SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 879
SMART MISSILE NAVIGATION IN DEFENCE SYSTEM USING RC4
ALGORITHM TO DETECT TARGET
Amruta B. Kale1
, P. C. Bhaskar2
1
M.Tech Student, Electronics engineering, Department of technology, Shivaji University, Maharashtra, India
2
Professor, Electronics engineering, Department of technology, Shivaji University, Maharashtra, India
Abstract
In today’s world enemy warfare is an important factor of any nation’s security. The national security mainly depends on army
(ground), navy (sea), air-force (air).The important and vital role is played by the army’s artillery such as missile, guns etc. This
system come up with an idea of detecting the incoming obstacle whether it is enemy or friendly with the help of higher encryption and
decryption routine using wireless module. This system develops ultrasonic based radar system which detects obstacles continuously.
To identify obstacle is friend or enemy RC4 algorithm is used which is implemented in ARM7. The main factors in RC4’s success over
such wide range applications are its speed and simplicity which efficiently implemented in both software and hardware. Ultrasonic
based radar model will rotate 360 degree with the help of DC motor.it send ultrasonic distance transmitter.PC including software to
display orientation of obstacle. If obstacle crosses the set range the transmitter will send encrypted frame to incoming unit which acts
as receiver over IR transceiver module. If decrypted frame is received from the incoming unit then the obstacle is friend.
Keywords: Ultrasonic based RADAR model, RC4 Algorithm, ARM 7, IR module, Visual Basic software
----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
Navigation is a field of study that focuses on the process of
monitoring and controlling the movement of a craft or vehicle
from one place to another. Navigation is very important in
defence system. The field of navigation includes four general
categories: land navigation, marine navigation, aeronautic
navigation, and space navigation. It is also the term of art used
for the specialized knowledge used by navigators to perform
navigation tasks. All navigational techniques involve locating
the navigator's position compared to known locations or
patterns.
Cryptography plays very important role in security system.it
keeps any data Confidential between sender and receiver so no
one can hack this data easily.
In defence system we come with idea using the combination
of navigation technique and cryptography concept for detect
target accurately. The missile's target accuracy is a critical
factor for its effectiveness. Guidance systems improve missile
accuracy by improving its "Single Shot Kill Probability"
(SSKP).The system develops ultrasonic based RADAR model
for tracking the incoming object and RC4 based Encryption
and Decryption system for detecting incoming object is friend
or enemy.
2. BACKGROUND AND RELATED WORK
In paper [1], air mine is designed to deal with various types of
planes in the civilian or air forces of the enemy. This mine is
act as a receiver which is operated by wirelessly to the
transmitter side .in this ultrasonic technique is used for object
detection. AES algorithm is implemented between transmitter
and receiver for authentication. In paper [2] as per the RC4 is
better than AES.RC4 is well suited for real time processing.it
is fast and energy efficient for encryption and decryption.
In paper [3], how to secure wireless sensor network by using
cryptography is mentioned. Authentication can be defined as a
security mechanism, whereby, the identity of a node in the
network can be identified as a valid node of the network.
Subsequently, data authenticity can be achieved; once the
integrity of the message sender/receiver has been established.
Consider the military. Secrecy is part of its nature; and data
(sensed/disseminated/stored) is required to remain
confidential. This is critical to the successful operation of a
military application. Enemy tracking and targeting are among
the most useful applications of wireless sensor networking in
military terms. The most current work can be found in the
Defence
Advanced Research Projects Agency (DARPA) website [4, 5]
In paper [6], author is proposed a mechanism based on
clustering and cryptography which is capable if detecting and
defending the DOS attacks.it provides the security in WSN
environments.
In paper [7], examines several Homeland Defence
applications, including perimeter monitoring, disaster
recovery, and counter terrorism. The wireless
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 880
communications requirements for Homeland Defence are
compared against those of unattended ground sensor systems
in an effort to identify ways in which UGS technology can be
applied to Homeland Defence applications.
In paper [8], how ultrasonic sensor work in air, detail
information of ultrasonic sensors are mentioned. Ultrasonic
sensor transform an electrical signal into ultrasonic waves and
vice versa. Same sensor is used for transmitter and receiver.in
some application it is used to calculate distance of the object.
Ultrasonic sensors is applicable in many areas, for example in
private housing, health care, defence system [1,9], traffic,
industry and engineering and science [10]
3. PROPOSED SYSTEM
Fig 1: Block diagram of system
Figure shows the block diagram of proposed system in which
top of diagram is transmitter side which consist ultrasonic
radar model for tracking obstacle, arm for encryption, LCD for
displaying obstacle is friend or enemy, and IR for transmitting
encrypted frame. The bottom part of figure is receiver side.it
consists arm for decryption, LCD for displaying output and IR
for sending decrypted frame back to the transmitter.
4. HARDWARE DESCRIPTION
Fig 2: Circuit Diagram of Transmitter side of system
Fig 3: Circuit Diagram of Receiver side of system
Here we are making an ultrasonic based Radar model. With
the help of DC motor the ultrasonic based radar model will
continuously rotate 360 degree. The ultrasonic sensor will
continuously send and receive the ultrasonic waves. The
distance is calculated using the Doppler Effect and directly
given to the ARM. The ARM receives the distance from the
ultrasonic sensor serially and transmits it to the LCD. If the
distance is less than the set point, it will automatically send a
frame to the ARM. The ARM will send encrypted frame to the
incoming obstacle via IR transceiver. Then if incoming
obstacle decrypt this frame then the obstacle is friend
otherwise it is enemy. Also PC shows the orientation of
obstacle by using visual basic software on PC
5. SOFTWARE DESCRIPTION
The signal captured from ultrasonic based radar model is to be
transmitted to transmitter .signal is to be sent to IR module
through UART. Hence once the signal is captured ARM7 is
initialized which is reference voltage 3V. This signal is then
LPC
2138
Tank
mechanism
ULTRASONIC
SENSOR
RADAR
Model
IR RX/TX
R
ra
IR RX/TX
LPC
2138
LCD 16*2
LCD 16*2
MOTOR 3
MOTOR
1
MOTOR
2
PC (VB)
R
R
rr
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 881
given to UART of ARM7 .Also, LCD is used to display word
output. All this that is initialization of UART, Timer and LCD
is done in Embedded C using Kiel µvision3.RC4 algorithm is
done in Embedded C using Kiel uvision 3 in which 256 state
and 4 bit key is used for encryption and decryption
Fig 4 Snapshot after debugging the code at transmitter side.
Fig 5 Snapshot after debugging the code at Receiver side.
6. RESULTS
 Ultrasonic based RADAR model that is
transmitter side is made which rotates 360
degree with the help of dc motor.so it tracks
the obstacle in all direction.
Fig 6: Transmitter side of the system
 In this, tracking and monitoring of obstacle is
displayed on PC by using visual basic software
as shown in figure 7.
 Different ultrasonic sensors are available which
have different ranges. Ultrasonic sensor used is
having range from 10 cm to 400 cm. We have set
250 cm range, when object crosses the range,
transmitter sends encrypted frame to the receiver.
If receiver does not send any response then
transmitter displays obstacle invalid as shown in
figure 8.
 When receiver sends response to transmitter then
receiver as shown in figure 9, will display
response sent as shown in figure 10.
 When transmitter gets response from receiver it
displays obstacle valid as shown in figure 11.
Fig 7: PC shows position of obstacle
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 882
Fig 8: LCD displays invalid object
Fig 9: Receiver side of the system
Fig 10: LCD shows receiver response
Fig 11: LCD displays valid object
7. CONCLUSIONS
This paper represents accurate tracking and authentication of
target. In this project ultrasonic based radar model tracks the
target accurately, then with the help of RC4 algorithm which
is implemented in arm7 the target is authenticated.RC4
security is depends on number of states and key used for
ciphering.RC4 is fast, and it is applicable in real time
processing. Transmission and reception between workstation
and target is done by IR transceiver.IR performs direct line of
sight transmission and it is applicable in night vision. The
position of obstacle is monitored on PC by using visual basic
software. This system is suitable where the authentication of
incoming vehicle, plane, tank etc. is necessary, boundary, and
in night situation where the incoming object cannot identified
by normal human eyes.
REFERENCES
[1]. Hussam Elbehiery” Prohibited Zones Coverage Protection
Using Aerial Mines,” IACSIT International Journal of
Engineering and Technology, Vol. 4, No. 1, February 2012
[2]. Nidhi Singhal1, J.P.S.Raina2” Comparative Analysis of
AES and RC4 Algorithms for Better Utilization,” International
Journal of Computer Trends and Technology- July to Aug
Issue 2011
[3]. David Boyle” Securing Wireless Sensor Networks:
Security Architectures,” JOURNAL OF NETWORKS, VOL.
3, NO. 1, JANUARY 2008
[4]. Perrig, A., Stankovic, J., Wagner, D. (2004), “Security in
Wireless Sensor Networks”, Communications of the ACM,
47(6), 53-57.
[5]. Defense Advanced Research Projects Agency (13 Oct
2006) Defense Advanced Research Projects Agency Home
[online], available: http://www.darpa.mil/index.html [accessed
26 July 2007]
[6]. Dines Kumar.V.S, Navaneethan.C” Protection Against
Denial of Service (DoS) Attacks in Wireless Sensor
Networks,” International Journal of Advanced Research in
Computer Science & Technology (IJARCST 2014)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 883
[7]. Thomas J. Bruns, Raymond J. O’Connell, Jeffrey S.
Wells, and Mark Dapper” Unattended Ground Sensor (UGS)
Systems for Homeland Defense,”
[8]. Valentin Magori” Ultrasonic Sensors in Air,”
[9]. MANSOOR-UL-HASSAN SIDDIQUE” Ultrasonic Radar
and Its Applications,” Proceedings of the 9th WSEAS
International Conference on APPLIED INFORMATICS AND
COMMUNICATIONS (AIC '09).
[10]. Ikuo Ihara” Ultrasonic Sensing: Fundamentals and Its
Applications to Non-destructive Evaluation (a draft),”

Más contenido relacionado

La actualidad más candente

IRJET- Survey on Wireless Body Area Network Security Algorithms
IRJET- Survey on Wireless Body Area Network Security AlgorithmsIRJET- Survey on Wireless Body Area Network Security Algorithms
IRJET- Survey on Wireless Body Area Network Security AlgorithmsIRJET Journal
 
IRJET- Signal Jammer in Military Operations
IRJET-  	  Signal Jammer in Military OperationsIRJET-  	  Signal Jammer in Military Operations
IRJET- Signal Jammer in Military OperationsIRJET Journal
 
Wireless Network For Strategic Boundary Supervision System
Wireless Network For Strategic Boundary Supervision SystemWireless Network For Strategic Boundary Supervision System
Wireless Network For Strategic Boundary Supervision SystemjournalBEEI
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingIJMER
 
IRJET- Smart Accident Detection and Emergency Notification System using IoT a...
IRJET- Smart Accident Detection and Emergency Notification System using IoT a...IRJET- Smart Accident Detection and Emergency Notification System using IoT a...
IRJET- Smart Accident Detection and Emergency Notification System using IoT a...IRJET Journal
 
On line condition monitoring systems using wireless sensors and
On line condition monitoring systems using wireless sensors andOn line condition monitoring systems using wireless sensors and
On line condition monitoring systems using wireless sensors andMustafa Khan
 
Collision Avoidance of Trains Using Arm7
Collision Avoidance of Trains Using Arm7Collision Avoidance of Trains Using Arm7
Collision Avoidance of Trains Using Arm7IJERA Editor
 
Case study of wireless sensor network
Case study of wireless sensor networkCase study of wireless sensor network
Case study of wireless sensor networkSushil Aggarwal
 
IRJET- Mobile Detector
IRJET-  	  Mobile DetectorIRJET-  	  Mobile Detector
IRJET- Mobile DetectorIRJET Journal
 
Intelligent vehicle control based on identification of
Intelligent vehicle control based on identification ofIntelligent vehicle control based on identification of
Intelligent vehicle control based on identification ofeSAT Publishing House
 
Vehicle Security System
Vehicle Security SystemVehicle Security System
Vehicle Security SystemVISHAL DONGA
 

La actualidad más candente (16)

IRJET- Survey on Wireless Body Area Network Security Algorithms
IRJET- Survey on Wireless Body Area Network Security AlgorithmsIRJET- Survey on Wireless Body Area Network Security Algorithms
IRJET- Survey on Wireless Body Area Network Security Algorithms
 
IRJET- Signal Jammer in Military Operations
IRJET-  	  Signal Jammer in Military OperationsIRJET-  	  Signal Jammer in Military Operations
IRJET- Signal Jammer in Military Operations
 
ULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY Pi
ULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY PiULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY Pi
ULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY Pi
 
Wireless Network For Strategic Boundary Supervision System
Wireless Network For Strategic Boundary Supervision SystemWireless Network For Strategic Boundary Supervision System
Wireless Network For Strategic Boundary Supervision System
 
HERFBUS1
HERFBUS1HERFBUS1
HERFBUS1
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
IRJET- Smart Accident Detection and Emergency Notification System using IoT a...
IRJET- Smart Accident Detection and Emergency Notification System using IoT a...IRJET- Smart Accident Detection and Emergency Notification System using IoT a...
IRJET- Smart Accident Detection and Emergency Notification System using IoT a...
 
Excellent cns
Excellent  cnsExcellent  cns
Excellent cns
 
On line condition monitoring systems using wireless sensors and
On line condition monitoring systems using wireless sensors andOn line condition monitoring systems using wireless sensors and
On line condition monitoring systems using wireless sensors and
 
Collision Avoidance of Trains Using Arm7
Collision Avoidance of Trains Using Arm7Collision Avoidance of Trains Using Arm7
Collision Avoidance of Trains Using Arm7
 
Case study of wireless sensor network
Case study of wireless sensor networkCase study of wireless sensor network
Case study of wireless sensor network
 
Facts seminar
Facts seminarFacts seminar
Facts seminar
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
IRJET- Mobile Detector
IRJET-  	  Mobile DetectorIRJET-  	  Mobile Detector
IRJET- Mobile Detector
 
Intelligent vehicle control based on identification of
Intelligent vehicle control based on identification ofIntelligent vehicle control based on identification of
Intelligent vehicle control based on identification of
 
Vehicle Security System
Vehicle Security SystemVehicle Security System
Vehicle Security System
 

Destacado

A survey on efficient no reference blur estimation
A survey on efficient no reference blur estimationA survey on efficient no reference blur estimation
A survey on efficient no reference blur estimationeSAT Publishing House
 
A study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinearA study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlineareSAT Publishing House
 
Study of shear walls in multistoried buildings with different thickness and r...
Study of shear walls in multistoried buildings with different thickness and r...Study of shear walls in multistoried buildings with different thickness and r...
Study of shear walls in multistoried buildings with different thickness and r...eSAT Publishing House
 
Qoe enhanced social live interactive streaming
Qoe enhanced social live interactive streamingQoe enhanced social live interactive streaming
Qoe enhanced social live interactive streamingeSAT Publishing House
 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallseSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Publishing House
 
Optimization of extrusion process for production of
Optimization of extrusion process for production ofOptimization of extrusion process for production of
Optimization of extrusion process for production ofeSAT Publishing House
 
Experimental study of weld characteristics during friction stir welding (fsw)...
Experimental study of weld characteristics during friction stir welding (fsw)...Experimental study of weld characteristics during friction stir welding (fsw)...
Experimental study of weld characteristics during friction stir welding (fsw)...eSAT Publishing House
 
Literature survey for 3 d reconstruction of brain mri
Literature survey for 3 d reconstruction of brain mriLiterature survey for 3 d reconstruction of brain mri
Literature survey for 3 d reconstruction of brain mrieSAT Publishing House
 
Optimization of 3 d geometrical soil model for
Optimization of 3 d geometrical soil model forOptimization of 3 d geometrical soil model for
Optimization of 3 d geometrical soil model foreSAT Publishing House
 
Frequency regulation of deregulated power system
Frequency regulation of deregulated power systemFrequency regulation of deregulated power system
Frequency regulation of deregulated power systemeSAT Publishing House
 
Study on the effects of ceramic particulates (sic, al2 o3
Study on the effects of ceramic particulates (sic, al2 o3Study on the effects of ceramic particulates (sic, al2 o3
Study on the effects of ceramic particulates (sic, al2 o3eSAT Publishing House
 
Compressed sensing system for efficient ecg signal
Compressed sensing system for efficient ecg signalCompressed sensing system for efficient ecg signal
Compressed sensing system for efficient ecg signaleSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Voltage sag mitigation using supercapacitor based dynamic voltage restorer
Voltage sag mitigation using supercapacitor based dynamic voltage restorerVoltage sag mitigation using supercapacitor based dynamic voltage restorer
Voltage sag mitigation using supercapacitor based dynamic voltage restorereSAT Publishing House
 
An enhanced mppt technique for small scale
An enhanced mppt technique for small scaleAn enhanced mppt technique for small scale
An enhanced mppt technique for small scaleeSAT Publishing House
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
 
Detection of hazard prone areas in the upper himalayan region in gis environment
Detection of hazard prone areas in the upper himalayan region in gis environmentDetection of hazard prone areas in the upper himalayan region in gis environment
Detection of hazard prone areas in the upper himalayan region in gis environmenteSAT Publishing House
 
Simulation and performance analysis of blast
Simulation and performance analysis of blastSimulation and performance analysis of blast
Simulation and performance analysis of blasteSAT Publishing House
 
Investigation on multi cylinder s.i engine using blends of hydrogen and cng
Investigation on multi cylinder s.i engine using blends of hydrogen and cngInvestigation on multi cylinder s.i engine using blends of hydrogen and cng
Investigation on multi cylinder s.i engine using blends of hydrogen and cngeSAT Publishing House
 

Destacado (20)

A survey on efficient no reference blur estimation
A survey on efficient no reference blur estimationA survey on efficient no reference blur estimation
A survey on efficient no reference blur estimation
 
A study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinearA study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinear
 
Study of shear walls in multistoried buildings with different thickness and r...
Study of shear walls in multistoried buildings with different thickness and r...Study of shear walls in multistoried buildings with different thickness and r...
Study of shear walls in multistoried buildings with different thickness and r...
 
Qoe enhanced social live interactive streaming
Qoe enhanced social live interactive streamingQoe enhanced social live interactive streaming
Qoe enhanced social live interactive streaming
 
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewallsGeometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewalls
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Optimization of extrusion process for production of
Optimization of extrusion process for production ofOptimization of extrusion process for production of
Optimization of extrusion process for production of
 
Experimental study of weld characteristics during friction stir welding (fsw)...
Experimental study of weld characteristics during friction stir welding (fsw)...Experimental study of weld characteristics during friction stir welding (fsw)...
Experimental study of weld characteristics during friction stir welding (fsw)...
 
Literature survey for 3 d reconstruction of brain mri
Literature survey for 3 d reconstruction of brain mriLiterature survey for 3 d reconstruction of brain mri
Literature survey for 3 d reconstruction of brain mri
 
Optimization of 3 d geometrical soil model for
Optimization of 3 d geometrical soil model forOptimization of 3 d geometrical soil model for
Optimization of 3 d geometrical soil model for
 
Frequency regulation of deregulated power system
Frequency regulation of deregulated power systemFrequency regulation of deregulated power system
Frequency regulation of deregulated power system
 
Study on the effects of ceramic particulates (sic, al2 o3
Study on the effects of ceramic particulates (sic, al2 o3Study on the effects of ceramic particulates (sic, al2 o3
Study on the effects of ceramic particulates (sic, al2 o3
 
Compressed sensing system for efficient ecg signal
Compressed sensing system for efficient ecg signalCompressed sensing system for efficient ecg signal
Compressed sensing system for efficient ecg signal
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Voltage sag mitigation using supercapacitor based dynamic voltage restorer
Voltage sag mitigation using supercapacitor based dynamic voltage restorerVoltage sag mitigation using supercapacitor based dynamic voltage restorer
Voltage sag mitigation using supercapacitor based dynamic voltage restorer
 
An enhanced mppt technique for small scale
An enhanced mppt technique for small scaleAn enhanced mppt technique for small scale
An enhanced mppt technique for small scale
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Detection of hazard prone areas in the upper himalayan region in gis environment
Detection of hazard prone areas in the upper himalayan region in gis environmentDetection of hazard prone areas in the upper himalayan region in gis environment
Detection of hazard prone areas in the upper himalayan region in gis environment
 
Simulation and performance analysis of blast
Simulation and performance analysis of blastSimulation and performance analysis of blast
Simulation and performance analysis of blast
 
Investigation on multi cylinder s.i engine using blends of hydrogen and cng
Investigation on multi cylinder s.i engine using blends of hydrogen and cngInvestigation on multi cylinder s.i engine using blends of hydrogen and cng
Investigation on multi cylinder s.i engine using blends of hydrogen and cng
 

Similar a Smart missile navigation in defence system using rc4 algorithm to detect target

IRJET- Location Monitoring System for Maritime Security using RSSI Technology
IRJET- Location Monitoring System for Maritime Security using RSSI TechnologyIRJET- Location Monitoring System for Maritime Security using RSSI Technology
IRJET- Location Monitoring System for Maritime Security using RSSI TechnologyIRJET Journal
 
Quadcopter (uavs) for border security with gui system
Quadcopter (uavs) for border security with gui systemQuadcopter (uavs) for border security with gui system
Quadcopter (uavs) for border security with gui systemeSAT Journals
 
Quadcopter (uavs) for border security with gui system
Quadcopter (uavs) for border security with gui systemQuadcopter (uavs) for border security with gui system
Quadcopter (uavs) for border security with gui systemeSAT Publishing House
 
IRJET- An Un-Hackable Security based Software Defined Radio using Wireles...
IRJET-  	  An Un-Hackable Security based Software Defined Radio using Wireles...IRJET-  	  An Un-Hackable Security based Software Defined Radio using Wireles...
IRJET- An Un-Hackable Security based Software Defined Radio using Wireles...IRJET Journal
 
Object collision avoidance with train using android
Object collision avoidance with train using androidObject collision avoidance with train using android
Object collision avoidance with train using androideSAT Publishing House
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...srinivasanece7
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...srinivasanece7
 
AUTOMATIC REAL-TIME RAILWAY FISHPLATE MONITORINGSYSTEM FOR EARLY WARNING USIN...
AUTOMATIC REAL-TIME RAILWAY FISHPLATE MONITORINGSYSTEM FOR EARLY WARNING USIN...AUTOMATIC REAL-TIME RAILWAY FISHPLATE MONITORINGSYSTEM FOR EARLY WARNING USIN...
AUTOMATIC REAL-TIME RAILWAY FISHPLATE MONITORINGSYSTEM FOR EARLY WARNING USIN...IRJET Journal
 
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...IRJET Journal
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET Journal
 
IRJET- Landmines Detection using UAV
IRJET- Landmines Detection using UAVIRJET- Landmines Detection using UAV
IRJET- Landmines Detection using UAVIRJET Journal
 
Automatic Object Detection and Target using Ultrasonic Sensor
Automatic Object Detection and Target using Ultrasonic SensorAutomatic Object Detection and Target using Ultrasonic Sensor
Automatic Object Detection and Target using Ultrasonic SensorIRJET Journal
 
Crowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiverCrowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receivereSAT Journals
 
Crowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiverCrowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receivereSAT Publishing House
 
Invalidating vulnerable broadcaster nodes using
Invalidating vulnerable broadcaster nodes usingInvalidating vulnerable broadcaster nodes using
Invalidating vulnerable broadcaster nodes usingeSAT Publishing House
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 

Similar a Smart missile navigation in defence system using rc4 algorithm to detect target (20)

IRJET- Location Monitoring System for Maritime Security using RSSI Technology
IRJET- Location Monitoring System for Maritime Security using RSSI TechnologyIRJET- Location Monitoring System for Maritime Security using RSSI Technology
IRJET- Location Monitoring System for Maritime Security using RSSI Technology
 
Quadcopter (uavs) for border security with gui system
Quadcopter (uavs) for border security with gui systemQuadcopter (uavs) for border security with gui system
Quadcopter (uavs) for border security with gui system
 
Quadcopter (uavs) for border security with gui system
Quadcopter (uavs) for border security with gui systemQuadcopter (uavs) for border security with gui system
Quadcopter (uavs) for border security with gui system
 
IRJET- An Un-Hackable Security based Software Defined Radio using Wireles...
IRJET-  	  An Un-Hackable Security based Software Defined Radio using Wireles...IRJET-  	  An Un-Hackable Security based Software Defined Radio using Wireles...
IRJET- An Un-Hackable Security based Software Defined Radio using Wireles...
 
Object collision avoidance with train using android
Object collision avoidance with train using androidObject collision avoidance with train using android
Object collision avoidance with train using android
 
A0550110
A0550110A0550110
A0550110
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
 
AUTOMATIC REAL-TIME RAILWAY FISHPLATE MONITORINGSYSTEM FOR EARLY WARNING USIN...
AUTOMATIC REAL-TIME RAILWAY FISHPLATE MONITORINGSYSTEM FOR EARLY WARNING USIN...AUTOMATIC REAL-TIME RAILWAY FISHPLATE MONITORINGSYSTEM FOR EARLY WARNING USIN...
AUTOMATIC REAL-TIME RAILWAY FISHPLATE MONITORINGSYSTEM FOR EARLY WARNING USIN...
 
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
 
IRJET- Landmines Detection using UAV
IRJET- Landmines Detection using UAVIRJET- Landmines Detection using UAV
IRJET- Landmines Detection using UAV
 
Automatic Object Detection and Target using Ultrasonic Sensor
Automatic Object Detection and Target using Ultrasonic SensorAutomatic Object Detection and Target using Ultrasonic Sensor
Automatic Object Detection and Target using Ultrasonic Sensor
 
RADAR SYSTEM
RADAR SYSTEMRADAR SYSTEM
RADAR SYSTEM
 
Crowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiverCrowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiver
 
Crowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiverCrowd control system using ir transmitter and receiver
Crowd control system using ir transmitter and receiver
 
Invalidating vulnerable broadcaster nodes using
Invalidating vulnerable broadcaster nodes usingInvalidating vulnerable broadcaster nodes using
Invalidating vulnerable broadcaster nodes using
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 

Más de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housingeSAT Publishing House
 

Más de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housing
 

Último

Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 

Último (20)

(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 

Smart missile navigation in defence system using rc4 algorithm to detect target

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 879 SMART MISSILE NAVIGATION IN DEFENCE SYSTEM USING RC4 ALGORITHM TO DETECT TARGET Amruta B. Kale1 , P. C. Bhaskar2 1 M.Tech Student, Electronics engineering, Department of technology, Shivaji University, Maharashtra, India 2 Professor, Electronics engineering, Department of technology, Shivaji University, Maharashtra, India Abstract In today’s world enemy warfare is an important factor of any nation’s security. The national security mainly depends on army (ground), navy (sea), air-force (air).The important and vital role is played by the army’s artillery such as missile, guns etc. This system come up with an idea of detecting the incoming obstacle whether it is enemy or friendly with the help of higher encryption and decryption routine using wireless module. This system develops ultrasonic based radar system which detects obstacles continuously. To identify obstacle is friend or enemy RC4 algorithm is used which is implemented in ARM7. The main factors in RC4’s success over such wide range applications are its speed and simplicity which efficiently implemented in both software and hardware. Ultrasonic based radar model will rotate 360 degree with the help of DC motor.it send ultrasonic distance transmitter.PC including software to display orientation of obstacle. If obstacle crosses the set range the transmitter will send encrypted frame to incoming unit which acts as receiver over IR transceiver module. If decrypted frame is received from the incoming unit then the obstacle is friend. Keywords: Ultrasonic based RADAR model, RC4 Algorithm, ARM 7, IR module, Visual Basic software ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Navigation is a field of study that focuses on the process of monitoring and controlling the movement of a craft or vehicle from one place to another. Navigation is very important in defence system. The field of navigation includes four general categories: land navigation, marine navigation, aeronautic navigation, and space navigation. It is also the term of art used for the specialized knowledge used by navigators to perform navigation tasks. All navigational techniques involve locating the navigator's position compared to known locations or patterns. Cryptography plays very important role in security system.it keeps any data Confidential between sender and receiver so no one can hack this data easily. In defence system we come with idea using the combination of navigation technique and cryptography concept for detect target accurately. The missile's target accuracy is a critical factor for its effectiveness. Guidance systems improve missile accuracy by improving its "Single Shot Kill Probability" (SSKP).The system develops ultrasonic based RADAR model for tracking the incoming object and RC4 based Encryption and Decryption system for detecting incoming object is friend or enemy. 2. BACKGROUND AND RELATED WORK In paper [1], air mine is designed to deal with various types of planes in the civilian or air forces of the enemy. This mine is act as a receiver which is operated by wirelessly to the transmitter side .in this ultrasonic technique is used for object detection. AES algorithm is implemented between transmitter and receiver for authentication. In paper [2] as per the RC4 is better than AES.RC4 is well suited for real time processing.it is fast and energy efficient for encryption and decryption. In paper [3], how to secure wireless sensor network by using cryptography is mentioned. Authentication can be defined as a security mechanism, whereby, the identity of a node in the network can be identified as a valid node of the network. Subsequently, data authenticity can be achieved; once the integrity of the message sender/receiver has been established. Consider the military. Secrecy is part of its nature; and data (sensed/disseminated/stored) is required to remain confidential. This is critical to the successful operation of a military application. Enemy tracking and targeting are among the most useful applications of wireless sensor networking in military terms. The most current work can be found in the Defence Advanced Research Projects Agency (DARPA) website [4, 5] In paper [6], author is proposed a mechanism based on clustering and cryptography which is capable if detecting and defending the DOS attacks.it provides the security in WSN environments. In paper [7], examines several Homeland Defence applications, including perimeter monitoring, disaster recovery, and counter terrorism. The wireless
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 880 communications requirements for Homeland Defence are compared against those of unattended ground sensor systems in an effort to identify ways in which UGS technology can be applied to Homeland Defence applications. In paper [8], how ultrasonic sensor work in air, detail information of ultrasonic sensors are mentioned. Ultrasonic sensor transform an electrical signal into ultrasonic waves and vice versa. Same sensor is used for transmitter and receiver.in some application it is used to calculate distance of the object. Ultrasonic sensors is applicable in many areas, for example in private housing, health care, defence system [1,9], traffic, industry and engineering and science [10] 3. PROPOSED SYSTEM Fig 1: Block diagram of system Figure shows the block diagram of proposed system in which top of diagram is transmitter side which consist ultrasonic radar model for tracking obstacle, arm for encryption, LCD for displaying obstacle is friend or enemy, and IR for transmitting encrypted frame. The bottom part of figure is receiver side.it consists arm for decryption, LCD for displaying output and IR for sending decrypted frame back to the transmitter. 4. HARDWARE DESCRIPTION Fig 2: Circuit Diagram of Transmitter side of system Fig 3: Circuit Diagram of Receiver side of system Here we are making an ultrasonic based Radar model. With the help of DC motor the ultrasonic based radar model will continuously rotate 360 degree. The ultrasonic sensor will continuously send and receive the ultrasonic waves. The distance is calculated using the Doppler Effect and directly given to the ARM. The ARM receives the distance from the ultrasonic sensor serially and transmits it to the LCD. If the distance is less than the set point, it will automatically send a frame to the ARM. The ARM will send encrypted frame to the incoming obstacle via IR transceiver. Then if incoming obstacle decrypt this frame then the obstacle is friend otherwise it is enemy. Also PC shows the orientation of obstacle by using visual basic software on PC 5. SOFTWARE DESCRIPTION The signal captured from ultrasonic based radar model is to be transmitted to transmitter .signal is to be sent to IR module through UART. Hence once the signal is captured ARM7 is initialized which is reference voltage 3V. This signal is then LPC 2138 Tank mechanism ULTRASONIC SENSOR RADAR Model IR RX/TX R ra IR RX/TX LPC 2138 LCD 16*2 LCD 16*2 MOTOR 3 MOTOR 1 MOTOR 2 PC (VB) R R rr
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 881 given to UART of ARM7 .Also, LCD is used to display word output. All this that is initialization of UART, Timer and LCD is done in Embedded C using Kiel µvision3.RC4 algorithm is done in Embedded C using Kiel uvision 3 in which 256 state and 4 bit key is used for encryption and decryption Fig 4 Snapshot after debugging the code at transmitter side. Fig 5 Snapshot after debugging the code at Receiver side. 6. RESULTS  Ultrasonic based RADAR model that is transmitter side is made which rotates 360 degree with the help of dc motor.so it tracks the obstacle in all direction. Fig 6: Transmitter side of the system  In this, tracking and monitoring of obstacle is displayed on PC by using visual basic software as shown in figure 7.  Different ultrasonic sensors are available which have different ranges. Ultrasonic sensor used is having range from 10 cm to 400 cm. We have set 250 cm range, when object crosses the range, transmitter sends encrypted frame to the receiver. If receiver does not send any response then transmitter displays obstacle invalid as shown in figure 8.  When receiver sends response to transmitter then receiver as shown in figure 9, will display response sent as shown in figure 10.  When transmitter gets response from receiver it displays obstacle valid as shown in figure 11. Fig 7: PC shows position of obstacle
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 882 Fig 8: LCD displays invalid object Fig 9: Receiver side of the system Fig 10: LCD shows receiver response Fig 11: LCD displays valid object 7. CONCLUSIONS This paper represents accurate tracking and authentication of target. In this project ultrasonic based radar model tracks the target accurately, then with the help of RC4 algorithm which is implemented in arm7 the target is authenticated.RC4 security is depends on number of states and key used for ciphering.RC4 is fast, and it is applicable in real time processing. Transmission and reception between workstation and target is done by IR transceiver.IR performs direct line of sight transmission and it is applicable in night vision. The position of obstacle is monitored on PC by using visual basic software. This system is suitable where the authentication of incoming vehicle, plane, tank etc. is necessary, boundary, and in night situation where the incoming object cannot identified by normal human eyes. REFERENCES [1]. Hussam Elbehiery” Prohibited Zones Coverage Protection Using Aerial Mines,” IACSIT International Journal of Engineering and Technology, Vol. 4, No. 1, February 2012 [2]. Nidhi Singhal1, J.P.S.Raina2” Comparative Analysis of AES and RC4 Algorithms for Better Utilization,” International Journal of Computer Trends and Technology- July to Aug Issue 2011 [3]. David Boyle” Securing Wireless Sensor Networks: Security Architectures,” JOURNAL OF NETWORKS, VOL. 3, NO. 1, JANUARY 2008 [4]. Perrig, A., Stankovic, J., Wagner, D. (2004), “Security in Wireless Sensor Networks”, Communications of the ACM, 47(6), 53-57. [5]. Defense Advanced Research Projects Agency (13 Oct 2006) Defense Advanced Research Projects Agency Home [online], available: http://www.darpa.mil/index.html [accessed 26 July 2007] [6]. Dines Kumar.V.S, Navaneethan.C” Protection Against Denial of Service (DoS) Attacks in Wireless Sensor Networks,” International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014)
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 883 [7]. Thomas J. Bruns, Raymond J. O’Connell, Jeffrey S. Wells, and Mark Dapper” Unattended Ground Sensor (UGS) Systems for Homeland Defense,” [8]. Valentin Magori” Ultrasonic Sensors in Air,” [9]. MANSOOR-UL-HASSAN SIDDIQUE” Ultrasonic Radar and Its Applications,” Proceedings of the 9th WSEAS International Conference on APPLIED INFORMATICS AND COMMUNICATIONS (AIC '09). [10]. Ikuo Ihara” Ultrasonic Sensing: Fundamentals and Its Applications to Non-destructive Evaluation (a draft),”