0% found this document useful (0 votes)
64 views5 pages

Predictive Analytics For Motorcycle Theft Detection and Recovery

Transportation is an integral component of our daily lives, and it is becoming increasingly common for people in the Philippines to rely on vehicles, such as motorcycles, as their primary mode of transportation. The prevalence of motorcycle theft has risen concurrently with the growing number of motorcycle users over the years. To address this issue, a system has been devised for the effective prevention and retrieval of stolen motorcycles in a timely and efficient manner.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views5 pages

Predictive Analytics For Motorcycle Theft Detection and Recovery

Transportation is an integral component of our daily lives, and it is becoming increasingly common for people in the Philippines to rely on vehicles, such as motorcycles, as their primary mode of transportation. The prevalence of motorcycle theft has risen concurrently with the growing number of motorcycle users over the years. To address this issue, a system has been devised for the effective prevention and retrieval of stolen motorcycles in a timely and efficient manner.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR2237

Predictive Analytics for Motorcycle Theft


Detection and Recovery
V. Mouli Kannan1 ; S. Nirmala Sugirtha Rajini2
1.
PG Student ; 2. Professor
Department of Computer Application,
Dr. M.G.R Educational and Research Institute Chennai-600095

Abstract:- Transportation is an integral component of car-security systems rely on several sensors. When the first
our daily lives, and it is becoming increasingly common Car Alarm System was initiated, the system consisted
for people in the Philippines to rely on vehicles, such as mostly of electromechanical devices. As automation
motorcycles, as their primary mode of transportation. advances, they unfold into fully integrated microprocessor-
The prevalence of motorcycle theft has risen positioned systems using diverse electronic sensors. In, the
concurrently with the growing number of motorcycle hardware and software of the GPS and GSM grid were
users over the years. To address this issue, a system has advanced.[2]
been devised for the effective prevention and retrieval of
stolen motorcycles in a timely and efficient manner. The A vehicle tracking system is an electronic device that
user of this system is alerted through an alert is installed in a vehicle to enable the owner or a third party
notification when the motorcycle has been moved over a to track the vehicle's location. The design of this system has
considerable distance or has been stolen. Additionally, advanced significantly, utilizing GPS and GSM technology.
the user can view the current location of the motorcycle, This process is supported by an embedded system, which is
turn off the engine, and capture an image of the thief. used for tracking and positioning any vehicle using the
Global Positioning System (GPS) and global system for
The system is composed of two parts: hardware and mobile communication (GSM). The system continuously
software modules. The hardware component includes a monitors the motion of the vehicle and provides real-time
micro-controller, GSM, GPS, and a camera. The status updates upon request. [3]
motorcycle serves as the primary controller of the entire
system and is also responsible for its operation. Predictive analytics is a branch of data science that
According to the usability and functionality evaluation uses statistical techniques and machine learning algorithms
conducted, it was discovered that most users strongly to analyse historical data and make predictions about future
agreed on the usefulness of the system. events. such as location, time, type of motorcycle, etc., and
creating models that can accurately predict when and where
Keywords:- Motorcycle, Theft Prevention, Image Capture, a theft is likely to occur.[4]
Hardware, Software, Micro-controller, GSM (Global
System for Mobile Communications), Detection and There are numerous potential benefits of using
Recovery. predictive analytics for motorcycle theft detection and
recovery. By identifying high-risk areas and times, law
I. INTRODUCTION enforcement agencies can effectively allocate resources for
patrolling and surveillance. Motorcycle owners can also take
As the number of motorcycles on the road continues to proactive measures such as investing in additional security
increase, theft is becoming a threat. With this growing features or avoiding certain areas at times. This study delves
concern, it has become crucial for authorities and into the application of predictive analytics in tackling
motorcycle owners to implement effective measures for the motorcycle theft and its potential benefits in enhancing
detection and recovery of stolen bikes. Predictive analytics security measures. [5]
is a powerful tool that can aid in achieving this goal by
analyzing past data and predicting future patterns. By II. LITERATURE SURVEY
leveraging this technology, motorcycle theft detection and
recovery can be significantly improved, ultimately leading Kunnu Purwanto.et al.,2019 this research created an
to safer and more secure environments for riders. [1] automatic motorcycle safety system called germ narcissistic.
Origin's egocentric is the crucial invention in automatic
The latest car anti-theft system is a car alarm, a vehicle security using a global positioning system (GPS),
flashing light manner that makes use of different kinds of global system for mobile communication (GSM), and Radio
sensors that can be pressure, tilt, shock, and door sensors, frequence Identification (RFID). This system was created
but the shortcomings are cost, and it only averts the vehicles using a short communication service (SMS) to give vehicle
from theft but cannot be used to trace the thief. Customary information, similar as time, position, and alarm, to the

IJISRT24APR2237 www.ijisrt.com 2010


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR2237

proprietor of the motorcycle. The arrangement of these interface for purchasing second-hand bikes and reporting
technologies can be used as a practical and effective safety stolen ones, receiving timely notifications about relevant
key for motorcycles [6]. listings. This system's unique focus on theft prevention and
recovery sets it apart, emphasizing security measures and
Rushikesh Bokade.et al.,2022 Transport is an integral integration with law enforcement databases to safeguard
aspect of our daily lives. As time goes by, more and more transactions and aid in the retrieval of stolen bikes.
individuals are relying on cars, particularly motorcycles
with two wheels, as their primary means of transportation. A. Architecture Diagram
Unfortunately, the number of motorcycle users and
instances of motorcycle theft continue to rise each year. This
paper examines and presents a variety of approaches to
recover from potholes and speed breakers as a means of
preventing theft [7].

Naruepon Panawong.et al.,2023 say that the


controlling software for Arduino and other hardware
components is created using C programming language.
Additionally, the system architecture encompasses the
operational framework. Furthermore, the design and
construction of an electronic circuit board are connected to
the sensors. Moreover, the motorcycle theft analysis process
examines the data from the inclination sensor and the
current location of the motorcycle. If motorcycle theft is
detected, the proposed system sends a notification to the
motorcycle owner via a messaging application. Finally, the
communication of data between the hardware components
and Firebase is established to determine the current location
of the motorcycle [8].

Rometdo Muzawi.et al.,2022 this study showed that Fig 1: Architecture of Proposed System
the system works by utilizing a cross pattern, a voltage
sensor taken directly from the ignition of a motorcycle as a B. Explanation:
notification of the vehicle's life or death, and the Internet of The architecture diagram depicts a system where users
Things capabilities. Moreover, this system has the benefit of can log in to access vehicle-related services. Upon
being outfitted with a GPS Neo 6 sensor that tracks the successful login, users receive confirmation and can then
motorcycle's location through longitude and latitude request vehicle details or search for stolen vehicles. The
coordinates if the motorcycle is in motion [9]. system retrieves information from a database and presents it
to users. Additionally, there's a component to detect and
Budi Artono.et al.,2020 say that GSM Module to send handle inappropriate user input. This architecture ensures
warning messages, and a GPS tracker to provide information secure access to vehicle information while promoting user
in latitude and longitude coordinates to track the stolen safety and experience.
motorcycle using Google Maps. GPS Tracker works by
reading the coordinates of the location of the objected. The C. Module Description
tests were carried out by moving and integrating the System development deals with the operations that are
motorcycle system, and the results can be seen in the carried out to get desired output from software product
coordinate changes, monitored by Google Maps showing the based on certain design specifications. This Application
movement of the motorcycle. The system was significantly hold the following three main modules
closer to the planned one [10].
 Controller
III. PROPOSED SYSTEM  Provider
 User
The proposed system is designed to address the issue
of online bike theft prevention through a three-module  Controller
architecture. The Controller/Admin module serves as the The Controller module acts as the central hub for
central management hub, overseeing user and bike provider system management and user interactions, offering
operations, as well as maintaining the stolen bike database administrative tools and privileges upon secure login.
and reporting functionalities. Bike providers utilize the Administrators can access user demographics and profiles
dedicated module to list second-hand bikes for sale, with through the "View User List" function and track vehicle
integrated checks against the stolen bike database to ensure history for maintenance purposes. User transaction patterns
legitimacy. Meanwhile, users benefit from a streamlined can be analyzed via the "View User Purchase History"

IJISRT24APR2237 www.ijisrt.com 2011


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR2237

feature, while the "View Stolen Vehicle Status" aids in In figure 2, demonstrates The Home Page design and
vehicle recovery efforts. The module also facilitates data layout effectively engage users, encouraging platform
visualization with the "View Graph" module and ensures exploration and interaction. Continuous monitoring and
secure session termination through the "Logout" feature, optimization enhance usability and user retention.
prioritizing data security and user privacy.

 Provider
The Provider module serves as the central hub for
managing vehicle-related tasks efficiently. Providers start by
securely logging into the system, gaining access to a range
of tools and features. They can then delve into the vehicle
history, reviewing past records and transactions. If there's a
need to add a new vehicle to the system, providers can
easily do so using the "Add Vehicle" function, ensuring that
the database stays up to date. Additionally, the "View
Vehicle" feature provides detailed information about
specific vehicles, including specifications and ownership
details. Providers can also use the "Check Request" function
to handle user requests promptly and effectively. Lastly, the
"Vehicle Status" feature provides real-time updates on the
availability and condition of vehicles, allowing providers to
make informed decisions. Overall, the Provider module
streamlines vehicle management tasks, ensuring smooth
operations within the system.
Fig 3: Controller Login Page
 User
The User module allows users to register securely and In figure 3, demonstrates The Controller Login Page
access system features after successful registration. Through features robust authentication and encryption mechanisms,
functions like "View Vehicle" and "Vehicle Status," users ensuring secure access for administrators. The
can explore detailed vehicle information and receive real- authentication process, granting authorized access to the
time updates on vehicle status. In the event of a stolen controller system's functionalities.
vehicle, users can report it using the "Find Stolen Vehicle"
function, contributing to community safety efforts.
Additionally, users can share vehicle statuses with others
and securely terminate sessions using the "Send/Share
Status" and "Logout" features, respectively, prioritizing data
security and privacy.

IV. RESULT AND DISCUSSION

Fig 4: Controller Home Page

In figure 4, The Controller Home Page provides users


with immediate access to pertinent information and
functionalities enabling seamless registration processes for
new providers.

Fig 2: Home Page

IJISRT24APR2237 www.ijisrt.com 2012


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR2237

Fig 5: Provider Register Page Fig 7: User Register Form

In figure 5, The Provider register page represented the In figure 7 Upon registration, users can access vehicle
users are required to input specific details, including their ID details and status updates. To utilize these features, users
number, phone number, and other common information. enter registration details in the provided form.
Once these details are entered, users can submit the form to
proceed with the registration process.

Fig 8: User Register View

Fig 6: View Provider Details In figure 8, Upon completing the user registration form,
users can access both user and provider registration details.
In figure 6, demonstrate the after entering the details in Users can view vehicle details and status, search for stolen
the provider registration form and submitting it, the system vehicles, and share updates seamlessly before logging out.
displays a confirmation page. View Vehicle History:
Review past activities and records related to vehicles within
the system.

IJISRT24APR2237 www.ijisrt.com 2013


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR2237

[3]. Hariyanto, Andysah Putera Utama Siahaan “Assessing


the GT06N GPS Tracker for Vehicle Monitoring”
Volume: 4, Issue - 10, Oct – 2018
[4]. Sumit S. Dukare, Dattatray A. Patil, Kantilal P. Rane
“In-Depth Review: Vehicle Tracking, Monitoring, and
Alerting Technologies" International Journal of
Computer Applications (0975 – 8887) Volume 119 –
No.10, June 2015
[5]. Arnold Mashud Abukari, Alhassan Adams, Iddrisu
Ibrahim "Advanced Technology for Motorcycle
Security: GPS-GSM Tracking System" Volume 17,
Issue 6, Page 58-73, June 2020
[6]. Kunnu Purwanto, Iswanto, Tony Khristanto Hariadi,
Muhammad Yusvin Muhtar "Microcontroller-based
RFID, GSM and GPS for Motorcycle Security System"
Volume: 10, No. 3, (2019)
[7]. Rushikesh Bokade, Vijay Borge, Chetan Gadge,
Kishor Patil "Navigating the Road: Tips for Avoiding
Potholes and Speed Bumps" Volume: 09 Issue: 04 |Apr
(2022)
[8]. Naruepon Panawong, Akkasit Sittisaman "A
Fig 9: All Vehicle Details Development of Motorcycle Anti-Theft Equipment and
Tracking System using Internet of Things" Volume: 3,
In figure 9, After users input their details, detecting (2023)
and analyzing motorcycles by providing detailed [9]. Rometdo Muzawi, Yuda Irawan, Dinul Akhiyar, Debi
information about comprehensive information regarding Setiawan "Motorcycle Security: Pattern Lock and GPS
stolen vehicles and all vehicle details is displayed. Systems" Volume: 70 Issue 3, 185-194, March (2022)
[10]. [Budi Artono, Tri Lestari Ningsih, R. Gaguk Pratama
V. CONCLUSION Yudha, Arizal Aflan Bachri "Motorcycle Security
System using SMS Warning and GPS Tracking"
The completion of this project demonstrates that it has Volume: 1, (2020)
effectively resolved the issues present in the existing system
and incorporated advanced features that satisfy current
requirements and situations. However, our work also
presents several additional challenges. For instance, in the
realm of Web databases, a significant challenge is the
development and maintenance of an appropriate workload
that satisfies similarity-based ranking properties. Another
intriguing challenge is determining techniques for inferring
ranking functions over Web databases. Additionally, it
would be fascinating to combine the concept of user
similarity proposed in our work with existing user profiles to
see if ranking quality can be improved even further.

The user will receive an SMS in case of unauthorized


access or the location of their vehicle. These data are sent to
a server, which then sends the information to the user-
friendly android application. The application displays all the
details, including the location of the vehicle.

REFERENCES

[1]. Rohitaksha K, Madhu C G, Nalini B G, Nirupama C


"Android Application for Vehicle Theft Prevention and
Tracking System" Volume:5 (3), 2014
[2]. Yash Sangale1, Vivek Chauhan1, A. N. Bhatt and J. M.
Rathod "A Comprehensive Survey of Two-Wheeler
Security and Monitoring Technologies for Riders"
Volumne:14 Issue 82 Feb 2024

IJISRT24APR2237 www.ijisrt.com 2014

You might also like