SlideShare a Scribd company logo
Second International Conference on Advances in Engineering and Technology
(ICAET-2022)- (Online)
ICAET-2022
Organised by
RSP Conference Hub, Coimbatore, Tamilnadu, India
Date: 29/09/2022 & 30/09/2022
Paper ID :220946 Category : UG / PG / RS / Faculty
Paper Title : INDENTIFYING WOMEN HARASSMENT IN PUBLIC CCTV CAMERAS
USING ARTIFICIAL INTELLIGENCE TECHNIQUES
Presented by
Mr Ajay Vishal R P,
Student – UG
Bannari Amman Institute of Technology,
Erode, Tamil Nadu
Authors Details
Mr Sakthi Aravind J,
Mr Kuralamudhan J
Ms Harsha M R
Ms Pooja Shree C
Student - UG
Bannari Amman Institute of
Technology,
Erode, Tamil Nadu
Paper Id : 220946
Presenter Category : UG
AGENDA • ABSTRACT
• INTRODUCTION
• PROPOSEDWORK
• WORK FLOW
• HUMAN DETECTION
• GENDER PREDICTION
• ANAMOLUS ACTIVITY DETECTION
• ACCURACY
• CONCLUTION
2
ABSTRACT
3
The general public most likely living in
the most terrible time our cutting edge
society has at any point found concerning
ladies security . Ladies feel hazardous to
travel solo at odd hours. There are numerous
android applications that are created for
ladies' wellbeing. The proposed framework is
an endeavor made to take care of the issues
of ladies wellbeing.
Clearly there will be CCTV cameras in each
open spot. In the event that any uncommon
movement of an individual is perceived by a
camera, the alarm message will be shipped off
the close by police headquarters which makes
them alert. This undertaking is made for the
accommodations, everything being equal.
INTRODUCTION
4
• Among the most terrible nations
in
wrongdoing, India has a despicable
history in
all types of sexual double-dealing.
• The proposed framework is a
completely
coordinated progressed AI based
framework
which can obviously recognize
what is going
on of the casualty by utilizing
public CCTV
• Alarm message quickly to the close
by
control room or police headquarters
to
protect the concerned specialists
There are sure prior CCTV cameras that
really do make an impression on the saved
contacts yet not a solitary one of them is
compelling and adequately fast and as
indicated by an overview, the current
innovation doesn't encourage most ladies.
PROPOSED WORK
5
• Human Detection
• Gender Prediction
• Anomalous Activity
Detection
Despite the fact that there are a number of
particular applications and numerous IOT
based thoughts for ladies security, this
proposed framework requires no
extraordinary equipment to cycle.The
undertaking is ordered into three modules.
WORK FLOW
6
• Step1: Start
• Step 2: Access Live CCTV
camera stream.
• Step 3: Detects the Presence of
humans
• Step 4: If any human activity is
detected it will enter the next
module (i.e.) Gender prediction.
• Step 5: It will identify if any women
are there or not.
• Step 6: Then it will be looking
for anomalous activity.
• Step 7: If any activity is found it will
be sending an alert message to the
nearby police station or control
room
HUMAN DETECTION
7
• Surface based techniques
like Histograms of Oriented
Gradient (HOG) utilize high
layered highlights in view of edges
and use Support Vector Machine
(SVM) to identify human districts
• The standardized outcome gives
better execution on variety in light
and force.
• The HOG is contrast-standardized,
this is finished by working out
force over a bigger region a few
cells known as square, then this
worth is utilized to standardize all
cells inside that square.
The human arrangement strategies could be
partitioned into three classes: shape-based,
movement based and surface based.
GENDER PREDICTION
8
• Observation camera the alarm
message will be shipped off close
by police headquarters.
• Making age and orientation
assessment from a solitary
face picture a significant
assignment in astute applications,
for example, access
control, human-PC collaboration,
policing, knowledge and visual
reconnaissance, and so on
• Age is one of the vital
facial credits, playing a very
essential job in friendly
connections
Assuming a female is remaining solitary in a
rail line station or in some other public places
particularly at evening time's is identified under
a live observation
ANOMALOUS
ACTIVITY
DETECTION
9
• The calculation will be searching for an
uncommon movement, for
example, running and so forth.
Assuming that any such sort of action is
distinguished the message will be
shipped off the close by
police headquarters.
• We propose a MIL positioning
misfortune with meagerly
and perfection imperatives for a
profound learning organization to
advance abnormality scores for
video fragments.
• We treat all irregular recordings
as one class and
typical recordings as another
class.
In the event that expect that, there are numerous
ladies remaining in a typical spot. It will be
considered as an ordinary action and on that
time assuming the message is conveyed to the
close by police headquarters it very well may be
set apart as spam.
ACCURACY
10
0
1
2
3
4
5
6
Category 1 Category 2 Category 3 Category 4
Chart Title
Series 1 Series 2 Series 3
The lower the percentile edge,
the higher the quantity of cells we
group as hazardous and the higher
is our model precision, yet is it great.
We need to track down the ideal
harmony between risk grouping and
model precision to get the best end-
client experience. There is definitely
not a solitary issue that can be more
terrible for an
individual's encounter than trust on
an application that is letting them
know that they are venturing into a
protected zone and end up being a
survivor of wrongdoing.
CONCLUSION
A ton of NGOs restoration focuses and helpline
numbers have been made functional in the
previous years however they are largely fixes to
the badgering that has proactively occurred
and not the counteraction that we want. There
are sure previous applications that truly do
make an impression on the saved contacts yet
not a solitary one of them is compelling
and adequately speedy and as indicated by a
study the current innovation doesn't encourage
most ladies.
THANK YOU

More Related Content

Similar to WH PAPER PRESENTATION PPT.pptx

Crime Detection using Machine Learning
Crime Detection using Machine LearningCrime Detection using Machine Learning
Crime Detection using Machine Learning
IRJET Journal
 
CS Org Ldrshp Poster
CS Org Ldrshp PosterCS Org Ldrshp Poster
CS Org Ldrshp PosterTurner Sparks
 
Mini project PowerPoint presentation useful
Mini project PowerPoint presentation usefulMini project PowerPoint presentation useful
Mini project PowerPoint presentation useful
g8248418302
 
ELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETY
IRJET Journal
 
IRJET- A Survey on Vision based Fall Detection Techniques
IRJET-  	  A Survey on Vision based Fall Detection TechniquesIRJET-  	  A Survey on Vision based Fall Detection Techniques
IRJET- A Survey on Vision based Fall Detection Techniques
IRJET Journal
 
Real Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningReal Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learning
IRJET Journal
 
Face Mask and Social Distance Detection
Face Mask and Social Distance DetectionFace Mask and Social Distance Detection
Face Mask and Social Distance Detection
IRJET Journal
 
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET Journal
 
IRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women Safety
IRJET Journal
 
Face Mask Detection and Contactless Body Temperature Sensing
Face Mask Detection and Contactless Body Temperature SensingFace Mask Detection and Contactless Body Temperature Sensing
Face Mask Detection and Contactless Body Temperature Sensing
IRJET Journal
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET Journal
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET Journal
 
A Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s SecurityA Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s Security
Dr. Amarjeet Singh
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Mahdi_Fahmideh
 
Social Distance Detection System
Social Distance Detection SystemSocial Distance Detection System
Social Distance Detection System
IRJET Journal
 
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
IRJET Journal
 
Smart ID for Blind People’s
Smart ID for Blind People’sSmart ID for Blind People’s
Smart ID for Blind People’s
IRJET Journal
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET Journal
 
Event Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance SystemsEvent Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance Systems
IRJET Journal
 

Similar to WH PAPER PRESENTATION PPT.pptx (20)

Crime Detection using Machine Learning
Crime Detection using Machine LearningCrime Detection using Machine Learning
Crime Detection using Machine Learning
 
CS Org Ldrshp Poster
CS Org Ldrshp PosterCS Org Ldrshp Poster
CS Org Ldrshp Poster
 
Mini project PowerPoint presentation useful
Mini project PowerPoint presentation usefulMini project PowerPoint presentation useful
Mini project PowerPoint presentation useful
 
ELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETYELECTRONIC JACKET FOR WOMEN SAFETY
ELECTRONIC JACKET FOR WOMEN SAFETY
 
sdReport
sdReportsdReport
sdReport
 
IRJET- A Survey on Vision based Fall Detection Techniques
IRJET-  	  A Survey on Vision based Fall Detection TechniquesIRJET-  	  A Survey on Vision based Fall Detection Techniques
IRJET- A Survey on Vision based Fall Detection Techniques
 
Real Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningReal Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learning
 
Face Mask and Social Distance Detection
Face Mask and Social Distance DetectionFace Mask and Social Distance Detection
Face Mask and Social Distance Detection
 
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...IRJET-  	  An Implementation and Efficient Way to Improve Women Safety Empowe...
IRJET- An Implementation and Efficient Way to Improve Women Safety Empowe...
 
IRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women Safety
 
Face Mask Detection and Contactless Body Temperature Sensing
Face Mask Detection and Contactless Body Temperature SensingFace Mask Detection and Contactless Body Temperature Sensing
Face Mask Detection and Contactless Body Temperature Sensing
 
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoTIRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
IRJET- Smart and Ubiquitous Defense Monitoring System based on IoT
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
 
A Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s SecurityA Smart Alarm System for Women’s Security
A Smart Alarm System for Women’s Security
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
Social Distance Detection System
Social Distance Detection SystemSocial Distance Detection System
Social Distance Detection System
 
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
 
Smart ID for Blind People’s
Smart ID for Blind People’sSmart ID for Blind People’s
Smart ID for Blind People’s
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation Forest
 
Event Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance SystemsEvent Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance Systems
 

More from AJAYVISHALRP

finalppt-150606051347-lva1-app6892.pptx
finalppt-150606051347-lva1-app6892.pptxfinalppt-150606051347-lva1-app6892.pptx
finalppt-150606051347-lva1-app6892.pptx
AJAYVISHALRP
 
Data Storage Access and Security.pptx
Data Storage Access and Security.pptxData Storage Access and Security.pptx
Data Storage Access and Security.pptx
AJAYVISHALRP
 
U3-PPT-1 (1).ppt
U3-PPT-1 (1).pptU3-PPT-1 (1).ppt
U3-PPT-1 (1).ppt
AJAYVISHALRP
 
U2-LP2.ppt
U2-LP2.pptU2-LP2.ppt
U2-LP2.ppt
AJAYVISHALRP
 
U1-LP1.ppt
U1-LP1.pptU1-LP1.ppt
U1-LP1.ppt
AJAYVISHALRP
 
disk scheduling algorithms.pptx
disk scheduling algorithms.pptxdisk scheduling algorithms.pptx
disk scheduling algorithms.pptx
AJAYVISHALRP
 
1G1.pptx
1G1.pptx1G1.pptx
1G1.pptx
AJAYVISHALRP
 
sorting1.pptx
sorting1.pptxsorting1.pptx
sorting1.pptx
AJAYVISHALRP
 
AI Pugal.pptx
AI Pugal.pptxAI Pugal.pptx
AI Pugal.pptx
AJAYVISHALRP
 

More from AJAYVISHALRP (9)

finalppt-150606051347-lva1-app6892.pptx
finalppt-150606051347-lva1-app6892.pptxfinalppt-150606051347-lva1-app6892.pptx
finalppt-150606051347-lva1-app6892.pptx
 
Data Storage Access and Security.pptx
Data Storage Access and Security.pptxData Storage Access and Security.pptx
Data Storage Access and Security.pptx
 
U3-PPT-1 (1).ppt
U3-PPT-1 (1).pptU3-PPT-1 (1).ppt
U3-PPT-1 (1).ppt
 
U2-LP2.ppt
U2-LP2.pptU2-LP2.ppt
U2-LP2.ppt
 
U1-LP1.ppt
U1-LP1.pptU1-LP1.ppt
U1-LP1.ppt
 
disk scheduling algorithms.pptx
disk scheduling algorithms.pptxdisk scheduling algorithms.pptx
disk scheduling algorithms.pptx
 
1G1.pptx
1G1.pptx1G1.pptx
1G1.pptx
 
sorting1.pptx
sorting1.pptxsorting1.pptx
sorting1.pptx
 
AI Pugal.pptx
AI Pugal.pptxAI Pugal.pptx
AI Pugal.pptx
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 

WH PAPER PRESENTATION PPT.pptx

  • 1. Second International Conference on Advances in Engineering and Technology (ICAET-2022)- (Online) ICAET-2022 Organised by RSP Conference Hub, Coimbatore, Tamilnadu, India Date: 29/09/2022 & 30/09/2022 Paper ID :220946 Category : UG / PG / RS / Faculty Paper Title : INDENTIFYING WOMEN HARASSMENT IN PUBLIC CCTV CAMERAS USING ARTIFICIAL INTELLIGENCE TECHNIQUES Presented by Mr Ajay Vishal R P, Student – UG Bannari Amman Institute of Technology, Erode, Tamil Nadu Authors Details Mr Sakthi Aravind J, Mr Kuralamudhan J Ms Harsha M R Ms Pooja Shree C Student - UG Bannari Amman Institute of Technology, Erode, Tamil Nadu Paper Id : 220946 Presenter Category : UG
  • 2. AGENDA • ABSTRACT • INTRODUCTION • PROPOSEDWORK • WORK FLOW • HUMAN DETECTION • GENDER PREDICTION • ANAMOLUS ACTIVITY DETECTION • ACCURACY • CONCLUTION 2
  • 3. ABSTRACT 3 The general public most likely living in the most terrible time our cutting edge society has at any point found concerning ladies security . Ladies feel hazardous to travel solo at odd hours. There are numerous android applications that are created for ladies' wellbeing. The proposed framework is an endeavor made to take care of the issues of ladies wellbeing. Clearly there will be CCTV cameras in each open spot. In the event that any uncommon movement of an individual is perceived by a camera, the alarm message will be shipped off the close by police headquarters which makes them alert. This undertaking is made for the accommodations, everything being equal.
  • 4. INTRODUCTION 4 • Among the most terrible nations in wrongdoing, India has a despicable history in all types of sexual double-dealing. • The proposed framework is a completely coordinated progressed AI based framework which can obviously recognize what is going on of the casualty by utilizing public CCTV • Alarm message quickly to the close by control room or police headquarters to protect the concerned specialists There are sure prior CCTV cameras that really do make an impression on the saved contacts yet not a solitary one of them is compelling and adequately fast and as indicated by an overview, the current innovation doesn't encourage most ladies.
  • 5. PROPOSED WORK 5 • Human Detection • Gender Prediction • Anomalous Activity Detection Despite the fact that there are a number of particular applications and numerous IOT based thoughts for ladies security, this proposed framework requires no extraordinary equipment to cycle.The undertaking is ordered into three modules.
  • 6. WORK FLOW 6 • Step1: Start • Step 2: Access Live CCTV camera stream. • Step 3: Detects the Presence of humans • Step 4: If any human activity is detected it will enter the next module (i.e.) Gender prediction. • Step 5: It will identify if any women are there or not. • Step 6: Then it will be looking for anomalous activity. • Step 7: If any activity is found it will be sending an alert message to the nearby police station or control room
  • 7. HUMAN DETECTION 7 • Surface based techniques like Histograms of Oriented Gradient (HOG) utilize high layered highlights in view of edges and use Support Vector Machine (SVM) to identify human districts • The standardized outcome gives better execution on variety in light and force. • The HOG is contrast-standardized, this is finished by working out force over a bigger region a few cells known as square, then this worth is utilized to standardize all cells inside that square. The human arrangement strategies could be partitioned into three classes: shape-based, movement based and surface based.
  • 8. GENDER PREDICTION 8 • Observation camera the alarm message will be shipped off close by police headquarters. • Making age and orientation assessment from a solitary face picture a significant assignment in astute applications, for example, access control, human-PC collaboration, policing, knowledge and visual reconnaissance, and so on • Age is one of the vital facial credits, playing a very essential job in friendly connections Assuming a female is remaining solitary in a rail line station or in some other public places particularly at evening time's is identified under a live observation
  • 9. ANOMALOUS ACTIVITY DETECTION 9 • The calculation will be searching for an uncommon movement, for example, running and so forth. Assuming that any such sort of action is distinguished the message will be shipped off the close by police headquarters. • We propose a MIL positioning misfortune with meagerly and perfection imperatives for a profound learning organization to advance abnormality scores for video fragments. • We treat all irregular recordings as one class and typical recordings as another class. In the event that expect that, there are numerous ladies remaining in a typical spot. It will be considered as an ordinary action and on that time assuming the message is conveyed to the close by police headquarters it very well may be set apart as spam.
  • 10. ACCURACY 10 0 1 2 3 4 5 6 Category 1 Category 2 Category 3 Category 4 Chart Title Series 1 Series 2 Series 3 The lower the percentile edge, the higher the quantity of cells we group as hazardous and the higher is our model precision, yet is it great. We need to track down the ideal harmony between risk grouping and model precision to get the best end- client experience. There is definitely not a solitary issue that can be more terrible for an individual's encounter than trust on an application that is letting them know that they are venturing into a protected zone and end up being a survivor of wrongdoing.
  • 11. CONCLUSION A ton of NGOs restoration focuses and helpline numbers have been made functional in the previous years however they are largely fixes to the badgering that has proactively occurred and not the counteraction that we want. There are sure previous applications that truly do make an impression on the saved contacts yet not a solitary one of them is compelling and adequately speedy and as indicated by a study the current innovation doesn't encourage most ladies.