An Autonomous Robot For Intelligent Security Systems: Abstract
An Autonomous Robot For Intelligent Security Systems: Abstract
Malaysia
Abstract— Today scientific knowledge relentlessly bringing becoming a part of everyday life and these elements relieve
change and comfort in day to day life. In Present generation, us from various dangers. The Robotic system usually
an autonomous robot has been a popular technology which is consists of two parts such as the robotic sensor body and
widely used in many areas. Robots are used to share the work Intelligence unit together can be used in many applications
and act more autonomously in performing the jobs faster than of factories and giant machine units. These systems are used
humans. Usually, Robots are more intelligent with endless in automatic painting, welding and conveyor systems etc.
energy levels and more precise in handling the jobs perfectly. The behavior of robot lies with Artificial intelligence for its
However, the proposed robot design is about researching and locomotion. This intelligence helps the robot for movement
investigating hazardous environments, exploration, remote from one point to another in performing complex operations
assistance and Military services. In the given system design, a
also. This motive force comes from a command and helps
robot system is built to monitor and identify the motion in
the robot wheels to move and perform any particular work
achieving better security and surveillance of indoor
environments. This autonomous system is built by using an
assigned [1]. The robotic system is an integration of
embedded system to perform specific tasks and function as hardware and software designed to perform the specific task
defined. This robotic system has five different systems such as which can also be defined as an embedded system. It is a
robotic arms for pick and place of the objects from conveyor real-time system which is designed to perform certain
belts, an ultrasonic sensor for distance calculation, a visionary calculations and automatic decisions in a timely manner.
system for recording the motion of invader and sending the The tasks assigned are carried out with strict deadlines in
pictures through video transmission system through a structured or unstructured environments with human
network. Fire sensor is used for detection of fire and a giving guidance continuously. These robots are of different types
alarm in the environment. The location of the robotic system is like autonomous, manual and semi-autonomous desirable to
defined with GPS longitude and latitude values. This work in any environments. The security and surveillance are
information is sent through a network using things speak and widely used by mobile robots [2]. These systems can be
the same information is displayed on the LCD. A GSM controlled through a remote control for responding
message is sent through mobile for giving an alert about the automatically to stimuli environment. Servo motors are used
operation. The robot designed has two modes of operation. in propulsion system and the sensors like ultrasonic and
One is the autonomous mode, and the other is the manual infrared are used for distance measurement and the camera
mode using a remote supervisory system. The deigned work placed on the robot are used to record the audio and video
combines the sensory and remote supervising system for better
and transmit wirelessly to different places. The surveillance
robotic security. The path planning is also carried out in a
systems used in the present world are active in research
robotic system for achieving the motion in real time and
obstacle avoidance. In the carried work the results are clearly
areas. These functional robots are extremely challenging in
discussed and overall work is defined with the coding details as exploration and monitoring in indoor/outdoor environments.
well. The autonomous robots are used to detect and identify the
objects with a multisensory platform in various applications
Keywords—Robotic arm; GSM module; Path Planning; LCD; like airports and museums. They can be used to work on
Robotic system. real-time applications of buildings and safety devices also.
To prevent from damages and theft also the security system
I. INTRODUCTION is being installed for remote monitoring and can send the
information through the network and automatically detect
Design of Robotics deals with knowledge creation the face of invaders for security alarms and also avoiding
in different fields. Robotic engineering applications involve hazards for extreme environments [4].
in manufacturing, surgical procedures, space industry,
Military and Health informatics. Today Robots are
Authorized licensed use limited to: Instituto Tecnologico Metropolitano ITM. Downloaded on April 29,2022 at 14:13:57 UTC from IEEE Xplore. Restrictions apply.
2018 9th IEEE Control and System Graduate Research Colloquium (ICSGRC 2018), 3 - 4 August 2018, Shah Alam, Malaysia
1.1. Need for Robots: One of the ways of solving these problems is by involving
The robots are more superior to humans in many aspects collaborative work through easy programming of smart
like improving the quality of work, better flexibility and applications with PolyScope or open CV software for rapid
Accuracy in perceived measurements. One of the significant and efficient development of the robotic system. These
aspects is Robots are able to handle the work in hazardous robots are being referred to as cobots with light-weight and
environments with many sensors built on it. In the present compact design with safety features with the intuitive
and future scenario, robots have largest research area in programming interface.
different fields like car production, space and underwater Robotic solutions are efficient and simple, but
exploration, commercial agriculture etc. The below figure during the implementation, they often provide the gap of
shows the research in coming years in various applications skill sets and experience in manufacturing the human
defined counterparts. One more problem implementation is the cost
of technology and budget requirements that can be spent to
make the robotics as a service and able to sustain the cost in
the market these challenges deal with the safety features in
monitoring, guiding and limiting the workforce for
automated solutions. Hence robotics as a service to make
the technology better, faster and smarter in the markets for
building the economic future. Such solutions are being
provided in the diagram shown in figure 3.
202
Authorized licensed use limited to: Instituto Tecnologico Metropolitano ITM. Downloaded on April 29,2022 at 14:13:57 UTC from IEEE Xplore. Restrictions apply.
2018 9th IEEE Control and System Graduate Research Colloquium (ICSGRC 2018), 3 - 4 August 2018, Shah Alam, Malaysia
203
Authorized licensed use limited to: Instituto Tecnologico Metropolitano ITM. Downloaded on April 29,2022 at 14:13:57 UTC from IEEE Xplore. Restrictions apply.
2018 9th IEEE Control and System Graduate Research Colloquium (ICSGRC 2018), 3 - 4 August 2018, Shah Alam, Malaysia
### ADS-LD Command file 'Design of an Intelligent Security Robot. lnp' through wireless RF interface to a Mobile phone through a
is ready. message alert.
### ADS-LD: About to start ADS-LD Thread.
### ADS-LD: executed with 0 errors However, the results shown are supervised
### Updating obj list practically as shown in the figures. Figure 10 and 11 shows
### LD ADS_ file () completed. the longitude and latitude values defining the position of the
robotic system unit on the LCD. The position is monitored
B. Initialize: in a timely manner and it can be visually monitored through
#include<lpc214x.h>
void delay(double ms) a camera and the objects detected and its pictures can be
{ transmitted to a laptop for object analysis. The analysis of
Unsigned int i,j; security measures is tested with user acceptance testing is
for (i=0;i<ms; i++) shown theoretically in section VI. The user testing
for (j=0;j<250;j++);
} measurement is done on the five-point scale. The detailed
int main() analysis of the survey is evaluated with security
{ measurements. The results are validated objectively through
PINSEL1=0x00000000; user acceptance testing and their accuracy results are well
PINSEL2=0x00000000;
IODIR0=0x00000000; described in section VI.
IODIR1=0X00FF0000;
IOCLR1=0X00FF0000;
While (1)
{
If ((IOPIN0&0x00010000) ==0x00)
{
IOCLR1= (1<<16) | (1<<18);
IOSET1= (1<<17) | (1<<19);
Delay (30000);
IOCLR1 = (1<<16) | (1<<17) | (1<<19) | (1<<18);
Delay (1000);
IOSET1= (1<<16);
IOCLR1= (1<<17)| (1<<19)| (1<<18);
Delay (30000);
}
// IOCLR1=0X00FF0000;
Else if ((IOPIN0&0x00020000) ==0x00000000) Figure 6: Setup of Autonomous Robot
{
IOSET1= (1<<17);
IOCLR1= (1<<16)| (1<<19)| (1<<18);
}
// IOCLR1=0X00FF0000;
Else if ((IOPIN0&0x00040000) ==0x00000000)
{
IOSET1= (1<<19);
IOCLR1= (1<<16)| (1<<18)| (1<<17);
}
// IOCLR1=0X00FF0000;
Else
{
IOSET1= (1<<16)| (1<<18);
IOCLR1= (1<<17)| (1<<19);
} Figure 7: Obstacle avoidance
}
}
V. EXPERIMENTAL RESULTS
In this section, it explains the results of research
and at the same time is given the comprehensive discussion.
Figure 6-11 defines separate results with three intelligent
security system operations, in figure 6 the robot is
autonomous picks and place the object based on the user
commands. In second set fig.7, the robot avoids the obstacle
and defines a path for smooth movement of a robot. It is
carried through a wireless interface and the location and
position, movement can be easily monitored through a GSM
and wireless camera. In third set Figure 8, 9 smoke or fire is
detected. A candle was used as a fire source and the smoke
detected information was supervised and transmitted Figure 8: Smoke detection
204
Authorized licensed use limited to: Instituto Tecnologico Metropolitano ITM. Downloaded on April 29,2022 at 14:13:57 UTC from IEEE Xplore. Restrictions apply.
2018 9th IEEE Control and System Graduate Research Colloquium (ICSGRC 2018), 3 - 4 August 2018, Shah Alam, Malaysia
Figure 15: Shows the channel place for storing and observing the data in
real time
205
Authorized licensed use limited to: Instituto Tecnologico Metropolitano ITM. Downloaded on April 29,2022 at 14:13:57 UTC from IEEE Xplore. Restrictions apply.
2018 9th IEEE Control and System Graduate Research Colloquium (ICSGRC 2018), 3 - 4 August 2018, Shah Alam, Malaysia
VI. OBJECTIVE ANALYSIS every step during contribution to my work and defining me
new research findings related to the work proposed.
The system designed was evaluated through a
Technology acceptance model in determining the security REFERENCES
measures and ease of user acceptance in defining the [1] Ren C. Luo, Yi T. Chou Chung T. Liao 2007, “ NCCU security
usefulness and positive impacts of a survey practically in warrior: An Intelligent security robot system” IECON 2007- 33rd
four levels. This survey was made with thirteen people with Annual conference of the IEEE industrial electronics society.
five-point scale questions [2] Wenjiang Huang, Qingsong Guan, Juhua Luo, Jingcheng Zhang,
1. Ease of Use and perceive nature: In the first level what Jinling Zhao, Dong Liang, Linsheng Huang, and Dongyan Zhang,
“New Optimized Spectral Indices for Identifying and Monitoring
makes an individual feel about the system design and degree Winter Wheat Diseases”, IEEE journal of selected topics in applied
of freedom and comfort in learning and using this earth observation and remote sensing, Vol. 7, No. 6, June 2014
technology. [3] P. Viola and M. Jones, "Robust Real-time Object Detection,"
2. Usefulness: In this level, it is understood about how the Proceeding of IEEE Workshop on Statistical and Computational
Theories of Vision (SCTV 2001).
performance of the technology does is improved and how it
[4] Ming-Hsuan Yang, Knegman, D.J., Ahuja, N, "Detecting faces in
helps in individual needs. images: a survey," IEEE Transactions on Pattern Analysis and
3. Attitude: How do the people see the design of the system Machine Intelligence, Volume 24, Issue 1, Jan. 2002, pp.34 - 58.
which is just about the personal feeling and emotion [5] Howie Choset, Kevin Lynch, Seth Hutchinson, George Kantor,
towards the robotic unit. Wolfram Burgard, Lydia Kavraki, and Sebastian Thrun, "Principles
4. Likelihood: In this level, the system design and its future of Robot Motion, Theory, Algorithms, and implementation",(2005).
are understood in development standard and a vision [6] Sakagami, Y.; Watanabe, R; Aoyama, C, Matsunaga, S.; Higaki, N;
Fujimura, K. "The intelligent ASTMO: system overview and
defining the intention of futuristic importance. integration", International Conference on Intelligent Robots and
Table 2: sampling with different pairs of test System, 2002. IEEE/RSJ Volume 3, 30 Sept.-5 Oct. 2002 pp.2478 -
2483 vol.3
Test Mean Standard df
[7] Kaneko, K.; Kanehiro, F.; Kajita, S.; Hirukawa, H.; Kawasaki, T.;
criteria deviation Hirata, M.; Akachi, K.; Isozumi, T " Humanoid robot HRP-2,"
1 -13.000 3.6 10 International Conference on Robotics and Automation, 2004.
2 -13.400 6.03 10 Proceedings. ICRA '04. 2004 IE EE Volume 2, Apr26-May 1, 2004
Page(s): 1083 -1090 Vol.2
3 -13.000 3.28 10 [8] Ren C. Luo, Te Yi. Hsu, Po Kai. Wang, and Kuo L. Su, "Multisensors
4 -4.600 3.05 10 Based on Dynamic Navigation for an Intelligent Security Robot," The
8th International Conference on Automation Technology, May 2005,
The results obtained in table 2 indicate that 90% of people pp. 504-509(2005).
participated in the survey were able to navigate the system [9] Caldwell, D.G.; Wardle, A.; Kocak, O.; Goodwin, M, " Telepresence
and enjoyed as an intruder to the system. 60% results were feedback and input systems for a twin armed mobile robot,"
Proceeding of Robotics & Automation Magazine, IEEE Volume 3,
obtained for awareness and feeling the satisfying Issue 3, Sept. 1996 pp.
experience. 100% results for the people responsible and [10] Valdez, M.A.C., Valera, J.A.O., Jojutla, Ma. And Arteaga, O.P,
commands pressed in the movement of the robots. However, "Estimating Soc in Lead-Acid Batteries Using Neural Networks in a
this result just gives an idea of statistical awareness of the Microcontroller- Based Charge-Controller," International Joint
Conference on IJCNN '06. pp.
robotic system designed. The number of respondents is 2713-2719,16-21 July 2006.
limited to thirteen people as this user acceptance testing was [11] Martin T. Hagan, Howard B. Demuth and Mark Beale, Neural
carried out in real time. The efficiency of the results is Network Design, International Thomson Publishing Inc. 1996.
defined based on the five-point scale questions. [12] Russell, S. J. & Norvig, P. (1995). Artificial Intelligence: A Modern
Approach. Prentice-Hall. Prentice Hall. ISBN 0-13-790395-2.
VII.CONCLUSION [13] Asada, H. and Slotine, J.-J. E. (1986). Robot Analysis and Control.
In this work carried autonomous robot is defined Wiley. ISBN 0-471-83029-1.
for intelligent security applications which can perform [14] Horn, Berthold, K. P. (1986). Robot Vision. MIT Press. ISBN 0-262-
08159-8.
multitask simultaneously both in manual mode as well as
[15] Craig, J. J. (1986). Introduction to Robotics: Mechanics and Control.
the automatic mode for picking and placing an object Addison Wesley. ISBN 0-201-09528-9.
manual mode is defined likewise with automatic mode this
[16] Everett, H. R. (1995). Sensors for Mobile Robots: Theory and
work defines GSM, GPS, RF, Ultrasonic, Smoke sensor for Application. AK Peters. ISBN 1-56881-048-2.
collision avoidance, fire detection, fire alert, positioning of [17] Poole, D., Mackworth, A. and Goebel, R. (1998), Computational
the robot, displaying video for industrial, military, medical, Intelligence: A Logical Approach. Oxford University Press. ISBN 0-
pathfinding applications etc. 19-510270-3.
ACKNOWLEDGMENT
I am very much thankful to Middle East College, Muscat
for providing me lab facilities and also creating an
environment of renowned professors who helped me at
206
Authorized licensed use limited to: Instituto Tecnologico Metropolitano ITM. Downloaded on April 29,2022 at 14:13:57 UTC from IEEE Xplore. Restrictions apply.