SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 7 06 - 08
______________________________________________________________________________________
6
IJRITCC | July 2018, Available @ http://www.ijritcc.org
_____________________________________________________________________________________
IOT-Based Wild Animal Intrusion Detection System
Prof. Divya, Prof. Usha kiran
Department of Information Science and Engineering,
Vivekananda College of Engineering and Technology, Puttur,
India
Divya.shettigar.hp@gmail.com, Hod.ise@vcetputtur.ac.in
Prof. Praveen M
Department of Electronics & communication Engineering,
Vivekananda College of Engineering and Technology, Puttur,
India
Pravec58@yahoo.in
Abstract- In forest zone and agricultural field human animal conflict is a major problem where enormous amount of resources is lost and human
life is in danger. Due to this People lose their crops, livestock, property, and sometimes their lives. So this zone is to be monitored continuously
to prevent entry of wild animals. With regard to this problem, we have made an effort to develop the system which will monitor the field. That
is at first it will detect intrusion around the field using sensor, then camera will capture the image of the intruder and classifying them using
image processing and then Taking suitable action based on the type of the intruder. Finally sends notification to farm owner and forest officials
using GSM.
Keywords---Animal detection, PIR sensors, camera, image processing, light emitter, sound generator, GSM module
__________________________________________________*****_________________________________________________
I. INTRODUCTION
India is an agricultural country. Agriculture has always been
India‟s most important economic sector. Though most of the
India‟s population depends on agriculture, there are still a
lot many problems faced by farmers. Human animal conflict
is a major problem where enormous amount of resources is
lost and human life is in danger. In recent times the numbers
of these kinds of conflicts are increasing. So this zone is to
be monitored continuously to prevent entry of this kind of
animals or any other unwanted intrusion. Human-animal
conflicts arises due to encroachment and poaching, humans
move into the forest to satisfy their livelihood, for claiming
of land for agricultural practices and rapid industrialization
causes spreading of urban ground and animals enter the
nearby villages for water during the summer due to dryness
in water body. Elephants or wild boar tramp the vegetation
in farm land in need of nutritious food. Need of the animal
or human put the other in real danger, in this process,
resources are spoiled and sometimes even the life is lost.
Human-elephant conflict is more in south Asia and in
Africa. Usually farms are protected with electrical fence;
animal which tries to enter the field suffers electrocution
with intense pain cause animals to behave in abnormal
manner.
Hardware requirements refer to the physical parts of a
computer and related devices. Internal hardware devices
include motherboards, hard drives and RAM.
 Sensors- PIR HC-SR501 Motion Sensor.
 WebCam
 Microcontroller- Arduino Uno.
 Light- Bright Light Emitter.
Software requirement is a field within Software Engineering
that deals with establishing the needs of stakeholders that
are to be solved by the software. The software requirement
of our project is given below.

Microcontroller- Arduino IDE.

Image processing- MATLAB 2017a.
II. OBJECTIVE
The objective of our project is to provide protection from
the attacks of the wild animals and thus minimizing the
probable loss to the farmer.
 To detect intrusion around the field.
 To capture the image of the intruder and
classifying them using image processing.
 Taking suitable action based on the type of the
intruder.
 To send notification to farm owner and forest
officials using GSM.
III. RELATED WORK
To track the location of Animal in the zoo or national parks
[1] a temperature sensor and PIR sensor is used. The
temperature sensor senses the temperature of each animal
and PIR sensor senses the human presence inside the animal
boundaries or restricted areas. If the animal is suffering
from any wounds or fever, the body temperature will be
automatically increased. To monitor this, temperature sensor
is used. It continuously monitors the animal‟s temperature.
If any variation in the temperature, It will be displayed on
the LCD. The PIR sensor is used to monitor the human
presence in restricted areas or nearby the animal boundaries.
When the human presence is detected, the voice processor
will give alert to the people through the pre-recorded voice.
The GPS receiver send the location, animal temperature to
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 7 06 - 08
______________________________________________________________________________________
7
IJRITCC | July 2018, Available @ http://www.ijritcc.org
_____________________________________________________________________________________
the controller and it is interfaced with the IOT, It will give
the complete information to the website on PC or laptop.
In Animal intrusion detection system using wireless sensor
networks system [2] the bird intrusion is being detected by
the use of wireless sensors and buzzers which produce
acoustic sounds. When a bird is being detected by the
sensors in the agricultural area the acoustic sounds get
activated. This sound irritates the birds. Hence when these
sounds are generated the birds will fly away as they cannot
accommodate to that sound. Thus the destruction caused by
the birds in the agricultural fields can be avoided. These
acoustic sounds that are being generated will be produced
only when the birds are detected and continuous for a while
until the birds are been driven away.
In [3], a simple approach where PIR sensors are placed in
the place which has to be monitored? The sensor is placed in
a tower arrangement. This system is one way
implementation of our job. The main objective of this
system is to monitor the area and find any unauthorized
entry into that area. Also the end result of this system is an
output which either denotes the entry of an animal or
human. Even an object with similar kind of characters are
not classified, because the entire system is only reliant on
sensor tower which differentiates between the two classes
based on the IR rays emitted by the object. Also the output
data is to be continuously monitored by a human, else there
will be no action taken against the intrusion. This is not an
autonomous system since no corrective action is taken for
the problem.
In this approach [4] a GPS tracking device is to be placed in
the leader of the group of animal. A virtual border is created
around the protective zone. These signals are to be
continuously monitored in a base station and when the
leader crosses the border an alert message is generated. Note
that here the leader of the group is assumed to lead a batch
of animals and also these animals always approach human
area in groups. This is not the case with most of the animals.
The group may be split; the animals may not follow the
animal which was identified as the leader; also finding the
animals „leader is a tedious task.
In this approach [5] a Wireless Sensor network is formed by
implementing motion sensors at various locations around
the field. Continuously motion data is communicated to the
Co-ordinator through Radio-frequency transceiver. On
detecting motion, alert message is delivered to the farm
owner.
IV. PREPARE YOUR PAPER BEFORE
STYLING
In the proposed project, PIR Sensors and camera act as first
round of security where the animal movement is detected
using the sensor and the sensor in turn triggers the camera to
take the picture of the animal and transmit the image for
processing via microcontroller i.e., through WSN. The
microcontroller transmits the image from the camera to the
PC in the command centre where the image processing and
classification of animal is done. Once the animal is found to
be a threat the PC will send the signal to the repellent
system via microcontroller to take appropriate action.
Input
Along the borders of the farm the PIR Sensors and the
camera is pole mounted. The number of sensors are
relatively twice of that of camera. The sensors have a range
of about 30 meters and that of camera is 50 meters. The
camera is powered by battery and solar panel. Once an
animal is been detected by the sensor, it gives the signal to
the camera via microcontroller that takes up the image of
the respective scope of area in which the signal has come
from. The camera will then send the image for processing
and classification of animal whether it is threat or not.
Processing
The image that is sent by the camera is received by the PC
for classification of animal. Database is created and the set
of sample images are stored in it. The program consists of
functions such as indexImage, imageSet and retrieveImage.
The ImageSet is used to hold a collection of images.
indexImage is used to create an image search index.
indexImage is used with the retrieveImage function to
search for images. The captured image is given as query
image to the processing system. The retrieveImage function
takes two arguments, a query image and the image stored in
the database. The resultant is the indices corresponding to
images within image Index that are visually similar to the
query image. The image IDs output contains the indices in
ranked order, from the most to least similar match. The
value match range is from 0-1.If the value is 0, then the
image is not matched. If it is 1, then the query image is same
as that of the stored image. If the value is found between
that of 0-1, then the query image falls under the category of
the stored image i.e., the contents in the query image are
same as that of the stored image. If the name of the image
matches with that of the regular expression of the image
then the animal is elephant otherwise it is a leopard. If the
score is in the range of 0.1 to 0.9, then the image is matched
with that of the stored image. Once the wild animal is
identified then the resulting repellent system is applied. If
the animal found is an elephant then the Bright light is
emitted. If it is found to be a Leopard, then the irritating
loud noise is used. Consequently a SMS is sent to the forest
officials and also to the field owner as alert information. If
the detected object is not a threat then no SMS is sent. By
this way false alarm can be prevented.
Figure 1: Block diagram of intrusion detection system
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 7 06 - 08
______________________________________________________________________________________
8
IJRITCC | July 2018, Available @ http://www.ijritcc.org
_____________________________________________________________________________________
Output
Once the animal is classified to be a threat, necessary
actions are. SMS notification will be sent to the farmer and
the forest official regarding the location of the animal and
what type of animal has been trying to intrude the farm.
Along with the SMS notification, repellent system of Bright
light and irritating loud noise is used simultaneously with
interval of 4 seconds is used upon the animal. The repellent
system works continuously for better effectiveness in
scaring away the animal.
Figure 2: Flow diagram of intrusion detection system
V. EXPERIMENTAL RESULTS
Figure below shows simulation result when elephant is
found as an intruder.
Figure 3: when the elephant detected as intruder
Figure 4 shows simulation result when leopard is found as
an intruder.
Figure 4: when the leopard is detected as intruder
VI. CONCLUSION
The animals, many of which are already threatened or
endangered, are often killed in retaliation or to prevent
future conflicts. So this zone is to be monitored
continuously to prevent entry of wild animals.
With regard to this problem, proposed system is developed
which will monitor the field using sensor and camera and
captured image of the intruder will be classified using image
processing so that suitable action can be taken.
VII. REFERENCES
[1]. R.Shanmugasundaram, S.Pavithra, V.Sangeetha,
S.Tamilselvan, A.H.Thanveer Ahmed , “IoT based animal
tracking and monitoring system in zoo”, South Asian
Journal of Engineering and Technology Vol.3, No.2
(2017) 162–168.
[2]. Dr. P. Uma Maheswari and Anjali Rose Rajan, “Animal
intrusion detection system using wireless sensor
networks”, International Journal of Advanced Research in
Biology Engineering Science and Technology
(IJARBEST), Vol. 2, Special Issue 10, March 2016.
[3]. Pampapathi B S, Manjunath P C, “Intrusion Detection
Using Passive Infrared Sensor (PIR) “, Asian Journal of
Engineering and Technology Innovation, Volume 4, Issue
7.
[4]. So-Hyeon Kim, Do-Hyeun Kim, Hee-Dong Park,
“Animal Situation Tracking Service Using RFID, GPS,
and Sensors“, 2010 Second International Conference on
Computer and Network Technology, 153 - 156, 2010
[5]. Shobhit Kumar Nagpal; P. Manojkumar, "Hardware
implementation of intruder recognition in a farm through
Wireless Sensor Network", 2016 International Conference
on Emerging Trends in Engineering, Technology and
Science (ICETETS), 2016, 1 – 5.

More Related Content

What's hot

Wireless robot ppt
Wireless robot pptWireless robot ppt
Wireless robot ppt
Varun B P
 
Automatic railway gate control
Automatic railway gate controlAutomatic railway gate control
Automatic railway gate control
Atchyuth Sonti
 

What's hot (20)

Vehicle accident detection and messaging system using GSM and arduino
Vehicle accident detection and messaging system using GSM and arduinoVehicle accident detection and messaging system using GSM and arduino
Vehicle accident detection and messaging system using GSM and arduino
 
Automatic Door Opener using PIR Sensor
Automatic Door Opener using PIR SensorAutomatic Door Opener using PIR Sensor
Automatic Door Opener using PIR Sensor
 
Safety app for woman
Safety app for womanSafety app for woman
Safety app for woman
 
Wireless robot ppt
Wireless robot pptWireless robot ppt
Wireless robot ppt
 
PATIENT MONITORING SYSTEM USING IOT
PATIENT MONITORING SYSTEM USING IOTPATIENT MONITORING SYSTEM USING IOT
PATIENT MONITORING SYSTEM USING IOT
 
HOME INTRUSION DETECTION.pptx
HOME INTRUSION DETECTION.pptxHOME INTRUSION DETECTION.pptx
HOME INTRUSION DETECTION.pptx
 
Robotic car project presentation
Robotic car project presentationRobotic car project presentation
Robotic car project presentation
 
Anti sleep alarm for drivers using arduino project
Anti sleep alarm for drivers using arduino projectAnti sleep alarm for drivers using arduino project
Anti sleep alarm for drivers using arduino project
 
Vehicle tracking Using GPS,GSM & ARM7
Vehicle tracking Using GPS,GSM & ARM7Vehicle tracking Using GPS,GSM & ARM7
Vehicle tracking Using GPS,GSM & ARM7
 
Micro electronic pill
Micro electronic pillMicro electronic pill
Micro electronic pill
 
final project ppt
final project pptfinal project ppt
final project ppt
 
Final year project presentation IOT Based home security system
Final year project presentation IOT Based home security systemFinal year project presentation IOT Based home security system
Final year project presentation IOT Based home security system
 
ACCIDENT DETECTION SYSTEM PPT
ACCIDENT DETECTION SYSTEM PPTACCIDENT DETECTION SYSTEM PPT
ACCIDENT DETECTION SYSTEM PPT
 
Automatic Railway Gate Control System with Arduino
Automatic Railway Gate Control System with ArduinoAutomatic Railway Gate Control System with Arduino
Automatic Railway Gate Control System with Arduino
 
Automatic water level monitoring and control system using IoT
Automatic water level monitoring and control system using IoTAutomatic water level monitoring and control system using IoT
Automatic water level monitoring and control system using IoT
 
Automatic room temperature controlled fan using arduino uno microcontroller
Automatic room temperature controlled fan using   arduino uno  microcontrollerAutomatic room temperature controlled fan using   arduino uno  microcontroller
Automatic room temperature controlled fan using arduino uno microcontroller
 
Automatic railway gate control
Automatic railway gate controlAutomatic railway gate control
Automatic railway gate control
 
Smart Irrigation System Using IoT
Smart Irrigation System Using IoTSmart Irrigation System Using IoT
Smart Irrigation System Using IoT
 
Automatic railway gate control
Automatic railway gate controlAutomatic railway gate control
Automatic railway gate control
 
IOT based air quality and monitoring by using arduino
IOT based air quality and monitoring by using arduinoIOT based air quality and monitoring by using arduino
IOT based air quality and monitoring by using arduino
 

Similar to IOT-Based Wild Animal Intrusion Detection System

Comparative Study on Advanced Farm Security System Using Internet of Things a...
Comparative Study on Advanced Farm Security System Using Internet of Things a...Comparative Study on Advanced Farm Security System Using Internet of Things a...
Comparative Study on Advanced Farm Security System Using Internet of Things a...
vivatechijri
 
Alert System for High Speed Vehicles to Avoid Wildlife Accidents
Alert System for High Speed Vehicles to Avoid Wildlife AccidentsAlert System for High Speed Vehicles to Avoid Wildlife Accidents
Alert System for High Speed Vehicles to Avoid Wildlife Accidents
IJERA Editor
 
Alert System for High Speed Vehicles to Avoid Wildlife Accidents
Alert System for High Speed Vehicles to Avoid Wildlife AccidentsAlert System for High Speed Vehicles to Avoid Wildlife Accidents
Alert System for High Speed Vehicles to Avoid Wildlife Accidents
IJERA Editor
 

Similar to IOT-Based Wild Animal Intrusion Detection System (20)

IRJET- GPS Arduino based Tracking and Alarm System for Protection of Wildlife...
IRJET- GPS Arduino based Tracking and Alarm System for Protection of Wildlife...IRJET- GPS Arduino based Tracking and Alarm System for Protection of Wildlife...
IRJET- GPS Arduino based Tracking and Alarm System for Protection of Wildlife...
 
Snake Detection in Agricultural Fields using IoT
Snake Detection in Agricultural Fields using IoTSnake Detection in Agricultural Fields using IoT
Snake Detection in Agricultural Fields using IoT
 
Smart Intrusion Detection System for Crop Protection
Smart Intrusion Detection System for Crop ProtectionSmart Intrusion Detection System for Crop Protection
Smart Intrusion Detection System for Crop Protection
 
IRJET- IoT based Wireless Sensor Network for Prevention of Crop Yields fr...
IRJET-  	  IoT based Wireless Sensor Network for Prevention of Crop Yields fr...IRJET-  	  IoT based Wireless Sensor Network for Prevention of Crop Yields fr...
IRJET- IoT based Wireless Sensor Network for Prevention of Crop Yields fr...
 
IRJET- Scare Away Animals
IRJET-  	  Scare Away AnimalsIRJET-  	  Scare Away Animals
IRJET- Scare Away Animals
 
Comparative Study on Advanced Farm Security System Using Internet of Things a...
Comparative Study on Advanced Farm Security System Using Internet of Things a...Comparative Study on Advanced Farm Security System Using Internet of Things a...
Comparative Study on Advanced Farm Security System Using Internet of Things a...
 
Detecting Alive Human Using Robot for Rescue Operation
Detecting Alive Human Using Robot for Rescue OperationDetecting Alive Human Using Robot for Rescue Operation
Detecting Alive Human Using Robot for Rescue Operation
 
WARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOT
WARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOTWARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOT
WARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOT
 
IRJET- A Smart Farmland using Raspberry Pi Crop Prevention and Animal Intrusi...
IRJET- A Smart Farmland using Raspberry Pi Crop Prevention and Animal Intrusi...IRJET- A Smart Farmland using Raspberry Pi Crop Prevention and Animal Intrusi...
IRJET- A Smart Farmland using Raspberry Pi Crop Prevention and Animal Intrusi...
 
A Survey on Various Animal Health Monitoring and Tracking Techniques
A Survey on Various Animal Health Monitoring and Tracking TechniquesA Survey on Various Animal Health Monitoring and Tracking Techniques
A Survey on Various Animal Health Monitoring and Tracking Techniques
 
Alert System for High Speed Vehicles to Avoid Wildlife Accidents
Alert System for High Speed Vehicles to Avoid Wildlife AccidentsAlert System for High Speed Vehicles to Avoid Wildlife Accidents
Alert System for High Speed Vehicles to Avoid Wildlife Accidents
 
Alert System for High Speed Vehicles to Avoid Wildlife Accidents
Alert System for High Speed Vehicles to Avoid Wildlife AccidentsAlert System for High Speed Vehicles to Avoid Wildlife Accidents
Alert System for High Speed Vehicles to Avoid Wildlife Accidents
 
Journal Publication
Journal PublicationJournal Publication
Journal Publication
 
PhD research publications
PhD research publicationsPhD research publications
PhD research publications
 
IJSRED-V2I3P47
IJSRED-V2I3P47IJSRED-V2I3P47
IJSRED-V2I3P47
 
ppt(ANIMAL MONITORING).pptx
ppt(ANIMAL MONITORING).pptxppt(ANIMAL MONITORING).pptx
ppt(ANIMAL MONITORING).pptx
 
A Literature Research Review On Animal Intrusion Detection And Repellent Systems
A Literature Research Review On Animal Intrusion Detection And Repellent SystemsA Literature Research Review On Animal Intrusion Detection And Repellent Systems
A Literature Research Review On Animal Intrusion Detection And Repellent Systems
 
SMART CROP PROTECTION-2.pptx
SMART CROP PROTECTION-2.pptxSMART CROP PROTECTION-2.pptx
SMART CROP PROTECTION-2.pptx
 
IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...
IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...
IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...
 
Anti-poaching System to Detect Poachers and Conserve Forest Ecosystem
Anti-poaching System to Detect Poachers and Conserve Forest EcosystemAnti-poaching System to Detect Poachers and Conserve Forest Ecosystem
Anti-poaching System to Detect Poachers and Conserve Forest Ecosystem
 

More from rahulmonikasharma

Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 

IOT-Based Wild Animal Intrusion Detection System

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 7 06 - 08 ______________________________________________________________________________________ 6 IJRITCC | July 2018, Available @ http://www.ijritcc.org _____________________________________________________________________________________ IOT-Based Wild Animal Intrusion Detection System Prof. Divya, Prof. Usha kiran Department of Information Science and Engineering, Vivekananda College of Engineering and Technology, Puttur, India Divya.shettigar.hp@gmail.com, Hod.ise@vcetputtur.ac.in Prof. Praveen M Department of Electronics & communication Engineering, Vivekananda College of Engineering and Technology, Puttur, India Pravec58@yahoo.in Abstract- In forest zone and agricultural field human animal conflict is a major problem where enormous amount of resources is lost and human life is in danger. Due to this People lose their crops, livestock, property, and sometimes their lives. So this zone is to be monitored continuously to prevent entry of wild animals. With regard to this problem, we have made an effort to develop the system which will monitor the field. That is at first it will detect intrusion around the field using sensor, then camera will capture the image of the intruder and classifying them using image processing and then Taking suitable action based on the type of the intruder. Finally sends notification to farm owner and forest officials using GSM. Keywords---Animal detection, PIR sensors, camera, image processing, light emitter, sound generator, GSM module __________________________________________________*****_________________________________________________ I. INTRODUCTION India is an agricultural country. Agriculture has always been India‟s most important economic sector. Though most of the India‟s population depends on agriculture, there are still a lot many problems faced by farmers. Human animal conflict is a major problem where enormous amount of resources is lost and human life is in danger. In recent times the numbers of these kinds of conflicts are increasing. So this zone is to be monitored continuously to prevent entry of this kind of animals or any other unwanted intrusion. Human-animal conflicts arises due to encroachment and poaching, humans move into the forest to satisfy their livelihood, for claiming of land for agricultural practices and rapid industrialization causes spreading of urban ground and animals enter the nearby villages for water during the summer due to dryness in water body. Elephants or wild boar tramp the vegetation in farm land in need of nutritious food. Need of the animal or human put the other in real danger, in this process, resources are spoiled and sometimes even the life is lost. Human-elephant conflict is more in south Asia and in Africa. Usually farms are protected with electrical fence; animal which tries to enter the field suffers electrocution with intense pain cause animals to behave in abnormal manner. Hardware requirements refer to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives and RAM.  Sensors- PIR HC-SR501 Motion Sensor.  WebCam  Microcontroller- Arduino Uno.  Light- Bright Light Emitter. Software requirement is a field within Software Engineering that deals with establishing the needs of stakeholders that are to be solved by the software. The software requirement of our project is given below.  Microcontroller- Arduino IDE.  Image processing- MATLAB 2017a. II. OBJECTIVE The objective of our project is to provide protection from the attacks of the wild animals and thus minimizing the probable loss to the farmer.  To detect intrusion around the field.  To capture the image of the intruder and classifying them using image processing.  Taking suitable action based on the type of the intruder.  To send notification to farm owner and forest officials using GSM. III. RELATED WORK To track the location of Animal in the zoo or national parks [1] a temperature sensor and PIR sensor is used. The temperature sensor senses the temperature of each animal and PIR sensor senses the human presence inside the animal boundaries or restricted areas. If the animal is suffering from any wounds or fever, the body temperature will be automatically increased. To monitor this, temperature sensor is used. It continuously monitors the animal‟s temperature. If any variation in the temperature, It will be displayed on the LCD. The PIR sensor is used to monitor the human presence in restricted areas or nearby the animal boundaries. When the human presence is detected, the voice processor will give alert to the people through the pre-recorded voice. The GPS receiver send the location, animal temperature to
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 7 06 - 08 ______________________________________________________________________________________ 7 IJRITCC | July 2018, Available @ http://www.ijritcc.org _____________________________________________________________________________________ the controller and it is interfaced with the IOT, It will give the complete information to the website on PC or laptop. In Animal intrusion detection system using wireless sensor networks system [2] the bird intrusion is being detected by the use of wireless sensors and buzzers which produce acoustic sounds. When a bird is being detected by the sensors in the agricultural area the acoustic sounds get activated. This sound irritates the birds. Hence when these sounds are generated the birds will fly away as they cannot accommodate to that sound. Thus the destruction caused by the birds in the agricultural fields can be avoided. These acoustic sounds that are being generated will be produced only when the birds are detected and continuous for a while until the birds are been driven away. In [3], a simple approach where PIR sensors are placed in the place which has to be monitored? The sensor is placed in a tower arrangement. This system is one way implementation of our job. The main objective of this system is to monitor the area and find any unauthorized entry into that area. Also the end result of this system is an output which either denotes the entry of an animal or human. Even an object with similar kind of characters are not classified, because the entire system is only reliant on sensor tower which differentiates between the two classes based on the IR rays emitted by the object. Also the output data is to be continuously monitored by a human, else there will be no action taken against the intrusion. This is not an autonomous system since no corrective action is taken for the problem. In this approach [4] a GPS tracking device is to be placed in the leader of the group of animal. A virtual border is created around the protective zone. These signals are to be continuously monitored in a base station and when the leader crosses the border an alert message is generated. Note that here the leader of the group is assumed to lead a batch of animals and also these animals always approach human area in groups. This is not the case with most of the animals. The group may be split; the animals may not follow the animal which was identified as the leader; also finding the animals „leader is a tedious task. In this approach [5] a Wireless Sensor network is formed by implementing motion sensors at various locations around the field. Continuously motion data is communicated to the Co-ordinator through Radio-frequency transceiver. On detecting motion, alert message is delivered to the farm owner. IV. PREPARE YOUR PAPER BEFORE STYLING In the proposed project, PIR Sensors and camera act as first round of security where the animal movement is detected using the sensor and the sensor in turn triggers the camera to take the picture of the animal and transmit the image for processing via microcontroller i.e., through WSN. The microcontroller transmits the image from the camera to the PC in the command centre where the image processing and classification of animal is done. Once the animal is found to be a threat the PC will send the signal to the repellent system via microcontroller to take appropriate action. Input Along the borders of the farm the PIR Sensors and the camera is pole mounted. The number of sensors are relatively twice of that of camera. The sensors have a range of about 30 meters and that of camera is 50 meters. The camera is powered by battery and solar panel. Once an animal is been detected by the sensor, it gives the signal to the camera via microcontroller that takes up the image of the respective scope of area in which the signal has come from. The camera will then send the image for processing and classification of animal whether it is threat or not. Processing The image that is sent by the camera is received by the PC for classification of animal. Database is created and the set of sample images are stored in it. The program consists of functions such as indexImage, imageSet and retrieveImage. The ImageSet is used to hold a collection of images. indexImage is used to create an image search index. indexImage is used with the retrieveImage function to search for images. The captured image is given as query image to the processing system. The retrieveImage function takes two arguments, a query image and the image stored in the database. The resultant is the indices corresponding to images within image Index that are visually similar to the query image. The image IDs output contains the indices in ranked order, from the most to least similar match. The value match range is from 0-1.If the value is 0, then the image is not matched. If it is 1, then the query image is same as that of the stored image. If the value is found between that of 0-1, then the query image falls under the category of the stored image i.e., the contents in the query image are same as that of the stored image. If the name of the image matches with that of the regular expression of the image then the animal is elephant otherwise it is a leopard. If the score is in the range of 0.1 to 0.9, then the image is matched with that of the stored image. Once the wild animal is identified then the resulting repellent system is applied. If the animal found is an elephant then the Bright light is emitted. If it is found to be a Leopard, then the irritating loud noise is used. Consequently a SMS is sent to the forest officials and also to the field owner as alert information. If the detected object is not a threat then no SMS is sent. By this way false alarm can be prevented. Figure 1: Block diagram of intrusion detection system
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 7 06 - 08 ______________________________________________________________________________________ 8 IJRITCC | July 2018, Available @ http://www.ijritcc.org _____________________________________________________________________________________ Output Once the animal is classified to be a threat, necessary actions are. SMS notification will be sent to the farmer and the forest official regarding the location of the animal and what type of animal has been trying to intrude the farm. Along with the SMS notification, repellent system of Bright light and irritating loud noise is used simultaneously with interval of 4 seconds is used upon the animal. The repellent system works continuously for better effectiveness in scaring away the animal. Figure 2: Flow diagram of intrusion detection system V. EXPERIMENTAL RESULTS Figure below shows simulation result when elephant is found as an intruder. Figure 3: when the elephant detected as intruder Figure 4 shows simulation result when leopard is found as an intruder. Figure 4: when the leopard is detected as intruder VI. CONCLUSION The animals, many of which are already threatened or endangered, are often killed in retaliation or to prevent future conflicts. So this zone is to be monitored continuously to prevent entry of wild animals. With regard to this problem, proposed system is developed which will monitor the field using sensor and camera and captured image of the intruder will be classified using image processing so that suitable action can be taken. VII. REFERENCES [1]. R.Shanmugasundaram, S.Pavithra, V.Sangeetha, S.Tamilselvan, A.H.Thanveer Ahmed , “IoT based animal tracking and monitoring system in zoo”, South Asian Journal of Engineering and Technology Vol.3, No.2 (2017) 162–168. [2]. Dr. P. Uma Maheswari and Anjali Rose Rajan, “Animal intrusion detection system using wireless sensor networks”, International Journal of Advanced Research in Biology Engineering Science and Technology (IJARBEST), Vol. 2, Special Issue 10, March 2016. [3]. Pampapathi B S, Manjunath P C, “Intrusion Detection Using Passive Infrared Sensor (PIR) “, Asian Journal of Engineering and Technology Innovation, Volume 4, Issue 7. [4]. So-Hyeon Kim, Do-Hyeun Kim, Hee-Dong Park, “Animal Situation Tracking Service Using RFID, GPS, and Sensors“, 2010 Second International Conference on Computer and Network Technology, 153 - 156, 2010 [5]. Shobhit Kumar Nagpal; P. Manojkumar, "Hardware implementation of intruder recognition in a farm through Wireless Sensor Network", 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), 2016, 1 – 5.