Intelligent_Military_Robot_for_Intruder_Detection_Using_Matlab_with_Machine_Learning_Technique
Intelligent_Military_Robot_for_Intruder_Detection_Using_Matlab_with_Machine_Learning_Technique
4th Rithul.M
Electronics and communication
Engineering
Chennai Institute of Technology
Chennai, India
rithul0206@gmail.com
Abstract— In India most of the autonomous Robots are fate of future battles. Regarding the application of ML in the
implemented for soldier safety purposes.Still it requires self context of intrusion detection systems, mention is made of
reliant and Aritificial intelligence features in robots . The the supervised learning paradigm and the classification and
Indian Navy has taken the initiative and split implementation regression problem. In actuality, the enemy will be finalised
of AI usage into short-, medium-, and long-term objectives.The using the attributes that were retrieved from the analysed
use of a low-cost surveillance robot for the purpose of border image. Consequently, we refer to a dataset as "labelled"
surveillance and the prevention of terrorist infiltration. when the correct responses for the model to learn are known
Machine learning approaches are being used increasingly (obviously only for the learning phase).
frequently to address all the issues where it is challenging to
understand the process of interest. The robot consists of a II. LITERATURE REVIEW
surveillance unit and an arm unit, both of which are separate
modules. The robot will patrol certain predefined paths along Assuming implicitly that the learning algorithm has the
the border as it moves along. Intruders can be located with the chance to compare the prediction with the actual response at
help of the ultrasonic sensor, and if any are found, the least during the learning phase, we shall refer to supervised
information is relayed to the operator with the help of the RF learning throughout this paper. The concept of remotely
Transmitter. Real-time video from the robot is recorded and operated vehicles is not widely accepted in India [1-6], with
stored on the phone using the camera that is already installed the exception of some applications involving the detection
in the device. Through the use of Bluetooth technology, the
of explosive ordnance. The advanced robotics technology
robotic device may be controlled by the user's smartphone.
The operator in the control room is being provided with
available today can be put to use in a wide variety of
continuous live video feed from the camera. When an intruder additional tasks. The use of robots to collect information and
is spotted, the operator brings the robot near to the intruder to even execute jobs on the ground during a battle can be very
obtain additional information before removing the threat with advantageous in today's increasingly digital conflicts. This
a weapon. This system is required to reduce the army's is especially true when the robots are used in conjunction
remaining casualties, and it may be run at any time with a with modern warfare. On the other hand, the Indian military
larger workforce than regular soldiers and with less operator and paramilitary forces only deploy these remotely piloted
requirements..In this work we implemented the identification vehicles for a select few operations [7-11], largely for the
of intruder by capturing the image and processed by MATLAB
purpose of explosives detection. The employment of
and using machine learning techniques,the robot finalizes
whether the person is authorized or unauthorized person and
military robots often has an impact and benefits that can be
passing the LASER upon the enemy.As all the database stored described as "lifesaving." The ability of robots to carry out
in the cloud.The Regression algorithm effectively finalizes the tasks that are analogous to those performed by humans
enemy with better accuracy.The experimental results are without putting the lives of humans in danger is the first
simulated and explained. major benefit and significance of robots. These robots, in
contrast to human lives, are easily replaceable, albeit at a
Keywords— Military Robot, Intruder detection cost. Robots are able to endure the effects of bombs and
system,MATLAB, Machine Learning,Computer vision other weapons that would normally destroy a human body.
I. INTRODUCTION This is a significant advantage over humans. The fact that
robots are available in a range of sizes is just another
The Indian armed services have not yet made extensive advantage they offer. Some robots are capable of fitting into
use of robotics, despite the apparent benefits that such usage tight locations that are difficult for humans to access. Robots
would provide. India is now making progress in ensuring the
are ideally suited for work in environments that are
effective application of artificial intelligence (AI) in conflict
frequently confined and poorly lit. A further advantage of
resolution, which is quickly evolving into a crucial
operational requirement that may very well determine the employing robots is that in addition to neutralizing bombs
Authorized licensed use limited to: VTU Consortium. Downloaded on October 10,2024 at 08:54:42 UTC from IEEE Xplore. Restrictions apply.
photographs. Using the RIJNDAEL algorithm for increased
security, it is possible to record and remotely broadcast both
the video and still photographs that have been acquired. The
Android operating system, which is open source and helps
enable support and ease of use, is running on the smart
phone.
Authorized licensed use limited to: VTU Consortium. Downloaded on October 10,2024 at 08:54:42 UTC from IEEE Xplore. Restrictions apply.
Distributed
network V COMMUNICATION BETWEEN THE ANDROID
AND THE ROBOT (ARDUINO):
Authorized licensed use limited to: VTU Consortium. Downloaded on October 10,2024 at 08:54:42 UTC from IEEE Xplore. Restrictions apply.
If (distance 3<20)
{
digitalWrite(3,0);digitalWrite(4,1);digitalWrite(5,1);digital
Write(6,0);delay(200);
digitalWrite(3,0);digitalWrite(4,0);digitalWrite(5,0);digital
Write(6,0);delay(200);
}
else
{
digitalWrite(3,1);digitalWrite(4,0);digitalWrite(5,1);digital
Write(6,0);delay(200);
digitalWrite(3,0);digitalWrite(4,0);digitalWrite(5,0);digital
Write(6,0);delay(200);
}
if(distance2<20)
{
digitalWrite(3,0);digitalWrite(4,1);digitalWrite(5,1);digital
Write(6,0);delay(200);
Figure 6: Programming in Aurdino IDE Software digitalWrite(3,0);digitalWrite(4,0);digitalWrite(5,0);digital
Write(6,0);delay(200);
VII ALGORITHM(source code)
}
#include <LiquidCrystal.h> Else
LiquidCrystal lcd(42,44,46,48,50,52); {
#include <ultrasonic.h> digitalWrite(3,1);digitalWrite(4,0);digitalWrite(5,1);digital
Ultrasonic(22, 23); Write(6,0);delay(200);
Ultrasonic ultrasonic2(24, 25); digitalWrite(3,0);digitalWrite(4,0);digitalWrite(5,0);digital
Ultrasonic ultrasonic3(26, 27); Write(6,0);delay(200);
int distance; }
int distance2;int distance3; delay(500); lcd.clear();
void setup()
{ VIII EXPERIMENTAL RESULTS
lcd.begin(16, 2);
The Experimental results are shown in figure 6.Based on
lcd.print("SMART ROBO"); the simulation using MATLAB the image was analysed and
delay(2500); gives the results to the authorized or unauthorized
lcd.clear(); person.This Experimental analysis shows accurate results on
pinMode(3,OUTPUT); estimating the distance of intruder and tracking the person
pinMode(4,OUTPUT); by capturing the image using stereo camera.It analyses the
pinMode(5,OUTPUT); authorized person and gives the acknowledgement.Figure 8
shows the unauthorized person figure and gives the
pinMode(6,O UTPUT);
mismatch command.
}
void loop()
{
distance = ultrasonic.read();
distance2 = ultrasonic2.read();
distance3 = ultrasonic3.read();
lcd.setCursor(0, 0);
lcd.print("U1:");
lcd.print(distance);
lcd.setCursor(8, 0);
lcd.print("U2:");
lcd.print(distance2);
lcd.setCursor(0, 1);
Figure 7: Results using MATLAB(Authorized person)
lcd.print("U3:");
lcd.print(distance3);
Authorized licensed use limited to: VTU Consortium. Downloaded on October 10,2024 at 08:54:42 UTC from IEEE Xplore. Restrictions apply.
C. Pacchierotti published "Decentralized Control of a
Heterogeneous Human-Robot Team for Exploration and
Patrolling."
[4].J. Bae and M. Park, "A Heuristic for Efficient
Coordination of Multiple Heterogeneous Mobile Robots
Considering Workload Balance," IEEE Robotics and
Automation Letters, vol. 6, no. 2, pp.
[5]."Robust Formation Coordination of Robot Swarms With
Nonlinear Dynamics and Unknown Disturbances: Design
and Experiments," in IEEE Transactions on Circuits and
Figure 8:Results using MATLAB(Unauthorized person)
Systems II: Express Briefs, vol. 69, no. 1, pp. 114-118, Jan.
IX CONCLUSION AND FUTURE WORK 2022.
[6].M. H. Sharif, "Laser-Based Algorithms Meeting Privacy
This Paper denotes lot of opportunity for more in Surveillance: A Survey," IEEE Access, vol. 9, 2021, p.
recent features to be added. If we programme the [7].Y. Wu, S. Wu, and X. Hu, "Cooperative Path Planning
surveillance vehicle with an algorithm for on-board image of UAVs & UGVs for a Persistent Surveillance Task in
analysis, it will be able to recognise potential threats without Urban Environments," IEEE Internet of Things Journal, vol.
human intervention. We are able to teach the robot to 8, no. 6, pp.
independently locate and approach objects via [8].Modeling and Path Planning for Persistent Surveillance
programming. As a direct consequence of this, we are able by Unmanned Ground Vehicle, IEEE Transactions on
to fully automate it[17]. Automation Science and Engineering, vol. 18, no. 4, pages
In addition, because it will be equipped with GPS 1615-1625, October 2021.
navigation and mapping software, the robot will be able to [9].V. Savkin and H. Huang, "Navigation of a UAV
choose the path that will lead it to its destination in the most Network for Optimal Surveillance of a Group of Moving
expedient manner. Even when it's dark out, increased Ground Targets Along a Road," IEEE Transactions on
security brought on by the installation of a camera with Intelligent Transportation Systems (2009).
night vision is possible. We can also make it an all-terrain [10].Failure-Resilient Coverage Maximization With
robot by fortifying it and providing additional protection, Multiple Robots, M. Ishat-E-Rabban and P. Tokekar, IEEE
which would make it an excellent candidate for a Robotics and Automation Letters, vol. 6, no. 2, pp. 3894-
surveillance robot. If it is able to take flight, the surveillance 3901, April 2021.
vehicle can also be put to use for the purpose of monitoring [11].H. Huang and A. V. Savkin, "Navigating UAVs for
India's coastline. There is an infinite number of possibilities. Optimal Monitoring of Moving Groups of Pedestrians or
This robot, in its current configuration, functions as a Vehicles," IEEE Transactions on Vehicular Technology,
platform for further research into the enhancement of its vol. 70, no. 4, April 2021, pp. 3891-3896.
capabilities. [12]. Real-Time Optical-Wireless Video Surveillance
Warfare in the future will be fought between System for High Visual-Fidelity Underwater Monitoring,
operators and machines rather than between warriors on the IEEE Photonics Journal, volume 14, number 2, pages 1-9,
front lines. In our upcoming study, we'll suggest a technique April 2022, article number 7315609.
for shooting a target more accurately and precisely while [13].Energy-Aware Stochastic UAV-Assisted Surveillance,
utilising wireless technology. S. Hosseinalipour, A. Rahmati, D. Y. Eun, and H. Dai, IEEE
Transactions on Wireless Communications, vol. 20, no. 5,
X.REFERENCE pp. 2820-2837, May 2021.
[14]."Visibility-Based Persistent Monitoring of Piecewise
[1]. H. -C. Chang, Y. -L. Hsu, C. -Y. Hsiao, and Y. -F. Linear Features on a Terrain Using Multiple Aerial and
Chen, "Design and Implementation of an Intelligent Ground Robots," in IEEE Transactions on Automation
Autonomous Surveillance System for Indoor Science and Engineering, volume 18, issue 4, pages 1692-
Environments," IEEE Sensors Journal, vol. 21, no. 15, pp. 1704, October 2021.
17335-17349, August 1, 2021. [15]. X. Lin, Y. Yazcolu, and D. Aksaray, "Robust
[2] Machine Learning for Military Trauma: Novel Massive Planning for Persistent Surveillance With Energy-
Transfusion Predictive Models in Combat Zones, Constrained UAVs and Mobile Charging Stations," IEEE
ChristopherMarencoMDahttps://doi.org/10.1016/j.jss.2021. Robotics and Automation Letters, vol. 7, no. 2, April 2022,
09.017 pp. 4157-4164.
[3].In IEEE Transactions on Automation Science and [16]. Ahmed, S. Din, G. Jeon, F. Piccialli, and G.
Engineering, M. Aggravi, G. Sirignano, P. R. Giordano, and Fortino, "Towards Collaborative Robotics in Top View
Authorized licensed use limited to: VTU Consortium. Downloaded on October 10,2024 at 08:54:42 UTC from IEEE Xplore. Restrictions apply.
Surveillance: A Framework for Multiple Object Tracking by Alberto Carrasco 2 and Antonio LaTorre 3.
Detection Using Deep Learning," IEEE/CAA Journal of https://doi.org/10.3390/math10091397
Automatica Sinica, vol. 8, no. 7, July 2021, pp. 1253-1270. [20] Taher, K.A.; Jisan, B.M.Y.; Rahman, M. Network
[17] A Survey of Selected Algorithms Used in Military intrusion detection using supervised machine learning
Applications from the Viewpoints of Dataflow and GaAs. technique with feature selection. In Proceedings of the 2019
Ilir Capuni1 and Veljko Milutinovi´ International Conference on Robotics, Electrical and Signal
[18] Analysis, Design, and Comparison of Machine- Processing Techniques (ICREST), Dhaka, Bangladesh, 10–
Learning Techniques for Networking Intrusion Detection. 12 January 2019
Pierpaolo Dini and Sergio Saponara
https://doi.org/10.3390/designs5010009
[19] Military Applications of Machine Learning: A
Bibliometric Perspective José Javier Galán 1,*, Ramón
Authorized licensed use limited to: VTU Consortium. Downloaded on October 10,2024 at 08:54:42 UTC from IEEE Xplore. Restrictions apply.