Delhi)

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CERTIFICATE
Certified that the Project Phase-1 work entitled “CAMOUFLAGE ROBOT FOR MILITARY
APPLICATIONS” carried out by NISARGA R [1JV20CS009], SUNIL V [1JV20CS014],
VAISHNAVI H N [1JV20CS016], RAKESH JAGANNANAVAR [1JV21CS401] are
bonafide students of Jnana Vikas Institute of Technology in partial fulfilment for the award
of the degree of Bachelor of Engineering in Computer Science and Engineering of the
Visvesvaraya Technological University, Belagavi during the year 2023-24. It is certified that
all corrections/suggestions indicated for Internal Assessment have been incorporated in the
report deposited in the department library. The project report has been approved as it satisfies
the academic requirement in respect of project work prescribed for the said degree.

RAGHAVENDRA S NIVEDITHA S Dr. AV SEETHA GIRISHA


Assistant Professor HoD & Assistant Professor Principal
Department of CSE Department of CSE JVIT, Bidadi
JVIT, Bidadi JVIT, Bidadi

Name of the Examiners Signature with Date

1. ________________ _________________

2. ________________ _________________
JNANAVIKAS INSTITUTE OF TECHNOLOGY
BIDADI-562109
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

DECLARATION
We, NISARGA R [1JV20CS009], SUNIL V [1JV20CS014], VAISHNAVI H N
[1JV20CS016], RAKESH JAGANNANAVAR [1JV21CS401] students of 7th semester B.E
in Computer Science And Engineering, Jnana Vikas Institute of Technology, Bidadi,
hereby declare that the Project Phase-1 work entitled “CAMOUFLAGE ROBOT FOR
MILITARY APPLICATIONS” has been carried out by us and submitted in partial fulfilment
of the course requirements for the award of degree of Bachelor of Engineering, from
Visvesvaraya Technological University during 2023-2024 is a record of an original work done
by us under the guidance of RAGHAVENDRA S, Assistant Professor in Department of
Computer Science and Engineering, JVIT, Bidadi. The results embodied in this work has not
submitted to any other University or Institute for the award of any degree.

NISARGA R
USN: 1JV20CS009
Department of Computer Science and Engineering,
Jnana Vikas Institute of Technology
Bengaluru-562109 Signature of the Student

SUNIL V
USN: 1JV20CS014
Department of Computer Science and Engineering,
Jnana Vikas Institute of Technology
Bengaluru-562109 Signature of the Student

VAISHNAVI H N
USN: 1JV20CS016
Department of Computer Science and Engineering,
Jnana Vikas Institute of Technology
Bengaluru-562109 Signature of the Student

RAKESH JAGANNANAVAR
USN: 1JV21CS401
Department of Computer Science and Engineering,
Jnana Vikas Institute of Technology
Bengaluru-562109 Signature of the Student
ACKNOWLEDGEMENT

A Project work is a job of great enormity and it cannot accomplish by an individual all by
them.Eventually We are grateful to a number of individuals whose professional guidance,
assistance and encouragement have made it a pleasant endeavour to undertake this seminar
work.

We have great pleasure in expressing my deep sense of gratitude to founder Sir C.M
Lingappa, Chairman for having provided us with a great infrastructure and well- furnished
labs.

We take this opportunity to express my profound gratitude to Dr. A V SEETHA GIRISHA,


Principal for his constant support and encouragement.

We would like to express my heart full thanks to NIVEDITHA S, Head of the


Department, Computer Science and Engineering who has guided me in all aspects.

We would like to extend my thanks to my guide RAGHAVENDRA S, who has guided me


in all aspects. I am grateful for his unfailing encouragement and suggestion, given to me in
course of my project works.

We would like to mention special thanks to all my Teaching Faculties of Department of


Computer Science and Engineering, JVIT, Bidadi for their valuable support and guidance.

We would like to thank to my Family and Friends for their unforgettable support and
encouragement.

NISARGA R [1JV20CS009]
SUNIL V [1JV20CS014]
VAISHNAVI H N [1JV20CS016]
RAKESH JAGANNANAVAR [1JV21CS401]

i
ABSTRACT

In this modern era, huge capital of the country has been spent for the defence field to
deploy primitive and high security measures and safeguard the border security forces from the
trespassers. Some defence organizations utilize robotics in the defence field and the efficiency
of robots are very high when compared to the human forces. Camouflage Robot plays a vital
role in saving human loses as well as the damages that occur during disasters. Thus, it will gain
more importance in the upcoming era. The robot basically consists of a vehicle mounted with
one camera, which captures the images and detects colour accordingly as a part of the
camouflaging feature. The robot can quietly enter into enemy area and send information via
camera to the controller. The main motive of this paper is to make the defence stronger by using
the robots, which will help defence to safeguard the human lives. This paper has proposed the
system using the Arduino, metal detectors, which help the robot to do multi functionalities to
do rescue operations.

ii
TABLE OF CONTENTS
DETAILS Page No.
ACKNOWLEDGEMENT i
ABSTRACT ii
TABLE OF CONTENTS iii
LIST OF FIGURES iv

Chapter 1 INTRODUCTION 1
1.1 Introduction 1
1.2 Objectives 3
1.3 Problem Statement 3

Chapter 2 LITERATURE SURVEY 4

Chapter 3 SYSTEM ANALYSIS 6


3.1 Proposed System 6
3.2 Existing System 7
3.3 System Requirements 7
3.3.1 Hardware Requirements 7
3.3.2 Software Requirements 7

Chapter 4 SYSTEM DESIGN 8


4.1 System Design 8
4.2 Architectural Design 8
4.3 Data Flow Diagram 8
4.4 Class Diagram 9
4.5 Use Case Diagram 10
4.6 Sequence Diagram 11

REFERENCES

iii
LIST OF FIGURES
Figure No. Name of the Figure Page No.
1.1.1 Mobile Security Robot on Prowl for Trespasses 1
3.1.1 Block Diagram of Camouflage Robot 6
4.2.1 Architecture Diagram of Camouflage Robot 8
4.3.1 Data flow Diagram 9
4.4.1 Class Diagram 10
4.5.1 Use Case Diagram 10
4.6.1 Sequence Diagram 11

iv
CAMOUFLAGE ROBOT FOR MILITARY APPLICATIONS 2023-24

CHAPTER 1
INTRODUCTION
1.1 INTRODUCTION
Ensuring security across border region is considered as an important aspect for any
country. It provides protection to the country at the same time it incurs huge expenses for a
country. Many systems are developed by researchers to provide a solution for efficient
monitoring of borders. A mechanized robot controlled by embedded system is reported. This
system employs a group of sensors and a web camera; data from these sensors transmitted
wirelessly to a mobile application. The robot consists of Wi-Fi enabled communication
between the robot and the user. Metal and smoke sensors transmit the information. A
camouflage system that uses a colour sensor that can detect the surrounding colours and change
the colour of the robot is also discussed in this section. The mobile application is responsible
for controlling the motion of the robot.

“Military and battlefield applications continue to grow at an accelerated pace due to


demand fuelled by government investment. Over the past decade, we have seen increasing
levels of investment in autonomous vehicles used for surveillance and security,” says Rush
LaSelle, Vice President and General Manager with Adept Technology Inc. (Pleasanton,
California) “Applications range from monitoring perimeters of secured areas such as airports
to acting as a night watchman.”

Fig. 1.1.1: Mobile Security Robot on Prowl for Trespasses. Courtesy


Adept Technology Inc.

Dept. of CSE, JVIT Page 1


CAMOUFLAGE ROBOT FOR MILITARY APPLICATIONS 2023-24

Mobile robotics play an increasingly important role in military matters, from patrol to
dealing with potential explosives. “With suitable sensors and cameras to perform different
missions, mobile robots are operated remotely for reconnaissance patrol and relay back video
images to an operator,” says Dr. Andrew Goldenberg, PhD, Chief Executive Officer and
President of Engineering Services Inc. (ESI, Toronto Ontario, Canada) “Robots can neutralize
suspicious objects that may explode. The platform has a robot arm to pick up explosives or
suspected hazards in military or civilian settings.” Goldenberg goes on to say, “The mobile
robotic platform is mounted on a rectangular box with electronic equipment. The platform
moves on wheels or tracks, or both, and is usually battery-powered. Communication equipment
and sensors can detect images, sounds, gases and other hazards. The communication systems
read sensors and relay that information to the operator.”

According to Goldenberg, the United States military recently began equipping mobile
robotic platforms to carry small and medium-size firearms. “Instead of having people get close
to hazards such as unattended objects or car bombs, robots are used. The robot could neutralize
that object by shooting to detonate it,” Goldenberg says. “Mobile robots detect and explode in-
ground mines or improvised explosive devices.” These same mobile robotic systems are used
for neutralizing or exploding forgotten ordnance and mines after conflicts cease.

Keeping tabs on temperature is of special importance to server farms and other sensitive
electronic systems, LaSelle says. “A key area of activity for mobile robotic platforms is
patrolling vacant properties and warehouses due to the reliability and low costs attributed to
autonomous vehicles,” adds LaSelle. Goldenberg’s and LaSelle’s portrayals of tasks carried
out by mobile robotic platforms is echoed by Sean Thompson, Applications Engineer with
MICROMO. (Clearwater, Florida) “Ground-based systems use robotics for surveillance. These
platforms are equipped with weapons and cameras.

A robot acts like a pack mule, is fully autonomous, and carries a large number of
supplies.” Thompson speaks of robotics to help inspect and maintain nuclear weapons. “Mobile
robotic systems inspect nuclear missiles. Commonly, such inspection systems were large,
requiring several people in protective suits going into containment systems. Now, smaller self-
guided robotic systems require only one person in a protective suit going to a certain point and
letting the robot go.” The robot is remotely operated outside the containment system, reducing
the number of people and the amount of time people are exposed to relatively high radiation
levels, Thompson concludes.

Dept. of CSE, JVIT Page 2


CAMOUFLAGE ROBOT FOR MILITARY APPLICATIONS 2023-24

1.2 OBJECTIVES

➢ To identify intruder through camera and sensors IR sensor.


➢ To eliminate the need of being physically present in any location for security of the
border.
➢ To camouflage the robot based on the surroundings.
➢ To send the sensors data to MIT App.
➢ To control the motion of robot using MIT App.

1.3 PROBLEM STATEMENT

➢ Previously many technologies come like ZigBee, Lora, RF, Bluetooth etc.., But all the
devices communication ranges very low so we go with a latest booming technology
called IOT.

➢ An IOT ecosystem consists of web-enabled smart devices that use embedded processors,
sensors and communication hardware to collect, send and act on data they acquire from
their environments.

➢ IOT devices share the sensor data they collect by connecting to an IOT gateway or other
edge device where data is either sent to the cloud to be analysed or analysed locally.

➢ Sometimes, these devices communicate with other related devices and act on the
information they get from one another.

➢ The devices do most of the work without human intervention, although people can
interact with the devices for instance, to set them up, give them instructions or access the
data.

➢ The connectivity, networking and communication protocols used with these web-enabled
devices largely depend on the specific IOT applications deployed.

Dept. of CSE, JVIT Page 3


CAMOUFLAGE ROBOT FOR MILITARY APPLICATIONS 2023-24

CHAPTER 2

LITERATURE SURVEY

[1] Development of a Framework for Effective Surveillance and Human Intrusion


Detection in Border regions covered with Dry leaves” D Arjun; P K Indukala; K A
Unnikrishna Menon IEEE 2020.

The proposed system is a part of the panchendriya framework, only for detecting a
human intruder in the border region covered by dry leaves. This framework aims to reduce
the work force and cost of the traditional border surveillance by integrating multiple
sensors and various wireless technologies. Microphone sensor is used to detect the
presence of human intruder in dry leaves through footstep signal detection and surveillance
camera sensor is used for getting clear evidence of the intrusion in the border region
through visual information. The overall system performance is enhanced by integrating
these sensors into a microcontroller development board with high computational
capability. Once the human intrusion in border region covered with dry leaves is detected,
then the system initiates early alerts.

[2] A Novel Approach for Border Security; Surveillance Drone with Live Intrusion
Monitoring” Ekra Bin Syed Mojib; A.K.M. BahalulHaque; Md. NafisRaihan;
Mahbubur Rahman; Fahad Bin Alam IEEE 2019.

Everything is being automated day-by-day. Automation has made life flexible.


Border security is one of the most crucial aspects of a country's defense. Monitoring the
border with human labor is a very tough job as it requires constant attention and over
watch. In this paper, authors have proposed an idea to make border security more vigilant
and active. As quadcopters fly in the sky and record everything with a wide-angle, it
becomes easy to watch an extensive area with one drone. Along with the help of machine
learning, we can easily detect the intrusion (human & another animal) from the video
captured by the drone. The developed prototype consists of three commercially available
quadcopters, a wireless network router, and a laptop to execute Python code. If we fly a
drone around a large area, then only one drone can do the work of 10 to 30 border guard
humans very quickly, which is very much feasible.

Dept. of CSE, JVIT Page 4


CAMOUFLAGE ROBOT FOR MILITARY APPLICATIONS 2023-24

[3] Persistent mobile aerial surveillance platform using intelligent battery health
management and drone swapping Alexander Williams; Oleg Yakimenko IEEE 2019.

Unmanned systems continue to be at the forefront of development for many


industries, including homeland security and military. Unmanned systems operate with
increasingly more advanced autonomy. According to the Defence Science Board report of
2012, the key aspect of enhancing autonomy is providing persistency. However, onboard
fuel, in general, and battery capacity, for the electrically-powered systems in particular,
limit the operational time of many systems characterized as persistent. That is why these
days researchers explore a variety of solutions that have their advantages and
disadvantages depending on the mission. These include using tethered systems, ground
pads with contact and wireless (inductive) battery charging, solar-powered ground
stations, power-line recharging stations, hydrogen fuel cells, solar-powered drones, laser-
beam inflight recharging, etc. This paper focuses on the development and evaluation of
simpler and seemingly more cost-efficient approach for a multi-rotor aerial persistent
system enabling longer-duration missions using vehicle swapping and intelligent battery
management.

[4] A survey in adaptive hybrid wireless Sensor Network for military operations Wichai
Pawgasame IEEE 2019.

A Sensor Network is the primary source for acquiring information in today's military
operations that require situation awareness (SA) of a battlefield. There are several types of
sensor nodes, and each type of sensors has limited capability. The requirement for
gathering and analysing information about the field cannot be fulfilled by one type of
sensor. Several sensors are needed to be networked and provide distributed sensing in such
the way that the complete information about the field can be achieved. With current sensor
and wireless technologies, a large number of heterogeneous sensor nodes can be rapidly
deployed and wirelessly networked in a battlefield. These sensor nodes can perform
distributed sensing tasks in collaborative and cooperative manner in order to extract
features of the event in the field. Unlike any typical network, military wireless sensor
network is operating under the harsh condition of a battlefield. Hence, the resources are
constrained in terms of energy, bandwidth, and computing power, which limit the sensing
capability of the wireless sensor network. In addition, a network is prone to attack by
enemies.

Dept. of CSE, JVIT Page 5


CAMOUFLAGE ROBOT FOR MILITARY APPLICATIONS 2023-24

CHAPTER 3
SYSTEM ANALYSIS
3.1 PROPOSED SYSTEM

Fig. 3.1.1: Block Diagram of Camouflage Robot.


The above block diagram shows the proposed system. The main component is the ESP32
Wi-Fi module and microcontroller. The camouflage system consists of a colour sensor which
captures the surrounding colour and after processing, the signals are send to ESP32 module
which decides which LED array to glow by actuating a relay module, there by matching the
surrounding environment.

There are various sensors such as Smoke Sensor: detects for toxic gases, IR Sensor:
Detects motion, Metal detector: searches for underground mines, L293D IC: for driving the dc
motors for motion control. ESP32 module collects data from these sensors and sends to Google
firebase where it is temporarily stored and sent to MIT app in your smartphone. Through the
MIT app the motion of the robot can be controlled When the IR sensor is triggered, the ESP32
cam takes a picture and sends it to telegram app as a notification.

Dept. of CSE, JVIT Page 6


CAMOUFLAGE ROBOT FOR MILITARY APPLICATIONS 2023-24

3.2 EXISTNG SYSTEM

Basically, Army Robot is capable of performing tasks such as locomotion, sensing the
harmful gas, sensing the humans beneath the surface, metal detection. Army robot is an
autonomous robot comprising of wireless camera which can be used as a spy and Bluetooth
used to control it wireless. The existing systems suffered many problems like high cost to set
up communication between robot and rescue control unit, noisy wireless communication link
between robot and control unit which ultimately stopped robot to function etc. In these systems,
distance is a limiting factor because the Bluetooth has a specified range that cannot be
increased.

Fundamentally, Military Robot is equipped for performing errands, for example, motion,
detecting the hurtful gas, detecting the people underneath the surface, metal identification.
Armed force robot is an independent robot involving remote camera which can be utilized as a
government agent and Bluetooth used to control it remote.

3.3 SYSTEM REQUIREMENTS


3.3.1 HARDWARE REQUIREMENTS
➢ ESP32 Wi-Fi & microcontroller module.
➢ ESP32 Cam.
➢ Smoke Sensor.
➢ IR sensor.
➢ Colour sensor.
➢ LED array.
➢ Motor Driver & motors.
➢ Metal detector.
➢ Buzzer.

3.3.2 HARDWARE REQUIREMENTS


➢ Arduino IDE
➢ Firebase
➢ MIT Application
➢ Telegram

Dept. of CSE, JVIT Page 7


CAMOUFLAGE ROBOT FOR MILITARY APPLICATIONS 2023-24

CHAPTER 4
SYSTEM DESIGN
4.1 SYSTEM DESIGN

System design is the process of defining the architecture, components, modules,


interfaces, and data for a system to satisfy specified requirements. Systems design could be
seen as the application of systems theory to product development.

4.2 ARCHITECTURAL DESIGN

System architecture is a conceptual model that defines the structure and behaviour of the
system. It comprises of the system components and the relationships describing how they work
together to implement the overall system.

Fig. 4.2.1: Architectural Diagram of Camouflage Army Robot

4.3 DATA FLOW DIAGRAM

A data flow diagram is a graphical representation of the "flow" of data through an


information system, modelling its process aspects. A DFD is often used as a preliminary step
to create an overview of the system without going into great detail, which can later be
elaborated. DFDs can also be used for the visualization of data processing.

A DFD shows what kind of information will be input to and output from the system, how
the data will advance through the system, and where the data will be stored. It does not show

Dept. of CSE, JVIT Page 8


CAMOUFLAGE ROBOT FOR MILITARY APPLICATIONS 2023-24

information about the timing of process or information about whether processes will operate in
sequence or in parallel unlike a flowchart which also shows this information.

Fig. 4.3.1: Data Flow Diagram

Fig 4.3 represents the data flow diagram of the camouflage army robot. It contains four
sensors. An obstacle sensor, PIR sensor, Colour sensor, Metal detector and a gas sensor. In the
course of robot movement if any obstacle is sensed then first it detected the colour by using
colour sensor and that particular colour is displayed in the RGB colour matrix. If any human
comes that is detected by PIR sensor and as soon as the human is detected camera and GPS
turns on and that particular live video is sent to the android app.

If any landmines are present then metal detector detects it and through GPS information
will be sent to the android app. If any leakage of gas is present then those gases are detected by
gas sensor and that particular information is sent to the android app.

4.4 CLASS DIAGRAM

Class diagram is a static diagram. It represents the static view of an application. Class
diagram is not only used for visualizing, describing, and documenting different aspects of a
system but also for constructing executable code of the software application. Class diagram
shows a collection of classes, interfaces, associations, collaborations, and constraints. It is also
known as a structural diagram.

Dept. of CSE, JVIT Page 9


CAMOUFLAGE ROBOT FOR MILITARY APPLICATIONS 2023-24

Fig. 4.4.1: Class Diagram

4.5 USE CASE DIAGRAM

A use case diagram at its simplest is a representation of a user's interaction with the system
that shows the relationship between the user and the different use cases in which the user is
involved. A use case diagram can identify the different types of users of a system and the
different use cases and will often be accompanied by other types of diagrams as well.

Fig. 4.5.1: Use Case Diagram

Dept. of CSE, JVIT Page 10


CAMOUFLAGE ROBOT FOR MILITARY APPLICATIONS 2023-24

While a use case itself might drill into a lot of detail about every possibility, a use case
diagram can help provide a higher-level view of the system. It has been said before that "Use
case diagrams are the blueprints for your system". They provide the simplified and graphical
representation of what the system must actually do.

4.6 SEQUENCE DIAGRAM

A sequence diagram shows object interactions arranged in time sequence. It depicts the
objects and classes involved in the scenario and the sequence of messages exchanged between
the objects needed to carry out the functionality of the scenario. Sequence diagrams are
typically associated with use case realizations in the Logical View of the system under
development. Sequence diagrams are sometimes called event diagrams or event scenarios.

A sequence diagram shows, as parallel vertical lines (lifelines), different processes or


objects that live simultaneously, and, as horizontal arrows, the messages exchanged between
them, in the order in which they occur. This allows the specification of simple runtime scenarios
in a graphical manner.

Sensors ESP 32 Cloud PC

Sending data

Tx of data

Broadcasts information

Configures collected data

Fig. 4.6.1: Sequence Diagram

Dept. of CSE, JVIT Page 11


REFERENCES
[1] “Design of IOT Based Multifunctional Camouflage Military Robot” P. Kavipriya; G.
Jegan; Edara Venkat; Deevi Nikhil Ranganadh, 2021 IEEE International Conference on
Artificial Intelligence and Smart Systems (ICAIS) Year: 2021 | Conference Paper |
Publisher: IEEE.

[2] “Development of a Framework for Effective Surveillance and Human Intrusion Detection
in Border regions covered with Dry leaves” D Arjun; P K Indukala; K A Unnikrishna
Menon, 2020 Fourth International Conference on Inventive Systems and Control (ICISC)
Year: 2020 | Conference Paper | Publisher: IEEE.

[3] “A Novel Approach for Border Security; Surveillance Drone with Live Intrusion
Monitoring” Ekra Bin Syed Mojib; A.K.M. Bahalul Haque; Md. Nafis Raihan; Mahbubur
Rahman; Fahad Bin Alam, 2019 IEEE International Conference on Robotics, Automation,
Artificial-intelligence and Internet-of-Things (RAAICON) Year: 2019 | Conference Paper
| Publisher: IEEE.

[4] “Maritime Border Security using Sensors, Processing, and Platforms to Detect Dark
Vessels” Ross S. Eaton; Stan German; Arjuna Balasuriya, 2018 IEEE International
Symposium on Technologies for Homeland Security (HST) Year: 2018 | Conference Paper
| Publisher: IEEE.

[5] S. Ren, K. He, R. Girshick, and J. Sun, “Faster R-CNN: Towards Real-Time Object
Detection with Region Proposal Networks,” IEEE Trans. Pattern Anal. Mach. Intell., vol.
39, no. 6, pp. 1137–1149, Jun. 2017.

[6] Arunpreet Kaur, Dilip Kumar “Wireless Multifunctional Robot for Military Applications”
2015 IEEE 2nd international conference on recent advances in engineering and
computational sciences April 2017.

[7] Joshi, Shreedhar A., Sunil Poojari, Tushar Chougale, Subrahmanya Shetty, and M. K.
Sandeep. "Home automation system using wireless network." In 2017 2nd International
Conference on Communication and Electronics Systems (ICCES), pp. 803-807. IEEE,
2017.

You might also like