Skip to main content

Research

Prototype Solution for Human-Elephant Conflict using  Secondary Data

Co-Authors - Dinushi M. Samarawickrama , Harshana Serasinghe
Department of Information and Communication Technology, Faculty of Technology, 
University of Sri Jayewardenepura, Sri Lanka
Website - elenotify.xyz
Introduction


Sri Lanka and elephants have been intertwined since ancient times. Sri Lankan elephants are world-famous as a fundamental symbol of culture. The Sri Lankan elephant community, with its proud body, makes a significant contribution to the tourism industry. But the decades-long human-elephant conflict has escalated to the point of loss of life. This conflict has now escalated into the killing of human elephants. The main reason for the human-elephant conflict in Sri Lanka is the loss of land where elephants and humans live, which can be attributed to each other's encroachment on each other's territory. As a result, the elephant distribution in Sri Lanka is 59.9%, of which 69.4% is inhabited. 

As a result of this conflict, the elephant population in Sri Lanka has declined by 16.1% since 1960, and its current distribution is largely declining, with 318 elephants dying and 112 losing human lives by 2020. Not only the loss of life but also the damage here affects the development of the country.


Electric elephant fences have been used since 1966 as a major solution to reduce human-elephant conflict. In 2018, US $ 1,068,021 was spent on all solutions, including elephant fences, radio collars and GPS collars. But these methods have not yet become successful solutions. As a result, Sri Lanka is moving to identify and tracking elephant movements and behaviours instead of harming or repelling the elephants currently in use globally.

Analysis of the literature made it clear that these motion identities occur under three modes of vision-based, sound-based, and seismic-based recognition. The seismic research was presented because of the positive results of many studies on the use of ground motion, the satisfactory contribution percentage of the data available for such research, and the country's ability to adapt to the cost.

Method

The frequency of seismic waves generated by elephant footprints is 4.5 - 80 Hz, which is captured by a geophone. A secondary dataset was used in this study, which was linked to logistics regression, a machine learning model.

The result was a mobile app designed to show the movements and behaviours of elephants. The REST API handles the data in the mobile application. The “accuracy_score” method and the “confusion_matrix” method obtain 93% Accuracy prediction.

Conclusion

Only a handful of technical research, such as seismic waves, still takes place. Researches are hampered by economic problems, data collection, activation of actual environmental research, and lack of necessary equipment.

But this kind of practice, which is universally accepted, may cost money in the beginning, but it will be a viable solution in the long run.



LET'S PROTECT 

THEM AND US

Comments

Popular posts from this blog

Classless IP Addressing - Q & A

 Visit to learn the theory more clearly Before questions Slash Notation Three Rules in CIDR Block Question 1 Given the CIDR representation 168.1.2.10 / 18. Find the range of IP Addresses in the CIDR block. IP address - 168.1.2.10                          10101000.00000001.00000010.00001010 Number of bit allocated to Network ID      -      18 Number of bit allocated to Host ID                -       32-18 = 14 Subnet mask - 11111111.11111111.11000000.00000000 First address = (given address) AND (Subnet mask) 1 0 1 0 1 0 0 0 . 0 0 0 0 0 0 0 1 . 0 0 0 0 0 0 1 0 . 0 0 0 0 1 0 1 0 AND 1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 . 1 1 0 0 0 0 0 0 . 0 0 0 0 0 0 0 0 1 0 1 0 1 0 0 0 . 0 0 0 0 0 0 0 1 . 0 0 0 0 0 0 0 0 . 0 0 0 0 0 0 0 0 1 6 8 . 1 . 0 . 0 Last Address = (any address) OR [NOT (Subnet mask)] NOT (Subnet mask) = 1 1 1 1 ...

Inspire with Nextgen

Representing ICOVDEN and Faculty of Technology  University of Sri Jayewardenepura Join nextgen members to discuss their journey from student to professionals in the technology industry. Sunday, 4th of July at 6.00 pm - 7.00 pm Live on Nextgen IOT Facebook Page https://fb.me/e/1xZdfKS1H #shilpasayura #nextgen #Shipasayura #GiT #LKA NextGen is a great platform for anyone interested in technology and information technology knowledge scattered throughout Sri Lanka to explore their technical knowledge. Working together from school children to universities and people in the industry, this is led by the young team of the current generation. More Details http://shilpasayura.org  

Short Note - IP classes

IP address classes and Subnet mask An  IP address  is a unique identifier or numeric label used to identify devices connected to the network. This helps to develop a virtual connection between source and destination for packet communication in networking. As we develop the network, we consider the scale, the number of devices connected to the network, and other requirements. That IP address space is divided into 5 classes and then we can get a better idea of ​​the range we need to use when we need to build a network. Class A Class B  Class C  Class D Class E Important Dividing IP address space (2 * 32 no. of IP addresses) into 5 classes is called  Classful addressing . In this concept, the number of hosts for each class is fixed. We use the concept of  Classless Inter-Domain Routing (CIDR)  concept because of the limitations of classful addressing. Before short note IP classes are identified by the 1st octet of the IP address (left most from all)....