Night Vision Patrolling Rover Navigation System for Women’s Safety Using Machine Learning
DOI:
https://doi.org/10.61841/kr08mw69Keywords:
Night Vision, Patrolling Rover Navigation System, Women’s Safety, Machine Learning, Class Imbalance, EnsembleAbstract
Women safety is the biggest threat to India. There are many areas in which women are not feeling safe. This should be changed as much soon as possible. Technology changes and improves day by day to change the way human are living. So this paper focuses on updating technology framework to make stronger women safety mechanism. In this paper, we introduce a new security mechanism to safeguard women during abnormal activities. New security mechanism has been proposed based on the patrolling robot using the Raspberry Pi. Here night vision camera can be used for securing any premises. To improve the accuracy of the classifier, various machine learning models are used. Algorithms like Boosting, Bagging, Stacking and Enhanced reweight mechanism in Ensemble are used. Confusion matrix with individual classifier accuracy is considered for evaluating results. The results show that the proposed method performs well compared to existing algorithms.
Downloads
References
[1] C. Micheloni, G. L. Foresti, C. Piciarelli and L. Cinque, “An Autonomous Vehicle for Video Surveillance
of Indoor Environments”, in IEEE Transactions on Vehicular Technology, vol. 56, no. 2, pp. 487-498,
2007.
[2] Ahsanul Hoque, Md. Baijid Hasan Shorif, Shekh Nuruzzaman, Md. Eftekhar Alam, “Arduino based
Battlefield Assistive Robot”, Humanitarian Technology conference, (R10-HTC) 2017.
[3] Kaumalee Bogahawatte and Shalinda Adikari, “Intelligent Criminal Identifiaction System”, Proceedings of
8th IEEE International Conference on Computer Science and Education, pp.633-638, 2013.
[4] Yu-Yueh Huang, Cheng-Te Li, Shyh-Kang Jeng. “Mining location-based social networks for criminal
activity prediction”, 24th Wireless and Optical Communication Conference (WOCC), 2015.
[5] Kamal Taha and Pau Yoo, “SIMMCO:A Forensic Investigation Tool for Identifying the Influential
Members of a criminal Organization”, IEEE Transactions on Information Forensics and Security, Vol.11,
No.4, pp.811-822, 2016.
[6] M.Sreedevi, A.Harsha Vardhan Reddy, Ch.Venkata Sai Krishna Reddy, “Review on Crime Analysis and
Prediction Using Data Mining Techniques”, International Journal of Innovative Research in Science,
Engineering and Technology, Vol. 7, Issue 4, April 2018.
[7] R. Devakunchari, Bhowmick S, Bhutada S P, Shishodia Y, “Analysis Of Crimes Against Women In India
Using Regression”, International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 –
8958, Volume-8, Issue-2S2, January 2019.
[8] P.Raja Rajeswari, P.Surya Teja, P.Sri Harsha, T.Chaitanya Kumar, “Enhancing the Performance of Crime
Prediction Technique Using Data Mining”, International Journal of Engineering & Technology, 7, 424-
426, 2018.
[9] J. Zhang, G. Song, G. Qiao, T. Meng and H. Sun, “An indoor security system with a jumping robot as the
surveillance terminal”, In IEEE Transactions on Consumer Electronics, vol. 57, no. 4, pp. 1774-1781,
November 2011.
[10] M.Selvam, “Smart phone based robotic control for surveillance applications”, International Journal of
Research in Engineering and Technology, 2014.
[11] Pahuja, Ritika, and Narender Kumar, “Android Mobile Phone Controlled Bluetooth Robot Using 8051
Microcontroller”, International Journal of Scientific Engineering and Research (IJSER), ISSN (Online),
pp.2347-3878, 2014.
[12] Chris Seiffert, Taghi M.Khoshgoftaar, Jason Van Hulse and Amri Napolitano, “RUSBoost: A Hybrid
Approach to Alleviating Class Imbalance”, IEEE Transactions on Systems and Cybernetics—Part A:
Systems And Humans, Volume 40, No. 1, 2010.
[13] Gustavo E.A.P.A.Batista, Ronaldo C.Prati and Maria Carolina Monard, “A Study of the Behaviour of
Several Methods for Balancing Machine Learning Training Data”, ACM SIGKDD Explorations, 2004.
[14] Nitesh V.Chawla, Nathalie Japkowicz and Aleksander Kolcz, “Editorial: Special Issue on Learning from
Imbalaned Data sets”, ACM Sigkdd Explorations, Volume 6, Issue 1 - Page 1-6, 2004.
[15] N.V.Chawla, K.W.Bowyer, L.O.Hall and W.P.Kegelmyer, “SMOTE: Synthetic Minority Over-Sampling
Technnique Journal of the Artificial Intelligence Research”, Volume 16, Page No. 321–357, 2002.
[16] J.Gowthami, N.Shanthi, “Secure Fuzzy Extractor based remote user validation scheme for Wearable
devices”, International Journal of Engineering Research & Technology, Volume 6, Issue 08, IJERT, 2018.
[17] J.Gowthami, K.Aishwariya, P.Divya, M.Kavin Kumar, A.Elangovan, “Data Provenance for Multi-Hop
Internet of Things”, International Journal of Engineering Research & Technology, 2019.
[18] Dhivyaa C R, Nithya K and Saranya M, “Automatic detection of diabetic retinopathy from color fundus
retinal images”, International Journal on Recent and Innovation Trends in Computing and communication,
Vol.2 ,Issue 3, ISSN:2321-8169, 2012.
[19] Saveetha P, Arumugam S and Kiruthikadevi K, “Cryptography and the Optimization Heuristics
Techniques”, Int. Journal of Advanced Research in Computer Science and Software Engg , volume. 4,
Issue.10, ISSN: 2277 128X, October 2014.
[20] Gokulraj P and Kiruthikadevi K, “Revocation and security based ownership deduplication of convergent
key creating in cloud”, International Journal of Innovative Research in Science, Engineering and
technology. Vol. 3, Issue 10, ISSN: 2319-8753, October 2014.
[21] Prakash, S. and Vijayakumar, M., “An effective network traffic data control using improved Apriori rule
mining,” Circuits and Systems, Issue 10, Vol. 07, pp. 3162-3173, June 2016.
[22] Saranya M and Nithya K, “Campus Navigation and Identifying Current Location through Android Device
to Guide Blind People”, International Research Journal of Engineering and Technology (IRJET),
Vol.02,Issue : 08,Nov 2015.
[23] Preethi, B.C. and Vijayakumar, M. “ A novel Cloud Integration Algorithm(CIA) for Energy Efficient High
Performance Computing Applications in Big Data Multimedia Applications”, Romanian Journal of
Information Science and Technology, vol. 2, no.1, pp. 1-11, March 2018.
[24] Vijayakumar M, Prakash s, “An Improved Sensitive Association Rule Mining using Fuzzy Partition
Algorithm”, Asian Journal of Research in Social Sciences and Humanities, Vol.6,Issue.6, pp.969-981,
2016.
[25] Prakash S, Vijayakumar M, “ Risk assessment in cancer treatment using association rule mining
techniques”, Asian Journal of Research in Social Sciences and Humanities, Vol.6,Issue.10, pp.1031-1037,
2016.
[26] Nandagopal S, Malathi T, “Enhanced Slicing Technique for Improving Accuracy in Crowd Sourcing
Database”, International Journal of Innovative Research in Science, Engineering and Technology, Vol.3,
Issue.1, pp.278-284, 2014.
[27] Dhivyaa C R ,Vijayakumar M,” An effective detection mechanism for localizing macular region and
grading maculopathy”, Journal of medical systems, Vol.43,Issue.3, pp.53-, 2019.
[28] Ragunath V, Dhivyaa C R “Privacy Preserved Association Rule Mining for Attack Detection and
Prevention” Published in International Journal of Innovative Research in Computer and Communication
Engineering, Vol.2, Issue 1, March 2014
[29] Nithya K, Krishnamoorthi M, KalamaniM, “Tweets: Review of Micro-Blog Based Recommendation
Systems (RS) for News Recommendation (NR)”, in International Journal of Recent Technology and
Engineering (IJRTE), ISSN: 2277-3878, Volume-7 Issue-4S, November 2018. pp. 444-448
[30] Nithya K, Saranya M, Dhivyaa C.R, “Concept Based Labeling of Text Documents Using Support Vector
Machine”, International Journal on Recent and Innovation Trends in Computing and Communication, vol.
2, no. 3, pp. 541-544, (2014).
[31] Suresh kumar V S , Booma K, Suma K “IOT Smart Classrooms”, International Journal Of Science
Technology and Humanities, Vol 6 , pp: 1-6,Issue 1,2019.
[32] Nandagopal S., Arunachalam V.P., Karthik S."A novel approach for inter-transaction association rule
mining, Journal of Applied Sciences Research VOL, 8, Issue 7, 2012.
[33] Kannan R., Selvambikai M., Jeena Rajathy I., Ananthi S. Rasayan, A study on structural analysis of
electroplated Nano crystalline nickel based thin films, Journal of Chemistry, Vol 10, issue 4,2017
[34] Arunvivek G.K., Maheswaran G., Senthil Kumar S., Senthilkumar M., Bragadeeswaran T. Experimental
study on influence of recycled fresh concrete waste coarse aggregate on properties of concrete.
International Journal of Applied Engineering Research, Vol 10, issue 11, 2015
[35] Krishna S.K., Sathya M. Usage of nanoparticle as adsorbent in adsorption process. A review International
Journal of Applied Chemistry, vol 11, Issue 2, 2015.
[36] Sudha S., Manimegalai B., Thirumoorthy P. A study on routing approach for in-network aggregation in
wireless sensor networks, International Conference on Computer Communication and Informatics:
Ushering in Technologies of Tomorrow, Today, ICCCI 2014.
[37] Satheesh A., Jeyageetha V. Improving power system stability with facts controller using certain intelligent
techniques, International Journal of Applied Engineering Research, Vol 9, no 23, 2014.
[38] Ashok V., Kumar N, Determination of blood glucose concentration by using wavelet transform and neural
networks, Iranian Journal of Medical Sciences, Vol 38, Issue 1, 2013.
[39] Somasundaram K., Saritha S., Ramesh K, Enhancement of network lifetime by improving the leach
protocol for large scale WSN, Indian Journal of Science and Technology, Vol 9, Issue 16, 2016.
[40] Jayavel S., Arumugam S., Singh B., Pandey P., Giri A., Sharma A. Use of Artificial Intelligence in
automation of sequential steps of software development / production, Journal of Theoretical and Applied
Information Technology, Vol 57, Issue 3, 2013.
[41] Ramesh Kumar K.A., Balamurugan K., Gnanaraj D., Ilangovan S, Investigations on the effect of flyash on
the SiC reinforced aluminium metal matrix composites, Advanced Composites Letters, Vol 23, Issue 3,
2014.
[42] Suresh V.M., Karthikeswaran D., Sudha V.M., Murali Chandraseker D, Web server load balancing using
SSL back-end forwarding method. IEEE-International Conference on Advances in Engineering, Science
and Management, ICAESM-2012, 2012.
[43] Karthikeswaran D., Sudha V.M., Suresh V.M., Javed Sultan A, A pattern based framework for privacy
preservation through association rule mining, IEEE-International Conference on Advances in Engineering,
Science and Management, ICAESM-2012, 2012.
[44] Senthil J., Arumugam S., Shah P, Real time automatic code generation using generative programming
paradigm, European Journal of Scientific Research, vol. 78, issue 4, 2012.
[45] Vijayakumar J., Arumugam S, Certain investigations on foot rot disease for betelvine plants using digital
imaging technique, Proceedings - 2013 International Conference on Emerging Trends in Communication,
Control, Signal Processing and Computing Applications, IEEE-C2SPCA", 2013.
[46] Vijayakumar J., Arumugam S. Odium piperis fungus identification for piper betel plants using digital
image processing, Journal of Theoretical and Applied Information Technology, vol 60, issue 2, 2014.
[47] Manchula A., Arumugam S, Face and fingerprint biometric fusion: Multimodal feature template matching
algorithm, International Journal of Applied Engineering Research, vol 9, issue 22, 2014.
[48] Ramesh Kumar K.A., Balamurugan K., Arungalai Vendan S., Bensam Raj J, Investigations on thermal
properties, stress and deformation of Al/SiC metal matrix composite based on finite element method.
Carbon - Science and Technology, Vol 6, Issue 3, 2014.
[49] Kanchana A., Arumugam S, Palm print texture recognition using connected-section morphological
segmentation, Asian Journal of Information Technology Vol 6, Issue 3, 2014.
[50] Padmapriya R., Thangavelu P, Characterization of nearly open sets using fuzzy sets, Global Journal of
Pure and Applied Mathematics, vol 11, issue 1, 2015.
[51] P.B. Narandiran, T. Bragadeeswaran, M. Kamalakannan, V. Aravind, Manufacture of Flyash Brick Using
Steel Slag and Tapioca Powder. Jour of Adv Research in Dynamical & Control Systems, Vol. 10, No. 12,
2018, 527-532
[52] R. Girimurugan*, N. Senniangiri, K. Adithya, B. Velliyangiri, Mechanical Behaviour of Coconut Shell
Powder Granule Reinforced Epoxy Resin Matrix Bio Composites, Jour of Adv Research in Dynamical &
Control Systems, Vol. 10, No. 12, 2018, 533-541.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Author
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.