0% found this document useful (0 votes)
21 views

Akashrakshak See Final Report Part 2

Uploaded by

Sumit Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Akashrakshak See Final Report Part 2

Uploaded by

Sumit Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Akash Rakshak” - Autonomous Threat Interception System

1. Introduction

In Today World most of the Countries are involved in some type of conflict or war-like situation
and threats such as missiles, tanks, air-craft etc. have emerged as some of the most destructive
and lethal weapons to man-kind. The increasing frequency of missile or related attacking objects
have raised concerns about national and international security.
In our project, titled “Akash Rakshak” - Autonomous Threat Interception System”, we are
developing an advanced autonomous threat detection system capable of identifying and
neutralizing various threats such as missiles, tanks, aircraft, armored vehicles, etc.

The purpose of this project is to design and construct an automatic object or missile detection
and destroying system. This system is designed to detect the target (missile/object) moving in
multiple directions. The target destroying system moves automatically in the direction of the
missile and fires it upon fixing the target. This system consists of an intelligent sonar based
object tracking system that continuously monitors the target. Upon detecting the target it checks
for temperature of the object to check for human presence and if found danger sends the target’s
location to a Central Control System. The Central Control System takes the action of moving the
firing mechanism in the direction of the target (missile). Upon fixing the direction, it sends the
control command to the firing system for attacking the target. In this project we are making use
of an ultrasonic radar system and a dc motor driven firing unit interfaced with a Microcontroller
based control unit. We prefer ultrasonic sensors to IR sensors, because the Ultrasonic sensor
covers a larger sensing distance and it can detect the target in all the lighting conditions (day or
night).

In this project there are two modes and for manual mode operation is done through gesture
direction using accelerometer sensor. The programming of Microcontroller is done using
Embedded ‘C’. An embedded system is a combination of software and hardware to perform a
dedicated task. Some of the main devices used in embedded products are Microprocessors and
Microcontrollers Microprocessors are commonly referred to as general purpose processors as
they simply accept the inputs, process it and give the output. In contrast, a microcontroller not
only accepts the data as inputs but also manipulates it, interfaces the data with various devices,
controls the data and thus finally gives the result.

Department of Electronics and Communication Engineering 1


Akash Rakshak” - Autonomous Threat Interception System

2. Literature survey

[1]. P.Bhuvana Sri, N. Kalpana (2023) “MISSILE TRACKING AND AUTO ALERT OVER
IOT” The purpose of this project is to design and construct automatic missile detection and
destroying systems. This system is designed to detect the target (missile) moving in multiple
directions.

[2].S RAVI KUMAR(2019)’Missile Tracking And Detection System By Using IoT Technology”

[3]. M. Poojitha Yadav, Ommi Aravind, K. Navya(2019) Radar Vision Based Controlling Alerts
And Weapon Activation For Border Defense.

[4] Krishnaiah, Dathrak Rakesh, Banavathu Jyothi(2020) Ultrasonic Radars based Military
Security System for Identification of Trespassers.

[5] Benjula Anbu Malar M B, Praveen R, Kavi Priya K P(2019)Hand Gesture Control Robot The
objective of this paper is to portray the control of the robot using the accelerometer with the help
of a human hand.

[6] Mr. B. Harikranth*1, K. Mounika*2, N. Raju*3, B. Sathwika*4, L. Vikram*5(2023) objects


detection and destroying system

[7] Dr.S.Sumathi.M.E.,
Ph.D1 , B. Mahesh2, V. Praveen3,C. Siva, A. Ruf Ahmed 5 A NOVEL
EMBEDDED BASED PROJECT ON MISSILE DETECTION AND AUTOMATIC
DESTROY.

Department of Electronics and Communication Engineering 2


Akash Rakshak” - Autonomous Threat Interception System

3. Overall Block Diagram

This is the block diagram of Akash Rakshak” - Autonomous Threat Interception System. In this
the Ultrasonic sensor is used HC-SR04 which is used to detect the obstacle and measures the
distance of a target object by emitting the ultrasonic waves and converts the sound into electrical
signal and switch is used to trigger the laser light and it is manually controlled.

Department of Electronics and Communication Engineering 3


Akash Rakshak” - Autonomous Threat Interception System

4. Flow diagram

This is the flow chart of Akash Rakshak” - Autonomous Threat Interception System. In this the
Ultrasonic sensor is used HC-SR04 which is used to detect the obstacle and measures the
distance and temperature sensor measure temperature of a target object and switch is used to
trigger the laser light and it is manually controlled.

Department of Electronics and Communication Engineering 4


Akash Rakshak” - Autonomous Threat Interception System

Working

1) Detection Phase:
The system begins by integrating advanced radar systems and sensors to continuously scan the
surroundings for potential missile threats.
Utilizing sophisticated tracking algorithms, the system can detect and monitor incoming missiles
with exceptional precision.
The combination of heat sensors and radar sensors allows the system to assess the threat level
posed by each detected object.

2) Threat Classification:
Based on predefined parameters, the system classifies the detected threats into three levels: Level
1 threat, Level 2 threat, and Level 3 threat.
This classification is crucial for determining the appropriate response strategy and engagement
parameters.

3) Autonomous Response Calculation:


Upon confirming a threat, the system autonomously calculates the optimal engagement
parameters. This involves determining the precise targeting coordinates for the incoming threat.
The autonomous response is designed to occur within seconds, minimizing reaction time and
ensuring a swift defense mechanism.

4) Laser-Based Targeting and Neutralization:


The centerpiece of the system is its high-energy laser technology. Once the optimal engagement
parameters are calculated, the laser system swiftly and accurately targets the incoming threat.
The laser technology offers a cost-effective and efficient alternative to conventional interceptor
missile systems, providing a rapid and precise means of neutralizing threats.

5) Control Mechanism and Gesture Input:


In the event of operational concerns or emergencies, the system can be managed and
manipulated using MEMS sensors. These sensors respond to hand movements, allowing for
precise control over the system's functions.
The use of gesture input provides an intuitive and responsive method for operators to intervene
or make adjustments as needed.

6) Redundancy and Failsafe:


The system incorporates redundancy and failsafe mechanisms to ensure uninterrupted operation,
even in adverse conditions or during hostile actions.

Department of Electronics and Communication Engineering 5


Akash Rakshak” - Autonomous Threat Interception System

This guarantees the highest level of reliability and readiness, critical for a defense system
intended to protect military assets, civilians, and infrastructure.

7) Object or Missile Destruction:


Once the threat is precisely targeted and neutralized by the laser system, the defense mechanism
considers the threat successfully eliminated.
The system is equipped with an array of sensors, including ultrasonic sensors and temperature
sensors, to ensure the correct identification of threats and the absence of false positives.

8) Automatic and Manual Modes:


The system provides both automatic and manual modes, allowing operators to choose the level
of control based on the situation.
Automatic mode enables the system to operate autonomously, while manual mode allows
operators to intervene and make decisions based on real-time information.

8)Communication and IoT Integration:


For communication purposes, the system incorporates an IoT communicator, facilitating data
exchange and coordination with other defense systems or command centers.
This communication aspect enhances the overall effectiveness and coordination of the missile
defense system.
This feature enables the exchange of critical data and coordination with other defense systems or
central command centers.
The communication infrastructure enhances the overall effectiveness and coordination of the
missile defense system, contributing to a comprehensive and integrated defense strategy.

The Missile Defense System with Autonomous Threat Interception combines advanced
detection, classification, and response mechanisms to provide a rapid and reliable defense against
incoming missile threats. The integration of cutting-edge technologies, such as high-energy
lasers and MEMS sensors, ensures precision, efficiency, and adaptability in addressing evolving
security challenges. The system's ability to operate in automatic and manual modes, coupled with
redundancy and failsafe features, contributes to its effectiveness in protecting military assets,
civilian populations, and critical infrastructure.

Department of Electronics and Communication Engineering 6


Akash Rakshak” - Autonomous Threat Interception System

5. Tools used for the project work

HARDWARE REQUIREMENT:

Arduino UNO

Ultrasonic Sensor (UV Sensor HC-SR04)

Temperature Sensor (MXL90614)

MEMS Sensor (ADXL335)

DC Motor (30 rpm gear motor)

Lasers (REES52)

IOT Communicator

Power Supply

LED and Buzzer

SOFTWARE REQUIREMENT:

Arduino IDE

Embedded C

Department of Electronics and Communication Engineering 7


Akash Rakshak” - Autonomous Threat Interception System

6. Results and Discussions

The expected outcome is an integrated system that can detect missile threats, assess their
trajectories, and automatically initiate interception or destruction measures. The system
will also provide user-friendly hand-gesture control.

The research aims to improve response times and accuracy in countering missile attacks
while enhancing the human-machine interface.

Department of Electronics and Communication Engineering 8


Akash Rakshak” - Autonomous Threat Interception System

7. Applications

1. Military Defense:

The primary application is in military settings, where it can protect military bases,
installations, and personnel from missile threats.

2. Civilian Protection:

It can be used to safeguard civilian populations and critical infrastructure, such as


airports, power plants, and government buildings, from potential missile attacks.

3. Peacekeeping Missions:

Useful in peacekeeping missions where military forces are deployed to conflict zones,
ensuring the safety of both military personnel and local populations.

4. Strategic Locations:

Deployed in regions with geopolitical tensions or in proximity to hostile territories to


deter missile attacks.

5. Maritime Defense:

Implemented on naval vessels and coast guard ships to defend against missile threats
while patrolling or stationed near conflict areas.

6. Disaster Management:

Beyond military applications, this technology can be adapted for disaster management,
aiding in the interception of dangerous projectiles during natural disasters, such as
volcanic eruptions or asteroid impacts. Private security companies and governments can
use tailored versions of this technology to protect their assets, including high-value
targets like data centers and research facilities.

Department of Electronics and Communication Engineering 9


Akash Rakshak” - Autonomous Threat Interception System

8. Conclusions

In conclusion, the development of an integrated automatic missile detection and destruction


system, featuring IoT technology and hand-gesture control with an ADXL sensor, presents a
significant step forward in enhancing national and global security. This system offers rapid,
automated threat detection and response, reducing the risk of missile attacks on military bases,
critical infrastructure, and civilian populations.The inclusion of intuitive hand-gesture control
ensures user-friendliness and responsiveness.
The advantages of improved security, rapid response, and enhanced accuracy position this
technology as a crucial tool in modern defense and disaster management. Future work will focus
on implementation and testing, as well as further refining the system's capabilities through
advanced AI and machine learning integration. This research opens the door to innovative
solutions for mitigating the ever-evolving threat of missile attacks while optimizing the
interaction between human operators and advanced technology.

Department of Electronics and Communication Engineering 10


Akash Rakshak” - Autonomous Threat Interception System

References

[1]. A.M. Anushree Kirthika (2014), "Missile Detection and Automatic Destroy System“
Volume 4, Number 1, pp. 1-6

[2]. Ashish Jadhav, Mahesh Kumbhar, and Meenakshi Pawar "Cell Phone Controlled Ground
Combat Vehicle(July 2012), "International Journal of Computer and Communication
Engineering, Vol. 1, No. 2, July 2012.

[3]. S. Murakami, Y. Nishida, T. Hori, H. Mizoguchi, Detecting Human Head Location Using a
Simply Installed Ultrasonic Radar System, in Proceedings of the 22nd Annual Conference of the
Robotics Society of Japan, 1A23(1)-(2), September 2004.

[4]. Fu-Kuang Yeh, Kai-Yuan Cheng, and Li-Chen Fu. "Variable Structure-Based Nonlinear
Missile Guidance/Autopilot Design With Highly Maneuverable Actuators“ IEEE transaction on
control systems technology,vol.12,no.6,november 2004.

[5]. Harvey, C., and Stein, G.(June 2014), “Missile Flight control system,” IEEE Trans. Autom.
Control AC-23(3), 378–387 (June 2014).

[6]. A.Hla Myo Tun, S.San Hlaing Oo, C.Myint Myint Yi, "Analysis of Phase Lead
Compensator Design for Laser Guided Missile System using MATLAB“

[7]. B. Kada, "Outer-Loop Sliding Mode Control Approach to Longitudinal Autopilot Missile
Design"IFAC World Congress Milano, September 2, 2011

[8]. Masahiko Saito,Mayur Palankar(2015), ”Embedded Systems - Missile Detection/


Interception,” IEEE transactions of Missile system 2015.

[9]. Reichert, R. T.(2014), “Dynamic Scheduling of Modern-Robust-Control Autopilot Designs


for Missiles,” IEEE Control Systems Magazine 12(5), 35–42 (2014).

[10] Samir chopra V Suman Bharati V Tarun sing hnegi V Prof X Ms X PXDX Kulkarni V
“Object detection by ultrasonic and auto destroy system” V international journal of engineering
science and research technology may R2014)

Department of Electronics and Communication Engineering 11


Akash Rakshak” - Autonomous Threat Interception System

Month-wise flow of events / Project Schedule

Once, the problem is defined along with the name - title of the project of the proposed work, then a
layout should be set as to how you will tackle the problem in stages, i.e., in the form of monthly progress,
i.e., you have to mention the objective of each stage (monthly review objective) in the work statement
column.

Mention the main points here how you have progressed your work in the beginning of the 7 th semester
and in the subsequent months, which is the monthly progress (normally at the end of each month).Some
of the agendas / points about how you are going to plan or execute your proposed project / dissertation
work should be mentioned against the respective months mentioned below in the table of flow of events.
The agendas may be …………
• Searching of the project topic,
• Searching for the venue for pursuing the project work,
• Literature survey,
• Definition of the problem,
• Synopsis formulation,
• Allocation of the guide,
• Consultations with the guide,
• Going to industry for consultations,
• Getting approval from the guide / UG coordinator / HOD / Principal,
• Frequent interactions,
• Developing Some Simulation Models for the Proposed Project Work,
• Proposing a Block Diagram,
• Writing Data Flow Diagrams,
• Flow-Charts, Algorithms,
• Doing Some Coding,
• Doing Some Experiments in the Industry or in the College Lab,
• Attending Conferences,
• Attending Workshops Relating to the Project Work,
• Developing Hardware for the Proposed Work,
• Doing Some Experimental Evaluation or Validation of the Simulated Work,
• Publication of a Review Paper in a National Conference & International Conference,
• Publication of a Research Paper in National Journal & Inter-National Journal,
• Frequent Project Reviews, Stage-1, Stage-2, Stage-3, Etc…, Final Project Review,
• Comparing the Work Done With Some Standard Methods Done By Various Authors,
• Conclusion of the Project Work,
• Report Submission for Correction to the Guide,
• Thesis Submission @ the End of the Period,
• Developing Research Monograph,
• Applying for Patent,
• Final Project Work Submission.
• Attending the Viva-Voce.

Department of Electronics and Communication Engineering 12


Akash Rakshak” - Autonomous Threat Interception System

No Oc No De Jan Fe Ma Ap Ma Jun
. Work statement
t v c b r r y
Project survey & problem
identification & problem
formulation, study of various
1 technologies relating to the
work, submitting the synopsis
abstract

Literature survey
2
Data collection & developing
3 some algorithms-1 (h/w-s/w)

First phase-1 report


4 submission&
Review of project phase-1
Development of algorithms-2
Hardware design
5
Software design

Development of algorithms-3
6 Software design

Development of algorithms-4
Checking the performance of the
7. project done & overall
demonstration of working item

Submission of the project work


8. thesis along with working model
demo (h/w – s/w)
9. Final viva-voce in examination

Department of Electronics and Communication Engineering 13


Akash Rakshak” - Autonomous Threat Interception System

PO-PSO Mapping

Project Title
Levels
PO Justification
3/2/1
PO1 3 Utilize mathematics, science, and engineering fundamentals to interpret data
from sensors (ultrasonic, temperature, MEMS), understand motor dynamics,
and create appropriate algorithms for data processing.
PO2 2 Analyzed complex engineering problems related to sensor data
interpretation, motor control, and IoT communication by reviewing relevant
literature and applying mathematical and engineering sciences.
PO3 3 Design solutions considering public safety, environmental impact, and societal
needs by integrating sensors, motors, and IoT communication to create an
effective Akash Rakshak system.
PO4 2 Employed research-based knowledge and methods to interpret sensor data,
conducted experiments for validation, and synthesized information for
drawing valid conclusions about system behavior and performance.
PO5 3 Utilize modern engineering tools, IT systems, and modeling techniques to
predict system behavior, manage sensor data, and control the Akash Rakshak
system while understanding the limitations of these tools.
PO6
PO7 2 Understand the environmental impact of the system, consider sustainability in
system design, and propose methods to minimize the ecological footprint of the
Akash Rakshak.
PO8 2 Adhere to ethical principles in the development, deployment, and operation of the
Akash Rakshak system, ensuring responsible engineering practices.
PO9 3 Collaborate effectively within a team, taking leadership roles when necessary,
to ensure the successful implementation and operation of the Akash Rakshak
system.
PO10 2 Effectively communicate complex engineering concepts to various
stakeholders, including the engineering community and society, through
reports, presentations, and clear instructions.
PO11 3 Apply engineering and management principles to manage the project
effectively, ensuring that resources are optimally utilized within the project
constraints.
PO12 2 Recognize the need for continual learning, especially in the rapidly evolving
technological landscape, to adapt and improve the Akash Rakshak system and
its functionalities.
PSO1 2 Employ data science principles to manage sensor data, ensure data security,
and create predictive models for system behavior and anomaly detection in
the Akash Rakshak system.
PSO2

Department of Electronics and Communication Engineering 14


Akash Rakshak” - Autonomous Threat Interception System

Budget Estimation
Sl. No. Particulars Estimated Cost in Rs.
1 Arduino UNO 800
2 Ultrasonic Sensor 108
3 DC motor 299
4 Motor Driver 289
5 Power Adapter 389
6 Connecting wires 110
7 Buzzer 20
8 DHT 11 temperature sensor 210
Total 2225

Department of Electronics and Communication Engineering 15


Akash Rakshak” - Autonomous Threat Interception System

Department of Electronics and Communication Engineering 16

You might also like