Human-Wildlife Conflict Early Warning System Using the Internet of Things and Short Message Service
Received: 23 December 2021 | Revised: 12 January 2022 | Accepted: 18 January 2022 | Online: 27 February 2022
Corresponding author: E. K. Ronoh
Human-wildlife conflict (HWC) is an important challenge to communities living in areas bordering wildlife game parks and reserves. It is more evident in the United Republic of Tanzania, whose economy depends on wildlife tourism. This paper proposes a low-cost and low-power early warning system using the Internet of Things (IoT) and Short Message Service (SMS) to support HWC respond teams in mitigating these challenges. The system comprises three primary units: sensing, processing, and alerting. The sensing unit consists of a Passive Infrared (PIR) sensor, a Global Positioning System (GPS), and a Raspberry Pi camera. The PIR sensor detects the proximity of the animal using the heat signature, GPS senses and records the current location, while the Raspberry Pi camera has the primary purpose of taking a picture after the PIR sensor detects the proximity of the animal. The processing unit with a Raspberry microcomputer performs data processing and image inferencing using the You Only Look Once (YOLO) algorithm. Last is the alerting unit, which includes a Global System for Mobile (GSM) communications module for sending SMS messages to the human-wildlife conflict response team and the nearer community response team leader whenever wild animals are spotted near the park’s border. The system detects, identifies, and reports the detected wild animals. The GPRS provides internet connectivity to support data collection, storage, and monitoring in the cloud.
Keywords:edge machine learning, raspberry pi, human-wildlife conflict, early warning system, camera trap
H. J. König, C. Kiffner, S. Kramer-Schadt, C. Fürst, O. Keuling, and A. T. Ford, "Human–wildlife coexistence in a changing world," Conservation Biology, vol. 34, no. 4, pp. 786–794, 2020. DOI: https://doi.org/10.1111/cobi.13513
P. S. Branco et al., "An experimental test of community-based strategies for mitigating human–wildlife conflict around protected areas," Conservation Letters, vol. 13, no. 1, 2020, Art. no. e12679. DOI: https://doi.org/10.1111/conl.12679
E. Beall and Food and Agriculture Organization of the United Nations, Eds., Bioenergy and food security: the BEFS analysis for Tanzania: sunflower biodiesel, water, and household food security. Rome, Italy: FAO, 2012.
M. Giefer and L. An, "Synthesizing Remote Sensing and Biophysical Measures to Evaluate Human–wildlife Conflicts: The Case of Wild Boar Crop Raiding in Rural China," Remote Sensing, vol. 12, no. 4, Jan. 2020, Art. no. 618. DOI: https://doi.org/10.3390/rs12040618
E. Znidersic, "Camera Traps are an Effective Tool for Monitoring Lewin’s Rail (Lewinia pectoralis brachipus)," Waterbirds, vol. 40, no. 4, pp. 417–422, Dec. 2017. DOI: https://doi.org/10.1675/063.040.0414
O. R. Wearn and P. Glover-Kapfer, "Snap happy: camera traps are an effective sampling tool when compared with alternative methods," Royal Society Open Science, vol. 6, no. 3, 2019, Art. no. 181748. DOI: https://doi.org/10.1098/rsos.181748
A. L. Lewis, T. D. Baird, and M. G. Sorice, "Mobile Phone Use and Human–Wildlife Conflict in Northern Tanzania," Environmental Management, vol. 58, no. 1, pp. 117–129, Apr. 2016. DOI: https://doi.org/10.1007/s00267-016-0694-2
M. S. Kumar, G. Janaki, S. Hariharan, and P. S. Priya, "IoT Based Warning System from the Threat of Wild Animals," in 2021 6th International Conference on Communication and Electronics Systems (ICCES), Coimbatre, India, Jul. 2021, pp. 550–553. DOI: https://doi.org/10.1109/ICCES51350.2021.9489181
S. Divya, U. Kiran, and M. Praveen, "IOT-Based Wild Animal Intrusion Detection System," International Journal on Recent and Innovation Trends in Computing and Communication, vol. 6, no. 7, pp. 06–08, Jul. 2018.
K. S. P. Premarathna, R. M. K. T. Rathnayaka, and J. Charles, "An Elephant Detection System to Prevent Human-Elephant Conflict and Tracking of Elephant Using Deep Learning," in 2020 5th International Conference on Information Technology Research (ICITR), Moratuwa, Sri Lanka, Sep. 2020. DOI: https://doi.org/10.1109/ICITR51448.2020.9310798
D. J. S. Anni and A. K. Sangaiah, "An Early Warning System to Prevent Human Elephant Conflict and Tracking of Elephant Using Seismic Sensors," in Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1, Cham, 2015, pp. 595–602. DOI: https://doi.org/10.1007/978-3-319-13728-5_67
M. Kiruthika and S. Bindu, "Classification of Electrical Power System Conditions with Convolutional Neural Networks," Engineering, Technology & Applied Science Research, vol. 10, no. 3, pp. 5759–5768, Jun. 2020. DOI: https://doi.org/10.48084/etasr.3512
K. Manjari, M. Verma, and G. Singal, "CREATION: Computational ConstRained Travel Aid for Object Detection in Outdoor eNvironment," in 2019 15th International Conference on Signal-Image Technology Internet-Based Systems (SITIS), Sorrento, Italy, Aug. 2019, pp. 247–254. DOI: https://doi.org/10.1109/SITIS.2019.00049
A. Alsheikhy, Y. Said, and M. Barr, "Logo Recognition with the Use of Deep Convolutional Neural Networks," Engineering, Technology & Applied Science Research, vol. 10, no. 5, pp. 6191–6194, Oct. 2020. DOI: https://doi.org/10.48084/etasr.3734
A. Ghosh, S. A. Al Mahmud, T. I. R. Uday, and D. Md. Farid, "Assistive Technology for Visually Impaired using Tensor Flow Object Detection in Raspberry Pi and Coral USB Accelerator," in 2020 IEEE Region 10 Symposium (TENSYMP), Dhaka, Bangladesh, Jun. 2020, pp. 186–189. DOI: https://doi.org/10.1109/TENSYMP50017.2020.9230630
P. N. Saranu, G. Abirami, S. Sivakumar, K. M. Ramesh, U. Arul, and J. Seetha, "Theft Detection System using PIR Sensor," in 2018 4th International Conference on Electrical Energy Systems (ICEES), Chennai, India, Oct. 2018, pp. 656–660. DOI: https://doi.org/10.1109/ICEES.2018.8443215
K. C. Sahoo and U. C. Pati, "IoT based intrusion detection system using PIR sensor," in 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT), Bangalore, India, Feb. 2017, pp. 1641–1645. DOI: https://doi.org/10.1109/RTEICT.2017.8256877
B. N. Rao and R. Sudheer, "Surveillance Camera using IoT and Raspberry Pi," in 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, Jul. 2020, pp. 1172–1176.2020.9182983. DOI: https://doi.org/10.1109/ICIRCA48905.2020.9182983
Wahyudi, M. S. Listiyana, Sudjadi, and Ngatelan, "Tracking Object based on GPS and IMU Sensor," in 2018 5th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), Semarang, Indonesia, Sep. 2018, pp. 214–218. DOI: https://doi.org/10.1109/ICITACEE.2018.8576928
G. Bekaroo and A. Santokhee, "Power consumption of the Raspberry Pi: A comparative analysis," in 2016 IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech), Balaclava, Mauritius, Dec. 2016, pp. 361–366. DOI: https://doi.org/10.1109/EmergiTech.2016.7737367
S. Javed, S. Ghazala, and U. Faseeha, "Perspectives of Heat Stroke Shield: An IoT based Solution for the Detection and Preliminary Treatment of Heat Stroke," Engineering, Technology & Applied Science Research, vol. 10, no. 2, pp. 5576–5580, Apr. 2020. DOI: https://doi.org/10.48084/etasr.3274
MNRT (2020), National Human-Wildlife Conflict Management Strategy 2020-2024. United Republic of Tanzania: Ministry of Natural Resources and Tourism, 2020.
How to Cite
MetricsAbstract Views: 999
PDF Downloads: 673
Copyright (c) 2022 Authors
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.