International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Wireless Sensor Network Surveillance on Forest Illegal Mining using 'Planned Behaviour Abortion Tower': Analytical Modelling

Author NameAuthor Details

Eric Opoku Osei , James B. Hayfron-Acquah, Michael Asante

Eric Opoku Osei [1]

James B. Hayfron-Acquah[2]

Michael Asante[3]

[1]Department of Computer Science, Kwame Nkrumah University of Science and Technology, Ghana

[2]Department of Computer Science, Kwame Nkrumah University of Science and Technology, Ghana

[3]Department of Computer Science, Kwame Nkrumah University of Science and Technology, Ghana

Abstract

The USAID report on climate change vulnerability and adaptation in Ghana confirmed the impact of recent explosion of illegal gold mining in forest reserves and in river body. Government of Ghana responded to such wake-up call in deploying military combatants against perpetrators operating at day and midnight hours when drones are ineffective to monitor. We aimed at wireless sensor network (WSN) deployment to compliment military efforts for real time remote sensing. A conceptual framework on WSN technology is proposed based on expert view gathered from Delphi technique data analysis. A close textual reading of illegal mining editorial and the primary evidence of climate change impact from water shortage due to river body pollution with cyanide chemical in Ghana are key input factors for this technology-based conceptual exploration. Positive analytical feedback from the 'Delphi' suggests that we can apply this conceptual framework to all environmental case studies in which technology-based security protocols are good compliments to abort human intention towards certain behavior. The comparative discussion on the use of Drones, Satellite and WSN showed that the latter is: economical to deploy, energy efficient for continuous operational availability and reliable data sensing at midnight mining compared to drones' image processing power at night to track manual mining excavations. This study gives a starting point for uptake investigation in WSN deployment for surveillance on illegal mining; hence the findings may have limitations such as subjectivity of expert view. This conceptual framework is a recommendation to urgent national issue and thus it is relevant having real-world implementation for testing the human behavioral assumptions.

Index Terms

Wireless Sensor Network

Surveillance

Illegal Gold Mining

Reference

  1. 1.
    S. K. Jacobson, J. R. Seavey, and R. C. Mueller, "Integrated science and art education for creative climate change communication," Ecol. Soc., vol. 21, no. 3, p. art30, Sep. 2016.
  2. 2.
    M. F. Othman and K. Shazali, "Wireless Sensor Network Applications: A Study in Environment Monitoring System," Procedia Eng., vol. 41, pp. 1204-1210, 2012.
  3. 3.
    World Health Organization, "Cyanide in Drinking-water Background document for development of WHO Guidelines for Drinking-water Quality," vol. 2, pp. 1-26, 2007.
  4. 4.
    U. S. Agency, I. Development, U. F. Service, and I. Programs, "Ghana Climate Change Vulnerability and," no. June, 2011.
  5. 5.
    V. Hsu, J. Kahn, and K. Pister, "Wireless communications for smart dust," Electron. Res. Lab. Tech. Memo. M98/2, pp. 1-22, 1998.
  6. 6.
    "'Operation Vanguard'-A Timely Saviour of our Environment - Government of Ghana." [Online]. Available: http://www.ghana.gov.gh/index.php/media-center/features/3966-operation-vanguard-a-timely-saviour-of-our-environment. [Accessed: 28-Aug-2018].
  7. 7.
    Y. Zare Mehrjerdi, "RFID?enabled systems: a brief review," Assem. Autom., vol. 28, no. 3, pp. 235-245, Aug. 2008.
  8. 8.
    "The Wi-fi, wireless security review in finding the best wireless security implementation." [Online]. Available:https://www.tenouk.com/wifisecurityfeatures.html. [Accessed: 24-Aug-2018].
  9. 9.
    T. Sobh and K. Elleithy, Eds., Advances in Systems, Computing Sciences and Software Engineering. Dordrecht: Springer Netherlands, 2006.
  10. 10.
    "Welcome to the Mobile Data Management and Applications Website." [Online]. Available: https://web.mst.edu/~mobildat/WMAN/index.html. [Accessed: 24-Aug-2018].
  11. 11.
    "???? ???? ???? ????." [Online]. Available: http://graduate2.korea.ac.kr/programs/programs01-3-06.jsp. [Accessed: 24-Aug-2018].
  12. 12.
    D. K. Lobiyal, V. Mansotra, and U. Singh, Eds., Next-Generation Networks, vol. 638. Singapore: Springer Singapore, 2018.
  13. 13.
    H. Su and X. Zhang, "Energy-Efficient Clustering System Model and Reconfiguration Schemes for Wireless Sensor Networks," in 2006 40th Annual Conference on Information Sciences and Systems, 2006, pp. 99-104.
  14. 14.
    H. M. Ammari, Ed., The Art of Wireless Sensor Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014.
  15. 15.
    "Smart Dust: Communication Systems and the Future World |ChaiOne." [Online]. Available: https://chaione.com/blog/smart-dust-communication-systems-and-future/. [Accessed: 24-Aug-2018].
  16. 16.
    R. M. Howard, R. Conway, and A. J. Harrison, "A survey of sensor devices: use in sports biomechanics," Sport. Biomech., vol. 15, no. 4, pp. 450-461, Oct. 2016.
  17. 17.
    ChipCon, "Single Chip Very Low Power RF Transceiver with 8051-Compatible Microcontroller," Fea.Kpi.Ua, 2002.
  18. 18.
    H. M. Ammari, Ed., The Art of Wireless Sensor Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014.
  19. 19.
    I. Ajzen, "The theory of planned behavior," Organ. Behav. Hum. Decis. Process., vol. 50, no. 2, pp. 179-211, Dec. 1991.
  20. 20.
    G. Elmer, "A diagram of panoptic surveillance," New Media Soc., vol. 5, no. 2, pp. 231-247, 2003.
  21. 21.
    I. AJZEN, R. Netemeyer, and M. Van Ryn, "The Theory of Planned Behavior," Organ. {Behavior} {Human} {Decision} {Processes}, v, vol. 50, no. JANUARY 1991, pp. 179-211, 1991.
  22. 22.
    M. R. de Villiers, P. J. T. de Villiers, and A. P. Kent, "The Delphi technique in health sciences education research," Med. Teach., vol. 27, no. 7, pp. 639-643, Nov. 2005.
  23. 23.
    A. Alomary and J. Woollard, "How Is Technology Accepted by Users? A Review of Technology Acceptance Models and Theories," IRES 17th Int. Conf., no. November, pp. 1-4, 2015.
  24. 24.
    P. Lai, "the Literature Review of Technology Adoption Models and Theories for the Novelty Technology," J. Inf. Syst. Technol. Manag., vol. 14, no. 1, pp. 21-38, 2017.
  25. 25.
    Eric, O. O (2018). Routing Protocol Redesign for Scalability in Wireless sensor Network Applications. (Unpublished doctoral thesis). Kwame Nkrumah University of Science and Technology. Kumasi, Ghana.
SCOPUS
SCImago Journal & Country Rank