Open Access Open Access  Restricted Access Subscription Access

Auto Triggering Weapon System for Border Security Using Internet of Things

Jenita J, Manoj Venkatesh Shet, Md Azrodin, Naveen M, Pavan Kumar C

Abstract


The most crucial duty in the area of national defense and security is border surveillance. A nation's borders need to be constantly monitored in order to preserve peace and guarantee the protection of its citizens. It is crucial to strictly secure border areas from such operations, especially in the current climate, where infiltrations by terrorists and the unlawful movement of both living and non-living objects has become commonplace, thanks to advances in technology. The least that can be done to stop such events in border regions is to offer continuous surveillance. Currently, the border security forces who are in charge of constantly monitoring the borders conduct this surveillance manually. Due to the vast distances between the borders and the harsh terrain and climate, it requires a lot of people and resources. Designing it is therefore analytically critical to create an automatic weapon system that could also complete even without monitoring task requirement for human involvement. It can do away with the requirement for constantly deploying personnel in dangerous situations. Additionally, the system must be capable of making the appropriate decisions and taking the appropriate steps in addition to sending alert messages to the human controllers in the event that something suspect is discovered. It is possible to place the central control rooms away from the boundary region. The next course of action must be chosen by humans once the alert is sent. If correctly implemented the resources can be preserved and also decrease the danger of human life. Due to safety considerations, total automation of border monitoring is not yet feasible, but such technologies may surely assist and also can perform in tandem with the armed forces to safeguard the boundaries of a nation.

 


Full Text:

PDF

References


D. Arjun, P. K. Indukala, and K. A. U. Menon, "Border surveillance and intruder detection using wireless sensor networks: A short assessment," International Conference on Communications and Signal Processing (ICCSP), 1125-1130, Chennai, 2017.

Harish, Palagati, Subhashini, R., and Priya, K. "Intruder identification using semantic information extracted from surveillance films," in Green Computing, Communication, and Electrical Engineering (ICGCCEE), 2014 International Conference on, pp. 1-5. IEEE, 2014.

Harish Bhaskar, "Integrated human target recognition, identification, and tracking for surveillance applications," 6th IEEE International Conference Intelligent Systems, Sofia, 2012, pp. 467-475.

R. C. Jisha, Maneesha V. Ramesh, and G. S. Lekshmi, "Intruder tracking utilising wireless sensor network," in Computational and Computing Research (ICCIC), 2010 IEEE International Conference on, pp. 1-5. IEEE, 2010.

Sagar, R N, Sharmila, S P, and Suma, B V. "Smart Home Intruder Detection System," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 6, no. 4, pp. 2278-1323, 2017.

Singh, Dushyant, and Dharmender Kushwaha. "Automatic Intruder Combat System: A Path to Smart Border Surveillance," Defence Science Journal, 67(1), pp. 50, 2016.

Sun, Zhi, Wang, Pu, Vuran, Mehmet C., Al-Rodhaan, Mznah A., Al-Dhelaan, Abdullah M., and Ian F. Akyildiz, "BorderSense: Border patrol with sophisticated wireless sensor networks," Ad Hoc Networks 9, 3 (2011), pp. 468-477.

Jin, Xin, Sarkar, Soumalya, Ray, Asok, Gupta, Shalabh, and Thyagaraju Damarla, "Target identification and categorization utilising seismic and PIR sensors," IEEE Sensors Journal, vol. 12, no. 6, pp. 1709-1718, 2012.

Zhang, Lijing, and Yingli Liang, "Motion person detection based on background subtraction," Second International Workshop on Education Technology and Computer Science, 2010, pp. 284-287.

Jianhua Ye, Tao Gao, and Jun Zhang. "Detecting moving objects using shadow removal and background removal "9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012, pp. 1859-1863.


Refbacks

  • There are currently no refbacks.