Design of an Intelligent Combat Robot for war fields
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 8
Abstract
The objective of this paper is to minimize human casualties in terrorist attack such as 26/11. The combat robot [1] has been designed to tackle such a cruel terror attacks. This robot is radio operated, self- powered, and has all the controls like a normal car. A wireless camera has been installed on it, so that it can monitor enemy remotely when required. It can silently enter into enemy area and send us all the information through its’ tiny Camera eyes. This spy robot can be used in star hotels, shopping malls, jewellary show rooms, etc where there can be threat from intruders or terrorists. Since human life is always precious, these robots are the replacement of fighters against terrorist in war areas.
Authors and Affiliations
Dr. S. Bhargavi , S. Manjunath
Assistive Technologies for Bipolar Disorder: A Survey
Bipolar disorder is a severe mental illness characterized by periodic manic and depressive episodes. The current mode of assessment of the patient’s bipolar state is using subjective clinical diagnosis influenced by the...
The Growing Role of Complex Sensor Systems and Algorithmic Pattern Recognition for Vascular Dementia Onset
Vascular Dementia is often Clinically diagnosed once the effects of the disease are prevalent in a person’s daily living routines. However previous research has shown various behavioral and physiological changes linked t...
Securing Cognitive Radio Vehicular Ad Hoc Network with Fog Node based Distributed Blockchain Cloud Architecture
Cognitive radio, ad hoc networks' applications are continuously increasing in wireless communication globally. In vehicles' environment, cognitive radio technology with mobile ad hoc networks (MANETs) enables vehicles to...
Intelligent Hybrid Approach for Android Malware Detection based on Permissions and API Calls
Android malware is rapidly becoming a potential threat to users. The number of Android malware is growing exponentially; they become significantly sophisticated and cause potential financial and information losses for us...
Data Mining and Intrusion Detection Systems
The rapid evolution of technology and the increased connectivity among its components, imposes new cyber-security challenges. To tackle this growing trend in computer attacks and respond threats, industry professionals a...