Spy Man Report 1

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 28

SYPMAN

Chapter 1

INTRODUCTION
In this chapter, we are going to give the introduction about the Autonomous robotic
system.

1.1 Introduction
Autonomous robotic system is an outstanding innovation of a modern technology. It has
been able to provide significant support to mankind by accomplishing arduous tasks that are
apparently in feasible for human beings to perform.

The proposed embedded robotic system detects human body and metal in the
catastrophic environments which is very helpful for rescue operations and military
operations. Robots are becoming more and more intelligent as technology advances in the
areas of CPU speed, sensors, memories etc. And there is ever demanding applications even in
defence. With the rapid growth of the Internet, more and more intelligent devices or systems
have been embedded into it for service, security and entertainment, including distributed
computer systems, surveillance cameras, telescopes, manipulators and mobile robots.
Although the notion of Internet robotics or web-based robotics is relatively new and also
allows to be trained in lot less time as compared to humans. The proposed system uses
various sensors to detect alive various services are deployed for rescue operations. In order to
increase the probability of saving lives of the victim, the rescue operation needs to be faster.
But, sometimes, it is difficult for rescue personnel to enter into some parts/areas of the War
field so here robots can be used.

1.2 Problem Statement


Less number of youth joining the army and increase in the death toll of soldiers in Line of
Control (LOC) is one of the major problems that the central government is facing today. In
India major military operations are occurring mostly in the North Western States and one of
the main problems that the army commandos are facing is the climatic condition. This robot
will have help to replace robots human at war and also it’s cost effective.

Dept. of CSE, MITE, Moodabidri Page1


SYPMAN

1.3 Objectives
 This android app based military robo aims to save the life of the soldiers during wars.
This is a spy robo which very smaller in size and cannot be easily recognized by the
enemies.
 This robot can be controlled wirelessly from a distant place by the soldiers using an
android application that can be installed in any android platform. In order to monitor
the opponents movement it is incorporated with a wireless camera and can take pics
of various instances at enemy sides.

1.4 Scope
The Prototype developed here would be a milestone for further research and
development in the Indian Army. It is economically feasible for implementing in large scale.

1.5 Organization of the Report


 Chapter-1: of this document describes the literature survey. It provides details about the
existing system, the limitations that the existing system experiences and the proposed
system for the project.
 Chapter-2: of this document describes the literature survey. It provides details about the
existing system the limitations the existing system experiences and the proposed system
for the project
 Chapter-3: of this document describes the System Requirements Specification. It includes
overall description and specific requirements. The overall requirement is further classified
as product perspective, product functions, user classes and characteristics, design and
implementation constraints, assumptions and dependencies. Specific requirements are
classified as hardware requirements, software requirements, functional requirements and
non-functional requirements.
 Chapter-4: is the Gantt chart which is a bar chart showing the project schedule.
 Chapter-5: is concerned with the System Design. It includes the architectural diagram, the
class diagram, the use case diagram and description, sequence diagram, activity diagram
and data flow diagram.

Dept. of CSE, MITE, Moodabidri Page2


SYPMAN

 Chapter-6: Describes the Implementation. It includes a detailed description about how the
project is been implemented.
 Chapter-7: Describes the Testing where the proposed system is tested in various levels
like unit test, integration test and system test and how the program is executed with the
set of test cases.
 Chapter-8: Describes the Results and snapshots of the project.
 Chapter-9: Describes conclusion and future work of the project.

Dept. of CSE, MITE, Moodabidri Page3


SYPMAN

Chapter 2

LITERATURE SURVEY
This research aim is to provide a survey for developing a robot that can detect mine, as the
robot may employ several sensors in order to help in mining. Incrementally improving
existing technologies, increasing the probability of detection, reducing the false alarm rate,
and planning use able deployment scenarios. There is no single method for efficient landmine
detection. Several technologies can be found, but their direct results cannot be generalized.
Rather than focusing on individual technologies operating in isolation, mine detection
research and development should emphasize the design from first principles and subsequent
development of an integrated, multi sensor system that would overcome the limitations of any
single sensor technology. Combining different kinds of sensors would certainly obtain better
results in landmine detection. Finally, some more attention should be given to sensor fusion
and metal detectors. All of these issues should help to discriminate useful data, which is
critical as large numbers of false alarms increase uncertainty and limit future research.

Biological Methods

Biological detection methods involve the use of mammals, insects, or microorganisms to


detect explosives. Like chemical sensors, these methods rely on detection of explosive
compounds rather than on detection of metal or changes in the physical properties of the
subsurface. Thus, they have the potential for reducing false alarm rates from metal clutter.
Biological- sensing technology requires an understanding of how explosives migrate away
from landmines as well as knowledge of the chemical and physical principles of the sensor.

Mechanical Methods

Clearing minefields by modified tanks or trucks is also a common method [12]. It does not
need sensors and is efficient on a suitable ground. Chains attached on a rotating roller are
hitting the ground in order to explode or destroy mines. Another possibility is to mount
plough in front of a tank, which dig out the mines, and moves them away, mostly without
exploding. Mine plough are slow (6.5km/h), but used in conjunction with rollers, this system
can provide a virtually 100 per cent mine clearance effectiveness [1].

2.1 Existing Systems


There are many researcher work in this field and evaluated the performance of mine detection
technologies. Researchers in physical, chemical, and biological sciences are studying and

Dept. of CSE, MITE, Moodabidri Page4


SYPMAN

developing methods that could reduce the false alarm rate and maintain or increase the
probability of detection for mine clearance. New detection concepts involve searching for
characteristics other than mine metal content. Varieties of techniques that exploit properties
of the electromagnetic spectrum are being explored. For example, Pelt et al. [3] proposed
detection method, which use a separated aperture microwave sensor and an artificial neural-
network pattern classifier to detect simulated land mines using data collected from a mine.
This data consists of a set of measurements made with a separated aperture sensor operating
in the wave guide near cut-off mode. Their work has shown that neural-network pattern
classifiers can successfully detect antitank mines. This method has some drawbacks that the
level of false alarms may be made arbitrarily low and the system's complexity. Waymond et
al. [4] proposed a hybrid technique that simultaneously uses both electromagnetic and
acoustic waves in a synergistic manner to detect buried land mines. The acoustic source
causes both the mine and the surface of the earth to be displaced. The electromagnetic radar
is used to detect these displacements and, thus, the mine. The displacement of the mine is
different from the earth, because the acoustic vehicles to detect and destroy land mines.
While has an advantage of being able to destroy the mines on the spot due to the vehicle’s
mechanical structure that can withstand mine explosion. The drawbacks of this method, in
certain environments the robot perform less effectively and performance of the object
avoidance need modification to climb big obstacles A car et al. [3] have investigated some
methods in path planning techniques in robotics. The first is sensor-based coverage according
to exact cellular decomposition in terms of critical points. The robot executing the coverage
algorithm incrementally constructs this cellular decomposition while it is covering the space
with back and forth motions. The second technique, the probabilistic method, is for where
time is limited and there exists a priori information about the minefield. This method works
by minefield parameter extraction. Once the parameters are determined, the minefield layout
is fixed, allowing opportunistic robot guidance to decrease de-mining time. The drawbacks of
this method, in few instances, the system was not able to identify correctly the landmine due
to the segmentation process where the K Means clustering algorithm failed to effectively
extract the exact objects’ platforms from the image, high cost, GPR is larger and heavier, and
GPR is more power hungry Z hang et al. [3] proposed a probabilistic method for robot
landmine search, focusing on optimization search strategy determining location of mines
and/or unexploded ordnance. They first extract the characteristics of dispersion pattern of the
minefield in order to construct a probability map and then design a path for the robot
searching.

Dept. of CSE, MITE, Moodabidri Page5


SYPMAN

2.2 Limitations:
There are many challenges in landmines detection. The first is the changes in weather factors
led to the disappearance of the mine underground spaces. The second is the ability to stop the
effect of mines without a vision underground. The third is not only the presence of the mine
is required to be discovered, it also needs the robot to mark the location of the mine with an
accuracy of 5cm radius. There is great motivation to research new counter-mine systems.
Current anti-personnel land mines cost between $3–$25 per mine and clearance methods cost
between $300–$1000 per mine removed [3].There is work to be done in fusion of landmine
detection technology in order to enhance its performance, since every approach has good
results within limited conditions. Due to the aforementioned limitations, a multi-sensor
system based on signal and algorithm fusion should be developed. Rather than focusing on
individual technologies operating in isolation, mine detection research and development
should emphasize the design from first principles and subsequent development of an
integrated, multisensory system that would overcome the limitations of any single sensor
technology. Combining different kinds of sensors would certainly obtain better results in
landmine detection.

Strategies of Landmines Detection Robotics

In order to clear up landmines, two major steps need to be done. The first step is to detect the
location of the mines. The second step is to deactivate or destroy the mines. Searching for the
location is the process that takes the most amount of time. This is because, every single inch
of the land needs to be manually and carefully probed with a mine detector [11]. There are
three kinds of mines weeping strategies ranging from a manual based mines weeping, a
mechanical equipment based mines weeping, to an advanced robot based mines weeping
[14]. The manual based technique relies on trained de-miners sweeping the ground using
metal detectors. Well-trained staff prod the ground with a thin steel spike every 2 cm at a
shallow angle of about 30 degrees [1]. The resistance of the probe and the reaction of the
surface define where to dig the ground around and carefully remove the mine. Of course, this
is a dangerous and slow task. The mine may have turned on its side and the pr odder hits the

Dept. of CSE, MITE, Moodabidri Page6


SYPMAN

2.3 Proposed System

The proposed system is controlled by human using his mobile phone. The mobile phone
allows user to fully maneuver the spyman system. The system has IR sensor, Mine detector
and also a live location sender to the user which gives the person where exactly the danger is
present.

The system has a disk shaped rotater present on which camera is mounted. This camera takes
in video and stores it in a memory card. There is gun trigger where an actual gun can also be
placed in order to shoot a person which is directly controlled by the user from the app. The
video now has to be converted to frames and then it is uploaded to machine learning model
and the model then predicts the outcome as it is human with a weapon, classify images of
weapons and also help soldiers to know what exact danger is present. This is done using a
deep learning model called web vision to classify images.

Dept. of CSE, MITE, Moodabidri Page7


SYPMAN

Chapter 3

SYSTEM REQUIREMENTSSPECIFICATION
A software requirements specification (SRS) is the official statement of what the
system developers should implement.It should include both the user requirements for a
system and a detailed specification of the system requirements.A requirement specification
for a software system is a complete description of the behaviour of a system to be
developed. It includes a set of use cases that describes all the interactions the users will
have with the software. In addition to the use cases the SRS will also have non-
functiona1requirements. Non-functional requirements are requirements which impose
constraints on the design or implementation(such as performance engineering requirements,
quality standards or design constraints).

Requirement specification adds more information to requirement definition. The


different desirable characteristics of a SRS are understandable, unambiguous,
completeness, verifiable,consistency,modifiable and traceable. This also provides a
reference for validation of the final product.

3.1 Overall Description


The SRS is a document, which describes completely the external behaviour of the software. This
section of the SRS describes the general factors that affect the product and its requirements. The
system will be explained in its context to show how the system interacts with other systems and
introduce the basic functionalities of it.

3.1.1 Product Perspective


Firstly, the robot is sent to war prone area for detecting bombs and enemy soldiers presence.
This is done wirelessly using an android application which is considered as the main part of
this project. The operating soldier can guide the robot by hiding inside a bunker to those
locations the soldier decides to locate and detect enemy actions. This robot cannot be seen
easily by the enemies since its size is very compact. A GPS module is used in this project to
send the accurate Geo-locations whenever the robot detects a human or bomb.

Dept. of CSE, MITE, Moodabidri Page8


SYPMAN

3.1.2 Product Functions


The final desired product can make the robot to move forward, backward, right and left by
using the android application along with the option for shooting someone using the laser gun.
This also detects bomb and sending the location details to the mobile application which is
developed using Arduino IDE and Android studio. The robot is operated by a 12V DC battery
which can be recharged.

3.1.3 Assumptions and Dependencies


Assumptions:

 The user’s system is active.

 The system is in Bluetooth range.

Dependencies:

 The system detects bomb and sends the location details to the mobile
application which is developed using Arduino IDE and Android studio.

 The robot is operated by a 12V DC battery which can be recharged

3.2 Specific Requirements


This section includes the detailed description about the hardware and software
requirements,functional requirements and non functional requirements

The Hardware and Software Requirements are:

3.2.1 Hardware Requirements


 Atmega328 micro controller

 Power supply battery

 L298 MOTOR DRIVER

 Motion Sensor

 LASER

 Metal Detector

 HC05

Dept. of CSE, MITE, Moodabidri Page9


SYPMAN

3.2.2 Software Requirements

 Arduino IDE

 Android studio

 Anaconda

3.2.3 Functional Requirements


These are statements of services the system should provide, how the system should
react to particular inputs and how the system should behave in particular situations. In some
cases, the functional requirements may also explicitly state what the system should not do.
These requirements depend on the type of software being developed, the expected users of
the software and the general approach taken by the organization when writing requirements.
When expressed as user requirements, the requirements are usually described in an abstract
way. However, functional system requirements describe the system function in detail, its
inputs and outputs, exceptions, and so on. Functional requirements for a software system may
be expressed in a number of ways.

3.2.3.1 Introduction: Military Robots are autonomous robot or wireless


controlled mobile robots designed for military applications, from detecting metal
bombs to intruder (trespassers) and attack. Autonomous robots would also save and
preserve soldiers lives by removing serving soldiers, whom might otherwise be
killed, from battle field. This project aims in providing the geo location of the
intruders or trespassers in a battle field thus by making the soldiers to take earlier
action plan before they start a mission.

3.2.3.2 Input: power supply to the Autonomous robotic system and directions in which the
robot should move like front, back, right, left.

3.2.3.3Processing:
Monitors and co-ordinate values continuously to determine the object detected in a war
field and determines the readings of the location in which bomb or human is
detected.

Dept. of CSE, MITE, Moodabidri Page10


SYPMAN

3.2.3.4 Output: Determines whether bomb or human is detected in a war field.

3.2.4 Non-Functional Requirements


Non-functional requirements are requirements that are not directly concerned with the
specific functions delivered by the system. They may relate to emergent system properties
such as reliability, response time and store occupancy. Alternatively, they may define
constraints on the system such as the capabilities of I/O devices and the data representations
used in system interfaces. The plan for implementing non-functional requirements is detailed
in the system architecture.Non functional requirement may be available for following
attributes.

3.2.4.1 Performance Requirements


This robot cannot be seen easily by the enemies since its size is very compact. A GPS module
is used in this project to send the accurate geo-locations whenever the robot detects a human
or bomb.

3.2.4.2 Safety Requirement


Autonomous robots would also save and preserve soldiers lives by removing serving soldiers,
whom might otherwise be killed, from battle field. This project aims in providing the geo
location of the intruders or trespassers in a battle field thus by making the soldiers to take
earlier action plan before they start a mission.

3.2.4.3 Security Requirements


At present major military powers like USA, Russia, France etc. already started implementing
Military Robots as Spy, soldier, location detector etc. while countries like India is still
struggling to develop one. The foremost challenge that our country facing today is that we
cannot buy military robots from other countries because of security issues. So we will have to
design by our own. It simplifies and automates the whole process of spying the enemy battle
field or areas without losing the life of a soldier along with the location status. The prototype
is able to reduce the overall operational cost.

Dept. of CSE, MITE, Moodabidri Page11


SYPMAN

Chapter 4

GANTT CHART
A Gantt chart is a type of bar chart, developed by Henry Gantt that illustrates a project
schedule. Gantt charts illustrate the start and finish of the terminal elements and summary
elements of the project. Terminal elements and summary elements comprise the work
breakdown structure of the project.

The following is the Gantt chart of the project “Autonomous robotic system”

Table 4.1: Gantt chart of planning and scheduling of project

Number Task Start End Duration(days)

1 Synopsis 01-Aug-2018 13-Aug-2018 15

2 Presentation on idea 17-Aug-2018 31-Aug-2018 14

3 Software Requirement 14-Sep-2018 26-Sep-2018 12


Specification

4 System Design 13-Oct-2018 28-Jan-2019 105

5 Implementation 30-Oct-2019 25-Mar-2019 149

6 Presentation on work
progress

7 Testing

8 Result and Report

Table 4.1: Gantt chart

Dept. of CSE, MITE, Moodabidri Page12


SYPMAN

ACTIVITY/ AU SE OC NO DE JA FE MA AP MA
MONTH G P T V C N B R R Y

SYNOPSIS

PRESENTATION
ON IDEA
SRS

DESIGN

IMPLEMENTATION

TESTING

REPORT

The Gantt chart of Table 4.2 shows our project schedule. The project work started in August
when the project synopsis was submitted. The presentation on the idea was done during
August. Requirement collection was done in September and design work in January.
Implementation was started in October and was continued till March.

Chapter 5

SYSTEM DESIGN
System overview provides a top-level view of the entire software product. It highlights the major
Dept. of CSE, MITE, Moodabidri Page13
SYPMAN

components without taking account the inner details of the implementation. It describes the
functionality of the product and context and design of the software product. The application will
be developed in a way which provides the user to interact with the system and simplifies the tasks
by providing a smooth user interface and user experience with easily readable and understandable
buttons. There are button with labels on for navigation purposes. The proposed solution takes
advantage of the rich features offered in android smart phones. This project makes it easier for
soldiers and thus keeping them safe, ensures safety and monitors the whereabouts of physically
harmful things and weapon carrying people.

5.1 Architectural diagram

The architectural design gives the description about how the overall system is designed. It is
specified by identifying the components defining the control and data flow between them.
The arrows indicate the connection and the rectangular boxes represent the functional units.
The Figure 5.1 shows the Architectural Design Diagram of this project.
This section describes the conceptual design of Spyman System as shown in (Figure 5.1).

User Control Movements GPS Location Result in App


Interface using app And Image
Tracking
Recoginition

Figure 5.1: Architectural Design diagram

5.2 Use Case Diagram and Description


A use case is a coherent piece of functionality that a system provides interacting with actors. It
describes a system which involves a set of use cases and a set of actors. A use case diagram
summarizes who uses our application or system and what they can do with it. A use case diagram

Dept. of CSE, MITE, Moodabidri Page14


SYPMAN

summarizes who uses our application or system and what they can do with it.

Figure 5.2(a) and Figure 5.2(b) shows Use Case Diagrams.

User Current

Position

Navigate Controls Mobile Control Application

Bluetooth Connection

Image Recognition

Figure 5.2(a): Use case


diagram of the Application

Dept. of CSE, MITE, Moodabidri Page15


SYPMAN

Open Mobile

App

Connect to

Spyman

Human Controller

Direct it to location
you want

Detect location, detect


metal and detect
humans by camera

Identify what’s inside the


image by image
classification model

Figure 5.2(b): Use case diagram of the application

Brief Description
There is human that operates the system. The mobile device is used to control the direction in

Dept. of CSE, MITE, Moodabidri Page16


SYPMAN

which the spyman moves. There is a small camera mounted on top of the spyman that records
video and it gets recorded in the memory and also it has a metal detector for detecting mines. This
will make the soldier understand threats that may have been planted by enemies what a soldier
may not have seen with his naked eyes since they are below the earth surface. The recorded video
is brought back along with spyman which can be used to study human with bombs and other geo-
locations.

A Sequence diagram shows parallel vertical lines (lifelines), different processes or objects that
live simultaneously, and as horizontal arrows, the messages exchanged between them, in the
order in which they occur. This allows the specification of simple run-time scenarios in a
Graphical manner. Figure 5.3 Shows the Sequence Diagram.

In the Project the Sequence Diagram consists of 7 Objects.

 To allow user to control Spyman using Mobile App.

 Control Spyman to make it move to any direction needed.

 Return if human detected or metal detected.

 Capture video while moving over a area.

 Apply Machine Learning on Video Captured by converting it into frames.

 And Classify as weapons ,humans, bombs, etc

5.4 Activity Diagram

Activity Diagram shows the sequence of steps that make up complex process. It shows the flow
of control, similar to sequence but focuses on operations rather than on objects. The components

Dept. of CSE, MITE, Moodabidri Page17


SYPMAN

used in this are as follows:

 Rounded Rectangle: It indicates the process.

 Arrow: It indicates transition line.

 Rhombus: It indicates the decision.

 Bars: It represents the start or end of concurrent activities.


 Solid Circle: It represents the initial state of workflow.

 Encircled Black Circle: It represents the final state of workflow.

Start

Mobile Application

Mobile Controls
(Movements)

No
Validate detection Items Detected

Displayed on
App

Yes

Video Capturing

Deep Learning Model

To Predict

Figure 5.4: Activity Diagram

5.5 Data Flow Diagram


A data flow diagram (DFD) is a graphical representation of the “flow” of data through an
information system, modeling its process aspects. A DFD is often used as a preliminary step to
create an overview of the system, which can later be elaborated.
Dept. of CSE, MITE, Moodabidri Page18
SYPMAN

Mobile Bluetooth DC
App MOTOR
Module

Arduino Board

IR Metal
Camera
SENSOR
Detector

Prediction

Model

Figure 5.5: Data Flow Diagram

The Figure 5.5 shows the data flow between each component in the system. Initially the
android app is connected to Bluetooth module. After the connection is set up, now a person
can navigate the Spyman to different location how he wants. After he has done that, the
detector if it detects anything a message is sent to app. The camera mounted on the top takes
a video which is further processed to identify what is there and give a clear image.

Chapter 6

IMPLEMENTATION
The implementation phase of the software development is concerned with translating design
specification into source code. The user tests developed system and changes are made
Dept. of CSE, MITE, Moodabidri Page19
SYPMAN

according to their needs. Our system has been successfully implemented. Before
implementation, several tests have been conducted to ensure that no errors are encountered
during operation. The implementation phase ends with evaluation of the system after placing
it into operation for a period of time. Implementation is the third phase of system process. In
order to achieve the objectives and the expected performance the system has been developed
in a highly interactive and user friendly manner.

6.1 Implementation of module

This Project makes use of many modules like arduino module, Bluetooth
module, Driving Motor, Sensor module and Machine Learning module to detect
and predict the outcomes.

6.1.1 Movement function

The function is made to maneuver the spyman using the mobile app.

Code snippet

void RIGHT()
{digitalWrite(2,HIGH);
digitalWrite(3,LOW);
digitalWrite(4,LOW);
digitalWrite(5,HIGH);
}
void LEFT()
{digitalWrite(2,LOW);
digitalWrite(3,HIGH);
digitalWrite(4,HIGH);
digitalWrite(5,LOW);

6.1.2 Gun Trigger function


This function is used to trigger the gun by clicking on the trigger button on the android app to
mark various locations.
Code snippet

Dept. of CSE, MITE, Moodabidri Page20


SYPMAN

void GUN_FIRE()
{
digitalWrite(12,HIGH);
delay(80);
digitalWrite(12,LOW);
delay(80);
digitalWrite(12,HIGH);
delay(80);
digitalWrite(12,LOW);
delay(80);
digitalWrite(12,HIGH);
delay(80);
digitalWrite(12,LOW);
delay(80);
}

6.1.3 Gun Movement function


This allows movement of gun in all 360 degree rotation.
Code snippet
void CHECK()

{MetalState = digitalRead(Metal_PIN); ObstacleState = digitalRead(Obstacle_PIN);

if(MetalState == 1 && ObstacleState == 1) { bt.print("# YES+


NO+12.8851.N+74.8383.E~");

delay(2000);//while(MetalState == 0);

else if(MetalState == 0 && ObstacleState == 0)


Chapter 7
TESTING
Testing is a process of executing the program with the intent of finding an error, it is a set of
activities that can be planned in advance and conducted systematically. Inadequate testing or non-

Dept. of CSE, MITE, Moodabidri Page21


SYPMAN

testing may lead to errors. Nothing is completed without the testing, as it is vital kinds of data.
While testing, errors are noted and corrections are made. So general testing demonstrates that the
system is working according to the specifications, and that it meets the performance requirement.

System testing is done to check whether the system works accurately and efficiently before live
operation commences. A small error can conceivably explode into much larger problem.
Effective testing early in the process translates directly into long term cost savings from a reduced
number of errors. Testing is the systematic search for details in all project deliverable. It is the
process of examining an output of a process under consideration, comparing the results against a
set of predetermined expectations and dealing with variances.

Testing is vital for the success of the system. System testing makes a logical assumption that if all
parts of the system are correct, the goal will be successfully achieved. Testing involves operation
of systems or application under controlled conditions and evaluating the results. The controlled
conditions include both normal and abnormal conditions. At first, the different units are
individually tested and the system as a whole is tested.

Tests are frequently grouped by where they are added in the software development process,
or by the level of specificity of test. The main level during the development process are unit
testing, integration testing, and the system testing that are distinguished by the test target
without implying a specific, process model.

7.1 Testing Levels


Testing is part of Verification and Validation. Testing plays a very critical role for quality
assurance and for ensuring the reliability of the software. Figure 7.1 shows Testing levels.
The objective of testing can be stated in the following ways:

 A successful test is one that uncovers as-yet-undiscovered bugs.

 A better test case has high probability of finding un-noticed bugs.

 A pessimistic approach of running the software with the intent of finding errors.

Testing can be performed in various levels like unit test, integration test and system test.

Dept. of CSE, MITE, Moodabidri Page22


SYPMAN

7.1.1 Unit Testing


Unit testing tests the individual components to ensure that they operate correctly.
Each component is tested independently, without other system component. This system was
tested with the set of proper test data for each module and the results were checked with the
expected output. Unit testing focuses on verification effort on the smallest unit of the
software design module.
7.1.2 Integration Testing
Integration testing is another aspect of testing that is generally done in order to uncover errors
associated with the flow of data across interfaces. The unit-tested modules are grouped
together and tested in small segment, which makes it easier to isolate and correct errors. This
approach is continued until we have integrated all modules to form the system as a whole.
7.1.3 System Testing
System testing tests a completely integrated system to verify that it meets its requirements.
7.1.4 Acceptance Testing
We have tested the system at different levels. At each level we found that it was working
properly and was meeting the requirements which are specified in the requirement analysis.

Dept. of CSE, MITE, Moodabidri Page23


SYPMAN

7.2 Test Cases


A test case is a software testing document, which consists of events, action, input, output,
expected result and actual result. Technically a test case includes test description, procedure,
expected result and remarks. Test cases should be based primarily on the software
requirements and developed to verify correct functionality and to establish conditions that
reveal potential errors.
Individual PASS/FAIL criteria are written for each test case. All the tests need to get a PASS
result for proper working of an application.
Test cases for our project are summarized below.

Test Case 1: Bluetooth Connection


Objective: To connect the mobile app and the hardware.
TEST ID: UT_1
Steps: The following steps have to be followed to carry out the test.
1. Connect the mobile Bluetooth to hardware Bluetooth (hc05).
2. After Connection is successful.
Expected Results: Mobile App loads up on the screen.
Result: Successful.

Test Case 2: Movement of Spyman


Objective: To move spyman in desired direction.
TEST ID: UT_2
Steps: The following steps have to be followed to carry out the test.
1. On Clicking left button it moved to left
2. Same way towards right, front and back buttons allowed it to move.
Expected Results: Spyman could move in the direction.
Result: Successful

Test Case 3: Trigger of Gun


Objective: To trigger gun of spyman in desired direction.
TEST ID: UT_3
Steps: The following steps have to be followed to carry out the test.
1. On Clicking trigger button laser light used to point straight.

Dept. of CSE, MITE, Moodabidri Page24


SYPMAN

Expected Results: A stream of laser light shoots out of the gun.


Result: Successful

Test Case 4: Movement of mounted rotation disk


Objective: To move the rotating disk of spyman in desired direction.
TEST ID: UT_4
Steps: The following steps have to be followed to carry out the test.
1. On Clicking disk rotate button it allows it to rotate in both direction.
Expected Results: Should be able to rotate both anti-clockwise and clockwise direction.
Result: Successful

Test Case 5: Video Capturing by mini spy cam


Objective: As the spyman moves front the camera keeps on recording video and gets stored
in memory card.
TEST ID: UT_5
Expected Results: Should be able to take video.
Result: Successful

Test Case 6: IR Sensor


Objective: When a spyman moves if a person is detected it reflects the same on the mobile
app as well as detected humans.
TEST ID: UT_6
Expected Results: Should be able to detect obstacles and humans.
Result: Successful

Test Case 7: Bomb Sensor


Objective: When a spyman moves if a metal item is detected it reflects the same on the
mobile app as well as detected metal.
TEST ID: UT_7
Expected Results: Should be able to detect obstacles, metal and bombs.
Result: Successful

Dept. of CSE, MITE, Moodabidri Page25


SYPMAN

Test Case 8: Image Classification


Objective: Whatever was recorded in the video is taken and identified to what it is by Deep
Learning.
TEST ID: UT_8
Steps: The following steps have to be followed to carry out the test.
1. First the video is converted to frames
2. Then each frame is passed as a input to the model to be identified so as to what it is.
Expected Results: It should be able to tell humans with bombs.
Result: Successful

Dept. of CSE, MITE, Moodabidri Page26


SYPMAN

Table 7.1 Test Cases

Test Test Test Case Expected Results Status


Numbers Case
ID
1 UT_1 Bluetooth Connection. Mobile App loads up on Displayed
the screen.

2 UT_2 Movement of Spyman Spyman could move in the Shown


direction.
.

3 UT_3 Trigger of Gun A stream of laser light Started


. shoots out of the gun.

4 UT_4 Movement of mounted Should be able to rotate Shown


rotation disk both anti-clockwise and
clockwise direction
5 UT_5 Video Capturing by mini spy Should be able to take Shown
cam video.

6 UT_6 IR Sensor Should be able to detect Displayed


. obstacles and humans.
7. UT_7 Bomb Sensor Should be able to detect Displayed
obstacles, metal and bombs

8 UT_8 Image Classification It should be able to tell Shown


humans with bombs

Dept. of CSE, MITE, Moodabidri Page27


SYPMAN

Chapter 8

CONCLUSION AND FUTURE WORK


8.1 Conclusion
The project is designed for reducing the chances of death on the war areas by any potentially
harmful things which can cause a big damage. Our Spyman can be a guide to all soldiers for
present time as loosing life of soldiers has become more because of many terrorist activities.

Thus able to do protect them from such instances. Also it can be used in any other
circumstance where humans can’t reach. This can be life saving in such situations.

8.2 Future Work


This project can also integrated with many other things like fire extinguisher or anything of
that sort to help to reduce fire. Self exploding bombs to avoid kill enemies and also help
soldiers or civilians life in many ways.

Dept. of CSE, MITE, Moodabidri Page28

You might also like