Publication Type:

Conference Paper

Source:

2010 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2010, Coimbatore, p.389-393 (2010)

ISBN:

9781424459674

URL:

http://www.scopus.com/inward/record.url?eid=2-s2.0-79951797071&partnerID=40&md5=e4258febb7f772f3df5bf01aa579c29e

Keywords:

Artificial intelligence, Base stations, Computer applications, Data handling, Data processing and analysis, Direction of the movement, Human intruders, Infrared, Internal security, Intruder, MICAz Sensor node, Military applications, Moving objects, Object Tracking, Passive infrared, PIR, Sensor nodes, Sensors, Specific areas, Target tracking, Telecommunication equipment, Tracking (position), Wireless networks

Abstract:

Nowadays, almost all the countries are facing threats from terrorists and intruders from their border areas, challenging the internal security of the country in those areas. So many civilian and military applications require locating an intruder in a secured area. Target tracking, data processing and analysis play a major role in this type of applications. The proposed system is to develop a centralized computer application that needs to identify moving objects in a specific area using sensors. The system will be basically designed to detect human intruders. The objective is to design and implement an object tracking system using a wireless sensor network. This application is able to detect and track objects, and report direction and speed of the intruder to a central base station. The human intruder is detected using a passive infrared (PIR) sensor. The sensor is connected to a MICAz sensor node. The PIR sensor is able to detect the humans and provide information about the direction of the movement. The gathered information from the sensor network is to be given to the base station for processing. The proposed system provides an environment for easy deployment and which does not require any existing infrastructure or constant monitoring by humans. © 2010 IEEE.

Notes:

cited By (since 1996)0; Conference of org.apache.xalan.xsltc.dom.DOMAdapter@7be8a7a4 ; Conference Date: org.apache.xalan.xsltc.dom.DOMAdapter@67563f89 Through org.apache.xalan.xsltc.dom.DOMAdapter@4f65705f; Conference Code:83872

Cite this Research Publication

R. C. Jisha, Ramesh, M. V., and Lekshmi, G. S., “Intruder tracking using wireless sensor network”, in 2010 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2010, Coimbatore, 2010, pp. 389-393.