MARINE COASTAL PERIMETER INTRUSION DETECTION SYSTEM
#1

[attachment=10076]
MARINE COASTAL PERIMETER INTRUSION DETECTION SYSTEM
ABSTRACT

In November last year, 10 heavily armed terrorists who India says came from
Pakistan sailed into Indian waters by giving the slip to Coast Guard officials with the help
of fake identity cards
Upon hearing these kind of news one is forced to think about the various means
and options to contribute in the effort to stop the unauthorized entry in our national
waters. This will not only strengthen the security of the country but will also give a sense
of being secured to the residents.
INTRODUCTION
Here we propose a mechanism in which every boat entering into national waters
and exiting into international water will be required to undergo a scrutiny check and
will be accounted for. For this we suggest that there will be only limited points of entry
and exits and all other points will be continuously monitored for any unlawful entry and
exit. Here the boat will be identified by means of RFID tags. Also at these entry and exit
points we propose to capture an image of the captain of the boat by means of a Webcam
and will be stored for later references. For all other points there should be continuous
patrolling of the coastal guards. However, India has a coastline of 7,517 km and has 13
coastal states bound by the Indian Ocean on the south, the Arabian Sea on the west, and
the Bay of Bengal on the east, so it becomes extremely difficult to monitor the entire
coastline by patrolling. To counter this problem we propose a mechanism (detectors) for
onnecting the entire coastline with a reflective type sensor (PIR) (Passive Infra Red)
or LOS (Line Of Sight) LASER (Light Amplification through Stimulated Emission of
Radiation) sensors.
MAIN COMPONETS
1. Detector

These ‘detectors’ will be continuously monitoring the coastline and will inform the nearest patrolling coastguard ship of any intrusion that is detected. This will be achieved by sending messages to the coastguard ship by RF transmitter. In the proposed model we will be using a transceiver with 150ft of data transmission, however in the real life scenario we will be required to send information over several miles.
If this mechanism is introduced it will not only stop the infiltration by the
terrorists but smuggling of drugs and other items.
Considering another scenario, the coast guards ships which are supposed to keep patrolling might be required to enter international waters legally. But the moment they try to do so, the sensors will immediately get activated and will give alarm in these cases too.
To solve such cases we will be connecting a receiver in the ‘detectors’ which will be used to deactivate the ‘detectors’ when the legitimate boats needs to be crossing the borders and can be reactivated once the transit is completed.
2. RFID Reader
The RFID reader consists of a 125 KHz oscillator that allows interrogation of
the RFID transponder. The information in the transponder is relayed via the reader to a
PC through a serial interface. The RFID transponder will transmit the ID codes without
making physical contact with the reader. This non-contact method of ID code reading
will allow non-invasive, non-intrusive identification process. Additionally, the RFID
transponder has the advantage of being immune to dust, dirt, grease, paint and any other
contaminant found in everyday life that generally affect older methods of identification
like barcodes and human readable lettering.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: marine electrical seminar, marine engineering harrington, marine, college of marine biology, marine coastal perimeter intrusion detection system project, coastal safety training, cummins marine power,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ULTRASONIC TECHNIQUES FOR HIDDEN CORROSION DETECTION IN AIRCRAFT WING SKIN smart paper boy 2 3,088 13-04-2017, 03:53 PM
Last Post: jaseela123d
  WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS seminar class 7 18,948 17-08-2016, 09:23 AM
Last Post: jaseela123d
  Brain Tumour Detection Using Water shedding and basic Image Processing Techniques smart paper boy 2 3,061 01-08-2015, 02:53 PM
Last Post: seminar report asees
  MOBILE DETECTION AND JAMMING computer science crazy 14 12,408 13-11-2013, 05:35 AM
Last Post: Guest
  AUTOMATIC ENERGY SAVING SYSTEM WITH HUMAN HEAT DETECTION smart paper boy 11 7,083 27-08-2013, 10:41 AM
Last Post: computer topic
  AUTOMATED TOLL COLLECTION AND ALCHCOL DETECTION USING PSOC full report project topics 6 7,344 08-04-2013, 03:28 PM
Last Post: computer topic
  AUTOMATIC VEHICLE ACCIDENT DETECTION AND MESSAGING SYSTEM USING GSM AND GPS MODEM smart paper boy 14 10,759 02-01-2013, 06:16 PM
Last Post: naidu sai
  ADAPTIVE TECHNIQUES BASED HIGH IMPULSIVE NOISE DETECTION AND REDUCTION OF A DIGITAL smart paper boy 1 1,933 05-12-2012, 03:58 PM
Last Post: seminar details
  ECG SIGNAL ANALYSIS: ENHANCEMENT AND R-PEAK DETECTION science projects buddy 5 2,769 08-11-2012, 01:35 PM
Last Post: seminar details
  BICYCLE AND PEDESTRIAN DETECTION seminar class 1 1,462 06-11-2012, 01:08 PM
Last Post: seminar details

Forum Jump: