AI Based Content Controlling System Using Age Prediction Algorithm and Selenium Tool
AI Based Content Controlling System Using Age Prediction Algorithm and Selenium Tool
https://doi.org/10.22214/ijraset.2023.51182
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
Abstract: The internet provides a platform to distribute a vast amount of content to millions of users worldwide. However, the
true issue is when users under the age of 18 are denied access to age-restricted content, which over time has a negative impact
on the user's physical and mental health. Children are spending more amount of time in surfing the browser and they easily
come across all types of content in internet. On the other hand, creating a plan for computing imaginative complexity would
ensure children's safety in social networks, which is unmatched among the most important criteria in today's society. This
technique will only be used to regulate the website's content. In this proposed work, face detection has been carried out for
detecting the age using a Haas cascade classifier and content restriction based on age done by selenium. In general, two
sophisticated techniques, such as age estimation and facial recognition, are needed to limit internet access to specified age
groups. Then, for a content management system, this proposed work has suggested a new unified framework for face recognition
and age detection. This proposed work has developed a system that accurately controls the browser content by combining age
recognition and content restriction. In order to regulate the website, selenium is applied after detecting the person’s face and
estimating their age.
Keywords: Component, formatting, style, styling, insert.
I. INTRODUCTION
John McCarthy, the father of artificial intelligence, defined it as the science and engineering of developing intelligent machines,
particularly clever computer programs. This method teaches a computer, a robot operated by a computer, or a piece of software how
to think critically, much like an intelligent person might.
Productivity has increased as a result, and some larger organizations now have access to completely new market opportunities. Uber
has already achieved global success by doing just that. Before the current wave of AI, it would have been impossible to envision
employing software to connect people with cabs. By using machine learning to evaluate user behaviour and subsequently improve
its services, Google became one of the key participants in a wide range of online services. This is based on fields of computer,
biology, psychology, linguistics, math, and engineering. One of the main goals of AI is the creation of computer capabilities
comparable to human intellect, such as learning, problem-solving, and reasoning.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 3983
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
The internet offers a wealth of knowledge, but sorting it into good and negative categories is a time-consuming and hard process.
Exposure to age-restricted information can lead to addiction, sadness, time wasting, social isolation, loneliness, obesity, cybercrime,
and abuse of humans. Easy access to divisive literature and other divisive material, instruction on handling explosives, and gambling,
which seriously harms both physical and mental health.
A. Selenium
Selenium is an effective tool for remotely manipulating a web browser. All major browsers and operating systems may use it, and its
scripts can be written in many different languages, including Python, Java, C#, and others. In our system model, Python is used in
programming. one can automate daily operations like managing your tweets, WhatsApp texts, and even simple things like Google
without actually opening a browser using this giving automation, no upper bounds. The system is built to create an Artificial
Intelligence (AI) program that uses a web camera to split faces and determine age. Using the Selenium tool, the system can limit the
content that a browser searches for based on its age.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 3984
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
III. METHODOLOGY
The major objective is to develop a method for accurately detecting the user's age by facial segmentation by applying artificial
intelligence, which may then regulate the browser's content-searching behaviour based on the age determined using a selenium tool.
The model has five phases:
1) Defining Architecture
2) Compiling the Model
3) Running the Segmentation
4) Observing and Collecting Data
5) Evaluating the Result
This model enables the system to achieve higher accuracy levels.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 3985
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
B. Face Segmentation
Then, the face segmentation is used to determine the age. Using OpenCV, the algorithm detects and segments the face in the
collected picture.
The Haar cascade is a technique for identifying objects, irrespective of their size or location in the image. The Haar feature for face
detection consists of two parallel rectangles situated across the cheek and eye areas. These rectangles are placed in connection to a
detection window that acts as the bounding box for the target item. The Haar Cascade Classifier plays a pivotal role in face
segmentation.
This algorithm is not overly complex and can run in real-time. In still images or moving videos, it uses an Object Detection
Algorithm to spot faces.
C. Age Classification
To determine the age classification to categorize the user if they are below or above 18. The pre-trained neural network model for
age categorization is then given the segmented picture.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 3986
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
In the model, Face book website is marked as an age restricted website for demo purpose. After, classifying the age, it directly takes
to the browser. In browser, the user tries to access the Face book which is marked under age-restricted website. As the person age is
above 18, the person gains the access to website. If the person age is under 18, the access to the website will be denied.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 3987
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
V. CONCLUSIONS
In conclusion, this proposed work offers a secure solution to this issue where Parenting is built on a foundation of concern for
children's safety. Digital friendships, environments, and occurrences are becoming more and more ingrained in children's life. As a
result, the suggested approach provides the solution to block the age restricted site using facial recognition. The first two modules
are combined, and a facial picture is extracted from the web camera and segmented using Haar cascade classifier. In subsequent
work, age identification is predicted for the segmented face using deep learning caffe model, and harmful websites are banned for
persons of a certain age using selenium tools, where the blocked websites are added if the person is found to be a minor and
restricted from accessing the website.
REFERENCES
[1] Eduardo Francisco Caizaluisa Moreno, Gabriela Katherine Cevallos Salazar, 'Development of an Application for Parental Control of WhatsApp on Android
Mobile Devices', 2019, International Conference on Information Systems and Software Technologies (ICI2ST).
[2] Michal Majchrowicz, Pawel Kapusta, Damian Faustryjak, Lidia Jackowska Strumillo, 'System for remote parental control and management of rooted smart
TVs', 2018, International Interdisciplinary PhD Workshop (IIPhDW).
[3] A. Priadana and M. Habibi, "Face Detection using Haar Cascades to Filter Selfie Face Image on Instagram", 2019, International Conference of Artificial
Intelligence and Information Technology (ICAIIT), Yogyakarta, Indonesia, 2019, pp. 6-9, doi: 10.1109/ICAIIT.2019.8834526.
[4] Priyanka Kumar, Raghul M., 'Location Based Parental Control-Child Tracking App Using Android Mobile Operating System', 2018, 4th International
Conference on Computing Communication and Automation (ICCCA).
[5] Y. M. He,T. Liu,Y. W. Chen, 'Influence of parental rearing patterns on academic burnout: The mediating role of psychological capital and self-control', 2017,
IEEE International Conference on Industrial Engineering and Engineering Management (IEEM).
[6] Syafrizal Wardhana, Mira Kania Sabariah, Veronikha Effendy, Dana S. Kusumo, 'User interface design model for parental control application on mobile
smartphone using user centered design method', 2017, 5th International Conference on Information and Communication Technology (ICoIC7).
[7] Hamza H. M. Altarturi,Nor Badrul Anuar, 'A preliminary study of cyber parental control and its methods', 2020, IEEE Conference on Application,
Information and Network Security (AINS).
[8] Olesia Barkovska, Natalia Axak, Dmytro Rosinskiy, Sergey Liashenko, 'Application of mydriasis identification methods in parental control systems',2018,
IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).
[9] Otávio de P. Albuquerque,Marcelo Fantinato, Marcelo M. Eler, Sarajane, M. Peres, Patrick C. K. Hung, 'A Study of Parental Control Requirements for
Smart Toys', 2020, IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[10] Walter Fuertes, Karina Quimbiulco, Fernando Galáfraga,José Luis GarcÃa-Dorado, 'On the Development of Advanced Parental Control Tools', 2015, 1st
International Conference on Software Security and Assurance (ICSSA).
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 3988