Night Vision Patrolling Rover Navigation System for Women’s Safety Using Machine Learning

Authors

  • K. Gopalakrishnan Assistant Professor, Department of Computer Science & Engineering, Nandha College of Technology, Erode. Author
  • S. Thiruvenkatasamy Assistant Professor, Department of Computer Science & Engineering, Nandha College of Technology, Erode Author
  • E. Prabhakar Assistant Professor, Department of Computer Science & Engineering, Nandha College of Technology, Erode. Author
  • R. Aarthi Assistant Professor, Department of Computer Science & Engineering, Nandha College of Technology, Erode. Author

DOI:

https://doi.org/10.61841/kr08mw69

Keywords:

Night Vision, Patrolling Rover Navigation System, Women’s Safety, Machine Learning, Class Imbalance, Ensemble

Abstract

 Women safety is the biggest threat to India. There are many areas in which women are not feeling safe. This should be changed as much soon as possible. Technology changes and improves day by day to change the way human are living. So this paper focuses on updating technology framework to make stronger women safety mechanism. In this paper, we introduce a new security mechanism to safeguard women during abnormal activities. New security mechanism has been proposed based on the patrolling robot using the Raspberry Pi. Here night vision camera can be used for securing any premises. To improve the accuracy of the classifier, various machine learning models are used. Algorithms like Boosting, Bagging, Stacking and Enhanced reweight mechanism in Ensemble are used. Confusion matrix with individual classifier accuracy is considered for evaluating results. The results show that the proposed method performs well compared to existing algorithms. 

Downloads

Download data is not yet available.

References

[1] C. Micheloni, G. L. Foresti, C. Piciarelli and L. Cinque, “An Autonomous Vehicle for Video Surveillance

of Indoor Environments”, in IEEE Transactions on Vehicular Technology, vol. 56, no. 2, pp. 487-498,

2007.

[2] Ahsanul Hoque, Md. Baijid Hasan Shorif, Shekh Nuruzzaman, Md. Eftekhar Alam, “Arduino based

Battlefield Assistive Robot”, Humanitarian Technology conference, (R10-HTC) 2017.

[3] Kaumalee Bogahawatte and Shalinda Adikari, “Intelligent Criminal Identifiaction System”, Proceedings of

8th IEEE International Conference on Computer Science and Education, pp.633-638, 2013.

[4] Yu-Yueh Huang, Cheng-Te Li, Shyh-Kang Jeng. “Mining location-based social networks for criminal

activity prediction”, 24th Wireless and Optical Communication Conference (WOCC), 2015.

[5] Kamal Taha and Pau Yoo, “SIMMCO:A Forensic Investigation Tool for Identifying the Influential

Members of a criminal Organization”, IEEE Transactions on Information Forensics and Security, Vol.11,

No.4, pp.811-822, 2016.

[6] M.Sreedevi, A.Harsha Vardhan Reddy, Ch.Venkata Sai Krishna Reddy, “Review on Crime Analysis and

Prediction Using Data Mining Techniques”, International Journal of Innovative Research in Science,

Engineering and Technology, Vol. 7, Issue 4, April 2018.

[7] R. Devakunchari, Bhowmick S, Bhutada S P, Shishodia Y, “Analysis Of Crimes Against Women In India

Using Regression”, International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 –

8958, Volume-8, Issue-2S2, January 2019.

[8] P.Raja Rajeswari, P.Surya Teja, P.Sri Harsha, T.Chaitanya Kumar, “Enhancing the Performance of Crime

Prediction Technique Using Data Mining”, International Journal of Engineering & Technology, 7, 424-

426, 2018.

[9] J. Zhang, G. Song, G. Qiao, T. Meng and H. Sun, “An indoor security system with a jumping robot as the

surveillance terminal”, In IEEE Transactions on Consumer Electronics, vol. 57, no. 4, pp. 1774-1781,

November 2011.

[10] M.Selvam, “Smart phone based robotic control for surveillance applications”, International Journal of

Research in Engineering and Technology, 2014.

[11] Pahuja, Ritika, and Narender Kumar, “Android Mobile Phone Controlled Bluetooth Robot Using 8051

Microcontroller”, International Journal of Scientific Engineering and Research (IJSER), ISSN (Online),

pp.2347-3878, 2014.

[12] Chris Seiffert, Taghi M.Khoshgoftaar, Jason Van Hulse and Amri Napolitano, “RUSBoost: A Hybrid

Approach to Alleviating Class Imbalance”, IEEE Transactions on Systems and Cybernetics—Part A:

Systems And Humans, Volume 40, No. 1, 2010.

[13] Gustavo E.A.P.A.Batista, Ronaldo C.Prati and Maria Carolina Monard, “A Study of the Behaviour of

Several Methods for Balancing Machine Learning Training Data”, ACM SIGKDD Explorations, 2004.

[14] Nitesh V.Chawla, Nathalie Japkowicz and Aleksander Kolcz, “Editorial: Special Issue on Learning from

Imbalaned Data sets”, ACM Sigkdd Explorations, Volume 6, Issue 1 - Page 1-6, 2004.

[15] N.V.Chawla, K.W.Bowyer, L.O.Hall and W.P.Kegelmyer, “SMOTE: Synthetic Minority Over-Sampling

Technnique Journal of the Artificial Intelligence Research”, Volume 16, Page No. 321–357, 2002.

[16] J.Gowthami, N.Shanthi, “Secure Fuzzy Extractor based remote user validation scheme for Wearable

devices”, International Journal of Engineering Research & Technology, Volume 6, Issue 08, IJERT, 2018.

[17] J.Gowthami, K.Aishwariya, P.Divya, M.Kavin Kumar, A.Elangovan, “Data Provenance for Multi-Hop

Internet of Things”, International Journal of Engineering Research & Technology, 2019.

[18] Dhivyaa C R, Nithya K and Saranya M, “Automatic detection of diabetic retinopathy from color fundus

retinal images”, International Journal on Recent and Innovation Trends in Computing and communication,

Vol.2 ,Issue 3, ISSN:2321-8169, 2012.

[19] Saveetha P, Arumugam S and Kiruthikadevi K, “Cryptography and the Optimization Heuristics

Techniques”, Int. Journal of Advanced Research in Computer Science and Software Engg , volume. 4,

Issue.10, ISSN: 2277 128X, October 2014.

[20] Gokulraj P and Kiruthikadevi K, “Revocation and security based ownership deduplication of convergent

key creating in cloud”, International Journal of Innovative Research in Science, Engineering and

technology. Vol. 3, Issue 10, ISSN: 2319-8753, October 2014.

[21] Prakash, S. and Vijayakumar, M., “An effective network traffic data control using improved Apriori rule

mining,” Circuits and Systems, Issue 10, Vol. 07, pp. 3162-3173, June 2016.

[22] Saranya M and Nithya K, “Campus Navigation and Identifying Current Location through Android Device

to Guide Blind People”, International Research Journal of Engineering and Technology (IRJET),

Vol.02,Issue : 08,Nov 2015.

[23] Preethi, B.C. and Vijayakumar, M. “ A novel Cloud Integration Algorithm(CIA) for Energy Efficient High

Performance Computing Applications in Big Data Multimedia Applications”, Romanian Journal of

Information Science and Technology, vol. 2, no.1, pp. 1-11, March 2018.

[24] Vijayakumar M, Prakash s, “An Improved Sensitive Association Rule Mining using Fuzzy Partition

Algorithm”, Asian Journal of Research in Social Sciences and Humanities, Vol.6,Issue.6, pp.969-981,

2016.

[25] Prakash S, Vijayakumar M, “ Risk assessment in cancer treatment using association rule mining

techniques”, Asian Journal of Research in Social Sciences and Humanities, Vol.6,Issue.10, pp.1031-1037,

2016.

[26] Nandagopal S, Malathi T, “Enhanced Slicing Technique for Improving Accuracy in Crowd Sourcing

Database”, International Journal of Innovative Research in Science, Engineering and Technology, Vol.3,

Issue.1, pp.278-284, 2014.

[27] Dhivyaa C R ,Vijayakumar M,” An effective detection mechanism for localizing macular region and

grading maculopathy”, Journal of medical systems, Vol.43,Issue.3, pp.53-, 2019.

[28] Ragunath V, Dhivyaa C R “Privacy Preserved Association Rule Mining for Attack Detection and

Prevention” Published in International Journal of Innovative Research in Computer and Communication

Engineering, Vol.2, Issue 1, March 2014

[29] Nithya K, Krishnamoorthi M, KalamaniM, “Tweets: Review of Micro-Blog Based Recommendation

Systems (RS) for News Recommendation (NR)”, in International Journal of Recent Technology and

Engineering (IJRTE), ISSN: 2277-3878, Volume-7 Issue-4S, November 2018. pp. 444-448

[30] Nithya K, Saranya M, Dhivyaa C.R, “Concept Based Labeling of Text Documents Using Support Vector

Machine”, International Journal on Recent and Innovation Trends in Computing and Communication, vol.

2, no. 3, pp. 541-544, (2014).

[31] Suresh kumar V S , Booma K, Suma K “IOT Smart Classrooms”, International Journal Of Science

Technology and Humanities, Vol 6 , pp: 1-6,Issue 1,2019.

[32] Nandagopal S., Arunachalam V.P., Karthik S."A novel approach for inter-transaction association rule

mining, Journal of Applied Sciences Research VOL, 8, Issue 7, 2012.

[33] Kannan R., Selvambikai M., Jeena Rajathy I., Ananthi S. Rasayan, A study on structural analysis of

electroplated Nano crystalline nickel based thin films, Journal of Chemistry, Vol 10, issue 4,2017

[34] Arunvivek G.K., Maheswaran G., Senthil Kumar S., Senthilkumar M., Bragadeeswaran T. Experimental

study on influence of recycled fresh concrete waste coarse aggregate on properties of concrete.

International Journal of Applied Engineering Research, Vol 10, issue 11, 2015

[35] Krishna S.K., Sathya M. Usage of nanoparticle as adsorbent in adsorption process. A review International

Journal of Applied Chemistry, vol 11, Issue 2, 2015.

[36] Sudha S., Manimegalai B., Thirumoorthy P. A study on routing approach for in-network aggregation in

wireless sensor networks, International Conference on Computer Communication and Informatics:

Ushering in Technologies of Tomorrow, Today, ICCCI 2014.

[37] Satheesh A., Jeyageetha V. Improving power system stability with facts controller using certain intelligent

techniques, International Journal of Applied Engineering Research, Vol 9, no 23, 2014.

[38] Ashok V., Kumar N, Determination of blood glucose concentration by using wavelet transform and neural

networks, Iranian Journal of Medical Sciences, Vol 38, Issue 1, 2013.

[39] Somasundaram K., Saritha S., Ramesh K, Enhancement of network lifetime by improving the leach

protocol for large scale WSN, Indian Journal of Science and Technology, Vol 9, Issue 16, 2016.

[40] Jayavel S., Arumugam S., Singh B., Pandey P., Giri A., Sharma A. Use of Artificial Intelligence in

automation of sequential steps of software development / production, Journal of Theoretical and Applied

Information Technology, Vol 57, Issue 3, 2013.

[41] Ramesh Kumar K.A., Balamurugan K., Gnanaraj D., Ilangovan S, Investigations on the effect of flyash on

the SiC reinforced aluminium metal matrix composites, Advanced Composites Letters, Vol 23, Issue 3,

2014.

[42] Suresh V.M., Karthikeswaran D., Sudha V.M., Murali Chandraseker D, Web server load balancing using

SSL back-end forwarding method. IEEE-International Conference on Advances in Engineering, Science

and Management, ICAESM-2012, 2012.

[43] Karthikeswaran D., Sudha V.M., Suresh V.M., Javed Sultan A, A pattern based framework for privacy

preservation through association rule mining, IEEE-International Conference on Advances in Engineering,

Science and Management, ICAESM-2012, 2012.

[44] Senthil J., Arumugam S., Shah P, Real time automatic code generation using generative programming

paradigm, European Journal of Scientific Research, vol. 78, issue 4, 2012.

[45] Vijayakumar J., Arumugam S, Certain investigations on foot rot disease for betelvine plants using digital

imaging technique, Proceedings - 2013 International Conference on Emerging Trends in Communication,

Control, Signal Processing and Computing Applications, IEEE-C2SPCA", 2013.

[46] Vijayakumar J., Arumugam S. Odium piperis fungus identification for piper betel plants using digital

image processing, Journal of Theoretical and Applied Information Technology, vol 60, issue 2, 2014.

[47] Manchula A., Arumugam S, Face and fingerprint biometric fusion: Multimodal feature template matching

algorithm, International Journal of Applied Engineering Research, vol 9, issue 22, 2014.

[48] Ramesh Kumar K.A., Balamurugan K., Arungalai Vendan S., Bensam Raj J, Investigations on thermal

properties, stress and deformation of Al/SiC metal matrix composite based on finite element method.

Carbon - Science and Technology, Vol 6, Issue 3, 2014.

[49] Kanchana A., Arumugam S, Palm print texture recognition using connected-section morphological

segmentation, Asian Journal of Information Technology Vol 6, Issue 3, 2014.

[50] Padmapriya R., Thangavelu P, Characterization of nearly open sets using fuzzy sets, Global Journal of

Pure and Applied Mathematics, vol 11, issue 1, 2015.

[51] P.B. Narandiran, T. Bragadeeswaran, M. Kamalakannan, V. Aravind, Manufacture of Flyash Brick Using

Steel Slag and Tapioca Powder. Jour of Adv Research in Dynamical & Control Systems, Vol. 10, No. 12,

2018, 527-532

[52] R. Girimurugan*, N. Senniangiri, K. Adithya, B. Velliyangiri, Mechanical Behaviour of Coconut Shell

Powder Granule Reinforced Epoxy Resin Matrix Bio Composites, Jour of Adv Research in Dynamical &

Control Systems, Vol. 10, No. 12, 2018, 533-541.

Downloads

Published

31.10.2019

How to Cite

Gopalakrishnan, K., Thiruvenkatasamy, S., Prabhakar, E., & Aarthi, R. (2019). Night Vision Patrolling Rover Navigation System for Women’s Safety Using Machine Learning. International Journal of Psychosocial Rehabilitation, 23(4), 1137-1148. https://doi.org/10.61841/kr08mw69