Predictive Analytics For Motorcycle Theft Detection and Recovery
Predictive Analytics For Motorcycle Theft Detection and Recovery
Abstract:- Transportation is an integral component of car-security systems rely on several sensors. When the first
our daily lives, and it is becoming increasingly common Car Alarm System was initiated, the system consisted
for people in the Philippines to rely on vehicles, such as mostly of electromechanical devices. As automation
motorcycles, as their primary mode of transportation. advances, they unfold into fully integrated microprocessor-
The prevalence of motorcycle theft has risen positioned systems using diverse electronic sensors. In, the
concurrently with the growing number of motorcycle hardware and software of the GPS and GSM grid were
users over the years. To address this issue, a system has advanced.[2]
been devised for the effective prevention and retrieval of
stolen motorcycles in a timely and efficient manner. The A vehicle tracking system is an electronic device that
user of this system is alerted through an alert is installed in a vehicle to enable the owner or a third party
notification when the motorcycle has been moved over a to track the vehicle's location. The design of this system has
considerable distance or has been stolen. Additionally, advanced significantly, utilizing GPS and GSM technology.
the user can view the current location of the motorcycle, This process is supported by an embedded system, which is
turn off the engine, and capture an image of the thief. used for tracking and positioning any vehicle using the
Global Positioning System (GPS) and global system for
The system is composed of two parts: hardware and mobile communication (GSM). The system continuously
software modules. The hardware component includes a monitors the motion of the vehicle and provides real-time
micro-controller, GSM, GPS, and a camera. The status updates upon request. [3]
motorcycle serves as the primary controller of the entire
system and is also responsible for its operation. Predictive analytics is a branch of data science that
According to the usability and functionality evaluation uses statistical techniques and machine learning algorithms
conducted, it was discovered that most users strongly to analyse historical data and make predictions about future
agreed on the usefulness of the system. events. such as location, time, type of motorcycle, etc., and
creating models that can accurately predict when and where
Keywords:- Motorcycle, Theft Prevention, Image Capture, a theft is likely to occur.[4]
Hardware, Software, Micro-controller, GSM (Global
System for Mobile Communications), Detection and There are numerous potential benefits of using
Recovery. predictive analytics for motorcycle theft detection and
recovery. By identifying high-risk areas and times, law
I. INTRODUCTION enforcement agencies can effectively allocate resources for
patrolling and surveillance. Motorcycle owners can also take
As the number of motorcycles on the road continues to proactive measures such as investing in additional security
increase, theft is becoming a threat. With this growing features or avoiding certain areas at times. This study delves
concern, it has become crucial for authorities and into the application of predictive analytics in tackling
motorcycle owners to implement effective measures for the motorcycle theft and its potential benefits in enhancing
detection and recovery of stolen bikes. Predictive analytics security measures. [5]
is a powerful tool that can aid in achieving this goal by
analyzing past data and predicting future patterns. By II. LITERATURE SURVEY
leveraging this technology, motorcycle theft detection and
recovery can be significantly improved, ultimately leading Kunnu Purwanto.et al.,2019 this research created an
to safer and more secure environments for riders. [1] automatic motorcycle safety system called germ narcissistic.
Origin's egocentric is the crucial invention in automatic
The latest car anti-theft system is a car alarm, a vehicle security using a global positioning system (GPS),
flashing light manner that makes use of different kinds of global system for mobile communication (GSM), and Radio
sensors that can be pressure, tilt, shock, and door sensors, frequence Identification (RFID). This system was created
but the shortcomings are cost, and it only averts the vehicles using a short communication service (SMS) to give vehicle
from theft but cannot be used to trace the thief. Customary information, similar as time, position, and alarm, to the
proprietor of the motorcycle. The arrangement of these interface for purchasing second-hand bikes and reporting
technologies can be used as a practical and effective safety stolen ones, receiving timely notifications about relevant
key for motorcycles [6]. listings. This system's unique focus on theft prevention and
recovery sets it apart, emphasizing security measures and
Rushikesh Bokade.et al.,2022 Transport is an integral integration with law enforcement databases to safeguard
aspect of our daily lives. As time goes by, more and more transactions and aid in the retrieval of stolen bikes.
individuals are relying on cars, particularly motorcycles
with two wheels, as their primary means of transportation. A. Architecture Diagram
Unfortunately, the number of motorcycle users and
instances of motorcycle theft continue to rise each year. This
paper examines and presents a variety of approaches to
recover from potholes and speed breakers as a means of
preventing theft [7].
Rometdo Muzawi.et al.,2022 this study showed that Fig 1: Architecture of Proposed System
the system works by utilizing a cross pattern, a voltage
sensor taken directly from the ignition of a motorcycle as a B. Explanation:
notification of the vehicle's life or death, and the Internet of The architecture diagram depicts a system where users
Things capabilities. Moreover, this system has the benefit of can log in to access vehicle-related services. Upon
being outfitted with a GPS Neo 6 sensor that tracks the successful login, users receive confirmation and can then
motorcycle's location through longitude and latitude request vehicle details or search for stolen vehicles. The
coordinates if the motorcycle is in motion [9]. system retrieves information from a database and presents it
to users. Additionally, there's a component to detect and
Budi Artono.et al.,2020 say that GSM Module to send handle inappropriate user input. This architecture ensures
warning messages, and a GPS tracker to provide information secure access to vehicle information while promoting user
in latitude and longitude coordinates to track the stolen safety and experience.
motorcycle using Google Maps. GPS Tracker works by
reading the coordinates of the location of the objected. The C. Module Description
tests were carried out by moving and integrating the System development deals with the operations that are
motorcycle system, and the results can be seen in the carried out to get desired output from software product
coordinate changes, monitored by Google Maps showing the based on certain design specifications. This Application
movement of the motorcycle. The system was significantly hold the following three main modules
closer to the planned one [10].
Controller
III. PROPOSED SYSTEM Provider
User
The proposed system is designed to address the issue
of online bike theft prevention through a three-module Controller
architecture. The Controller/Admin module serves as the The Controller module acts as the central hub for
central management hub, overseeing user and bike provider system management and user interactions, offering
operations, as well as maintaining the stolen bike database administrative tools and privileges upon secure login.
and reporting functionalities. Bike providers utilize the Administrators can access user demographics and profiles
dedicated module to list second-hand bikes for sale, with through the "View User List" function and track vehicle
integrated checks against the stolen bike database to ensure history for maintenance purposes. User transaction patterns
legitimacy. Meanwhile, users benefit from a streamlined can be analyzed via the "View User Purchase History"
feature, while the "View Stolen Vehicle Status" aids in In figure 2, demonstrates The Home Page design and
vehicle recovery efforts. The module also facilitates data layout effectively engage users, encouraging platform
visualization with the "View Graph" module and ensures exploration and interaction. Continuous monitoring and
secure session termination through the "Logout" feature, optimization enhance usability and user retention.
prioritizing data security and user privacy.
Provider
The Provider module serves as the central hub for
managing vehicle-related tasks efficiently. Providers start by
securely logging into the system, gaining access to a range
of tools and features. They can then delve into the vehicle
history, reviewing past records and transactions. If there's a
need to add a new vehicle to the system, providers can
easily do so using the "Add Vehicle" function, ensuring that
the database stays up to date. Additionally, the "View
Vehicle" feature provides detailed information about
specific vehicles, including specifications and ownership
details. Providers can also use the "Check Request" function
to handle user requests promptly and effectively. Lastly, the
"Vehicle Status" feature provides real-time updates on the
availability and condition of vehicles, allowing providers to
make informed decisions. Overall, the Provider module
streamlines vehicle management tasks, ensuring smooth
operations within the system.
Fig 3: Controller Login Page
User
The User module allows users to register securely and In figure 3, demonstrates The Controller Login Page
access system features after successful registration. Through features robust authentication and encryption mechanisms,
functions like "View Vehicle" and "Vehicle Status," users ensuring secure access for administrators. The
can explore detailed vehicle information and receive real- authentication process, granting authorized access to the
time updates on vehicle status. In the event of a stolen controller system's functionalities.
vehicle, users can report it using the "Find Stolen Vehicle"
function, contributing to community safety efforts.
Additionally, users can share vehicle statuses with others
and securely terminate sessions using the "Send/Share
Status" and "Logout" features, respectively, prioritizing data
security and privacy.
In figure 5, The Provider register page represented the In figure 7 Upon registration, users can access vehicle
users are required to input specific details, including their ID details and status updates. To utilize these features, users
number, phone number, and other common information. enter registration details in the provided form.
Once these details are entered, users can submit the form to
proceed with the registration process.
Fig 6: View Provider Details In figure 8, Upon completing the user registration form,
users can access both user and provider registration details.
In figure 6, demonstrate the after entering the details in Users can view vehicle details and status, search for stolen
the provider registration form and submitting it, the system vehicles, and share updates seamlessly before logging out.
displays a confirmation page. View Vehicle History:
Review past activities and records related to vehicles within
the system.
REFERENCES