SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-3 (June 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15
93 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Women Safety Night Patrolling Robot Using IOT
M Renu Babu1
, B Hari Krishna2
, G Rakesh3
, M Sai Tejashri4
and Y Parichitha5
1
Assistant Professor, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering
College, INDIA
2
UG Scholar Student, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering
College, INDIA
3
UG Scholar Student, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering
College, INDIA
4
UG Scholar Student, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering
College, INDIA
5
UG Scholar Student, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering
College, INDIA
1
Corresponding Author: renubabum@tkrec.ac.in
ABSTRACT
India's greatest threat is the safety of its women.
Women do not feel safe in a variety of situations. This needs
to be addressed as quickly as feasible. Technology evolves and
develops on a daily basis, affecting how people live. As a
result, the focus of this article is on modernising the
technological framework in order to strengthen women's
safety mechanisms. We introduce a new security method in
this study to protect women during unusual behaviours. A
new security technique based on a patrolling robot using the
Raspberry Pi has been proposed. In this case, a night vision
camera can be employed to secure any location. Various
machine learning methods are applied to improve the
classifier's accuracy. The findings suggest that the suggested
method outperforms existing methods.
Keywords-- IOT, Night Vision Camera, Raspberry pi,
Sensors, Women Safety
I. INTRODUCTION
Women's safety is currently the most pressing
worry in many regions of the world. There is still a fear of
women in isolated locations. Women are skilled at uniting
disparate groups for a common goal. To promote peace,
they frequently collaborate across ethnic, religious,
political, and cultural barriers. We all recognise the
importance of women's safety, but we must also recognise
that they must be adequately protected. Because women
are not as physically powerful as men, a helping hand
would be a welcome relief in an emergency. The greatest
method to reduce your chances of being a victim of violent
crime (such as robbery, sexual assault, rape, or domestic
abuse) is to identify and contact resources that can assist
you in escaping risky situations. Having these applications
scan decrease the risk and bring aid when needed, whether
it is an emergency problem or they get separated from pals
during a night out and don't know how to return home.
Several of them were created for students to lessen the
danger of sexual assault on college, but they are
appropriate for all women. People are preparing to strike
back in various ways in the wake of the recent incident in
Delhi, which shocked the nation and made us aware of the
safety concerns for our daughters. Over the millennia, the
status of women in India has changed dramatically.
Women continue to face social challenges in modern India,
and they are frequently victims of abuse and violent
crimes; according to a global poll conducted by Thomson
Reuters, India is the “fourth most dangerous country” for
women in the world, and the worst country for women
among the G20 countries. It's past time for women to make
a shift. So, utilising a Raspberry Pi, we suggest a security
patrolling robot. This project focuses on a security robot
that is specifically created to provide security and
protection to women in order for them to never feel
helpless when confronted with such social difficulties. For
safeguarding any location, the system employs cameras
and sensors. When a robot hears a sound, it begins moving
in the direction of the sound along a predetermined course.
It can also stream live video. This robot is equipped with a
camera that can catch images, record them, and
communicate them to the control station. The control
station can receive a real-time video signal from this
system. The goal here is to secure the entire area. Any little
sound will cause the robot to activate a line following
course, which it will follow until it encounters an
obstruction, at which point it will capture an image of the
region and send it to the control room. In order to create an
autonomous robotic system, a Raspberry Pi coupled to a
camera is required.
II. METHODOLOGY
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-3 (June 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15
94 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The night vision camera is mounted on the
Raspberry Pi in this suggested system to help the system
go for automation and help find the human or any problem
detected using the sound sensor, and it automatically goes
to that region and captures the image and sends it to the
user using IOT technology.
The robot starts at some place and continues to
move, but stops at some spots to listen for any sounds; if
any are detected, the robot stops, otherwise it continues to
move. It is made up of four infrared sensors. While
patrolling, the robot moves in a predetermined line and
follows a predetermined path. If sound is detected, it stops
at specific points and carries on to the next. A sound
sensor is utilised to detect any sound, and if one is
detected, IR sensors set a line following path towards the
sound. The robot follows that path, capturing photographs
and transmitting them to the control room.
It resumes patrolling after sending the photos or
videos to the control room. If a sound is heard again, the
IR sensors create a line following path in the direction of
the sound, and the robot advances in that direction,
capturing the image.
Figure 1: Flow chart of women safety night patrolling
robot using IOT
If no sound is heard, it will continue patrolling
along the trail. We can avoid any harm to women in this
way.
III. PRIOR APPROACH
In the current approach, the patrol robot must be
commanded remotely by a person who must monitor the
region via remote control, necessitating the use of
additional human resources. Some solutions necessitate the
use of a smartphone to control the night vision robot.
Because some people use a local host web page, the
control range is confined to the local network. Due to a
lack of parts, autonomous operation necessitates the use of
a workforce. As a result, a great deal of human work is
required. Also, because this is a time-consuming operation,
errors may arise.
IV. OUR APPROACH
There is no requirement for regular monitoring in
our proposed system. It's completely automatic. It does not
produce any faults, and the time it takes to do any activity
is quite short, making this system a worthy robot. The IR
Sensor is utilised in this project to make the robot travel
automatically along a predetermined course. A sound
sensor is used to determine the sound level in a specific
region. The photos are collected by the camera and then
sent to the control room. A USB camera is linked to the
Raspberry Pi, and the Raspberry Pi is powered by a
battery. Using a VGA to HDMI converter cable, connect
the Raspberry Pi to the monitor via HDMI. Connect the
Raspberry Pi to a USB mouse and keyboard.
4.1 Block diagram
Figure 2: Block diagram of the women safety night
patrolling robot using IOT
V. HARDWARE COMPONENTS
5.1 Raspberry pi
The Raspberry Pi is a small, low-cost computer
the size of a credit card that connects to a computer
monitor or television and utilises a conventional keyboard
and mouse. It's a capable small device that allows
individuals of all ages to learn about computers and
programming languages like Scratch and Python. It can do
all of the functions of a desktop computer, including
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-3 (June 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15
95 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
accessing the internet and watching high-definition video,
as well as creating spreadsheets, word editing, and playing
games.
Figure 3: Raspberry pi
The Raspberry Pi can communicate with the outside world
and has been used in a variety of digital maker projects,
including music machines and parent detectors, as well as
weather stations and tweeting birdhouses with infrared
cameras.
Characteristics
 ARM1176JZ-F Low-Power Applications
Processor • Dual Core Video Core IV Multimedia
Co-Processor • 1080p30 Full HD HP H.264
Video Encoder / Decoder • Advanced Image
Sensor Pipeline (ISP) • Low-power, high-
performance display outputs At 1080p60, a high-
resolution LCD and HDMI with HDCP are
displayed simultaneously.
5.2 Battery
The fastest-growing and most promising battery
chemistry is lithium-ion. A lithium-ion (Li-ion) battery is a
high-performance battery that employs lithium ions as a
key component of its electrochemistry. Lithium atoms in
the anode are ionised and separated from their electrons
during a discharge cycle. The lithium ions go from the
anode via the electrolyte to the cathode, where they
recombine with their electrons and become electrically
neutral. Between the anode and the cathode, the lithium
ions are tiny enough to pass through a micro-permeable
separator. Li-ion batteries can have a very high voltage and
charge storage per unit mass and volume, thanks in part to
lithium's tiny size (third only to hydrogen and helium).
Figure 4: Battery
The electrodes of Li-ion batteries can be made of
a variety of materials. The most popular combination is
lithium cobalt oxide (cathode) and graphite (anode), which
can be found in cell phones and computers. Lithium
manganese oxide (used in hybrid and electric vehicles) and
lithium iron phosphate are two other cathode materials.
Ether (a class of organic chemicals) is commonly used as
an electrolyte in Li-ion batteries.
5.3 L293D Driver Circuit
The L293D IC is typically packaged in a 16-pin
DIP package (dual-in line package). With just four
microcontroller pins, this motor driver IC can operate two
tiny motors in any direction: forward or backward (if you
do not use enable pins).
Description
It is based on the H-bridge concept. The H-bridge
is a circuit that permits current to flow in both directions.
Because voltage must change direction in order to rotate
the motor in either a clockwise or anticlockwise direction,
H-bridge ICs are perfect for driving a DC motor. In a
single l293d chip, there are two h-Bridge circuits that can
independently rotate two dc motors. It is often utilised in
robotic applications for controlling DC motors due to its
size. The pin diagram for an L293D motor controller is
shown below.
Figure 5: Pin diagram of L293D
On the l293d, there are two Enable pins. Pin 1
and pin 9 must both be high in order to drive the motor.
Pin 1 must be enabled to high in order to drive the motor
with the left H-bridge. You'll also need to raise pin 9 for
the right H-Bridge. The motor in the relevant segment will
stop functioning if either pin1 or pin9 goes low. It's as
though a switch has been flipped.
5.4 Infrared Sensor
A line follower or obstacle avoider robot can
benefit greatly from the use of an infrared sensor. In this
project, a simple infrared sensor is used to identify an
object that is around 6-7 cm away. An infrared sensor is
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-3 (June 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15
96 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
nothing more than a diode that detects infrared radiation.
The IR TX-RX pair is an infrared transmitter and receiver.
Figure 6: Infrared sensor
Working of IR
The functioning mechanism of an infrared sensor
is entirely reliant on changes in the resistance of the IR
receiver. In this sensor, the IR receiver is connected in
reverse bias, resulting in a very high resistance when not
exposed to IR light. The resistance in this example is in the
Mega ohm range, however when IR light is reflected back
and falls on the IR receiver, the resistance is much lower.
Rx has a resistance range of a few hundred ohms to a few
thousand ohms. This change in resistance is converted to a
voltage change. The voltage is then applied to a
comparator IC, which compares it to a predetermined
threshold level. If the sensor voltage exceeds the threshold,
the output is high; otherwise, it is low and can be used
directly by the microcontroller.
5.5 USB Camera
A USB camera is a video camera that feeds or
streams an image or video to or through a computer
network, such as the Internet, in real time. Small cameras
that sit on a desk, attach to a user's monitor, or are
incorporated into the hardware are the most common. This
is used in this project to take photos, record videos, and
broadcast live.
Figure 7: USB Camera
USB cameras are imaging cameras that transfer
image data using USB 2.0 or USB 3.0 technology. USB
cameras use the same USB technology that is present on
most laptops to connect to specialised computer systems.
USB Cameras are suited for various photographic
applications due to the widespread use of USB technology
in computer systems and the 480 Mb/s transfer rate of
USB 2.0.
A growing number of USB 3.0 cameras with data
transfer rates of up to 5 Gb/s are also available. Edmund
Optics offers a wide range of USB cameras to address a
wide range of image requirements. EO USB Cameras are
available with both CMOS and CCD sensors, allowing
them to be used in a wider range of applications. Most
USB cameras come with pre-installed capability for simple
setup, and software can be downloaded for most models.
USB cameras that operate on low-power USB connections,
such as those used on laptops, may require a separate
power supply.
5.6 Sound Sensor
One sort of module used to detect sound is the
sound sensor. This module is typically used to detect
sound intensity. Switch, security, and monitoring are some
of the most common uses for this module. For convenience
of use, the accuracy of this sensor can be modified. A
microphone is used to provide input to the buffer, peak
detector, and amplifier in this sensor. When a sound is
detected, this sensor sends an o/p voltage signal to a
microcontroller. Following that, it does the necessary
processing.
This sensor can detect noise levels in DBs (decibels) at
frequencies between 3 and 6 kHz, which is roughly where
the human ear is sensitive. To measure the sound level, an
android application called decibel metre is available for
smart phones.
Figure 8: Sound sensor
Pin Configuration
This sensor includes three pins which include the
following.
 Pin1 (VCC): 3.3V DC to 5V DC
 Pin2 (GND): This is aground pin
 Pin3 (DO): This is an output pin
Working Principle
This sensor's functioning concept is similar to that
of human ears. Because the human eye has a diaphragm,
the diaphragm's primary job is to convert vibrations into
signals. This sensor, on the other hand, employs a
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-3 (June 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15
97 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
microphone whose primary job is to convert vibrations
into current rather than voltage.
5.7 WiFi Module
The ESP8266 is a low-cost Wi-Fi chip from a
Shanghai-based Chinese manufacturer that includes a full
TCP/IP stack and MCU (microcontroller unit)
functionality. The ESP-01 module, created by a third-party
producer, AI-Thinker, first brought the chip to the notice
of western makers in August 2014. Using Hayes-style
commands, this little module allows microcontrollers to
connect to a Wi-Fi network and make rudimentary TCP/IP
communications. There was, however, almost little
English-language documentation about the chip and the
commands it received at the time. Many hackers were
attracted to the module, chip, and software on it, as well as
to translate the Chinese documentation, due to the low
price and the fact that there were few external components
on the module, implying that it may someday be very
affordable in bulk.
Figure 9: ESP8266 WiFi module
Features
 802.11 b/g/n protocol
 Wi-Fi Direct (P2P), soft-AP
 Integrated TCP/IP protocol stack
 Integrated TR switch, balun, LNA, power
amplifier and matching network
 Integrated PLL, regulators, and power
management units
 +19.5dBm output power in 802.11b mode
 Integrated temperature sensor
 Supports antenna diversity
 Power down leakage current of < 10uA
 Integrated low power 32-bit CPU could be used
as application processor
 SDIO 2.0, SPI, UART
 STBC, 1×1 MIMO, 2×1 MIMO
 A-MPDU & A-MSDU aggregation & 0.4µs guard
interval
5.8 DC Motor
The DC is most typically employed in industrial
applications such as automation technologies for high-tech
gadgets. It's a self-contained electrical device that spins
machine parts with high precision and efficiency. This
motor's output shaft can also be adjusted to a certain angle.
These are commonly found in consumer electronics, toys,
automobiles, aeroplanes, and a variety of other equipment.
Figure 10: DC Motor
Definition: A rotary actuator or motor that provides for
exact control of angular position, acceleration, and velocity
is known as a DC motor. In essence, it possesses qualities
that a standard motor lacks. As a result, it employs a
standard motor in conjunction with a position feedback
sensor.
Principle of working
The angle of rotation of a DC motor is regulated
by the duration of the pulse delivered to its control PIN,
according to the PWM (Pulse Width Modulation) concept.
Applications
 Robotics
 Conveyor belts
 Camera auto focus
VI. SOFTWARE
6.1 Python
Python is a high-level, general-purpose
programming language that is interpreted. Python's design
philosophy prioritises code readability, as evidenced by its
extensive use of indentation. Its language elements and
object-oriented approach are aimed at assisting
programmers in writing clear, logical code for both small
and large-scale projects. Python is designed to be a
language that is simple to understand. Its formatting is
clean and uncomplicated, and it frequently uses English
terms instead of punctuation in other languages. It does not
employ curly brackets to delimit blocks, unlike many other
languages, and semicolons after statements are allowed but
seldom, if ever, utilised. In comparison to C, it features
fewer syntactic exceptions and special instances.
6.2 Raspbian OS
The Raspberry Pi's operating system is housed on
a micro SD card. The operating system must be installed
on the card if it does not already exist. The operating
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-3 (June 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15
98 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
system on your Raspberry Pi can be set up in a variety of
ways. Raspberry Pi OS (formerly known as Raspbian) is a
Debian-based operating system for the Raspberry Pi. The
Raspberry Pi Foundation has officially released it as the
primary operating system for the Raspberry Pi line of
small single-board computers since 2015. Mike Thompson
and Peter Green produced the first version of Raspbian as
a side project. The first phase of construction was finished
in June 2012.
VII. APPLICATIONS
 Used for the safety of women.
 Used for the safety of children.
 Used for the safety of physically challenged
people.
 Applicable as a legal evidence of crime.
 Remote regions can likewise be investigated.
 Used to record and send video of the necessary
condition.
VIII. ADVANTAGES
 Cost efficient.
 Automatic control.
 Quick response.
 Reduced error.
IX. CONCLUSION
Women can never feel afraid or helpless in any
situation, and they can defend themselves even late at
night. These methods will also aid authorities in
apprehending and tracking down the criminals. Because
women's safety is an issue in many parts of the world, this
robot can prove to be a valuable resource.
FUTURE SCOPE
 There are numerous enhancements to the current
design and technology that can be made, as well
as numerous extra features that may be
introduced.
 Different types of sensors, such as temperature
sensors, pressure sensors, heat sensors, position
sensors, and proximity sensors, can be used to use
robots in many fields.
 A wireless network can be used to create a
multipurpose robot, with applications ranging
from surveillance and home security to industrial
applications where the user does not need to be
physically present at the work site but may do it
from his house.
REFERENCES
[1] M. Bertozzi, A. Broggi, C. Caraffi, M. Del Rose, M.
Felisa, & G. Vezzoni. (2007). Pedestrian detection by
means of far-infrared stereo vision. Computer Vision and
Image Understanding, 106(2), 194–204.
[2] J. Ge, Y. Luo, & G. Tei. (2009). Real-time pedestrian
detection and tracking at nighttime for driver-assistance
systems. Intelligent Transportation Systems, IEEE
Transactions, 10(2), 283–298.
[3] J.M. A´ lvarez & A.M. Lopez. (2010). Road detection
based on illuminant invariance. Intelligent Transportation
Systems, IEEE Transactions, 99, 1–10.
[4] O. Ramstrom & H. Christensen. (2005). A method for
following unmarked roads. In: Intelligent Vehicles
Symposium, pp. 650–655.

Más contenido relacionado

La actualidad más candente

inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communication
Nitish Tanwar
 
Training Report on Embedded System
Training Report on Embedded SystemTraining Report on Embedded System
Training Report on Embedded System
Roshan Mani
 
THE THIRD EYE-Presentation
THE THIRD EYE-PresentationTHE THIRD EYE-Presentation
THE THIRD EYE-Presentation
Romil Shah
 

La actualidad más candente (20)

Women safety device with gps tracking and alerts
Women safety device with gps tracking  and alertsWomen safety device with gps tracking  and alerts
Women safety device with gps tracking and alerts
 
Smart door lock
Smart door lockSmart door lock
Smart door lock
 
Presentation IOT Robot
Presentation IOT RobotPresentation IOT Robot
Presentation IOT Robot
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communication
 
Li fi technology ppt
Li fi technology pptLi fi technology ppt
Li fi technology ppt
 
home automation using esp8266
home automation using esp8266home automation using esp8266
home automation using esp8266
 
Training Report on Embedded System
Training Report on Embedded SystemTraining Report on Embedded System
Training Report on Embedded System
 
THE THIRD EYE-Presentation
THE THIRD EYE-PresentationTHE THIRD EYE-Presentation
THE THIRD EYE-Presentation
 
Smart street lighting control system project PPT
Smart street lighting control system project PPT Smart street lighting control system project PPT
Smart street lighting control system project PPT
 
IRJET- IOT Based Surveillance Robotic Car using Raspberry PI
IRJET- IOT Based Surveillance Robotic Car using Raspberry PIIRJET- IOT Based Surveillance Robotic Car using Raspberry PI
IRJET- IOT Based Surveillance Robotic Car using Raspberry PI
 
ACCIDENT DETECTION SYSTEM PPT
ACCIDENT DETECTION SYSTEM PPTACCIDENT DETECTION SYSTEM PPT
ACCIDENT DETECTION SYSTEM PPT
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
 
Smart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharSmart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likhar
 
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEMAUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
 
Bluetooth Controlled Robot Project Report
Bluetooth Controlled Robot Project ReportBluetooth Controlled Robot Project Report
Bluetooth Controlled Robot Project Report
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
ppt
pptppt
ppt
 
Sensor technology
Sensor technologySensor technology
Sensor technology
 
Wireless charging ppt
Wireless charging pptWireless charging ppt
Wireless charging ppt
 

Similar a Women Safety Night Patrolling Robot Using IOT

SISR - Smart Indoor Surveillance Robot using IoT for day to day usage PPT.pptx
SISR - Smart Indoor Surveillance Robot using IoT for day to day usage PPT.pptxSISR - Smart Indoor Surveillance Robot using IoT for day to day usage PPT.pptx
SISR - Smart Indoor Surveillance Robot using IoT for day to day usage PPT.pptx
SanjaySTippannavar1
 

Similar a Women Safety Night Patrolling Robot Using IOT (20)

IRJET - Ensuring Women Safety by Offline Tracking
IRJET -  	  Ensuring Women Safety by Offline TrackingIRJET -  	  Ensuring Women Safety by Offline Tracking
IRJET - Ensuring Women Safety by Offline Tracking
 
SISR - Smart Indoor Surveillance Robot using IoT for day to day usage PPT.pptx
SISR - Smart Indoor Surveillance Robot using IoT for day to day usage PPT.pptxSISR - Smart Indoor Surveillance Robot using IoT for day to day usage PPT.pptx
SISR - Smart Indoor Surveillance Robot using IoT for day to day usage PPT.pptx
 
IRJET- Women Security System using IoT
IRJET-  	  Women Security System using IoTIRJET-  	  Women Security System using IoT
IRJET- Women Security System using IoT
 
CSE journals
CSE journalsCSE journals
CSE journals
 
IRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women Safety
 
Bomb squad final thesis
Bomb squad final thesis Bomb squad final thesis
Bomb squad final thesis
 
military surveillance robot
military surveillance robot  military surveillance robot
military surveillance robot
 
Multi-Purpose Robot using Raspberry Pi & Controlled by Smartphone
Multi-Purpose Robot using Raspberry Pi & Controlled by SmartphoneMulti-Purpose Robot using Raspberry Pi & Controlled by Smartphone
Multi-Purpose Robot using Raspberry Pi & Controlled by Smartphone
 
ELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETY
 
IRJET- Animal Identification in Roads and Alert System for Passengers usi...
IRJET-  	  Animal Identification in Roads and Alert System for Passengers usi...IRJET-  	  Animal Identification in Roads and Alert System for Passengers usi...
IRJET- Animal Identification in Roads and Alert System for Passengers usi...
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
Engineering Project profile
Engineering Project profile Engineering Project profile
Engineering Project profile
 
IRJET - Women’s Safety System using IoT
IRJET -  	  Women’s Safety System using IoTIRJET -  	  Women’s Safety System using IoT
IRJET - Women’s Safety System using IoT
 
Detecting Alive Human Using Robot for Rescue Operation
Detecting Alive Human Using Robot for Rescue OperationDetecting Alive Human Using Robot for Rescue Operation
Detecting Alive Human Using Robot for Rescue Operation
 
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
 
GILS: Automatic Security and Gas Detection Robot
GILS: Automatic Security and Gas Detection RobotGILS: Automatic Security and Gas Detection Robot
GILS: Automatic Security and Gas Detection Robot
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
 
Smart Elevator
Smart ElevatorSmart Elevator
Smart Elevator
 
WarField Robot
WarField RobotWarField Robot
WarField Robot
 
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking System
 

Más de Dr. Amarjeet Singh

An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
Dr. Amarjeet Singh
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Dr. Amarjeet Singh
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Dr. Amarjeet Singh
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of View
Dr. Amarjeet Singh
 

Más de Dr. Amarjeet Singh (20)

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
 
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
 
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
 
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
 
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
 
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
 
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
 
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
 
A Study on Derivative Market in India
A Study on Derivative Market in IndiaA Study on Derivative Market in India
A Study on Derivative Market in India
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
 
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidAnalytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
 
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureTechno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
 
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
 
Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of View
 
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
 
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
 
Capacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryCapacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel Industry
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain Ecosystem
 

Último

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 

Último (20)

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 

Women Safety Night Patrolling Robot Using IOT

  • 1. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-11, Issue-3 (June 2021) www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15 93 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. Women Safety Night Patrolling Robot Using IOT M Renu Babu1 , B Hari Krishna2 , G Rakesh3 , M Sai Tejashri4 and Y Parichitha5 1 Assistant Professor, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering College, INDIA 2 UG Scholar Student, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering College, INDIA 3 UG Scholar Student, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering College, INDIA 4 UG Scholar Student, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering College, INDIA 5 UG Scholar Student, Department of Electronics and Communication Engineering, Teegala Krishna Reddy Engineering College, INDIA 1 Corresponding Author: renubabum@tkrec.ac.in ABSTRACT India's greatest threat is the safety of its women. Women do not feel safe in a variety of situations. This needs to be addressed as quickly as feasible. Technology evolves and develops on a daily basis, affecting how people live. As a result, the focus of this article is on modernising the technological framework in order to strengthen women's safety mechanisms. We introduce a new security method in this study to protect women during unusual behaviours. A new security technique based on a patrolling robot using the Raspberry Pi has been proposed. In this case, a night vision camera can be employed to secure any location. Various machine learning methods are applied to improve the classifier's accuracy. The findings suggest that the suggested method outperforms existing methods. Keywords-- IOT, Night Vision Camera, Raspberry pi, Sensors, Women Safety I. INTRODUCTION Women's safety is currently the most pressing worry in many regions of the world. There is still a fear of women in isolated locations. Women are skilled at uniting disparate groups for a common goal. To promote peace, they frequently collaborate across ethnic, religious, political, and cultural barriers. We all recognise the importance of women's safety, but we must also recognise that they must be adequately protected. Because women are not as physically powerful as men, a helping hand would be a welcome relief in an emergency. The greatest method to reduce your chances of being a victim of violent crime (such as robbery, sexual assault, rape, or domestic abuse) is to identify and contact resources that can assist you in escaping risky situations. Having these applications scan decrease the risk and bring aid when needed, whether it is an emergency problem or they get separated from pals during a night out and don't know how to return home. Several of them were created for students to lessen the danger of sexual assault on college, but they are appropriate for all women. People are preparing to strike back in various ways in the wake of the recent incident in Delhi, which shocked the nation and made us aware of the safety concerns for our daughters. Over the millennia, the status of women in India has changed dramatically. Women continue to face social challenges in modern India, and they are frequently victims of abuse and violent crimes; according to a global poll conducted by Thomson Reuters, India is the “fourth most dangerous country” for women in the world, and the worst country for women among the G20 countries. It's past time for women to make a shift. So, utilising a Raspberry Pi, we suggest a security patrolling robot. This project focuses on a security robot that is specifically created to provide security and protection to women in order for them to never feel helpless when confronted with such social difficulties. For safeguarding any location, the system employs cameras and sensors. When a robot hears a sound, it begins moving in the direction of the sound along a predetermined course. It can also stream live video. This robot is equipped with a camera that can catch images, record them, and communicate them to the control station. The control station can receive a real-time video signal from this system. The goal here is to secure the entire area. Any little sound will cause the robot to activate a line following course, which it will follow until it encounters an obstruction, at which point it will capture an image of the region and send it to the control room. In order to create an autonomous robotic system, a Raspberry Pi coupled to a camera is required. II. METHODOLOGY
  • 2. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-11, Issue-3 (June 2021) www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15 94 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. The night vision camera is mounted on the Raspberry Pi in this suggested system to help the system go for automation and help find the human or any problem detected using the sound sensor, and it automatically goes to that region and captures the image and sends it to the user using IOT technology. The robot starts at some place and continues to move, but stops at some spots to listen for any sounds; if any are detected, the robot stops, otherwise it continues to move. It is made up of four infrared sensors. While patrolling, the robot moves in a predetermined line and follows a predetermined path. If sound is detected, it stops at specific points and carries on to the next. A sound sensor is utilised to detect any sound, and if one is detected, IR sensors set a line following path towards the sound. The robot follows that path, capturing photographs and transmitting them to the control room. It resumes patrolling after sending the photos or videos to the control room. If a sound is heard again, the IR sensors create a line following path in the direction of the sound, and the robot advances in that direction, capturing the image. Figure 1: Flow chart of women safety night patrolling robot using IOT If no sound is heard, it will continue patrolling along the trail. We can avoid any harm to women in this way. III. PRIOR APPROACH In the current approach, the patrol robot must be commanded remotely by a person who must monitor the region via remote control, necessitating the use of additional human resources. Some solutions necessitate the use of a smartphone to control the night vision robot. Because some people use a local host web page, the control range is confined to the local network. Due to a lack of parts, autonomous operation necessitates the use of a workforce. As a result, a great deal of human work is required. Also, because this is a time-consuming operation, errors may arise. IV. OUR APPROACH There is no requirement for regular monitoring in our proposed system. It's completely automatic. It does not produce any faults, and the time it takes to do any activity is quite short, making this system a worthy robot. The IR Sensor is utilised in this project to make the robot travel automatically along a predetermined course. A sound sensor is used to determine the sound level in a specific region. The photos are collected by the camera and then sent to the control room. A USB camera is linked to the Raspberry Pi, and the Raspberry Pi is powered by a battery. Using a VGA to HDMI converter cable, connect the Raspberry Pi to the monitor via HDMI. Connect the Raspberry Pi to a USB mouse and keyboard. 4.1 Block diagram Figure 2: Block diagram of the women safety night patrolling robot using IOT V. HARDWARE COMPONENTS 5.1 Raspberry pi The Raspberry Pi is a small, low-cost computer the size of a credit card that connects to a computer monitor or television and utilises a conventional keyboard and mouse. It's a capable small device that allows individuals of all ages to learn about computers and programming languages like Scratch and Python. It can do all of the functions of a desktop computer, including
  • 3. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-11, Issue-3 (June 2021) www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15 95 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. accessing the internet and watching high-definition video, as well as creating spreadsheets, word editing, and playing games. Figure 3: Raspberry pi The Raspberry Pi can communicate with the outside world and has been used in a variety of digital maker projects, including music machines and parent detectors, as well as weather stations and tweeting birdhouses with infrared cameras. Characteristics  ARM1176JZ-F Low-Power Applications Processor • Dual Core Video Core IV Multimedia Co-Processor • 1080p30 Full HD HP H.264 Video Encoder / Decoder • Advanced Image Sensor Pipeline (ISP) • Low-power, high- performance display outputs At 1080p60, a high- resolution LCD and HDMI with HDCP are displayed simultaneously. 5.2 Battery The fastest-growing and most promising battery chemistry is lithium-ion. A lithium-ion (Li-ion) battery is a high-performance battery that employs lithium ions as a key component of its electrochemistry. Lithium atoms in the anode are ionised and separated from their electrons during a discharge cycle. The lithium ions go from the anode via the electrolyte to the cathode, where they recombine with their electrons and become electrically neutral. Between the anode and the cathode, the lithium ions are tiny enough to pass through a micro-permeable separator. Li-ion batteries can have a very high voltage and charge storage per unit mass and volume, thanks in part to lithium's tiny size (third only to hydrogen and helium). Figure 4: Battery The electrodes of Li-ion batteries can be made of a variety of materials. The most popular combination is lithium cobalt oxide (cathode) and graphite (anode), which can be found in cell phones and computers. Lithium manganese oxide (used in hybrid and electric vehicles) and lithium iron phosphate are two other cathode materials. Ether (a class of organic chemicals) is commonly used as an electrolyte in Li-ion batteries. 5.3 L293D Driver Circuit The L293D IC is typically packaged in a 16-pin DIP package (dual-in line package). With just four microcontroller pins, this motor driver IC can operate two tiny motors in any direction: forward or backward (if you do not use enable pins). Description It is based on the H-bridge concept. The H-bridge is a circuit that permits current to flow in both directions. Because voltage must change direction in order to rotate the motor in either a clockwise or anticlockwise direction, H-bridge ICs are perfect for driving a DC motor. In a single l293d chip, there are two h-Bridge circuits that can independently rotate two dc motors. It is often utilised in robotic applications for controlling DC motors due to its size. The pin diagram for an L293D motor controller is shown below. Figure 5: Pin diagram of L293D On the l293d, there are two Enable pins. Pin 1 and pin 9 must both be high in order to drive the motor. Pin 1 must be enabled to high in order to drive the motor with the left H-bridge. You'll also need to raise pin 9 for the right H-Bridge. The motor in the relevant segment will stop functioning if either pin1 or pin9 goes low. It's as though a switch has been flipped. 5.4 Infrared Sensor A line follower or obstacle avoider robot can benefit greatly from the use of an infrared sensor. In this project, a simple infrared sensor is used to identify an object that is around 6-7 cm away. An infrared sensor is
  • 4. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-11, Issue-3 (June 2021) www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15 96 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. nothing more than a diode that detects infrared radiation. The IR TX-RX pair is an infrared transmitter and receiver. Figure 6: Infrared sensor Working of IR The functioning mechanism of an infrared sensor is entirely reliant on changes in the resistance of the IR receiver. In this sensor, the IR receiver is connected in reverse bias, resulting in a very high resistance when not exposed to IR light. The resistance in this example is in the Mega ohm range, however when IR light is reflected back and falls on the IR receiver, the resistance is much lower. Rx has a resistance range of a few hundred ohms to a few thousand ohms. This change in resistance is converted to a voltage change. The voltage is then applied to a comparator IC, which compares it to a predetermined threshold level. If the sensor voltage exceeds the threshold, the output is high; otherwise, it is low and can be used directly by the microcontroller. 5.5 USB Camera A USB camera is a video camera that feeds or streams an image or video to or through a computer network, such as the Internet, in real time. Small cameras that sit on a desk, attach to a user's monitor, or are incorporated into the hardware are the most common. This is used in this project to take photos, record videos, and broadcast live. Figure 7: USB Camera USB cameras are imaging cameras that transfer image data using USB 2.0 or USB 3.0 technology. USB cameras use the same USB technology that is present on most laptops to connect to specialised computer systems. USB Cameras are suited for various photographic applications due to the widespread use of USB technology in computer systems and the 480 Mb/s transfer rate of USB 2.0. A growing number of USB 3.0 cameras with data transfer rates of up to 5 Gb/s are also available. Edmund Optics offers a wide range of USB cameras to address a wide range of image requirements. EO USB Cameras are available with both CMOS and CCD sensors, allowing them to be used in a wider range of applications. Most USB cameras come with pre-installed capability for simple setup, and software can be downloaded for most models. USB cameras that operate on low-power USB connections, such as those used on laptops, may require a separate power supply. 5.6 Sound Sensor One sort of module used to detect sound is the sound sensor. This module is typically used to detect sound intensity. Switch, security, and monitoring are some of the most common uses for this module. For convenience of use, the accuracy of this sensor can be modified. A microphone is used to provide input to the buffer, peak detector, and amplifier in this sensor. When a sound is detected, this sensor sends an o/p voltage signal to a microcontroller. Following that, it does the necessary processing. This sensor can detect noise levels in DBs (decibels) at frequencies between 3 and 6 kHz, which is roughly where the human ear is sensitive. To measure the sound level, an android application called decibel metre is available for smart phones. Figure 8: Sound sensor Pin Configuration This sensor includes three pins which include the following.  Pin1 (VCC): 3.3V DC to 5V DC  Pin2 (GND): This is aground pin  Pin3 (DO): This is an output pin Working Principle This sensor's functioning concept is similar to that of human ears. Because the human eye has a diaphragm, the diaphragm's primary job is to convert vibrations into signals. This sensor, on the other hand, employs a
  • 5. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-11, Issue-3 (June 2021) www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15 97 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. microphone whose primary job is to convert vibrations into current rather than voltage. 5.7 WiFi Module The ESP8266 is a low-cost Wi-Fi chip from a Shanghai-based Chinese manufacturer that includes a full TCP/IP stack and MCU (microcontroller unit) functionality. The ESP-01 module, created by a third-party producer, AI-Thinker, first brought the chip to the notice of western makers in August 2014. Using Hayes-style commands, this little module allows microcontrollers to connect to a Wi-Fi network and make rudimentary TCP/IP communications. There was, however, almost little English-language documentation about the chip and the commands it received at the time. Many hackers were attracted to the module, chip, and software on it, as well as to translate the Chinese documentation, due to the low price and the fact that there were few external components on the module, implying that it may someday be very affordable in bulk. Figure 9: ESP8266 WiFi module Features  802.11 b/g/n protocol  Wi-Fi Direct (P2P), soft-AP  Integrated TCP/IP protocol stack  Integrated TR switch, balun, LNA, power amplifier and matching network  Integrated PLL, regulators, and power management units  +19.5dBm output power in 802.11b mode  Integrated temperature sensor  Supports antenna diversity  Power down leakage current of < 10uA  Integrated low power 32-bit CPU could be used as application processor  SDIO 2.0, SPI, UART  STBC, 1×1 MIMO, 2×1 MIMO  A-MPDU & A-MSDU aggregation & 0.4µs guard interval 5.8 DC Motor The DC is most typically employed in industrial applications such as automation technologies for high-tech gadgets. It's a self-contained electrical device that spins machine parts with high precision and efficiency. This motor's output shaft can also be adjusted to a certain angle. These are commonly found in consumer electronics, toys, automobiles, aeroplanes, and a variety of other equipment. Figure 10: DC Motor Definition: A rotary actuator or motor that provides for exact control of angular position, acceleration, and velocity is known as a DC motor. In essence, it possesses qualities that a standard motor lacks. As a result, it employs a standard motor in conjunction with a position feedback sensor. Principle of working The angle of rotation of a DC motor is regulated by the duration of the pulse delivered to its control PIN, according to the PWM (Pulse Width Modulation) concept. Applications  Robotics  Conveyor belts  Camera auto focus VI. SOFTWARE 6.1 Python Python is a high-level, general-purpose programming language that is interpreted. Python's design philosophy prioritises code readability, as evidenced by its extensive use of indentation. Its language elements and object-oriented approach are aimed at assisting programmers in writing clear, logical code for both small and large-scale projects. Python is designed to be a language that is simple to understand. Its formatting is clean and uncomplicated, and it frequently uses English terms instead of punctuation in other languages. It does not employ curly brackets to delimit blocks, unlike many other languages, and semicolons after statements are allowed but seldom, if ever, utilised. In comparison to C, it features fewer syntactic exceptions and special instances. 6.2 Raspbian OS The Raspberry Pi's operating system is housed on a micro SD card. The operating system must be installed on the card if it does not already exist. The operating
  • 6. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-11, Issue-3 (June 2021) www.ijemr.net https://doi.org/10.31033/ijemr.11.3.15 98 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. system on your Raspberry Pi can be set up in a variety of ways. Raspberry Pi OS (formerly known as Raspbian) is a Debian-based operating system for the Raspberry Pi. The Raspberry Pi Foundation has officially released it as the primary operating system for the Raspberry Pi line of small single-board computers since 2015. Mike Thompson and Peter Green produced the first version of Raspbian as a side project. The first phase of construction was finished in June 2012. VII. APPLICATIONS  Used for the safety of women.  Used for the safety of children.  Used for the safety of physically challenged people.  Applicable as a legal evidence of crime.  Remote regions can likewise be investigated.  Used to record and send video of the necessary condition. VIII. ADVANTAGES  Cost efficient.  Automatic control.  Quick response.  Reduced error. IX. CONCLUSION Women can never feel afraid or helpless in any situation, and they can defend themselves even late at night. These methods will also aid authorities in apprehending and tracking down the criminals. Because women's safety is an issue in many parts of the world, this robot can prove to be a valuable resource. FUTURE SCOPE  There are numerous enhancements to the current design and technology that can be made, as well as numerous extra features that may be introduced.  Different types of sensors, such as temperature sensors, pressure sensors, heat sensors, position sensors, and proximity sensors, can be used to use robots in many fields.  A wireless network can be used to create a multipurpose robot, with applications ranging from surveillance and home security to industrial applications where the user does not need to be physically present at the work site but may do it from his house. REFERENCES [1] M. Bertozzi, A. Broggi, C. Caraffi, M. Del Rose, M. Felisa, & G. Vezzoni. (2007). Pedestrian detection by means of far-infrared stereo vision. Computer Vision and Image Understanding, 106(2), 194–204. [2] J. Ge, Y. Luo, & G. Tei. (2009). Real-time pedestrian detection and tracking at nighttime for driver-assistance systems. Intelligent Transportation Systems, IEEE Transactions, 10(2), 283–298. [3] J.M. A´ lvarez & A.M. Lopez. (2010). Road detection based on illuminant invariance. Intelligent Transportation Systems, IEEE Transactions, 99, 1–10. [4] O. Ramstrom & H. Christensen. (2005). A method for following unmarked roads. In: Intelligent Vehicles Symposium, pp. 650–655.