India's greatest threat is the safety of its women. Women do not feel safe in a variety of situations. This needs to be addressed as quickly as feasible. Technology evolves and develops on a daily basis, affecting how people live. As a result, the focus of this article is on modernising the technological framework in order to strengthen women's safety mechanisms. We introduce a new security method in this study to protect women during unusual behaviours. A new security technique based on a patrolling robot using the Raspberry Pi has been proposed. In this case, a night vision camera can be employed to secure any location. Various machine learning methods are applied to improve the classifier's accuracy. The findings suggest that the suggested method outperforms existing methods.
1. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-3 (June 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15
93 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Women Safety Night Patrolling Robot Using IOT
M Renu Babu1
, B Hari Krishna2
, G Rakesh3
, M Sai Tejashri4
and Y Parichitha5
1
Assistant Professor, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering
College, INDIA
2
UG Scholar Student, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering
College, INDIA
3
UG Scholar Student, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering
College, INDIA
4
UG Scholar Student, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering
College, INDIA
5
UG Scholar Student, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering
College, INDIA
1
Corresponding Author: renubabum@tkrec.ac.in
ABSTRACT
India's greatest threat is the safety of its women.
Women do not feel safe in a variety of situations. This needs
to be addressed as quickly as feasible. Technology evolves and
develops on a daily basis, affecting how people live. As a
result, the focus of this article is on modernising the
technological framework in order to strengthen women's
safety mechanisms. We introduce a new security method in
this study to protect women during unusual behaviours. A
new security technique based on a patrolling robot using the
Raspberry Pi has been proposed. In this case, a night vision
camera can be employed to secure any location. Various
machine learning methods are applied to improve the
classifier's accuracy. The findings suggest that the suggested
method outperforms existing methods.
Keywords-- IOT, Night Vision Camera, Raspberry pi,
Sensors, Women Safety
I. INTRODUCTION
Women's safety is currently the most pressing
worry in many regions of the world. There is still a fear of
women in isolated locations. Women are skilled at uniting
disparate groups for a common goal. To promote peace,
they frequently collaborate across ethnic, religious,
political, and cultural barriers. We all recognise the
importance of women's safety, but we must also recognise
that they must be adequately protected. Because women
are not as physically powerful as men, a helping hand
would be a welcome relief in an emergency. The greatest
method to reduce your chances of being a victim of violent
crime (such as robbery, sexual assault, rape, or domestic
abuse) is to identify and contact resources that can assist
you in escaping risky situations. Having these applications
scan decrease the risk and bring aid when needed, whether
it is an emergency problem or they get separated from pals
during a night out and don't know how to return home.
Several of them were created for students to lessen the
danger of sexual assault on college, but they are
appropriate for all women. People are preparing to strike
back in various ways in the wake of the recent incident in
Delhi, which shocked the nation and made us aware of the
safety concerns for our daughters. Over the millennia, the
status of women in India has changed dramatically.
Women continue to face social challenges in modern India,
and they are frequently victims of abuse and violent
crimes; according to a global poll conducted by Thomson
Reuters, India is the “fourth most dangerous country” for
women in the world, and the worst country for women
among the G20 countries. It's past time for women to make
a shift. So, utilising a Raspberry Pi, we suggest a security
patrolling robot. This project focuses on a security robot
that is specifically created to provide security and
protection to women in order for them to never feel
helpless when confronted with such social difficulties. For
safeguarding any location, the system employs cameras
and sensors. When a robot hears a sound, it begins moving
in the direction of the sound along a predetermined course.
It can also stream live video. This robot is equipped with a
camera that can catch images, record them, and
communicate them to the control station. The control
station can receive a real-time video signal from this
system. The goal here is to secure the entire area. Any little
sound will cause the robot to activate a line following
course, which it will follow until it encounters an
obstruction, at which point it will capture an image of the
region and send it to the control room. In order to create an
autonomous robotic system, a Raspberry Pi coupled to a
camera is required.
II. METHODOLOGY
2. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-3 (June 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15
94 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The night vision camera is mounted on the
Raspberry Pi in this suggested system to help the system
go for automation and help find the human or any problem
detected using the sound sensor, and it automatically goes
to that region and captures the image and sends it to the
user using IOT technology.
The robot starts at some place and continues to
move, but stops at some spots to listen for any sounds; if
any are detected, the robot stops, otherwise it continues to
move. It is made up of four infrared sensors. While
patrolling, the robot moves in a predetermined line and
follows a predetermined path. If sound is detected, it stops
at specific points and carries on to the next. A sound
sensor is utilised to detect any sound, and if one is
detected, IR sensors set a line following path towards the
sound. The robot follows that path, capturing photographs
and transmitting them to the control room.
It resumes patrolling after sending the photos or
videos to the control room. If a sound is heard again, the
IR sensors create a line following path in the direction of
the sound, and the robot advances in that direction,
capturing the image.
Figure 1: Flow chart of women safety night patrolling
robot using IOT
If no sound is heard, it will continue patrolling
along the trail. We can avoid any harm to women in this
way.
III. PRIOR APPROACH
In the current approach, the patrol robot must be
commanded remotely by a person who must monitor the
region via remote control, necessitating the use of
additional human resources. Some solutions necessitate the
use of a smartphone to control the night vision robot.
Because some people use a local host web page, the
control range is confined to the local network. Due to a
lack of parts, autonomous operation necessitates the use of
a workforce. As a result, a great deal of human work is
required. Also, because this is a time-consuming operation,
errors may arise.
IV. OUR APPROACH
There is no requirement for regular monitoring in
our proposed system. It's completely automatic. It does not
produce any faults, and the time it takes to do any activity
is quite short, making this system a worthy robot. The IR
Sensor is utilised in this project to make the robot travel
automatically along a predetermined course. A sound
sensor is used to determine the sound level in a specific
region. The photos are collected by the camera and then
sent to the control room. A USB camera is linked to the
Raspberry Pi, and the Raspberry Pi is powered by a
battery. Using a VGA to HDMI converter cable, connect
the Raspberry Pi to the monitor via HDMI. Connect the
Raspberry Pi to a USB mouse and keyboard.
4.1 Block diagram
Figure 2: Block diagram of the women safety night
patrolling robot using IOT
V. HARDWARE COMPONENTS
5.1 Raspberry pi
The Raspberry Pi is a small, low-cost computer
the size of a credit card that connects to a computer
monitor or television and utilises a conventional keyboard
and mouse. It's a capable small device that allows
individuals of all ages to learn about computers and
programming languages like Scratch and Python. It can do
all of the functions of a desktop computer, including
3. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-3 (June 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15
95 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
accessing the internet and watching high-definition video,
as well as creating spreadsheets, word editing, and playing
games.
Figure 3: Raspberry pi
The Raspberry Pi can communicate with the outside world
and has been used in a variety of digital maker projects,
including music machines and parent detectors, as well as
weather stations and tweeting birdhouses with infrared
cameras.
Characteristics
ARM1176JZ-F Low-Power Applications
Processor • Dual Core Video Core IV Multimedia
Co-Processor • 1080p30 Full HD HP H.264
Video Encoder / Decoder • Advanced Image
Sensor Pipeline (ISP) • Low-power, high-
performance display outputs At 1080p60, a high-
resolution LCD and HDMI with HDCP are
displayed simultaneously.
5.2 Battery
The fastest-growing and most promising battery
chemistry is lithium-ion. A lithium-ion (Li-ion) battery is a
high-performance battery that employs lithium ions as a
key component of its electrochemistry. Lithium atoms in
the anode are ionised and separated from their electrons
during a discharge cycle. The lithium ions go from the
anode via the electrolyte to the cathode, where they
recombine with their electrons and become electrically
neutral. Between the anode and the cathode, the lithium
ions are tiny enough to pass through a micro-permeable
separator. Li-ion batteries can have a very high voltage and
charge storage per unit mass and volume, thanks in part to
lithium's tiny size (third only to hydrogen and helium).
Figure 4: Battery
The electrodes of Li-ion batteries can be made of
a variety of materials. The most popular combination is
lithium cobalt oxide (cathode) and graphite (anode), which
can be found in cell phones and computers. Lithium
manganese oxide (used in hybrid and electric vehicles) and
lithium iron phosphate are two other cathode materials.
Ether (a class of organic chemicals) is commonly used as
an electrolyte in Li-ion batteries.
5.3 L293D Driver Circuit
The L293D IC is typically packaged in a 16-pin
DIP package (dual-in line package). With just four
microcontroller pins, this motor driver IC can operate two
tiny motors in any direction: forward or backward (if you
do not use enable pins).
Description
It is based on the H-bridge concept. The H-bridge
is a circuit that permits current to flow in both directions.
Because voltage must change direction in order to rotate
the motor in either a clockwise or anticlockwise direction,
H-bridge ICs are perfect for driving a DC motor. In a
single l293d chip, there are two h-Bridge circuits that can
independently rotate two dc motors. It is often utilised in
robotic applications for controlling DC motors due to its
size. The pin diagram for an L293D motor controller is
shown below.
Figure 5: Pin diagram of L293D
On the l293d, there are two Enable pins. Pin 1
and pin 9 must both be high in order to drive the motor.
Pin 1 must be enabled to high in order to drive the motor
with the left H-bridge. You'll also need to raise pin 9 for
the right H-Bridge. The motor in the relevant segment will
stop functioning if either pin1 or pin9 goes low. It's as
though a switch has been flipped.
5.4 Infrared Sensor
A line follower or obstacle avoider robot can
benefit greatly from the use of an infrared sensor. In this
project, a simple infrared sensor is used to identify an
object that is around 6-7 cm away. An infrared sensor is
4. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-3 (June 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15
96 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
nothing more than a diode that detects infrared radiation.
The IR TX-RX pair is an infrared transmitter and receiver.
Figure 6: Infrared sensor
Working of IR
The functioning mechanism of an infrared sensor
is entirely reliant on changes in the resistance of the IR
receiver. In this sensor, the IR receiver is connected in
reverse bias, resulting in a very high resistance when not
exposed to IR light. The resistance in this example is in the
Mega ohm range, however when IR light is reflected back
and falls on the IR receiver, the resistance is much lower.
Rx has a resistance range of a few hundred ohms to a few
thousand ohms. This change in resistance is converted to a
voltage change. The voltage is then applied to a
comparator IC, which compares it to a predetermined
threshold level. If the sensor voltage exceeds the threshold,
the output is high; otherwise, it is low and can be used
directly by the microcontroller.
5.5 USB Camera
A USB camera is a video camera that feeds or
streams an image or video to or through a computer
network, such as the Internet, in real time. Small cameras
that sit on a desk, attach to a user's monitor, or are
incorporated into the hardware are the most common. This
is used in this project to take photos, record videos, and
broadcast live.
Figure 7: USB Camera
USB cameras are imaging cameras that transfer
image data using USB 2.0 or USB 3.0 technology. USB
cameras use the same USB technology that is present on
most laptops to connect to specialised computer systems.
USB Cameras are suited for various photographic
applications due to the widespread use of USB technology
in computer systems and the 480 Mb/s transfer rate of
USB 2.0.
A growing number of USB 3.0 cameras with data
transfer rates of up to 5 Gb/s are also available. Edmund
Optics offers a wide range of USB cameras to address a
wide range of image requirements. EO USB Cameras are
available with both CMOS and CCD sensors, allowing
them to be used in a wider range of applications. Most
USB cameras come with pre-installed capability for simple
setup, and software can be downloaded for most models.
USB cameras that operate on low-power USB connections,
such as those used on laptops, may require a separate
power supply.
5.6 Sound Sensor
One sort of module used to detect sound is the
sound sensor. This module is typically used to detect
sound intensity. Switch, security, and monitoring are some
of the most common uses for this module. For convenience
of use, the accuracy of this sensor can be modified. A
microphone is used to provide input to the buffer, peak
detector, and amplifier in this sensor. When a sound is
detected, this sensor sends an o/p voltage signal to a
microcontroller. Following that, it does the necessary
processing.
This sensor can detect noise levels in DBs (decibels) at
frequencies between 3 and 6 kHz, which is roughly where
the human ear is sensitive. To measure the sound level, an
android application called decibel metre is available for
smart phones.
Figure 8: Sound sensor
Pin Configuration
This sensor includes three pins which include the
following.
Pin1 (VCC): 3.3V DC to 5V DC
Pin2 (GND): This is aground pin
Pin3 (DO): This is an output pin
Working Principle
This sensor's functioning concept is similar to that
of human ears. Because the human eye has a diaphragm,
the diaphragm's primary job is to convert vibrations into
signals. This sensor, on the other hand, employs a
5. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-3 (June 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15
97 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
microphone whose primary job is to convert vibrations
into current rather than voltage.
5.7 WiFi Module
The ESP8266 is a low-cost Wi-Fi chip from a
Shanghai-based Chinese manufacturer that includes a full
TCP/IP stack and MCU (microcontroller unit)
functionality. The ESP-01 module, created by a third-party
producer, AI-Thinker, first brought the chip to the notice
of western makers in August 2014. Using Hayes-style
commands, this little module allows microcontrollers to
connect to a Wi-Fi network and make rudimentary TCP/IP
communications. There was, however, almost little
English-language documentation about the chip and the
commands it received at the time. Many hackers were
attracted to the module, chip, and software on it, as well as
to translate the Chinese documentation, due to the low
price and the fact that there were few external components
on the module, implying that it may someday be very
affordable in bulk.
Figure 9: ESP8266 WiFi module
Features
802.11 b/g/n protocol
Wi-Fi Direct (P2P), soft-AP
Integrated TCP/IP protocol stack
Integrated TR switch, balun, LNA, power
amplifier and matching network
Integrated PLL, regulators, and power
management units
+19.5dBm output power in 802.11b mode
Integrated temperature sensor
Supports antenna diversity
Power down leakage current of < 10uA
Integrated low power 32-bit CPU could be used
as application processor
SDIO 2.0, SPI, UART
STBC, 1×1 MIMO, 2×1 MIMO
A-MPDU & A-MSDU aggregation & 0.4µs guard
interval
5.8 DC Motor
The DC is most typically employed in industrial
applications such as automation technologies for high-tech
gadgets. It's a self-contained electrical device that spins
machine parts with high precision and efficiency. This
motor's output shaft can also be adjusted to a certain angle.
These are commonly found in consumer electronics, toys,
automobiles, aeroplanes, and a variety of other equipment.
Figure 10: DC Motor
Definition: A rotary actuator or motor that provides for
exact control of angular position, acceleration, and velocity
is known as a DC motor. In essence, it possesses qualities
that a standard motor lacks. As a result, it employs a
standard motor in conjunction with a position feedback
sensor.
Principle of working
The angle of rotation of a DC motor is regulated
by the duration of the pulse delivered to its control PIN,
according to the PWM (Pulse Width Modulation) concept.
Applications
Robotics
Conveyor belts
Camera auto focus
VI. SOFTWARE
6.1 Python
Python is a high-level, general-purpose
programming language that is interpreted. Python's design
philosophy prioritises code readability, as evidenced by its
extensive use of indentation. Its language elements and
object-oriented approach are aimed at assisting
programmers in writing clear, logical code for both small
and large-scale projects. Python is designed to be a
language that is simple to understand. Its formatting is
clean and uncomplicated, and it frequently uses English
terms instead of punctuation in other languages. It does not
employ curly brackets to delimit blocks, unlike many other
languages, and semicolons after statements are allowed but
seldom, if ever, utilised. In comparison to C, it features
fewer syntactic exceptions and special instances.
6.2 Raspbian OS
The Raspberry Pi's operating system is housed on
a micro SD card. The operating system must be installed
on the card if it does not already exist. The operating
6. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-3 (June 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15
98 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
system on your Raspberry Pi can be set up in a variety of
ways. Raspberry Pi OS (formerly known as Raspbian) is a
Debian-based operating system for the Raspberry Pi. The
Raspberry Pi Foundation has officially released it as the
primary operating system for the Raspberry Pi line of
small single-board computers since 2015. Mike Thompson
and Peter Green produced the first version of Raspbian as
a side project. The first phase of construction was finished
in June 2012.
VII. APPLICATIONS
Used for the safety of women.
Used for the safety of children.
Used for the safety of physically challenged
people.
Applicable as a legal evidence of crime.
Remote regions can likewise be investigated.
Used to record and send video of the necessary
condition.
VIII. ADVANTAGES
Cost efficient.
Automatic control.
Quick response.
Reduced error.
IX. CONCLUSION
Women can never feel afraid or helpless in any
situation, and they can defend themselves even late at
night. These methods will also aid authorities in
apprehending and tracking down the criminals. Because
women's safety is an issue in many parts of the world, this
robot can prove to be a valuable resource.
FUTURE SCOPE
There are numerous enhancements to the current
design and technology that can be made, as well
as numerous extra features that may be
introduced.
Different types of sensors, such as temperature
sensors, pressure sensors, heat sensors, position
sensors, and proximity sensors, can be used to use
robots in many fields.
A wireless network can be used to create a
multipurpose robot, with applications ranging
from surveillance and home security to industrial
applications where the user does not need to be
physically present at the work site but may do it
from his house.
REFERENCES
[1] M. Bertozzi, A. Broggi, C. Caraffi, M. Del Rose, M.
Felisa, & G. Vezzoni. (2007). Pedestrian detection by
means of far-infrared stereo vision. Computer Vision and
Image Understanding, 106(2), 194–204.
[2] J. Ge, Y. Luo, & G. Tei. (2009). Real-time pedestrian
detection and tracking at nighttime for driver-assistance
systems. Intelligent Transportation Systems, IEEE
Transactions, 10(2), 283–298.
[3] J.M. A´ lvarez & A.M. Lopez. (2010). Road detection
based on illuminant invariance. Intelligent Transportation
Systems, IEEE Transactions, 99, 1–10.
[4] O. Ramstrom & H. Christensen. (2005). A method for
following unmarked roads. In: Intelligent Vehicles
Symposium, pp. 650–655.