Wireless Network For Strategic Boundary Supervision System

The major trouble with national security is "Terrorism" happening in borders. In border areas, regular forces or even satellites cannot monitor accurately intruding. The wireless sensor network scheme gives a possible way to explain this issue. To outline a wireless remote system of estimated sensor motes that contains various installed sensors and a processor to detect and impart an adversary interruption crosswise over a border and war zones. The idea is to distribute many smartdust motes inside an enormous geological region. Every one of these motes shapes a remote system, and one of them will go about as the system organiser that can control the whole system and furthermore goes about as a passage to the outside world. The preferred standpoint with these little motes is that it can be conveyed in a couple of hours by a pair of men or even dropped from an airborne helicopter. Every mote comprises of an assortment of sensors to distinguish every single potential type of interruption.

Bulletin of Electrical Engineering and Informatics
ISSN: 2302-9285
Vol. 6, No. 4, December 2017, pp. 367~370, DOI: 10.11591/eei.v6i4.869  367
Received August 23, 2017; Revised October 24, 2017; Accepted November 8, 2017
Wireless Network for Strategic Boundary Supervision
System
Anu Priya*, Sasilatha T.
Department of Electrical Engineering(EEEM), AMET University, Chennai, India
*Corresponding author, e-mail: eei@journal.uad.ac.id
Abstract
The major trouble with national security is "Terrorism" happening in borders. In border areas,
regular forces or even satellites cannot monitor accurately intruding. The wireless sensor network scheme
gives a possible way to explain this issue. To outline a wireless remote system of estimated sensor motes
that contains various installed sensors and a processor to detect and impart an adversary interruption
crosswise over a border and war zones. The idea is to distribute many smartdust motes inside an
enormous geological region. Every one of these motes shapes a remote system, and one of them will go
about as the system organiser that can control the whole system and furthermore goes about as a
passage to the outside world. The preferred standpoint with these little motes is that it can be conveyed in
a couple of hours by a pair of men or even dropped from an airborne helicopter. Every mote comprises of
an assortment of sensors to distinguish every single potential type of interruption.
Keywords: MEMS accelerometer, MEMS magnetometer, PIR sensor, sound sensor, microcontroller
1. Introduction
Intrusion recognition is a major problem in this application typically manages the
identification of items and arranges it into human or vehicle or gatherings and track the foe
interruption [1]. The battery life of dustmotes based on the size and the capability of the device.
A typical mote utilises radio recurrence signs to communicate short separations [2]. This
enables planners to limit mote estimate and diminish control utilisation. When intruders detected
by a sensor, the information is sent to a neighbouring mote to take necessary steps [3]. The
system keeps on performing possibility that some ways neglect to work. Once a mote set in a
current regime, it adjusts to mix in with other hubs to shape a bigger system; and when a mote
falls flat, alternate gadgets in the system assume control over its load.The wireless technology
is advanced so that there are several types of connections are existing such as ZigBee, WI-FI,
GSM and Bluetooth. Based on the system requirementsthetechnology is preferred.
The review of intruder alert paper clarifies how the gatecrasher can be arranged [1].
The detailed portrayal about the keen clean is finished by Dough Steel [1]. The writing says,
"reconnaissance arrangements must be multi-mission appropriate, versatile, adaptable, viable,
upgradeable, interoperable, shareable, and reasonable", which can able to fringe observation
and other security problems. The system fulfils the previously mentioned its requirements, and
its minimal size is an additional benefit.
To give another case, the work done by C. Neumann and his partners clarifies about
the assurance of military camps utilising Radar observation techniques [4]. The difficulties in the
border area discussed by P. Pratap and his associates [5]. The paper talks three important
issues which are time, area and power to implement the system for successful
information transmission‟.
A system that conquers these difficulties will give a practical arrangement need the
necessary foundation to meet outskirt observing and exact needs.Various work is done in
outlining outskirt reconnaissance frameworks and improves the current systems.
By utilising unmanned air vehicles and fibre optic detecting the current gets enhance
using Radar advancements [3-4], [6-7]. The paper proposes a method to observe the activity
around the border area and forest areas. The third segment likewise insights about the parts
utilised and it's setup. Cognitive radio is a network is used to share the signal with
many users [8].
 ISSN: 2302-9285
Bulletin of EEI Vol. 6, No. 4, December 2017 : 367 – 370
368
The product configuration area likewise incorporates an abnormal state stream graph
for the framework, and the pending segment portrays the yield acquired when the structure was
put under test. The last area represents the elements, few concerns and a few improvements of
the proposed extension. Few papers utilise the idea of picture preparing. A. Greenblatt
discussed in his article that computerised recognition frameworks for outskirt interruption exist,
yet a significant portion of them require costly device and include the ad-hoc network [9-10].
2. Research Method
Interruption identification is a major issue in thick fringes. Auspicious location of break is
the exceptionally delicate part in recognising the disruption. At the point when the interruption
occurs in an expansive territory or flat areas, it 's hard to recognise, since looking over those
regions through men turns into a troublesome undertaking. If the enemy intrusion is
distinguished, a further action takes place by utilising the cutting edge smart ultra-little clean like
remote sensor motes has inbuild board sensors and controller, which can identify a foe
interruption crosswise over fringes and war zones. Based on the size and compatibility these
motes are deployable, and they frame a system all alone and give the outcome through remote
association. The onboard system comprises of the collection of sensors like vibration/seismic,
motion detection sensor, acoustic and microcontroller for preparing these sensor values over a
remote system through the radio receiver.
The sensor mote comprises of this system is known as the clean mote. The focal
observing hub went about as a parent hub and associated with a distributed remote system
display. Smart Dust ordinarily utilised as an equivalent word for modest gadgets that join
detecting, registering, remote correspondence capacities, and independent power supply inside
a volume of just a couple of cubic millimetres effortlessly.
The little size and small per-gadget cost permit a subtle sending of large and thick
Smart Dust populaces in the physical condition, in this way empowering definite in-situ checking
of certifiable wonders, while just insignificantly aggravating the watched physical procedures.
Smart Dust is imagined to utilise a part of an extensive assortment of utilisation spaces,
including ecological assurance (distinguishing proof and checking of contamination), living
space checking (watching the conduct of creatures in their natural living areas), and military
frameworks (observing exercises in out of reach territories).
Once an intrusion is detected, the system will send a warning information to the
coordinator mote and will classify as vehicles or individuals and groups. The coordinator mote
process the sensor readings, sort the targets, and the tracking history can be viewed in a
Graphics LCD attached with it. The coordinator mote is capable of sending an alert SMS to an
authorised person about the intrusion through a GSM unit.
Figure 1. Sensor mote
Bulletin of EEI ISSN: 2302-9285 
Wireless Network For Strategic Boundary Supervision System (Anu Priya)
369
Figure 2. Base station mote
3. Results and Analysis
The coordinator mote acts as the base station in a peer to peer wireless network model
and will be powered by a larger battery or by mains power. Wireless sensor network is
constructed based on IEEE 802.15.4 low-power wireless network protocol. A 32-bit ARM
Cortex-M3 microcontroller is used as the brain of all these sensor and coordinator motes. Each
mote will consume little power to stay longer and will be fuelled by a tiny battery. A separate
ARM Cortex-M3 microcontroller will be used to interface and process the camera images from
the vision sensor.
Figure 3. Implementation of smart dust
When some vehicle movement detected means the vibration sensor in the border gives
data like vibration found to the authorised person. In the event, if the change occurs means
sensor detects it and guides the data to the controller. Finally, controller gathers all these data
sensed by the sensor and transmits to the recipient through wireless GSM modem. The
beneficiary shows all the assembled data in GLCD.
4. Conclusion
Finally, the proposed method is a designed wireless sensor mote which has multiple
onboard sensors and a processor.It can identify a foe interruption crosswise over outskirts and
war zones. The system incorporates a variety of sensors for vibration/seismic, attractive,
acoustic and warm mark, a microcontroller for preparing these sensor values over a remote
system. The sensor deployed on the border area readings will be collected and send an alert
simultaneously displayed in the GLCD of the observing unit.
 ISSN: 2302-9285
Bulletin of EEI Vol. 6, No. 4, December 2017 : 367 – 370
370
References
[1] Kishore Kumar S. Smart Dust for Tactical Border Surveillance to Detect, Classify and track Enemy
Intrusion Using Acoustic-magnetic-thermal Vibration Signatures. Proceedings of IRAJ International
Conference, 20th October 2013.
[2] Girard AR. et al. Border Patrol and Surveillance Missions Using Multiple Unmanned Air Vehicles.
CDC. 43rd IEEE Conference on Decision and Control. 2004.
[3] Slaheddine Chelbi, Majed Abdouli, Mourad Kaddes, Claude Duvallet, Rafik Bouaziz. An Unequal
Cluster-based Routing Protocol Based on Data Controlling for Wireless Sensor Network. International
Journal of Electrical and Computer Engineering (IJECE). October 2016; 6(5): 2403-2414.
[4] Tapaswini Samant, Amlan Datta. Analysis and Comparison of SMAC and TMAC Protocol for Energy
Efficient Dynamic Topology in Sensor Network. International Journal of Electrical and Computer
Engineering (IJECE). October 2016; 6(5); 2331-2337.
[5] Nohara TJ. A Commercial Approach to Successful Persistent Radar Surveillance of Sea, Air and
Land along the Northern Border. 2010
[6] Mehdi Haj Ali, Qun-Xiong Zhu, Yan-Lin He. Mining Top-K Click Stream Sequences Patterns.
Indonesian Journal of Electrical Engineering and Computer Science. December 2016; 4(3): 655-664.
[7] Pratap P, et al. Challenges Of Remote Border Monitoring. IEEE International Conference on
Technologies for Homeland Security (HST). 2010.
[8] C.S. Preetham, M.S.G. Prasad, D.S.S.L. Saranya, Charan Teja Somepalli, D. Bhargava Satya Sai
Krishna, V. Rohit. Performance Analysis of Cooperative Hybrid Cognitive Radio Network with Various
Diversity Techniques. International Journal of Electrical and Computer Engineering (IJECE). October
2016; 6(5): 2125-2133
[9] Ahmed AS. Kumaran TS, Syed SSA, Subburam S. Cross-Layer Design Approach for Power Control
in Mobile Ad Hoc Networks. Egyptian Informatics Journal. 2015; 16(1), 1-7.
[10] Helen D, Arivazhagan D. Power Saving Mechanism for Ad-Hoc Network Using 3G fast dormancy
technology. Indian Journal of Science and Technology. 2014; 7(S6): 74-77.
[11] Slaheddine Chelbi, Majed Abdouli, Mourad Kaddes, Claude Duvallet, Rafik Bouaziz. An Unequal
Cluster-based Routing Protocol Based on Data Controlling for Wireless Sensor Network. International
Journal of Electrical and Computer Engineering (IJECE). October 2016; 6(5): 2403-2414.

Recomendados

Smartdust Network for Tactical Border Surveillance Using Multiple Signatures por
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
290 visualizações10 slides
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters por
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET Journal
20 visualizações4 slides
50120140506010 por
5012014050601050120140506010
50120140506010IAEME Publication
297 visualizações6 slides
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network por
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
11 visualizações5 slides
Wireless sensor network report por
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
12.7K visualizações21 slides
Oj3425062509 por
Oj3425062509Oj3425062509
Oj3425062509IJERA Editor
271 visualizações4 slides

Mais conteúdo relacionado

Mais procurados

wireless sensor networks & application :forest fire detection por
 wireless sensor networks  & application :forest fire detection wireless sensor networks  & application :forest fire detection
wireless sensor networks & application :forest fire detectionMueenudheen Shafaquath V P
9K visualizações31 slides
paper presentation _ survey of wireless sensor netwrok por
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokejbyun77
6.9K visualizações23 slides
Wireless Sensor Network por
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
3.9K visualizações18 slides
Some aspects of wireless sensor networks por
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
418 visualizações10 slides
Basics of Wireless sensor networks por
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
26K visualizações45 slides
533 450-457 por
533 450-457533 450-457
533 450-457idescitation
459 visualizações8 slides

Mais procurados(17)

wireless sensor networks & application :forest fire detection por Mueenudheen Shafaquath V P
 wireless sensor networks  & application :forest fire detection wireless sensor networks  & application :forest fire detection
wireless sensor networks & application :forest fire detection
Mueenudheen Shafaquath V P9K visualizações
paper presentation _ survey of wireless sensor netwrok por ejbyun77
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
ejbyun776.9K visualizações
Wireless Sensor Network por Ganesh Khadsan
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Ganesh Khadsan3.9K visualizações
Some aspects of wireless sensor networks por pijans
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans418 visualizações
Basics of Wireless sensor networks por Rushin Shah
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
Rushin Shah26K visualizações
533 450-457 por idescitation
533 450-457533 450-457
533 450-457
idescitation459 visualizações
An overview of a wireless sensor network communication ppt por phbhagwat
An overview of a wireless sensor network communication pptAn overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication ppt
phbhagwat1.6K visualizações
Wireless sensor networks por Zaahir Salam
Wireless sensor networksWireless sensor networks
Wireless sensor networks
Zaahir Salam3.5K visualizações
Report on WIRELESS SENSOR NETWORK por Nishant Bhardwaj
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
Nishant Bhardwaj4.6K visualizações
A Border security Using Wireless Integrated Network Sensors (WINS) por Saurabh Giratkar
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
Saurabh Giratkar394 visualizações
Wireless sensor network por ShubhamTakkar
Wireless sensor networkWireless sensor network
Wireless sensor network
ShubhamTakkar465 visualizações
Wireless sensor Network using Zero Knowledge Protocol ppt por sofiakhatoon
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
sofiakhatoon5.8K visualizações
WSN IN IOT por skumartarget
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget21.5K visualizações
Hetrogenous wireless sensor network por Chinmoy Jena
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
Chinmoy Jena3.6K visualizações
Ppt on low power wireless sensor network 5th sem por shikhathegreat
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
shikhathegreat5.3K visualizações
Sensor networks por Marc Pous
Sensor networksSensor networks
Sensor networks
Marc Pous4.6K visualizações
Secure data dissemination protocol in wireless sensor networks using xor netw... por eSAT Publishing House
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House878 visualizações

Similar a Wireless Network For Strategic Boundary Supervision System

Ieeepro techno solutions ieee 2013 embedded project smartdust network for... por
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...srinivasanece7
153 visualizações10 slides
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures por
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
206 visualizações10 slides
A0550110 por
A0550110A0550110
A0550110IOSR Journals
162 visualizações10 slides
Ieeepro techno solutions ieee 2013 embedded project smartdust network for... por
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...srinivasanece7
216 visualizações10 slides
F33022028 por
F33022028F33022028
F33022028IJERA Editor
371 visualizações7 slides
F33022028 por
F33022028F33022028
F33022028IJERA Editor
178 visualizações7 slides

Similar a Wireless Network For Strategic Boundary Supervision System(20)

Ieeepro techno solutions ieee 2013 embedded project smartdust network for... por srinivasanece7
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
srinivasanece7153 visualizações
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures por IOSR Journals
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
IOSR Journals206 visualizações
A0550110 por IOSR Journals
A0550110A0550110
A0550110
IOSR Journals162 visualizações
Ieeepro techno solutions ieee 2013 embedded project smartdust network for... por srinivasanece7
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
srinivasanece7216 visualizações
F33022028 por IJERA Editor
F33022028F33022028
F33022028
IJERA Editor371 visualizações
F33022028 por IJERA Editor
F33022028F33022028
F33022028
IJERA Editor178 visualizações
E010412433 por IOSR Journals
E010412433E010412433
E010412433
IOSR Journals142 visualizações
Wireless Sensor Network for Radiation Detection por ijeei-iaes
Wireless Sensor Network for Radiation DetectionWireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation Detection
ijeei-iaes54 visualizações
Remote Monitoring of Crop Field Using Wireless Sensor Network por IJMER
Remote Monitoring of Crop Field Using Wireless Sensor NetworkRemote Monitoring of Crop Field Using Wireless Sensor Network
Remote Monitoring of Crop Field Using Wireless Sensor Network
IJMER505 visualizações
Wireless Sensor Network – Theoretical Findings and Applications por AshishDPatel1
Wireless Sensor Network – Theoretical Findings and ApplicationsWireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and Applications
AshishDPatel1102 visualizações
International Journal of Engineering (IJE) Volume (2) Issue (1) por CSCJournals
International Journal of Engineering (IJE) Volume (2)  Issue (1)International Journal of Engineering (IJE) Volume (2)  Issue (1)
International Journal of Engineering (IJE) Volume (2) Issue (1)
CSCJournals3.4K visualizações
The International Journal of Engineering and Science (IJES) por theijes
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
theijes498 visualizações
Ijarcet vol-2-issue-2-756-760 por Editor IJARCET
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
Editor IJARCET336 visualizações
Sensor net por Ines Bahram
Sensor netSensor net
Sensor net
Ines Bahram1.3K visualizações
IRJET- Smart Accident Detection and Emergency Notification System using IoT a... por IRJET Journal
IRJET- Smart Accident Detection and Emergency Notification System using IoT a...IRJET- Smart Accident Detection and Emergency Notification System using IoT a...
IRJET- Smart Accident Detection and Emergency Notification System using IoT a...
IRJET Journal19 visualizações
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou... por journalBEEI
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI16 visualizações
L010527175 por IOSR Journals
L010527175L010527175
L010527175
IOSR Journals188 visualizações
A Review on Wireless Sensor Network Security por ijtsrd
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
ijtsrd31 visualizações
Stimulating The Wireless Sensor Network por Tracy Williams
Stimulating The Wireless Sensor NetworkStimulating The Wireless Sensor Network
Stimulating The Wireless Sensor Network
Tracy Williams4 visualizações

Mais de journalBEEI

Square transposition: an approach to the transposition process in block cipher por
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherjournalBEEI
54 visualizações8 slides
Hyper-parameter optimization of convolutional neural network based on particl... por
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
68 visualizações8 slides
Supervised machine learning based liver disease prediction approach with LASS... por
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
49 visualizações8 slides
Handling concept drifts and limited label problems using semi-supervised comb... por
Handling concept drifts and limited label problems using semi-supervised comb...Handling concept drifts and limited label problems using semi-supervised comb...
Handling concept drifts and limited label problems using semi-supervised comb...journalBEEI
26 visualizações8 slides
A secure and energy saving protocol for wireless sensor networks por
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksjournalBEEI
26 visualizações8 slides
Plant leaf identification system using convolutional neural network por
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkjournalBEEI
221 visualizações12 slides

Mais de journalBEEI(20)

Square transposition: an approach to the transposition process in block cipher por journalBEEI
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
journalBEEI54 visualizações
Hyper-parameter optimization of convolutional neural network based on particl... por journalBEEI
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
journalBEEI68 visualizações
Supervised machine learning based liver disease prediction approach with LASS... por journalBEEI
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
journalBEEI49 visualizações
Handling concept drifts and limited label problems using semi-supervised comb... por journalBEEI
Handling concept drifts and limited label problems using semi-supervised comb...Handling concept drifts and limited label problems using semi-supervised comb...
Handling concept drifts and limited label problems using semi-supervised comb...
journalBEEI26 visualizações
A secure and energy saving protocol for wireless sensor networks por journalBEEI
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
journalBEEI26 visualizações
Plant leaf identification system using convolutional neural network por journalBEEI
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
journalBEEI221 visualizações
Timetabling problem solving based on best-nests cuckoo search por journalBEEI
Timetabling problem solving based on best-nests cuckoo searchTimetabling problem solving based on best-nests cuckoo search
Timetabling problem solving based on best-nests cuckoo search
journalBEEI22 visualizações
Customized moodle-based learning management system for socially disadvantaged... por journalBEEI
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
journalBEEI31 visualizações
Understanding the role of individual learner in adaptive and personalized e-l... por journalBEEI
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
journalBEEI36 visualizações
Prototype mobile contactless transaction system in traditional markets to sup... por journalBEEI
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
journalBEEI31 visualizações
Wireless HART stack using multiprocessor technique with laxity algorithm por journalBEEI
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
journalBEEI35 visualizações
Implementation of double-layer loaded on octagon microstrip yagi antenna por journalBEEI
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
journalBEEI28 visualizações
The calculation of the field of an antenna located near the human head por journalBEEI
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
journalBEEI34 visualizações
Exact secure outage probability performance of uplinkdownlink multiple access... por journalBEEI
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
journalBEEI27 visualizações
Design of a dual-band antenna for energy harvesting application por journalBEEI
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
journalBEEI47 visualizações
Transforming data-centric eXtensible markup language into relational database... por journalBEEI
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
journalBEEI18 visualizações
Key performance requirement of future next wireless networks (6G) por journalBEEI
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
journalBEEI40 visualizações
Noise resistance territorial intensity-based optical flow using inverse confi... por journalBEEI
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
journalBEEI15 visualizações
Modeling climate phenomenon with software grids analysis and display system i... por journalBEEI
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
journalBEEI36 visualizações
An approach of re-organizing input dataset to enhance the quality of emotion ... por journalBEEI
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
journalBEEI29 visualizações

Último

802.11 Computer Networks por
802.11 Computer Networks802.11 Computer Networks
802.11 Computer NetworksTusharChoudhary72015
10 visualizações33 slides
MSA Website Slideshow (16).pdf por
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdfmsaucla
76 visualizações8 slides
Renewal Projects in Seismic Construction por
Renewal Projects in Seismic ConstructionRenewal Projects in Seismic Construction
Renewal Projects in Seismic ConstructionEngineering & Seismic Construction
5 visualizações8 slides
START Newsletter 3 por
START Newsletter 3START Newsletter 3
START Newsletter 3Start Project
5 visualizações25 slides
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptxlwang78
83 visualizações19 slides
Effect of deep chemical mixing columns on properties of surrounding soft clay... por
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...AltinKaradagli
9 visualizações10 slides

Último(20)

MSA Website Slideshow (16).pdf por msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla76 visualizações
START Newsletter 3 por Start Project
START Newsletter 3START Newsletter 3
START Newsletter 3
Start Project5 visualizações
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang7883 visualizações
Effect of deep chemical mixing columns on properties of surrounding soft clay... por AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli9 visualizações
REACTJS.pdf por ArthyR3
REACTJS.pdfREACTJS.pdf
REACTJS.pdf
ArthyR327 visualizações
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn5 visualizações
DevOps-ITverse-2023-IIT-DU.pptx por Anowar Hossain
DevOps-ITverse-2023-IIT-DU.pptxDevOps-ITverse-2023-IIT-DU.pptx
DevOps-ITverse-2023-IIT-DU.pptx
Anowar Hossain12 visualizações
GDSC Mikroskil Members Onboarding 2023.pdf por gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil53 visualizações
Investor Presentation por eser sevinç
Investor PresentationInvestor Presentation
Investor Presentation
eser sevinç25 visualizações
Ansari: Practical experiences with an LLM-based Islamic Assistant por M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous5 visualizações
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome33 visualizações
MongoDB.pdf por ArthyR3
MongoDB.pdfMongoDB.pdf
MongoDB.pdf
ArthyR335 visualizações
LDPC_CODES.ppt por hsomashekar987
LDPC_CODES.pptLDPC_CODES.ppt
LDPC_CODES.ppt
hsomashekar98716 visualizações
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli12 visualizações
Generative AI Models & Their Applications por SN
Generative AI Models & Their ApplicationsGenerative AI Models & Their Applications
Generative AI Models & Their Applications
SN8 visualizações
Design_Discover_Develop_Campaign.pptx por ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth632 visualizações
sam_software_eng_cv.pdf por sammyigbinovia
sam_software_eng_cv.pdfsam_software_eng_cv.pdf
sam_software_eng_cv.pdf
sammyigbinovia5 visualizações

Wireless Network For Strategic Boundary Supervision System

  • 1. Bulletin of Electrical Engineering and Informatics ISSN: 2302-9285 Vol. 6, No. 4, December 2017, pp. 367~370, DOI: 10.11591/eei.v6i4.869  367 Received August 23, 2017; Revised October 24, 2017; Accepted November 8, 2017 Wireless Network for Strategic Boundary Supervision System Anu Priya*, Sasilatha T. Department of Electrical Engineering(EEEM), AMET University, Chennai, India *Corresponding author, e-mail: eei@journal.uad.ac.id Abstract The major trouble with national security is "Terrorism" happening in borders. In border areas, regular forces or even satellites cannot monitor accurately intruding. The wireless sensor network scheme gives a possible way to explain this issue. To outline a wireless remote system of estimated sensor motes that contains various installed sensors and a processor to detect and impart an adversary interruption crosswise over a border and war zones. The idea is to distribute many smartdust motes inside an enormous geological region. Every one of these motes shapes a remote system, and one of them will go about as the system organiser that can control the whole system and furthermore goes about as a passage to the outside world. The preferred standpoint with these little motes is that it can be conveyed in a couple of hours by a pair of men or even dropped from an airborne helicopter. Every mote comprises of an assortment of sensors to distinguish every single potential type of interruption. Keywords: MEMS accelerometer, MEMS magnetometer, PIR sensor, sound sensor, microcontroller 1. Introduction Intrusion recognition is a major problem in this application typically manages the identification of items and arranges it into human or vehicle or gatherings and track the foe interruption [1]. The battery life of dustmotes based on the size and the capability of the device. A typical mote utilises radio recurrence signs to communicate short separations [2]. This enables planners to limit mote estimate and diminish control utilisation. When intruders detected by a sensor, the information is sent to a neighbouring mote to take necessary steps [3]. The system keeps on performing possibility that some ways neglect to work. Once a mote set in a current regime, it adjusts to mix in with other hubs to shape a bigger system; and when a mote falls flat, alternate gadgets in the system assume control over its load.The wireless technology is advanced so that there are several types of connections are existing such as ZigBee, WI-FI, GSM and Bluetooth. Based on the system requirementsthetechnology is preferred. The review of intruder alert paper clarifies how the gatecrasher can be arranged [1]. The detailed portrayal about the keen clean is finished by Dough Steel [1]. The writing says, "reconnaissance arrangements must be multi-mission appropriate, versatile, adaptable, viable, upgradeable, interoperable, shareable, and reasonable", which can able to fringe observation and other security problems. The system fulfils the previously mentioned its requirements, and its minimal size is an additional benefit. To give another case, the work done by C. Neumann and his partners clarifies about the assurance of military camps utilising Radar observation techniques [4]. The difficulties in the border area discussed by P. Pratap and his associates [5]. The paper talks three important issues which are time, area and power to implement the system for successful information transmission‟. A system that conquers these difficulties will give a practical arrangement need the necessary foundation to meet outskirt observing and exact needs.Various work is done in outlining outskirt reconnaissance frameworks and improves the current systems. By utilising unmanned air vehicles and fibre optic detecting the current gets enhance using Radar advancements [3-4], [6-7]. The paper proposes a method to observe the activity around the border area and forest areas. The third segment likewise insights about the parts utilised and it's setup. Cognitive radio is a network is used to share the signal with many users [8].
  • 2.  ISSN: 2302-9285 Bulletin of EEI Vol. 6, No. 4, December 2017 : 367 – 370 368 The product configuration area likewise incorporates an abnormal state stream graph for the framework, and the pending segment portrays the yield acquired when the structure was put under test. The last area represents the elements, few concerns and a few improvements of the proposed extension. Few papers utilise the idea of picture preparing. A. Greenblatt discussed in his article that computerised recognition frameworks for outskirt interruption exist, yet a significant portion of them require costly device and include the ad-hoc network [9-10]. 2. Research Method Interruption identification is a major issue in thick fringes. Auspicious location of break is the exceptionally delicate part in recognising the disruption. At the point when the interruption occurs in an expansive territory or flat areas, it 's hard to recognise, since looking over those regions through men turns into a troublesome undertaking. If the enemy intrusion is distinguished, a further action takes place by utilising the cutting edge smart ultra-little clean like remote sensor motes has inbuild board sensors and controller, which can identify a foe interruption crosswise over fringes and war zones. Based on the size and compatibility these motes are deployable, and they frame a system all alone and give the outcome through remote association. The onboard system comprises of the collection of sensors like vibration/seismic, motion detection sensor, acoustic and microcontroller for preparing these sensor values over a remote system through the radio receiver. The sensor mote comprises of this system is known as the clean mote. The focal observing hub went about as a parent hub and associated with a distributed remote system display. Smart Dust ordinarily utilised as an equivalent word for modest gadgets that join detecting, registering, remote correspondence capacities, and independent power supply inside a volume of just a couple of cubic millimetres effortlessly. The little size and small per-gadget cost permit a subtle sending of large and thick Smart Dust populaces in the physical condition, in this way empowering definite in-situ checking of certifiable wonders, while just insignificantly aggravating the watched physical procedures. Smart Dust is imagined to utilise a part of an extensive assortment of utilisation spaces, including ecological assurance (distinguishing proof and checking of contamination), living space checking (watching the conduct of creatures in their natural living areas), and military frameworks (observing exercises in out of reach territories). Once an intrusion is detected, the system will send a warning information to the coordinator mote and will classify as vehicles or individuals and groups. The coordinator mote process the sensor readings, sort the targets, and the tracking history can be viewed in a Graphics LCD attached with it. The coordinator mote is capable of sending an alert SMS to an authorised person about the intrusion through a GSM unit. Figure 1. Sensor mote
  • 3. Bulletin of EEI ISSN: 2302-9285  Wireless Network For Strategic Boundary Supervision System (Anu Priya) 369 Figure 2. Base station mote 3. Results and Analysis The coordinator mote acts as the base station in a peer to peer wireless network model and will be powered by a larger battery or by mains power. Wireless sensor network is constructed based on IEEE 802.15.4 low-power wireless network protocol. A 32-bit ARM Cortex-M3 microcontroller is used as the brain of all these sensor and coordinator motes. Each mote will consume little power to stay longer and will be fuelled by a tiny battery. A separate ARM Cortex-M3 microcontroller will be used to interface and process the camera images from the vision sensor. Figure 3. Implementation of smart dust When some vehicle movement detected means the vibration sensor in the border gives data like vibration found to the authorised person. In the event, if the change occurs means sensor detects it and guides the data to the controller. Finally, controller gathers all these data sensed by the sensor and transmits to the recipient through wireless GSM modem. The beneficiary shows all the assembled data in GLCD. 4. Conclusion Finally, the proposed method is a designed wireless sensor mote which has multiple onboard sensors and a processor.It can identify a foe interruption crosswise over outskirts and war zones. The system incorporates a variety of sensors for vibration/seismic, attractive, acoustic and warm mark, a microcontroller for preparing these sensor values over a remote system. The sensor deployed on the border area readings will be collected and send an alert simultaneously displayed in the GLCD of the observing unit.
  • 4.  ISSN: 2302-9285 Bulletin of EEI Vol. 6, No. 4, December 2017 : 367 – 370 370 References [1] Kishore Kumar S. Smart Dust for Tactical Border Surveillance to Detect, Classify and track Enemy Intrusion Using Acoustic-magnetic-thermal Vibration Signatures. Proceedings of IRAJ International Conference, 20th October 2013. [2] Girard AR. et al. Border Patrol and Surveillance Missions Using Multiple Unmanned Air Vehicles. CDC. 43rd IEEE Conference on Decision and Control. 2004. [3] Slaheddine Chelbi, Majed Abdouli, Mourad Kaddes, Claude Duvallet, Rafik Bouaziz. An Unequal Cluster-based Routing Protocol Based on Data Controlling for Wireless Sensor Network. International Journal of Electrical and Computer Engineering (IJECE). October 2016; 6(5): 2403-2414. [4] Tapaswini Samant, Amlan Datta. Analysis and Comparison of SMAC and TMAC Protocol for Energy Efficient Dynamic Topology in Sensor Network. International Journal of Electrical and Computer Engineering (IJECE). October 2016; 6(5); 2331-2337. [5] Nohara TJ. A Commercial Approach to Successful Persistent Radar Surveillance of Sea, Air and Land along the Northern Border. 2010 [6] Mehdi Haj Ali, Qun-Xiong Zhu, Yan-Lin He. Mining Top-K Click Stream Sequences Patterns. Indonesian Journal of Electrical Engineering and Computer Science. December 2016; 4(3): 655-664. [7] Pratap P, et al. Challenges Of Remote Border Monitoring. IEEE International Conference on Technologies for Homeland Security (HST). 2010. [8] C.S. Preetham, M.S.G. Prasad, D.S.S.L. Saranya, Charan Teja Somepalli, D. Bhargava Satya Sai Krishna, V. Rohit. Performance Analysis of Cooperative Hybrid Cognitive Radio Network with Various Diversity Techniques. International Journal of Electrical and Computer Engineering (IJECE). October 2016; 6(5): 2125-2133 [9] Ahmed AS. Kumaran TS, Syed SSA, Subburam S. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks. Egyptian Informatics Journal. 2015; 16(1), 1-7. [10] Helen D, Arivazhagan D. Power Saving Mechanism for Ad-Hoc Network Using 3G fast dormancy technology. Indian Journal of Science and Technology. 2014; 7(S6): 74-77. [11] Slaheddine Chelbi, Majed Abdouli, Mourad Kaddes, Claude Duvallet, Rafik Bouaziz. An Unequal Cluster-based Routing Protocol Based on Data Controlling for Wireless Sensor Network. International Journal of Electrical and Computer Engineering (IJECE). October 2016; 6(5): 2403-2414.