Sie sind auf Seite 1von 32

UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

1. INTRODUCTION
1.1 BACKGROUND
Unmanned Military all terrain surveillance vehicle (UMATSV) is a vehicle that moves by
being in contact with the ground and without any onboard human presence. It can also reach
places that are inaccessible by humans. The vehicle can serve both civilian and military
purpose. Further, it can be used for safety of humans from suspicious people carrying
weapons[6].
1.2 BRIEF HISTORY OF TECHNOLOGY
Unmanned ground vehicle depends on two basic automaton innovations joined into one unit and
create it work adequately[13]. The primary is DRDO Daksh automaton, that is controlled by
remote to find the parlous articles firmly and annihilating them. this is often accomplished by the
X- beam machine to seek out metals and LED's. It’s to boot used for ascent staircases and filter
vehicles for explosives. The other is Foster-mill operator Claw automaton accustomed explores
through sand, water and even to climb trees[14].Thus each one of those highlights are enclosed
aboard oneself controlled activities to create a perform multiple tasks automaton that works
adequately utilizing means composing and impediment location

1.3 APPLICATIONS
Various applications include, enemy detection using OpenCV wherein the captured image is
compared with a dataset of images having faces of various people. Thus, recognizing if the
person is an enemy. Number plate detection is being used in order to identify vehicles having
criminals and also the ones violating traffic rules. Detecting weapons being carried by criminals
so that situations of violence can be avoided. The car is made autonomous such that it can easily
make decisions when required and act upon it[17]. IoT is being used to make it autonomous and
Machine Learning algorithms are implemented such that the vehicle can take decisions based on
the environment. The information is then passed to a human operator who is located at a
different location for further analysis.

Department of Computer Science and Engineering Page 1


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

1.4 RESEARCH MOTIVATION AND PROBLEM STATEMENT

1.4.1 RESEARCH MOTIVATION


We as a whole realize that people have been battling each other since time immemorial. At the
point when different countries come into front line, everyone needs to be most grounded among
all and in present innovation with regards to a war, it isn't just adequate to have labor, however it
is likewise essential to have most recent devices which makes a nation most grounded enough to
win wars against their rivals.

1.4.2 PROBLEM STATEMENT

There comes the image of an unmanned ground vehicle, which spares human lives in barrier
tasks, which can go to places that are totally inaccessible to individuals and not at all like people
which can detect the nearness of metals, bombs, smokes, and so on.

1.5 RESEARCH OBJECTIVE AND CONTRIBUTION

1.5.1 PRIMARY OBJECTIVE


The main objective of this project was to design and develop a Unmanned Military all terrain
surveillance vehicle (UMATSV) which could be used for military warfare, rescue & surveillance
operations.

1.5.2 MAIN CONTRIBUTION


The need for self-controlled robots is due to the terrorism faced by the people and soldiers. Huge
investments are made by nations for the research of new defense systems which are capable of
safeguarding citizens from terrorist threats. One such is a UMSATV . This motivated our group
to develop prototype self-controlled unmanned ground vehicle to undertake missions like border
patrol and surveillance.

1.6 ORGANIZATION OF THE REPORT


This report records the discoveries and proposals of the project. It gives explicit innovation
improvement targets and a science and innovation guide to control the Army as it incorporates
applicable UGV advancements in its Objective Force frameworks.

Department of Computer Science and Engineering Page 2


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

1.7 SUMMARY
UMATSVs can be utilized for some applications where it might be awkward, risky, or difficult
to have a human administrator present. For the most part, the vehicle will have a lot of sensors to
observe the environment, and will either independently decides its conduct or pass the data to a
human administrator at an alternate area who will control the vehicle through tele-operation.

Department of Computer Science and Engineering Page 3


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

2. LITERATURE SURVEY
2.1 INTRODUCTION
Unmanned Military all terrain surveillance vehicle (UMATSV) is a vehicle that moves when in
contact with the ground and has no human intervention on board. It can also reach places that are
inaccessible by humans. The vehicle can serve both civilian and military purposes. Further, it can
be used for safety of humans from suspicious people carrying weapons[6]. Various applications
include, enemy detection using OpenCV wherein the captured image is compared with a dataset
of images having faces of various people; thus, recognizing if the person is an enemy or not.
Number plate detection is being used in order to identify vehicles having criminals and also the
ones violating traffic rules. It can also help in detecting weapons being carried by criminals so
that situations of violence can be avoided. The car is made autonomous such that it can easily
make decisions when required and act upon it[17]. IoT is being used to make it autonomous and
Machine Learning algorithms are implemented such that the vehicle can take decisions based on
the environment. The information is then passed to a human operator who is located at a
different location for further analysis.

2.2 RELATED WORK


The need of the hour is to use AI in the fields of Weaponry and enemy detection. Concealed
weapons are hard to detect and find; use of AI although can minimize the efforts and make it
pretty much simpler than the existing process[1]. Side by side the terror caused by the terrorists
need to be reduced. Facial recognition can be of tremendous effect if we can deploy the same on
suspected enemies. Terrorism perhaps is one of the greatest menaces to the security of our nation
which is unsettling our nation through the borders. The borders of Bangladesh and Kashmir are
quite composite and also they are large, such that any armed forces or even satellites also cannot
be able to monitor the intervening terrorists. This mechanism we might come up with will be
specially designed in areas where it is very difficult for the Army personnel to operate. The
technology currently residing with Indian defense forces lags behind countries like US
(DARPA), Russia etc. To fall at par with them we need to step up our game and AI is the
solution[1]. This proposed system has an additional feature of controlling the mechanism from
remote locations. This technique helps to take real time decisions during military operations.

Department of Computer Science and Engineering Page 4


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

Also this system includes an automatic mode in which face recognition techniques are used to
combat intruders[20].

2.3TECHNOLOGY USED
2.3.1 EXISTING SYSTEM

 Facial Recognition using Template Matching which has less accuracy.


 Pre-historic facial recognition techniques like PCA, LDA have slower processing
 Enemy Detection on the borders has not been done.
 Enemy Detection, Weapon Detection and Number Plate Detection have never been
computed on the same system together.
 The semi-autonomous car could only detect obstacles and avoid collision and stop in
front of the obstacle.
 Existing systems are not sensible to Real Time Applications.
 Accuracy of multi class classifier is less.

2.3.2 PROPOSED SYSTEM

 Facial Recognition using feature extraction which improves accuracy.


 Usage of neural networks like GoogleNet, AlexNet, ImageNet which have higher
accuracy for facial recognition
 Enemy Detection for the military on the border of the country for surveillance in order to
save ally lives.
 Integration of systems like Enemy Detection, Weapon Detection and Number Plate
Recognition make the system a lot more accurate and efficient.
 The semi-autonomous car can detect obstacles, avoid collisions and also carry on the
predefined path with utmost accuracy and also do the processing alongside.
 Proposed System has higher accuracy and sensitiveness towards Real Time Applications.
 Computation time required to detect a weapon directly in an image as compared to
detection by a human is reduced.

Department of Computer Science and Engineering Page 5


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

2.4 SUMMARY
We can clearly see how the advancements in the already existing systems can make the process
so much easier and more efficient. Since the process has no human onboard intervention there is
no loss to human life which is turn is a boon to the military forces. This is highly efficient for
terrorist surveillance and reduces the risk of getting caught while executing covert operations.
This method will prove to be precise and has received significant appraisals from the pundits.
Added to this is the advantage the system provides for better decision making. Border Patrolling
Security Forces (BPSF) can tremendously reduce life risk and utilize this as a surveillance
alternative. It can be deployed 24*7 as there is no fatigue to the technology.

Department of Computer Science and Engineering Page 6


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

3. SYSTEM REQUIREMENTS SPECIFICATIONS

3.1 GENERAL DESCRIPTION

3.1.1 PRODUCT PERSPECTIVE

Different sensors and components will be integrated together to form full functional prototype.
Used components and sensors are:

 PI Camera: The raspberry pi camera can be used for still images as well as HD videos. It
has a 5Mp camera that supports 720p, 1080p and VGA90 video mode and still captures.
 Ultrasonic Sensors: Ultrasonic sensors are used to measure distance of an object using
ultrasonic sound waves. It has two components i.e. Transmitter and Receiver. We will
use this sensor to sense an object avoiding all obstructions.
 L293D: L293D is an motor driver that helps DC motors to rotate on either direction. Two
motors can be simultaneously controlled by a single L293D IC. Its main use is for the
movement of the vehicle.
3.2 SYSTEM REQUIREMENTS
3.2.1 HARDWARE REQUIREMENT
 ARDUINO: Arduino is used for developing electronic projects and the platform is open
source. It is comprised of a microcontroller and software. Various devices like camera,
buttons, LED’s, etc. can be integrated with Arduino.The autonomous movement of the
car is achieved by using PI camera along with few sensors like ultrasonic sensor and
GPS. For the movement of the car, the motor driver is attached to the wheels and thus
makes them move.
 RASPBERRY PI: The Raspberry Pi is a cost-effective, small sized computer that can be
plugged into a computer or TV screen. A “Raspbian” OS is integrated with its hardware
that provides basic utilities to all its users. Raspberry PI is used for processing the image
that is captured using the PI camera.

Department of Computer Science and Engineering Page 7


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

3.2.2 SOFTWARE REQUIREMENT


3.2.2.1 FUNCTIONAL AND NON-FUNCTIONAL
 OPEN SOURCE COMPUTER VISION (OpenCV): It is a library of various functions
designed for computations and used for real-time application. It is basically written in
C/C++ with interfaces of C++, python and java and is supported by Windows, Mac OS,
linux, Android and iOS. OpenCV is being used for processing and analysis of the images
detected by the UMATSV. Main features includes image processing, capturing of video
and analysing features like face and object detection.
 MACHINE LEARNING (ML): Machine Learning(ML) facilitates the systems with the
ability to learn automatically and improvise themselves through experience instead of
being programmed. It is an application of Artificial Intelligence(AI) that focus on
development of computer programs for accessing data and using to learn on their own. It
builds algorithms that receives data as input and predict an output through statistical
analysis.Various algorithms like K-NN and Backpropagation are used to recognise the
output generated using OpenCV, and match it with the images in the dataset.
3.2.2.2 USER REQUIREMENTS
 Python: Python language is one of the most used and easy language. Python has gained
huge popularity on the basis of this. Python does contain special libraries for machine
learning namely scipy and numpy which is great for linear algebra.
 C++: MLPack will be used because of its flexibility. It is a library written in C++. They
provide fast and extensive implementations of ML algorithms.
3.3 SUMMARY

For planning of the prototype specifying hardware and software requirements is very essential
and it provides better view of the project. These prototypes are a more visual way to represent
the requirements and helps the user to easily comprehend what is planned.

Department of Computer Science and Engineering Page 8


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

4. DESIGN

4.1 ARCHITECTURAL DESIGN

Fig. 4.1.1 Architectural Design Of The Vehicle.


The architectural design of the Vehicle is given in the Fig. 4.1.1. The figure consists of
prototype of the vehicle containing ultrasonic sensors, motor driver, arduino board, bread
board and jumper cables. The sensor is fit in the front of the vehicle to detect obstacles
and change direction accordingly.

Department of Computer Science and Engineering Page 9


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

4.2 DATA FLOW DIAGRAM

Fig. 4.2.1 The flow diagram

The above figure( Fig. 4.2.1) represents the flow diagram of the vehicle. The vehicle
starts and moves through the terrain, if any obstacle is detected, the vehicles avoids
the obstacle and carries on the path. In case there is no obstacle the vehicle should
drive through the terrain and collect information. While driving through the terrain, if
an enemy or number plate of enemy’s vehicle is detected then the vehicle should take

Department of Computer Science and Engineering Page 10


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

a photo and run a check with the database in order to perform facial recognition and
number plate detection. In case a weapon is detected, the vehicle should check
accuracy. However, if any of the conditions are met then the vehicle drives through
the terrain and collect more information.

Department of Computer Science and Engineering Page 11


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

4.3 SEQUENCE DIAGRAM

Fig. 4.3.1 Stages Of Vehicle Name Plate Detection

The above figure (Fig. 4.3.1) represents the stages of Number Plate Detection. The main reason
behind Number Plate Detection and Recognition is to find out traffic violators and to find out
potential enemy vehicles where these vehicles could be carrying dangerous criminals [10]. The
process is carried under the name of Vehicle Number Plate Recognition (VNPR).

This process includes three major stages:

 Number Plate Detection


 Image Extraction and Pre-Processing
 Character Segmentation and Recognition

Department of Computer Science and Engineering Page 12


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

Fig. 4.3.2 Stages of Enemy Detection

Fig. 4.3.2 represents the stages of enemy detection, where enemy is detected using facial
detection and facial recognition techniques. FRT is a smaller aspect to a much bigger aspect
known as Pattern Matching and Recognition. Pattern Matching is used to match already existing
data from the databases with the feed data and try to understand existing data patterns[12].

Pattern Matching uses statistically placed techniques in order to understand all the extraction
done from the feed images.

When we already have a face extracted we will try to do feature extrication and find out all the
important parts of the image and discard all the unwanted portions from the images. This makes
the processing much faster and effective[2][3].

Department of Computer Science and Engineering Page 13


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

Fig.4.3.3 Stages Of Weapon Detection

Detection of weapon is considered to be an important obstacle to the improvement of the security


of general public as well as the safety of public assets and military purposes[6]. The above figure,
Fig.4..3.3. represents the stages pf weapon detection. It is desirable to be able to detect weapons
from a greater distance especially when it is not possible to deploy people to that particular
place. The images that are captured using infrared imaging sensors depend upon the temperature
distribution information of the target to form an image. The human body absorbs the radiation
and re-emits it[7]. Thus, the area that doesn’t emit the rays can be analyzed for the presence of
concealed weapons. The inputs to the sensor are: The color image and Infrared images.

Department of Computer Science and Engineering Page 14


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

4.4 ACTIVITY DIAGRAM

Fig 4.4.1 The overall function of the UMATSV

The diagram above (Fig. 4.4.1) represents the overall function of UMATSV. It employs weapon
detection, number plate recognition, facial recognition and then integration of the vehicle with
the semi autonomous car. The various function of each implementation part is given in the
figure above.

Department of Computer Science and Engineering Page 15


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

5. IMPLEMENTATION

5.1 DESCRIPTION OF PROCESS

5.1.1 Number Plate Detection and Recognition

As we know every vehicle is registered with a unique number, that number is known as the
Vehicle Number. These number plates distinguish vehicles from each other, where the number
plate data is extricated from vehicle's picture or from grouping of pictures without direct human
mediation[9]. Traffic activity control and vehicle proprietor distinguishing proof has progressed
towards becoming a significant issue for each nation[11]. Now and again it progresses towards
becoming hard to recognize the vehicle proprietor who abuses movement rules and what's more
is that the driver drives too fast.

The main reason behind Number Plate Detection and Recognition is to find out traffic violators
and to find out potential enemy vehicles where these vehicles could be carrying dangerous
criminals[10]. The process is carried under the name of Vehicle Number Plate Recognition
(VNPR).

This process includes three major stages:

 Number Plate Detection


 Image Extraction and Pre-Processing
 Character Segmentation and Recognition
5.1.2 Enemy Detection And Recognition

The enemy detection process is carried out in such a way that the face detection and recognition
takes place. The enemy’s face is detected out of the image and is extracted from the image into a
separate image. This entire process can be named Facial Recognition Technology or FRT in
brief. FRT is a smaller aspect to a much bigger aspect known as Pattern Matching and

Department of Computer Science and Engineering Page 16


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

Recognition. Pattern Matching is used to match already existing data from the databases with the
feed data and try to understand existing data patterns[12].

Pattern Matching uses statistically placed techniques in order to understand all the extraction
done from the feed images.

When we already have a face extracted we will try to do feature extrication and find out all the
important parts of the image and discard all the unwanted portions from the images. This makes
the processing much faster and effective[2][3].

Each image is consisting of millions of pixels in the form of 0’s and 1’s when taken into binary
consideration. When we do face matching, maximum number of pixels should give an
approximate match in order to match a face from the existing dataset or databases taken into
consideration[2].

For enemy detection we match the faces with the existing dataset of wanted criminals or
terrorists and if a match is found the person is declared as an enemy and if not, he is classified as
a friendly. The major motivation to do the same is to help our soldiers posted in the border where
a bot can do the same and reduce loss to ally human lives as this reduces the danger to our ally
soldiers.

5.1.3 Semi Autonomous Movement Of The Car

When we talk about autonomous driving, driverless cars come in our minds[14]. Autonomous cars
can be of two types, one being fully autonomous where there is no human intervention and the
second one being semi-autonomous where the driving is decided by the amount of human
intervention whatever is decided[16][17]. For our convenience we have chosen semi-autonomous
over fully autonomous to have more control over the prototype vehicle[19]. The vehicle is to be
designed in such a way that it can traverse through any kind of terrain. Since we have increased
the computation the vehicle is supposed to do, we have reduced the autonomous behavior of the
car[18][19].

The onboard processor won’t be able to capacitate the amount of processing required to make it
fully autonomous along with the other image processing going on simultaneously in the
background.

Department of Computer Science and Engineering Page 17


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

What has been decided is to use Arduino and an Ultrasonic Sensor to control the movements of
the car and make it semi-autonomous in nature. The Arduino will have the predefined instruction
set as to do whatever is decided and the decided path will be fed through the user’s input and the
GPS will be able to guide the vehicle to the predefined path. The ultrasonic sensor will help in
detecting any obstacles and avoid them accordingly and yet carry on the same path.

The main targets to be achieved using this design includes the following:

 The maneuverability of the vehicle with ease.


 Adaptation to any kinds of sudden height changes.
 Locating and recognition of obstacles and avoidance of the same.

5.3 Integrating Raspberry Pi With Vehicle

The facial recognition algorithm, wherein faces were trained with the datasets and stored for
recognition is integrated with Raspberry Pi. The OS is installed in the Raspberry Pi using the SD
card and then inserted into the Raspberry Pi. The packages are installed and then Pi camera is
modeled. The images captured via the Pi Camera are processed and sent to the system wherein
the algorithm matches the image in the image in the dataset and recognizes the face. We use it to
stream using Pi camera and then display the video on laptop.

1. Open up your Raspberry Pi Camera module. Be aware that the camera can be damaged by
static electricity. Before removing the camera from its grey anti-static bag, make sure you have
discharged yourself by touching an earthed object

Department of Computer Science and Engineering Page 18


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

2. Install the Raspberry Pi Camera module by inserting the cable into the Raspberry Pi. The cable
slots into the connector situated between the Ethernet and HDMI ports, with the silver
connectors facing the HDMI port.

3. Boot up your Raspberry Pi.

4.From the prompt, run "sudo raspi-config". If the "camera" option is not listed, you will need to
run a few commands to update your Raspberry Pi. Run "sudo apt-get update" and "sudo apt-get
upgrade"

5. Run "sudo raspi-config" again - you should now see the "camera" option.

6. Navigate to the "camera" option, and enable it. Select “Finish” and reboot your Raspberry Pi.

Department of Computer Science and Engineering Page 19


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

5.2 PSEUDO CODE

#define IN1 2 //IN1

#define IN2 3 //IN2

#define ENA 7 //ENA

#define ENB 6 //ENB

#define IN3 4 //IN3

#define IN4 5 //IN4

#define trigger 11 //Trigger

#define echo 12 //Echo

void stopm(void);

void forward(void);

void inputs(void);

void sharpright(void);

int duration;

float distance;

void setup(void)

Serial.begin (9600);

pinMode(trigger, OUTPUT);

pinMode(echo, INPUT);

pinMode(IN1 ,OUTPUT);

Department of Computer Science and Engineering Page 20


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

pinMode(IN2,OUTPUT);

pinMode(IN3,OUTPUT);

pinMode(IN4,OUTPUT);

pinMode(ENA,OUTPUT);

pinMode(ENB,OUTPUT);

digitalWrite(ENA,HIGH);

digitalWrite(ENB,HIGH);

void loop(void) {

inputs();

if(distance<30){

stopm();

delay(400);

sharpright();

else

forward();

void forward(void)

Department of Computer Science and Engineering Page 21


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

digitalWrite(IN1, HIGH);

digitalWrite(IN2, HIGH);

digitalWrite(IN3, LOW);

digitalWrite(IN4, LOW);

void sharpright()

digitalWrite(IN1, LOW);

digitalWrite(IN2, HIGH);

digitalWrite(IN3, HIGH);

digitalWrite(IN4, LOW);

delay(400);

}void stopm(void)

digitalWrite(IN1, LOW);

digitalWrite(IN2, LOW);

digitalWrite(IN3, LOW);

digitalWrite(IN4, LOW);

void inputs()

Department of Computer Science and Engineering Page 22


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

digitalWrite(trigger, LOW);

delayMicroseconds(2);

digitalWrite(trigger, HIGH);

delayMicroseconds(10);

digitalWrite(trigger, LOW);

duration = pulseIn(echo, HIGH);

distance = (duration / 2) / 29.1;

digitalWrite(trigger, LOW);

Serial.print("forward Distance: ");

Serial.println(distance);

Department of Computer Science and Engineering Page 23


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

6. TESTCASES

S.No. Part Sub-Part Accuracy in


%
1. Enemy Recognition
Male faces 65%
Female faces 23%
2. Vehicle Number Plate
Recognition
Alphabets (A-Z) 75%
Numbers (0-9) 93%
3. Autonomous Vehicle
Detects Obstacles with 85%
correctness
4. GUI
Switching between modes 85%

Department of Computer Science and Engineering Page 24


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

7. RESULT

Fig. 7.1 Number Plate Detection original image

Fig. 7.2 Number Plate Detected final image

Department of Computer Science and Engineering Page 25


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

Fig. 7.3 Recognized number plate stored in database

Fig. 7.4 Face Detection

Department of Computer Science and Engineering Page 26


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

Fig. 7.5 Face recognition

Fig. 7.6 Graphical User Interface

Department of Computer Science and Engineering Page 27


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

Fig 7.7 Integration With Pi Camera

Fig 7.8 Datasets and folders for facial recognition

Department of Computer Science and Engineering Page 28


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

8. CONCLUSION

We can clearly see how the advancements in the already existing systems can make the process
so much easier and more efficient. Since the process has no human onboard intervention there is
no loss to human life which is turn is a boon to the military forces. This is highly efficient for
terrorist surveillance and reduces the risk of getting caught while executing covert operations.
This method will prove to be precise and has received significant appraisals from the pundits.
Added to this is the advantage the system provides for better decision making. Border Patrolling
Security Forces (BPSF) can tremendously reduce life risk and utilize this as a surveillance
alternative. It can be deployed 24*7 as there is no fatigue to the technology.

Department of Computer Science and Engineering Page 29


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

9. REFERENCES
[1] Dr. S. Vijayarani and Ms. A. Sakila, "Multimedia Mining Research – An Overview," in
International Journal of Computer Graphics & Animation (IJCGA) Vol.5, No.1, January
2015.

[2] Mrs. Sunita Roy et.al., "A Tutorial Review on Face Detection", International Journal of
Engineering Research & Technology (IJERT), Vol. 1 Issue 8, October - 2012, ISSN: 2278-
0181

[3] E. Hjelmas and B. K. Low, “Face detection: A survey,” Computer Vision and Image
Understanding, vol. 83, pp. 236–274, 2001

[4] T.Karthikeyan, P.Manikandaprabhu, "Function and Information Driven Frameworks for


Image Mining - A Review" in International Journal of Advanced Research in Computer and
Communication Engineering Vol. 2, Issue 11, November 2013.

[5] Hua-Mei Chen, Seungsin Lee, Raghuveer M. Rao, Mohamed-Adel Slamani, and Pramod
K. Varshney. : A
tutorial overview of development in imaging sensors and processing. IEEE SIGNAL
PROCESSING
MAGAZINE, pp.52-61, MARCH 2005.

[6] Yu-Wen Chang ; Michael Johnson. : Portable Concealed Weapon Detection Using
Millimeter Wave
FMCW Radar Imaging. Federal funds provided by the U.S. Department of Justice August 30,
2001.[7] Ji Zhang, Wynne Hsu, Mong Li Lee, “Image Mining: Trends and Developments”,
International Workshop on Multimedia Data Mining, 2001.

[8]Sudipta Roy and Prof. Samir K. Bandyopadhyay. : Visual Image Based Hand
Recognitions. Asian
JournalOf Computer Science And Information Technolog(AJCSIT)y1:4 (2011), pp.106 –
110.
http://innovativejournal.in/index.php/ajcsit/article/view/94

[9]Sudipta Roy, Prof. Samir K. Bandyopadhyay, “Contour Detection of Human Knee”,


International Journal
of Computer Science Engineering and Technology (IJCSET) ,September 2011 , Vol 1, Issue
8,pp. 484-487.

[10]Danian Zheng, Yannan Zhao, and Jiaxin Wang. An efficient method of license plate
location.Pattern Recognition Letters, 26(15):2431–2438, 2005

Department of Computer Science and Engineering Page 30


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

[11]Christos-Nikolaos E Anagnostopoulos, Ioannis E Anagnostopoulos, Ioannis D Psoroulas,


VassiliLoumos, and EleftheriosKayafas. License plate recognition from still images and
video sequences: A survey. Intelligent Transportation Systems, IEEE Transactions on, 9
(3):377–391, 2008.

[12]NavneetDalal and Bill Triggs. Histograms of oriented gradients for human detection.In
Computer Vision and Pattern Recognition, 2005.CVPR 2005.IEEE Computer Society
Conference on, volume 1, pages 886–893. IEEE, 2005

[13]Bai Hongliang and Liu Changping. A hybrid license plate extraction method based on
edge
statistics and morphology. In Pattern Recognition, 2004.ICPR 2004. Proceedings of the
17th International Conference on, volume 2, pages 831–834. IEEE, 2004.

[14]V. Sezer, C. Dikilita, Z. Ercan, H. Heceoglu, A.bner, A. Apak, M. Gokasan and A.


Mugan,“Conversion of a conventional electric automobileinto an unmanned ground vehicle
(UGV)”,Proceedings of the IEEE International Conferenceon Mechatronics, Istanbul,
Turkey, April 2012.

[15]A. Bouhraoua, N. Merah, M. AlDajani and M. ElShafei, ”Design and Implementation of


anUnmanned Ground Vehicle for SecurityApplications”, Proceedings of the 7th International
Symposium on Mechatronics and its Applications, Dhahran, Saudi Arabia, April, 2010.

[16]Sanjay T. Gandhe, K. T. Talele and Avinash G. Keskar (2007), “Image Mining Using
Wavelet Transform”, Knowledge-Based Intelligent Information and Engineering Systems,
Springer link book chapter, pp. 797-803.

[17]Matthies, Larry, A. Kelly, T. Litwin, and G.Tharp, “Obstacle detection for


unmannedground vehicles: A progress report”, Springer London, pp 475-486,.2000.

[18] A. Yilmaz, O. Javed, and M. Shah, “Object tracking: A survey,” Acm computing
surveys (CSUR), vol. 38, no. 4, p. 13, 2006.

[19] S. Lazebnik, C. Schmid, and J. Ponce, “Beyond bags of features: Spatial pyramid
matching for recognizing natural scene categories,” in 2006 IEEE Computer Society
Conference on Computer Vision and Pattern Recognition (CVPR’06), vol. 2. IEEE, 2006, pp.
2169–2178.

[20] Liu. Y.. Hu. J.. Snell-Feikema . I..VanBemmel. M. S..Lamsal.A..&Wimberly. M. C.


(2015 ). Software to facilitate remote sensing data access.Environmental Modelling &
Software. 74(December ). 247-257

Department of Computer Science and Engineering Page 31


UNMANNED MILITARY ALL-TERRAIN SURVEILLANCE VEHICLE (UMATSV)

Department of Computer Science and Engineering Page 32

Das könnte Ihnen auch gefallen