SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Second International Conference on Advances in Engineering and Technology
(ICAET-2022)- (Online)
ICAET-2022
Organised by
RSP Conference Hub, Coimbatore, Tamilnadu, India
Date: 29/09/2022 & 30/09/2022
Paper ID :220946 Category : UG / PG / RS / Faculty
Paper Title : INDENTIFYING WOMEN HARASSMENT IN PUBLIC CCTV CAMERAS
USING ARTIFICIAL INTELLIGENCE TECHNIQUES
Presented by
Mr Ajay Vishal R P,
Student – UG
Bannari Amman Institute of Technology,
Erode, Tamil Nadu
Authors Details
Mr Sakthi Aravind J,
Mr Kuralamudhan J
Ms Harsha M R
Ms Pooja Shree C
Student - UG
Bannari Amman Institute of
Technology,
Erode, Tamil Nadu
Paper Id : 220946
Presenter Category : UG
AGENDA • ABSTRACT
• INTRODUCTION
• PROPOSEDWORK
• WORK FLOW
• HUMAN DETECTION
• GENDER PREDICTION
• ANAMOLUS ACTIVITY DETECTION
• ACCURACY
• CONCLUTION
2
ABSTRACT
3
The general public most likely living in
the most terrible time our cutting edge
society has at any point found concerning
ladies security . Ladies feel hazardous to
travel solo at odd hours. There are numerous
android applications that are created for
ladies' wellbeing. The proposed framework is
an endeavor made to take care of the issues
of ladies wellbeing.
Clearly there will be CCTV cameras in each
open spot. In the event that any uncommon
movement of an individual is perceived by a
camera, the alarm message will be shipped off
the close by police headquarters which makes
them alert. This undertaking is made for the
accommodations, everything being equal.
INTRODUCTION
4
• Among the most terrible nations
in
wrongdoing, India has a despicable
history in
all types of sexual double-dealing.
• The proposed framework is a
completely
coordinated progressed AI based
framework
which can obviously recognize
what is going
on of the casualty by utilizing
public CCTV
• Alarm message quickly to the close
by
control room or police headquarters
to
protect the concerned specialists
There are sure prior CCTV cameras that
really do make an impression on the saved
contacts yet not a solitary one of them is
compelling and adequately fast and as
indicated by an overview, the current
innovation doesn't encourage most ladies.
PROPOSED WORK
5
• Human Detection
• Gender Prediction
• Anomalous Activity
Detection
Despite the fact that there are a number of
particular applications and numerous IOT
based thoughts for ladies security, this
proposed framework requires no
extraordinary equipment to cycle.The
undertaking is ordered into three modules.
WORK FLOW
6
• Step1: Start
• Step 2: Access Live CCTV
camera stream.
• Step 3: Detects the Presence of
humans
• Step 4: If any human activity is
detected it will enter the next
module (i.e.) Gender prediction.
• Step 5: It will identify if any women
are there or not.
• Step 6: Then it will be looking
for anomalous activity.
• Step 7: If any activity is found it will
be sending an alert message to the
nearby police station or control
room
HUMAN DETECTION
7
• Surface based techniques
like Histograms of Oriented
Gradient (HOG) utilize high
layered highlights in view of edges
and use Support Vector Machine
(SVM) to identify human districts
• The standardized outcome gives
better execution on variety in light
and force.
• The HOG is contrast-standardized,
this is finished by working out
force over a bigger region a few
cells known as square, then this
worth is utilized to standardize all
cells inside that square.
The human arrangement strategies could be
partitioned into three classes: shape-based,
movement based and surface based.
GENDER PREDICTION
8
• Observation camera the alarm
message will be shipped off close
by police headquarters.
• Making age and orientation
assessment from a solitary
face picture a significant
assignment in astute applications,
for example, access
control, human-PC collaboration,
policing, knowledge and visual
reconnaissance, and so on
• Age is one of the vital
facial credits, playing a very
essential job in friendly
connections
Assuming a female is remaining solitary in a
rail line station or in some other public places
particularly at evening time's is identified under
a live observation
ANOMALOUS
ACTIVITY
DETECTION
9
• The calculation will be searching for an
uncommon movement, for
example, running and so forth.
Assuming that any such sort of action is
distinguished the message will be
shipped off the close by
police headquarters.
• We propose a MIL positioning
misfortune with meagerly
and perfection imperatives for a
profound learning organization to
advance abnormality scores for
video fragments.
• We treat all irregular recordings
as one class and
typical recordings as another
class.
In the event that expect that, there are numerous
ladies remaining in a typical spot. It will be
considered as an ordinary action and on that
time assuming the message is conveyed to the
close by police headquarters it very well may be
set apart as spam.
ACCURACY
10
0
1
2
3
4
5
6
Category 1 Category 2 Category 3 Category 4
Chart Title
Series 1 Series 2 Series 3
The lower the percentile edge,
the higher the quantity of cells we
group as hazardous and the higher
is our model precision, yet is it great.
We need to track down the ideal
harmony between risk grouping and
model precision to get the best end-
client experience. There is definitely
not a solitary issue that can be more
terrible for an
individual's encounter than trust on
an application that is letting them
know that they are venturing into a
protected zone and end up being a
survivor of wrongdoing.
CONCLUSION
A ton of NGOs restoration focuses and helpline
numbers have been made functional in the
previous years however they are largely fixes to
the badgering that has proactively occurred
and not the counteraction that we want. There
are sure previous applications that truly do
make an impression on the saved contacts yet
not a solitary one of them is compelling
and adequately speedy and as indicated by a
study the current innovation doesn't encourage
most ladies.
THANK YOU

Weitere ähnliche Inhalte

Ähnlich wie WH PAPER PRESENTATION PPT.pptx

Crime Detection using Machine Learning
Crime Detection using Machine LearningCrime Detection using Machine Learning
Crime Detection using Machine LearningIRJET Journal
 
CS Org Ldrshp Poster
CS Org Ldrshp PosterCS Org Ldrshp Poster
CS Org Ldrshp PosterTurner Sparks
 
Mini project PowerPoint presentation useful
Mini project PowerPoint presentation usefulMini project PowerPoint presentation useful
Mini project PowerPoint presentation usefulg8248418302
 
ELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYIRJET Journal
 
IRJET- A Survey on Vision based Fall Detection Techniques
IRJET-  	  A Survey on Vision based Fall Detection TechniquesIRJET-  	  A Survey on Vision based Fall Detection Techniques
IRJET- A Survey on Vision based Fall Detection TechniquesIRJET Journal
 
Real Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningReal Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningIRJET Journal
 
Face Mask and Social Distance Detection
Face Mask and Social Distance DetectionFace Mask and Social Distance Detection
Face Mask and Social Distance DetectionIRJET Journal
 
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET Journal
 
IRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET Journal
 
Face Mask Detection and Contactless Body Temperature Sensing
Face Mask Detection and Contactless Body Temperature SensingFace Mask Detection and Contactless Body Temperature Sensing
Face Mask Detection and Contactless Body Temperature SensingIRJET Journal
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET Journal
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance VideoIRJET Journal
 
A Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s SecurityA Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s SecurityDr. Amarjeet Singh
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 
Social Distance Detection System
Social Distance Detection SystemSocial Distance Detection System
Social Distance Detection SystemIRJET Journal
 
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...IRJET Journal
 
Smart ID for Blind People’s
Smart ID for Blind People’sSmart ID for Blind People’s
Smart ID for Blind People’sIRJET Journal
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET Journal
 
Event Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance SystemsEvent Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance SystemsIRJET Journal
 

Ähnlich wie WH PAPER PRESENTATION PPT.pptx (20)

Crime Detection using Machine Learning
Crime Detection using Machine LearningCrime Detection using Machine Learning
Crime Detection using Machine Learning
 
CS Org Ldrshp Poster
CS Org Ldrshp PosterCS Org Ldrshp Poster
CS Org Ldrshp Poster
 
Mini project PowerPoint presentation useful
Mini project PowerPoint presentation usefulMini project PowerPoint presentation useful
Mini project PowerPoint presentation useful
 
ELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETY
 
sdReport
sdReportsdReport
sdReport
 
IRJET- A Survey on Vision based Fall Detection Techniques
IRJET-  	  A Survey on Vision based Fall Detection TechniquesIRJET-  	  A Survey on Vision based Fall Detection Techniques
IRJET- A Survey on Vision based Fall Detection Techniques
 
Real Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningReal Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learning
 
Face Mask and Social Distance Detection
Face Mask and Social Distance DetectionFace Mask and Social Distance Detection
Face Mask and Social Distance Detection
 
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
 
IRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women Safety
 
Face Mask Detection and Contactless Body Temperature Sensing
Face Mask Detection and Contactless Body Temperature SensingFace Mask Detection and Contactless Body Temperature Sensing
Face Mask Detection and Contactless Body Temperature Sensing
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
 
A Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s SecurityA Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s Security
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
Social Distance Detection System
Social Distance Detection SystemSocial Distance Detection System
Social Distance Detection System
 
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
 
Smart ID for Blind People’s
Smart ID for Blind People’sSmart ID for Blind People’s
Smart ID for Blind People’s
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation Forest
 
Event Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance SystemsEvent Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance Systems
 

Mehr von AJAYVISHALRP

finalppt-150606051347-lva1-app6892.pptx
finalppt-150606051347-lva1-app6892.pptxfinalppt-150606051347-lva1-app6892.pptx
finalppt-150606051347-lva1-app6892.pptxAJAYVISHALRP
 
Data Storage Access and Security.pptx
Data Storage Access and Security.pptxData Storage Access and Security.pptx
Data Storage Access and Security.pptxAJAYVISHALRP
 
disk scheduling algorithms.pptx
disk scheduling algorithms.pptxdisk scheduling algorithms.pptx
disk scheduling algorithms.pptxAJAYVISHALRP
 

Mehr von AJAYVISHALRP (9)

finalppt-150606051347-lva1-app6892.pptx
finalppt-150606051347-lva1-app6892.pptxfinalppt-150606051347-lva1-app6892.pptx
finalppt-150606051347-lva1-app6892.pptx
 
Data Storage Access and Security.pptx
Data Storage Access and Security.pptxData Storage Access and Security.pptx
Data Storage Access and Security.pptx
 
U3-PPT-1 (1).ppt
U3-PPT-1 (1).pptU3-PPT-1 (1).ppt
U3-PPT-1 (1).ppt
 
U2-LP2.ppt
U2-LP2.pptU2-LP2.ppt
U2-LP2.ppt
 
U1-LP1.ppt
U1-LP1.pptU1-LP1.ppt
U1-LP1.ppt
 
disk scheduling algorithms.pptx
disk scheduling algorithms.pptxdisk scheduling algorithms.pptx
disk scheduling algorithms.pptx
 
1G1.pptx
1G1.pptx1G1.pptx
1G1.pptx
 
sorting1.pptx
sorting1.pptxsorting1.pptx
sorting1.pptx
 
AI Pugal.pptx
AI Pugal.pptxAI Pugal.pptx
AI Pugal.pptx
 

Kürzlich hochgeladen

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Kürzlich hochgeladen (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

WH PAPER PRESENTATION PPT.pptx

  • 1. Second International Conference on Advances in Engineering and Technology (ICAET-2022)- (Online) ICAET-2022 Organised by RSP Conference Hub, Coimbatore, Tamilnadu, India Date: 29/09/2022 & 30/09/2022 Paper ID :220946 Category : UG / PG / RS / Faculty Paper Title : INDENTIFYING WOMEN HARASSMENT IN PUBLIC CCTV CAMERAS USING ARTIFICIAL INTELLIGENCE TECHNIQUES Presented by Mr Ajay Vishal R P, Student – UG Bannari Amman Institute of Technology, Erode, Tamil Nadu Authors Details Mr Sakthi Aravind J, Mr Kuralamudhan J Ms Harsha M R Ms Pooja Shree C Student - UG Bannari Amman Institute of Technology, Erode, Tamil Nadu Paper Id : 220946 Presenter Category : UG
  • 2. AGENDA • ABSTRACT • INTRODUCTION • PROPOSEDWORK • WORK FLOW • HUMAN DETECTION • GENDER PREDICTION • ANAMOLUS ACTIVITY DETECTION • ACCURACY • CONCLUTION 2
  • 3. ABSTRACT 3 The general public most likely living in the most terrible time our cutting edge society has at any point found concerning ladies security . Ladies feel hazardous to travel solo at odd hours. There are numerous android applications that are created for ladies' wellbeing. The proposed framework is an endeavor made to take care of the issues of ladies wellbeing. Clearly there will be CCTV cameras in each open spot. In the event that any uncommon movement of an individual is perceived by a camera, the alarm message will be shipped off the close by police headquarters which makes them alert. This undertaking is made for the accommodations, everything being equal.
  • 4. INTRODUCTION 4 • Among the most terrible nations in wrongdoing, India has a despicable history in all types of sexual double-dealing. • The proposed framework is a completely coordinated progressed AI based framework which can obviously recognize what is going on of the casualty by utilizing public CCTV • Alarm message quickly to the close by control room or police headquarters to protect the concerned specialists There are sure prior CCTV cameras that really do make an impression on the saved contacts yet not a solitary one of them is compelling and adequately fast and as indicated by an overview, the current innovation doesn't encourage most ladies.
  • 5. PROPOSED WORK 5 • Human Detection • Gender Prediction • Anomalous Activity Detection Despite the fact that there are a number of particular applications and numerous IOT based thoughts for ladies security, this proposed framework requires no extraordinary equipment to cycle.The undertaking is ordered into three modules.
  • 6. WORK FLOW 6 • Step1: Start • Step 2: Access Live CCTV camera stream. • Step 3: Detects the Presence of humans • Step 4: If any human activity is detected it will enter the next module (i.e.) Gender prediction. • Step 5: It will identify if any women are there or not. • Step 6: Then it will be looking for anomalous activity. • Step 7: If any activity is found it will be sending an alert message to the nearby police station or control room
  • 7. HUMAN DETECTION 7 • Surface based techniques like Histograms of Oriented Gradient (HOG) utilize high layered highlights in view of edges and use Support Vector Machine (SVM) to identify human districts • The standardized outcome gives better execution on variety in light and force. • The HOG is contrast-standardized, this is finished by working out force over a bigger region a few cells known as square, then this worth is utilized to standardize all cells inside that square. The human arrangement strategies could be partitioned into three classes: shape-based, movement based and surface based.
  • 8. GENDER PREDICTION 8 • Observation camera the alarm message will be shipped off close by police headquarters. • Making age and orientation assessment from a solitary face picture a significant assignment in astute applications, for example, access control, human-PC collaboration, policing, knowledge and visual reconnaissance, and so on • Age is one of the vital facial credits, playing a very essential job in friendly connections Assuming a female is remaining solitary in a rail line station or in some other public places particularly at evening time's is identified under a live observation
  • 9. ANOMALOUS ACTIVITY DETECTION 9 • The calculation will be searching for an uncommon movement, for example, running and so forth. Assuming that any such sort of action is distinguished the message will be shipped off the close by police headquarters. • We propose a MIL positioning misfortune with meagerly and perfection imperatives for a profound learning organization to advance abnormality scores for video fragments. • We treat all irregular recordings as one class and typical recordings as another class. In the event that expect that, there are numerous ladies remaining in a typical spot. It will be considered as an ordinary action and on that time assuming the message is conveyed to the close by police headquarters it very well may be set apart as spam.
  • 10. ACCURACY 10 0 1 2 3 4 5 6 Category 1 Category 2 Category 3 Category 4 Chart Title Series 1 Series 2 Series 3 The lower the percentile edge, the higher the quantity of cells we group as hazardous and the higher is our model precision, yet is it great. We need to track down the ideal harmony between risk grouping and model precision to get the best end- client experience. There is definitely not a solitary issue that can be more terrible for an individual's encounter than trust on an application that is letting them know that they are venturing into a protected zone and end up being a survivor of wrongdoing.
  • 11. CONCLUSION A ton of NGOs restoration focuses and helpline numbers have been made functional in the previous years however they are largely fixes to the badgering that has proactively occurred and not the counteraction that we want. There are sure previous applications that truly do make an impression on the saved contacts yet not a solitary one of them is compelling and adequately speedy and as indicated by a study the current innovation doesn't encourage most ladies.