Design of an Intelligent Combat Robot for war fields
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 8
Abstract
The objective of this paper is to minimize human casualties in terrorist attack such as 26/11. The combat robot [1] has been designed to tackle such a cruel terror attacks. This robot is radio operated, self- powered, and has all the controls like a normal car. A wireless camera has been installed on it, so that it can monitor enemy remotely when required. It can silently enter into enemy area and send us all the information through its’ tiny Camera eyes. This spy robot can be used in star hotels, shopping malls, jewellary show rooms, etc where there can be threat from intruders or terrorists. Since human life is always precious, these robots are the replacement of fighters against terrorist in war areas.
Authors and Affiliations
Dr. S. Bhargavi , S. Manjunath
Performance Analysis of Multilayer Perceptron Neural Network Models in Week-Ahead Rainfall Forecasting
Multilayer perceptron neural network (MLPNN) is considered as one of the most efficient forecasting techniques which can be implemented for the prediction of weather occurrence. As with any machine learning implementatio...
Carbon Break Even Analysis: Environmental Impact of Tablets in Higher Education
With the growing pace of tablets use and the large focus it is attracting especially in higher education, this paper looks at an important aspect of tablets; their carbon footprint. Studies have suggested that tablets ha...
Energy Efficient Camera Solution for Video Surveillance
Video surveillance is growing rapidly, new problems and issues are also coming into view which needs serious and urgent attention. Video surveillance system requires a beneficial energy efficient camera solution. In this...
Construction of FuzzyFind Dictionary using Golay Coding Transformation for Searching Applications
searching through a large volume of data is very critical for companies, scientists, and searching engines applications due to time complexity and memory complexity. In this paper, a new technique of generating FuzzyFind...
Android Platform Malware Analysis
Mobile devices have evolved from simple devices, which are used for a phone call and SMS messages to smartphone devices that can run third party applications. Nowadays, malicious software, which is also known as malware,...