Real Time Vital Sign Monitoring for AI Enabled Wearables and Study of Cryptographic Co Processor
DOI:
https://doi.org/10.15662/IJEETR.2026.0802082Keywords:
Real-time monitoring, AI-enabled wearables, vital signs tracking, cryptographic co-processor, data security, biosensors, healthcare IoTAbstract
Human detection in army sectors is crucial for maintaining security and preventing unauthorized intrusions. This study presents a Python-based approach utilizing the OpenCV library for real-time human detection. The proposed method involves preprocessing input images to enhance features relevant to human detection, followed by employing the Haar cascade classifier provided by OpenCV to identify human figures. Additionally, a combination of background subtraction and contour detection techniques is utilized to enhance the accuracy of human detection in varying environmental conditions. The algorithm is trained and tested on a dataset consisting of diverse images captured in different lighting conditions and terrains typical of army sectors. Experimental results demonstrate the effectiveness and robustness of the proposed method in accurately detecting human presence, while minimizing false positives. The developed system offers a cost-effective and efficient solution for enhancing security measures in army sectors, enabling timely detection and response to potential threats. Furthermore, the light weight nature of the Python implementation makes it suitable for deployment on resource constrained devices commonly used in field operations. Overall, the proposed human detection system offers a reliable and adaptable solution for enhancing situational awareness and security in army sectors.
References
1. A. Aashraya, P. Munisami, Department of electronics and communication engineering Institute of Aeronautical Engineering, Hyderabad- 500043, “IoT BASED MILITARY ROBOT USING RASPBERRY Pi3”.
2. Abhijith Altha Valsan; Parvathy B.; Vismaya Dev G. H.; R.S Unnikrishnan; Praveen Kumar Reddy, “Unmanned Aerial Vehicle for Search and Rescue Mission”.
3. Anand Vijay K S; S Pursuit; R Suhas; CG Pavan, “A Live Human Being Detector in War Fields and Earthquake Location Using Robot with Camouflage Technology”.
4. Garcia, A.; Rodriguez, L.; Martinez, E, “Fanion of radar and vision sensors for human detection in army environments”.
5. Liu, Q.; Wang, L.; Yang, C, “Human detection in harsh weather conditions for military applications”.
6. C.Nagarajan and M.Madheswaran - ‘Stability Analysis of Series Parallel Resonant Converter with Fuzzy Logic Controller Using State Space Techniques’- Taylor &Francis, Electric Power Components and Systems, Vol.39 (8), pp.780-793, May 2011. DOI: 10.1080/15325008.2010.541746
7. C.Nagarajan and M.Madheswaran - ‘Experimental verification and stability state space analysis of CLL-T Series Parallel Resonant Converter’ - Journal of Electrical Engineering, Vol.63 (6), pp.365-372, Dec.2012. DOI: 10.2478/v10187-012-0054-2
8. C.Nagarajan and M.Madheswaran - ‘Performance Analysis of LCL-T Resonant Converter with Fuzzy/PID Using State Space Analysis’- Springer, Electrical Engineering, Vol.93 (3), pp.167-178, September 2011. DOI 10.1007/s00202-011-0203-9
9. S.Tamilselvi, R.Prakash, C.Nagarajan,“Solar System Integrated Smart Grid Utilizing Hybrid Coot-Genetic Algorithm Optimized ANN Controller” Iranian Journal Of Science And Technology-Transactions Of Electrical Engineering, DOI10.1007/s40998-025-00917-z,2025
10. S.Tamilselvi, R.Prakash, C.Nagarajan,“ Adaptive sliding mode control of multilevel grid-connected inverters using reinforcement learning for enhanced LVRT performance” Electric Power Systems Research 253 (2026) 112428, doi.org/10.1016/j.epsr.2025.112428
11. S.Thirunavukkarasu, C. Nagarajan, 2024, “Performance Investigation on OCF and SCF study in BLDC machine using FTANN Controller," Journal of Electrical Engineering And Technology, Volume 20, pages 2675–2688, (2025), doi.org/10.1007/s42835-024-02126-w
12. C. Nagarajan, M.Madheswaran and D.Ramasubramanian- ‘Development of DSP based Robust Control Method for General Resonant Converter Topologies using Transfer Function Model’- Acta Electrotechnica et Informatica Journal , Vol.13 (2), pp.18-31,April-June.2013, DOI: 10.2478/aeei-2013-0025.
13. C.Nagarajan and M.Madheswaran - ‘DSP Based Fuzzy Controller for Series Parallel Resonant converter’- Springer, Frontiers of Electrical and Electronic Engineering, Vol. 7(4), pp. 438-446, Dec.12. DOI 10.1007/s11460-012-0212-0.
14. C.Nagarajan and M.Madheswaran - ‘Experimental Study and steady state stability analysis of CLL-T Series Parallel Resonant Converter with Fuzzy controller using State Space Analysis’- Iranian Journal of Electrical & Electronic Engineering, Vol.8 (3), pp.259-267, September 2012.
15. C.Nagarajan and M.Madheswaran, “Analysis and Simulation of LCL Series Resonant Full Bridge Converter Using PWM Technique with Load Independent Operation” has been presented in ICTES’08, a IEEE / IET International Conference organized by M.G.R.University, Chennai.Vol.no.1, pp.190-195, Dec.2007
16. Suganthi Mullainathan, Ramesh Natarajan, “An SPSS and CNN modelling based quality assessment using ceramic materials and membrane filtration techniques”, Revista Materia (Rio J.) Vol. 30, 2025, DOI: https://doi.org/10.1590/1517-7076-RMAT-2024-0721
17. M Suganthi, N Ramesh, “Treatment of water using natural zeolite as membrane filter”, Journal of Environmental Protection and Ecology, Volume 23, Issue 2, pp: 520-530,2022
18. Nguyen, T.; Tran, A.; Pham, H, “Human detection using LiDAR-based systems for military border control”.
19. Sandeep Bhatia; Hardeep Singh Dhillon; Nitin Kumar, “Alive human body detection system using an autonomous mobile rescue robot”.
20. R, Prasad D, Assistant Professor, Department of Electronics and Telecommunication, “IoT Based Vehicle Robot for Supriya P Kurlekar, Sahil Military Services”.
21. Sugumar, R. (2025). Designing Resilient and Scalable Cloud-Native Frameworks for Generative AI Content Production. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 8(6), 13268-13279.
22. Soundappan, S. J. (2020). Big Data Analytics in Healthcare: Applications for Pandemic Forecastin. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 3(1), 2248-2253.
23. Aarthi, K., Thirumoorthy, P., Tamizharasu, K., Manoja, R., Kalyanasundaram, P., & Rajasekar, M. (2025, September). Improved Network lifetime using Cluster based Power-Aware Balanced Routing Protocol for Device to Device Communication. In 2025 6th International Conference on Electronics and Sustainable Communication Systems (ICESC) (pp. 1005-1010). IEEE.
24. Mathew, A. Cybersecurity 5.0: From Firewalls to Fully Autonomous Digital Protection.
25. Rengarajan, A. (2025). Cloud-Based AI-Driven Threat Detection Framework for Smart Grid Cybersecurity. International Journal of Future Innovative Science and Technology (IJFIST), 8(6), 16065.
26. Anbazhagan, K. (2025). Next-Generation Enterprise Cloud AI for Healthcare: Secure CNN Pipelines and Privacy Controls. International Journal of Future Innovative Science and Technology (IJFIST), 8(6), 15980.
27. Socrates, S., Shanmugapriya, M., Murugeshwari, B., & Angalaeswari, S. (2024). Efficient Design for Implantable Device Constant Current Induction Doubly Fed Generating Incorporating Grid Connectivity. In Intelligent Solutions for Sustainable Power Grids (pp. 382-392). IGI Global Scientific Publishing.
28. Sugumar, R. (2026). Performance Optimization Frameworks for Financial Web Platforms with Real-Time Transaction Processing. International Journal of Engineering & Extended Technologies Research (IJEETR), 8(2), 600-611.
29. Anbazhagan, K. (2025). AI Driven Zero Trust Security Model for Enterprise Data Protection and Intelligent Infrastructure Management. International Journal of Technology, Management and Humanities, 11(03), 101-107.
30. Prabha, P. S., & Rengarajan, A. (2025). ENHANCING CLOUD RESOURCE ALLOCATION WITH VISION TRANSFORMER, DEEP REINFORCEMENT LEARNING, AND IMPROVED SHRIKE OPTIMIZATION ALGORITHM. Corrosion Management ISSN: 1355-5243, 35(2), 233-245.
31. Gopinathan, V. R. (2023). Cloud-First AI Security Architecture for Protecting Enterprise Digital Ecosystems and Financial Networks. International Journal of Research and Applied Innovations, 6(6), 10031-10039.
32. Mathew, A. A Secure, Trustworthy, and Regulated Framework for AI Agents in Distributed Networks.
33. Anbazhagan, K. (2025). Secure AI Enabled Enterprise Ecosystems for Fraud Prevention Compliance Automation and Real Time Analytics. International Journal of Multidisciplinary Research in Science, Engineering, Technology & Management, 1(4), 6-13.
34. Soundappan, S. J. (2026). Building Trustworthy AI: Explainability and Security in Modern Cloud-Native Data-Driven Ecosystem Platforms. International Journal of Engineering & Extended Technologies Research (IJEETR), 8(2), 570-579.
35. Sugumar, R. (2025). Cyber-Secure Cloud Architecture Integrating Network and API Controls for Risk-Aware SAP Healthcare Data Platforms. International Journal of Humanities and Information Technology, 7(4), 53-60.
36. Vimal, V. R., & Banerjee, J. S. (2025). Integrating PSO, GA, and ACO for Optimized ECG Feature Selection and Classification of Cardiac Disorders. SGS-Engineering & Sciences, 1(5).
37. Gopinathan, V. R. (2025). AI-Powered Kubernetes Orchestration for Complex Cloud-Native Workloads. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 8(6), 13215-13225.
38. Mathew, A. From Conversation to Command Execution: A Comparative Threat Modeling and Risk Analysis of OpenClaw and ChatGPT. Risk, 100(1).
39. Inbavalli, M., & Arasu, T. (2015). Efficient Analysis of Frequent Item Set Association Rule Mining Methods. International Journal of Scientific & Engineering Research, 6(4).
40. Sugumar, R. (2025). Secure and Explainable AI Systems in Cloud-Based Applications: Bridging Trust and Performance. International Journal of Engineering & Extended Technologies Research (IJEETR), 7(4), 10328-10335.





