Beruflich Dokumente
Kultur Dokumente
1. INTRODUCTION
1.1 BACKGROUND
Unmanned Military all terrain surveillance vehicle (UMATSV) is a vehicle that moves by
being in contact with the ground and without any onboard human presence. It can also reach
places that are inaccessible by humans. The vehicle can serve both civilian and military
purpose. Further, it can be used for safety of humans from suspicious people carrying
weapons[6].
1.2 BRIEF HISTORY OF TECHNOLOGY
Unmanned ground vehicle depends on two basic automaton innovations joined into one unit and
create it work adequately[13]. The primary is DRDO Daksh automaton, that is controlled by
remote to find the parlous articles firmly and annihilating them. this is often accomplished by the
X- beam machine to seek out metals and LED's. It’s to boot used for ascent staircases and filter
vehicles for explosives. The other is Foster-mill operator Claw automaton accustomed explores
through sand, water and even to climb trees[14].Thus each one of those highlights are enclosed
aboard oneself controlled activities to create a perform multiple tasks automaton that works
adequately utilizing means composing and impediment location
1.3 APPLICATIONS
Various applications include, enemy detection using OpenCV wherein the captured image is
compared with a dataset of images having faces of various people. Thus, recognizing if the
person is an enemy. Number plate detection is being used in order to identify vehicles having
criminals and also the ones violating traffic rules. Detecting weapons being carried by criminals
so that situations of violence can be avoided. The car is made autonomous such that it can easily
make decisions when required and act upon it[17]. IoT is being used to make it autonomous and
Machine Learning algorithms are implemented such that the vehicle can take decisions based on
the environment. The information is then passed to a human operator who is located at a
different location for further analysis.
There comes the image of an unmanned ground vehicle, which spares human lives in barrier
tasks, which can go to places that are totally inaccessible to individuals and not at all like people
which can detect the nearness of metals, bombs, smokes, and so on.
1.7 SUMMARY
UMATSVs can be utilized for some applications where it might be awkward, risky, or difficult
to have a human administrator present. For the most part, the vehicle will have a lot of sensors to
observe the environment, and will either independently decides its conduct or pass the data to a
human administrator at an alternate area who will control the vehicle through tele-operation.
2. LITERATURE SURVEY
2.1 INTRODUCTION
Unmanned Military all terrain surveillance vehicle (UMATSV) is a vehicle that moves when in
contact with the ground and has no human intervention on board. It can also reach places that are
inaccessible by humans. The vehicle can serve both civilian and military purposes. Further, it can
be used for safety of humans from suspicious people carrying weapons[6]. Various applications
include, enemy detection using OpenCV wherein the captured image is compared with a dataset
of images having faces of various people; thus, recognizing if the person is an enemy or not.
Number plate detection is being used in order to identify vehicles having criminals and also the
ones violating traffic rules. It can also help in detecting weapons being carried by criminals so
that situations of violence can be avoided. The car is made autonomous such that it can easily
make decisions when required and act upon it[17]. IoT is being used to make it autonomous and
Machine Learning algorithms are implemented such that the vehicle can take decisions based on
the environment. The information is then passed to a human operator who is located at a
different location for further analysis.
Also this system includes an automatic mode in which face recognition techniques are used to
combat intruders[20].
2.3TECHNOLOGY USED
2.3.1 EXISTING SYSTEM
2.4 SUMMARY
We can clearly see how the advancements in the already existing systems can make the process
so much easier and more efficient. Since the process has no human onboard intervention there is
no loss to human life which is turn is a boon to the military forces. This is highly efficient for
terrorist surveillance and reduces the risk of getting caught while executing covert operations.
This method will prove to be precise and has received significant appraisals from the pundits.
Added to this is the advantage the system provides for better decision making. Border Patrolling
Security Forces (BPSF) can tremendously reduce life risk and utilize this as a surveillance
alternative. It can be deployed 24*7 as there is no fatigue to the technology.
Different sensors and components will be integrated together to form full functional prototype.
Used components and sensors are:
PI Camera: The raspberry pi camera can be used for still images as well as HD videos. It
has a 5Mp camera that supports 720p, 1080p and VGA90 video mode and still captures.
Ultrasonic Sensors: Ultrasonic sensors are used to measure distance of an object using
ultrasonic sound waves. It has two components i.e. Transmitter and Receiver. We will
use this sensor to sense an object avoiding all obstructions.
L293D: L293D is an motor driver that helps DC motors to rotate on either direction. Two
motors can be simultaneously controlled by a single L293D IC. Its main use is for the
movement of the vehicle.
3.2 SYSTEM REQUIREMENTS
3.2.1 HARDWARE REQUIREMENT
ARDUINO: Arduino is used for developing electronic projects and the platform is open
source. It is comprised of a microcontroller and software. Various devices like camera,
buttons, LED’s, etc. can be integrated with Arduino.The autonomous movement of the
car is achieved by using PI camera along with few sensors like ultrasonic sensor and
GPS. For the movement of the car, the motor driver is attached to the wheels and thus
makes them move.
RASPBERRY PI: The Raspberry Pi is a cost-effective, small sized computer that can be
plugged into a computer or TV screen. A “Raspbian” OS is integrated with its hardware
that provides basic utilities to all its users. Raspberry PI is used for processing the image
that is captured using the PI camera.
For planning of the prototype specifying hardware and software requirements is very essential
and it provides better view of the project. These prototypes are a more visual way to represent
the requirements and helps the user to easily comprehend what is planned.
4. DESIGN
The above figure( Fig. 4.2.1) represents the flow diagram of the vehicle. The vehicle
starts and moves through the terrain, if any obstacle is detected, the vehicles avoids
the obstacle and carries on the path. In case there is no obstacle the vehicle should
drive through the terrain and collect information. While driving through the terrain, if
an enemy or number plate of enemy’s vehicle is detected then the vehicle should take
a photo and run a check with the database in order to perform facial recognition and
number plate detection. In case a weapon is detected, the vehicle should check
accuracy. However, if any of the conditions are met then the vehicle drives through
the terrain and collect more information.
The above figure (Fig. 4.3.1) represents the stages of Number Plate Detection. The main reason
behind Number Plate Detection and Recognition is to find out traffic violators and to find out
potential enemy vehicles where these vehicles could be carrying dangerous criminals [10]. The
process is carried under the name of Vehicle Number Plate Recognition (VNPR).
Fig. 4.3.2 represents the stages of enemy detection, where enemy is detected using facial
detection and facial recognition techniques. FRT is a smaller aspect to a much bigger aspect
known as Pattern Matching and Recognition. Pattern Matching is used to match already existing
data from the databases with the feed data and try to understand existing data patterns[12].
Pattern Matching uses statistically placed techniques in order to understand all the extraction
done from the feed images.
When we already have a face extracted we will try to do feature extrication and find out all the
important parts of the image and discard all the unwanted portions from the images. This makes
the processing much faster and effective[2][3].
The diagram above (Fig. 4.4.1) represents the overall function of UMATSV. It employs weapon
detection, number plate recognition, facial recognition and then integration of the vehicle with
the semi autonomous car. The various function of each implementation part is given in the
figure above.
5. IMPLEMENTATION
As we know every vehicle is registered with a unique number, that number is known as the
Vehicle Number. These number plates distinguish vehicles from each other, where the number
plate data is extricated from vehicle's picture or from grouping of pictures without direct human
mediation[9]. Traffic activity control and vehicle proprietor distinguishing proof has progressed
towards becoming a significant issue for each nation[11]. Now and again it progresses towards
becoming hard to recognize the vehicle proprietor who abuses movement rules and what's more
is that the driver drives too fast.
The main reason behind Number Plate Detection and Recognition is to find out traffic violators
and to find out potential enemy vehicles where these vehicles could be carrying dangerous
criminals[10]. The process is carried under the name of Vehicle Number Plate Recognition
(VNPR).
The enemy detection process is carried out in such a way that the face detection and recognition
takes place. The enemy’s face is detected out of the image and is extracted from the image into a
separate image. This entire process can be named Facial Recognition Technology or FRT in
brief. FRT is a smaller aspect to a much bigger aspect known as Pattern Matching and
Recognition. Pattern Matching is used to match already existing data from the databases with the
feed data and try to understand existing data patterns[12].
Pattern Matching uses statistically placed techniques in order to understand all the extraction
done from the feed images.
When we already have a face extracted we will try to do feature extrication and find out all the
important parts of the image and discard all the unwanted portions from the images. This makes
the processing much faster and effective[2][3].
Each image is consisting of millions of pixels in the form of 0’s and 1’s when taken into binary
consideration. When we do face matching, maximum number of pixels should give an
approximate match in order to match a face from the existing dataset or databases taken into
consideration[2].
For enemy detection we match the faces with the existing dataset of wanted criminals or
terrorists and if a match is found the person is declared as an enemy and if not, he is classified as
a friendly. The major motivation to do the same is to help our soldiers posted in the border where
a bot can do the same and reduce loss to ally human lives as this reduces the danger to our ally
soldiers.
When we talk about autonomous driving, driverless cars come in our minds[14]. Autonomous cars
can be of two types, one being fully autonomous where there is no human intervention and the
second one being semi-autonomous where the driving is decided by the amount of human
intervention whatever is decided[16][17]. For our convenience we have chosen semi-autonomous
over fully autonomous to have more control over the prototype vehicle[19]. The vehicle is to be
designed in such a way that it can traverse through any kind of terrain. Since we have increased
the computation the vehicle is supposed to do, we have reduced the autonomous behavior of the
car[18][19].
The onboard processor won’t be able to capacitate the amount of processing required to make it
fully autonomous along with the other image processing going on simultaneously in the
background.
What has been decided is to use Arduino and an Ultrasonic Sensor to control the movements of
the car and make it semi-autonomous in nature. The Arduino will have the predefined instruction
set as to do whatever is decided and the decided path will be fed through the user’s input and the
GPS will be able to guide the vehicle to the predefined path. The ultrasonic sensor will help in
detecting any obstacles and avoid them accordingly and yet carry on the same path.
The main targets to be achieved using this design includes the following:
The facial recognition algorithm, wherein faces were trained with the datasets and stored for
recognition is integrated with Raspberry Pi. The OS is installed in the Raspberry Pi using the SD
card and then inserted into the Raspberry Pi. The packages are installed and then Pi camera is
modeled. The images captured via the Pi Camera are processed and sent to the system wherein
the algorithm matches the image in the image in the dataset and recognizes the face. We use it to
stream using Pi camera and then display the video on laptop.
1. Open up your Raspberry Pi Camera module. Be aware that the camera can be damaged by
static electricity. Before removing the camera from its grey anti-static bag, make sure you have
discharged yourself by touching an earthed object
2. Install the Raspberry Pi Camera module by inserting the cable into the Raspberry Pi. The cable
slots into the connector situated between the Ethernet and HDMI ports, with the silver
connectors facing the HDMI port.
4.From the prompt, run "sudo raspi-config". If the "camera" option is not listed, you will need to
run a few commands to update your Raspberry Pi. Run "sudo apt-get update" and "sudo apt-get
upgrade"
5. Run "sudo raspi-config" again - you should now see the "camera" option.
6. Navigate to the "camera" option, and enable it. Select “Finish” and reboot your Raspberry Pi.
void stopm(void);
void forward(void);
void inputs(void);
void sharpright(void);
int duration;
float distance;
void setup(void)
Serial.begin (9600);
pinMode(trigger, OUTPUT);
pinMode(echo, INPUT);
pinMode(IN1 ,OUTPUT);
pinMode(IN2,OUTPUT);
pinMode(IN3,OUTPUT);
pinMode(IN4,OUTPUT);
pinMode(ENA,OUTPUT);
pinMode(ENB,OUTPUT);
digitalWrite(ENA,HIGH);
digitalWrite(ENB,HIGH);
void loop(void) {
inputs();
if(distance<30){
stopm();
delay(400);
sharpright();
else
forward();
void forward(void)
digitalWrite(IN1, HIGH);
digitalWrite(IN2, HIGH);
digitalWrite(IN3, LOW);
digitalWrite(IN4, LOW);
void sharpright()
digitalWrite(IN1, LOW);
digitalWrite(IN2, HIGH);
digitalWrite(IN3, HIGH);
digitalWrite(IN4, LOW);
delay(400);
}void stopm(void)
digitalWrite(IN1, LOW);
digitalWrite(IN2, LOW);
digitalWrite(IN3, LOW);
digitalWrite(IN4, LOW);
void inputs()
digitalWrite(trigger, LOW);
delayMicroseconds(2);
digitalWrite(trigger, HIGH);
delayMicroseconds(10);
digitalWrite(trigger, LOW);
digitalWrite(trigger, LOW);
Serial.println(distance);
6. TESTCASES
7. RESULT
8. CONCLUSION
We can clearly see how the advancements in the already existing systems can make the process
so much easier and more efficient. Since the process has no human onboard intervention there is
no loss to human life which is turn is a boon to the military forces. This is highly efficient for
terrorist surveillance and reduces the risk of getting caught while executing covert operations.
This method will prove to be precise and has received significant appraisals from the pundits.
Added to this is the advantage the system provides for better decision making. Border Patrolling
Security Forces (BPSF) can tremendously reduce life risk and utilize this as a surveillance
alternative. It can be deployed 24*7 as there is no fatigue to the technology.
9. REFERENCES
[1] Dr. S. Vijayarani and Ms. A. Sakila, "Multimedia Mining Research – An Overview," in
International Journal of Computer Graphics & Animation (IJCGA) Vol.5, No.1, January
2015.
[2] Mrs. Sunita Roy et.al., "A Tutorial Review on Face Detection", International Journal of
Engineering Research & Technology (IJERT), Vol. 1 Issue 8, October - 2012, ISSN: 2278-
0181
[3] E. Hjelmas and B. K. Low, “Face detection: A survey,” Computer Vision and Image
Understanding, vol. 83, pp. 236–274, 2001
[5] Hua-Mei Chen, Seungsin Lee, Raghuveer M. Rao, Mohamed-Adel Slamani, and Pramod
K. Varshney. : A
tutorial overview of development in imaging sensors and processing. IEEE SIGNAL
PROCESSING
MAGAZINE, pp.52-61, MARCH 2005.
[6] Yu-Wen Chang ; Michael Johnson. : Portable Concealed Weapon Detection Using
Millimeter Wave
FMCW Radar Imaging. Federal funds provided by the U.S. Department of Justice August 30,
2001.[7] Ji Zhang, Wynne Hsu, Mong Li Lee, “Image Mining: Trends and Developments”,
International Workshop on Multimedia Data Mining, 2001.
[8]Sudipta Roy and Prof. Samir K. Bandyopadhyay. : Visual Image Based Hand
Recognitions. Asian
JournalOf Computer Science And Information Technolog(AJCSIT)y1:4 (2011), pp.106 –
110.
http://innovativejournal.in/index.php/ajcsit/article/view/94
[10]Danian Zheng, Yannan Zhao, and Jiaxin Wang. An efficient method of license plate
location.Pattern Recognition Letters, 26(15):2431–2438, 2005
[12]NavneetDalal and Bill Triggs. Histograms of oriented gradients for human detection.In
Computer Vision and Pattern Recognition, 2005.CVPR 2005.IEEE Computer Society
Conference on, volume 1, pages 886–893. IEEE, 2005
[13]Bai Hongliang and Liu Changping. A hybrid license plate extraction method based on
edge
statistics and morphology. In Pattern Recognition, 2004.ICPR 2004. Proceedings of the
17th International Conference on, volume 2, pages 831–834. IEEE, 2004.
[16]Sanjay T. Gandhe, K. T. Talele and Avinash G. Keskar (2007), “Image Mining Using
Wavelet Transform”, Knowledge-Based Intelligent Information and Engineering Systems,
Springer link book chapter, pp. 797-803.
[18] A. Yilmaz, O. Javed, and M. Shah, “Object tracking: A survey,” Acm computing
surveys (CSUR), vol. 38, no. 4, p. 13, 2006.
[19] S. Lazebnik, C. Schmid, and J. Ponce, “Beyond bags of features: Spatial pyramid
matching for recognizing natural scene categories,” in 2006 IEEE Computer Society
Conference on Computer Vision and Pattern Recognition (CVPR’06), vol. 2. IEEE, 2006, pp.
2169–2178.