Unauthorized entry in restricted areas represents an obvious security issue. Therefore, strict monitoring is highly required in order to ensure security. This research presents a smart surveillance bot for highly restricted areas with (1) automatic surveillance of an area specified by the user and obstacle detection and avoidance using Ultrasonic Sensor (2) human detection using Infrared (IR) thermal camera and identification of friend or foe (IFF) using RFID tags (3) live video surveillance using camera and manual remote control mode. The bot has the ability to detect human presence in an area using thermal image processing. If the bot detects and human presence while operating in surveillance mode, it confirms whether the person is a friend or foe by reading RFID. If the bot identifies the person as foe, it automatically sends the user a notification of intrusion and turns on live video streaming. The user would be able to take total control of the bot remotely in order to verify and judge on the situation using live video streaming. It also exhibits warning message in its display and points a toy gun at the intruder. In real life cases, the toy gun can be replaced with actual ones. The user bears the authority to decide whether to shoot or not. Due to having tank rover chassis, the robot has the ability to maneuver in rough terrains which enhances its versatility and usability.
Published in | Advances in Networks (Volume 7, Issue 2) |
DOI | 10.11648/j.net.20190702.12 |
Page(s) | 21-28 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2019. Published by Science Publishing Group |
Smart Bot, Surveillance, Raspberry Pi, Ultrasonic Sensor, RFID, Thermal Camera, Pixy Cam, Image Processing, Outdoor Security
[1] | M. Hasan, M. H. Anik and S. Islam, "Microcontroller Based Smart Home System with Enhanced Appliance Switching Capacity," 2018 Fifth HCT Information Technology Trends (ITT), Dubai, United Arab Emirates, 2018, pp. 364-367. |
[2] | M. Hasan, P. Biswas, M. T. I. Bilash and M. A. Z. Dipto, "Smart Home Systems: Overview and Comparative Analysis," 2018 Fourth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), Kolkata, India, 2018, pp. 264-268. |
[3] | P. Kuruba, A. Arjun, S. Aravind Kumar, A. L. Santosh Kumar and M. Prakash, "Surveillance Rover for Remote Areas," 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, 2018, pp. 14-15. |
[4] | A. Hampapur, L. Brown, J. Connell, S. Pankanti, A. Senior and Y. Tian, "Smart surveillance: applications, technologies and implications," Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint, Singapore, 2003, pp. 1133-1138 vol. 2. |
[5] | M. T. Rashid, P. Chowdhury and M. K. Rhaman, "Espionage: A voice guided surveillance robot with DTMF control and web based control," 2015 18th International Conference on Computer and Information Technology (ICCIT), Dhaka, 2015, pp. 419-422. |
[6] | S. M. Shaikh, K. Sufiyan, A. Ali and M. Ibrahim, “Wireless Video Surveillance Robot Controlled Using Simple Bluetooth Android Application,” International Journal of Advanced Research in Computer Science, vol. 6, no. 2. pp. 100-103, 2015. |
[7] | P. S. Shrungare, A. A. Bokde, N. U. Kashte and S. S. Raut, “Smart Phone Based Robot for Domestic Purpose Using Bluetooth,” International Research Journal of Engineering and Technology (IRJET), vol. 5, no. 1, pp. 694-697, 2018. |
[8] | D. Singh, P. Zaware and A. Nandgaonkar, "Wi-Fi surveillance bot with real time audio & video streaming through Android mobile," 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, 2017, pp. 746-750. |
[9] | D. Priyanka and V. Karthik, “Wireless Surveillance Robot with Motion Detection and Live Video Transmission and Gas Detection,” International Journal Scientific Engineering and Technology Research, vol. 4, no. 17, pp. 3099-3106, 2015. |
[10] | Q. A. Kester, O. W. Chibueze and A. D. Asisat, “A Surveillance Wireless Camera Sensor Network for Intrusion Detection Using Image Processing Techniques,” APRN Journal of Engineering and Applied Sciences, vol. 10, no. 17, pp. 7394-7399, 2015. |
[11] | D. D. O. Golcalves and D. G. Costa, “A Survey of Image Security in Wireless Sensor Network,” Journal of Imaging, vol. 4, no. 30, pp. 1-30, 2015. |
[12] | H. R and M. H. Safwat Hussain, "Surveillance Robot Using Raspberry Pi and IoT," 2018 International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C), Bangalore, 2018, pp. 46-51. |
[13] | A. Vinay, A. Singh, N. Anand, M. Raj, A. Bharati, K. N. B. Murthy and S. Natarajan, “Surveillance Robots Based on Pose Invariant Face Recognition Using SSIM and Spectral Clustering,” Procedia Computer Science, vol. 133, pp. 940-951, 2018. |
[14] | A. Vinay, A. R. Deshpande, B. S. Pranathi, H. Jha, K. B. Murthy and S. Natarajan, “Effective Descriptors Based Face Recognition Technique for Robotic Surveillance Systems,” Procedia Computer, vol. 133, pp. 968-975, 2018. |
[15] | F. P. Mahdi, M. M. Habib, A. A. R. Ahad, M. Susan, A. S. M. Moslehuddin and P. Vasant, “Face Recognition-Based Real-Time System for Surveillance,” Intelligent Decision Technologies, vol. 11, no. 1, pp. 79-92, 2017. |
[16] | S. K. Sharma, R. Agrawal, S. Srivastava and D. K. Singh, "Review of human detection techniques in night vision," 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, 2017, pp. 2216-2220. |
[17] | K. Lenac, I. Maurovi´c and I. Petrovi´ c, “Moving Object Detection Using a Thermal Camera and IMU on a vehicle,” 2015 International Conference on Electrical Drives and Power Electronics (EDPE), The High Tatras, 2015, pp. 212-219. |
[18] | D. ALshukri, V. L. R, S. E. P and P. Krishnan, "Intelligent Border Security Intrusion Detection using IoT and Embedded systems," 2019 4th MEC International Conference on Big Data and Smart City (ICBDSC), Muscat, Oman, 2019, pp. 1-3. |
[19] | M. Teutsch, T. Mueller, M. Huber and J. Beyerer, "Low Resolution Person Detection with a Moving Thermal Infrared Camera by Hot Spot Classification," 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops, Columbus, OH, 2014, pp. 209-216. |
[20] | Y. Khandhediya, K. Sav, V. Gajjar, Human detection for night surveillance using adaptive background subtracted image, 2017. Doi: arXiv:1709.09389. |
[21] | R. Soundrapandiyan, P. V. S. S. R. C. Mouli, “Adaptive Pedestrian Detection in Infrared Images Using Background Substraction and Local Thresholding,” Procedia Computer Science, vol. 58, pp. 706-713, 2015. |
[22] | D. Nikolov, G. Zafirov, I. Stefanov, K. Nikov and S. Stefanova, "Autonomous navigation and speed control for line following robot," 2018 IEEE XXVII International Scientific Conference Electronics - ET, Sozopol, 2018, pp. 1-4. |
[23] | M. D. B. Isa, A. R. B. Mohammad and M. Z. B. M. Hanifah, “Vision Mobile Robot System with Color Optical Sensor,” APRN Journal of Engineering and Applied Sciences, vol. 12, no. 4, pp. 1291-1295, 2017. |
[24] | S. Arumugam, A. P. Forsido and D. Adane, “Ultrasonic Sensor Based Obstacle Detection for Automobiles,” International Journal of Recent Treands in Engineering and Research, vol. 2, no. 5, pp. 268-274, 2016. |
[25] | M. Hasan, M. J. Hossein, U. K. Saha, M. S. Tarif, “Overview and Comparative Performance Analysis of Full Adder Cells in 90 nm Tecnology,” 2018 4th International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, 2018, pp. 1-6. |
[26] | S. Polina, P. K. Barathula and K. P. P Rao, “Autonomous Obstacle Avoiding and Line Following Rover,” International Journal of Pure and Applied Mathematics, vol. 114, no. 9, pp. 272-279, 2017. |
[27] | M. Hasan, M. J. Hossein, M. Hossain, H. U. Zaman and S. Islam, “Desing of a Scalabel Low-Power 1-Bit Hybrid Full Adder for Fast Computation,” IEEE Transactions on Circuits and Systems II: Express Briefs, Early Access Preprint, 2019, doi: 10.1109/TCSII.2019.2940558. |
[28] | M. Hasan, M. H. Anik, S. Chowdhury, S. A. Chowdhury, M. T. I Bilash and S. Islam, “Low-Cost Appliance Switchong Cirucit for Discarding technical Issues of Microcontroller Controlled Smart Home,” International Journal of Sensors and Sensor Networks, vol. 7, no. 2, pp. 16-22, 2019. |
[29] | S. Chowdhury, F. R. Wasee, M. S. Islam, H. U. Zaman, “Bengali Handwriting Recognition and Convertion to Editable Text,” 2018 International Conference on Advances in Electronics, Computer and Communication (ICAECC), Bangalore, 2018, pp. 1-6. |
[30] | M. Z. Talukder, S. S. Towqir, A. R. Remon and H. U. Zaman, "An IoT based automated traffic control system with real-time update capability," 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Delhi, 2017, pp. 1-6. |
[31] | M. A. Islam, W. Ahad, M. Faisal and H. U. Zaman, "A cost-effective design and development of a surveillance robot," 2015 International Conference on Advances in Electrical Engineering (ICAEE), Dhaka, 2015, pp. 259-262. |
[32] | H. U. Zaman, M. M. H. Bhuiyan, M. Ahmed and S. M. T. Aziz, "A novel design of line following robot with multifarious function ability," 2016 International Conference on Microelectronics, Computing and Communications (MicroCom), Durgapur, 2016, pp. 1-5. |
[33] | H. U. Zaman, M. S. Hossain, M. Wahiduzzaman and S. Asif, "A novel design of a robotic vehicle for rescue operation," 2015 18th International Conference on Computer and Information Technology (ICCIT), Dhaka, 2015, pp. 507-510. |
[34] | M. Hasan, U. K. Saha, M. S. Hossain, P. Biswas, M. J. Hossein and M. A. Z. Dipto, "Low Power Design of a Two Bit Mangitude Comparator for High Speed Operation," 2019 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, Tamil Nadu, India, 2019, pp. 1-4. |
[35] | H. U. Zaman, T. A. Khan, S. R. Falgunee, G. S. Rashid and F. H. Talukder, "Autonomous Firefighting Robot With Optional Bluetooth Control," 2018 4th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 2018, pp. 1-4. |
[36] | H. U. Zaman, A. A. Joy, K. M. Akash and S. T. Fayad, "A simple and effective way of controlling a robot by hand gesture," 2017 International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, 2017, pp. 330-333. |
[37] | H. U. Zaman, J. S. Hossain, T. T. Anika and D. Choudhury, "RFID based attendance system," 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Delhi, 2017, pp. 1-5. |
[38] | R. Hossain, M. Ahmed, M. M. Alfasani and H. U. Zaman, "An advanced security system integrated with RFID based automated toll collection system," 2017 Third Asian Conference on Defence Technology (ACDT), Phuket, 2017, pp. 59-64. |
[39] | H. U. Zaman, J. Khisha, N. Zerin and M. H. Jamal, "Speech responsive mobile robot for transporting objects of different weight categories," 2017 18th International Conference on Advanced Robotics (ICAR), Hong Kong, 2017, pp. 395-400. |
[40] | M. Hasan, U. K. Saha, A. Sorwar, M. A. Z. Dipto, M. S. Hossain, H. U. Zaman, “A Novel Hybrid Full Adder Based on Gate Diffusion Input Technique, Transmission Gate and Static CMOS Logic,” 2019 10th International Conference on Computing, Communication and Networking Technologies, Kanpur, 2019. |
[41] | M. Hasan, P. Biswas, M. S. Alam, H. U. Zaman, M. Hossain and S. Islam, “High Speed and Ultra Low Power Design of Carry-Out Bit of 4-Bit Carry Look-Ahead Adder,” 2019 10th International Conference on Computing, Communication and Networking Technologies, Kanpur, 2019. |
[42] | R. Hossain, M. Ahmed, H. U. Zaman, “A Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System,” Advances in Science, Technology and Engineering Systems Journal Vol. 2, no. 3, pp. 1777-1783, 2017. |
APA Style
Mehedi Hasan, Ashik Zafar Dipto, Moumita Sadia Islam, Afran Sorwar, Shihabul Alam. (2019). A Smart Semi-Automated Multifarious Surveillance Bot for Outdoor Security Using Thermal Image Processing. Advances in Networks, 7(2), 21-28. https://doi.org/10.11648/j.net.20190702.12
ACS Style
Mehedi Hasan; Ashik Zafar Dipto; Moumita Sadia Islam; Afran Sorwar; Shihabul Alam. A Smart Semi-Automated Multifarious Surveillance Bot for Outdoor Security Using Thermal Image Processing. Adv. Netw. 2019, 7(2), 21-28. doi: 10.11648/j.net.20190702.12
@article{10.11648/j.net.20190702.12, author = {Mehedi Hasan and Ashik Zafar Dipto and Moumita Sadia Islam and Afran Sorwar and Shihabul Alam}, title = {A Smart Semi-Automated Multifarious Surveillance Bot for Outdoor Security Using Thermal Image Processing}, journal = {Advances in Networks}, volume = {7}, number = {2}, pages = {21-28}, doi = {10.11648/j.net.20190702.12}, url = {https://doi.org/10.11648/j.net.20190702.12}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.net.20190702.12}, abstract = {Unauthorized entry in restricted areas represents an obvious security issue. Therefore, strict monitoring is highly required in order to ensure security. This research presents a smart surveillance bot for highly restricted areas with (1) automatic surveillance of an area specified by the user and obstacle detection and avoidance using Ultrasonic Sensor (2) human detection using Infrared (IR) thermal camera and identification of friend or foe (IFF) using RFID tags (3) live video surveillance using camera and manual remote control mode. The bot has the ability to detect human presence in an area using thermal image processing. If the bot detects and human presence while operating in surveillance mode, it confirms whether the person is a friend or foe by reading RFID. If the bot identifies the person as foe, it automatically sends the user a notification of intrusion and turns on live video streaming. The user would be able to take total control of the bot remotely in order to verify and judge on the situation using live video streaming. It also exhibits warning message in its display and points a toy gun at the intruder. In real life cases, the toy gun can be replaced with actual ones. The user bears the authority to decide whether to shoot or not. Due to having tank rover chassis, the robot has the ability to maneuver in rough terrains which enhances its versatility and usability.}, year = {2019} }
TY - JOUR T1 - A Smart Semi-Automated Multifarious Surveillance Bot for Outdoor Security Using Thermal Image Processing AU - Mehedi Hasan AU - Ashik Zafar Dipto AU - Moumita Sadia Islam AU - Afran Sorwar AU - Shihabul Alam Y1 - 2019/11/19 PY - 2019 N1 - https://doi.org/10.11648/j.net.20190702.12 DO - 10.11648/j.net.20190702.12 T2 - Advances in Networks JF - Advances in Networks JO - Advances in Networks SP - 21 EP - 28 PB - Science Publishing Group SN - 2326-9782 UR - https://doi.org/10.11648/j.net.20190702.12 AB - Unauthorized entry in restricted areas represents an obvious security issue. Therefore, strict monitoring is highly required in order to ensure security. This research presents a smart surveillance bot for highly restricted areas with (1) automatic surveillance of an area specified by the user and obstacle detection and avoidance using Ultrasonic Sensor (2) human detection using Infrared (IR) thermal camera and identification of friend or foe (IFF) using RFID tags (3) live video surveillance using camera and manual remote control mode. The bot has the ability to detect human presence in an area using thermal image processing. If the bot detects and human presence while operating in surveillance mode, it confirms whether the person is a friend or foe by reading RFID. If the bot identifies the person as foe, it automatically sends the user a notification of intrusion and turns on live video streaming. The user would be able to take total control of the bot remotely in order to verify and judge on the situation using live video streaming. It also exhibits warning message in its display and points a toy gun at the intruder. In real life cases, the toy gun can be replaced with actual ones. The user bears the authority to decide whether to shoot or not. Due to having tank rover chassis, the robot has the ability to maneuver in rough terrains which enhances its versatility and usability. VL - 7 IS - 2 ER -