This paper presents a Wireless Sensor Network (WSN) system which was created as a project about protecting wildlife using sensor networks following the assistance of the department of Electrical and Computer Engineering of the Democritus University of Thrace. An automated process was implemented, regarding the recognition of a passenger (ie human, wolf, bear, etc.) traversing a box-shaped underground passage, such as the ones located along main highways fusing Width, Height and Weight values. These were measured using low-cost distance (beam) and weight (S-type load) micro-sensors and stored in a central repository. Moreover, the information provided by the WSN was analyzed, via a variety of methods including a neural pattern recognition network as well as clustering algorithms, which were able to recognize the kind of passenger, with certainty scores over 90%. The main concern, regarding the future, is the evaluation of these passages in respect to their effectiveness, i.e. whether they are frequently utilized by animals. This information was further analysed by appropriate information systems, in order to provide insights about the effectiveness of such mitigation structures.

1.
Alpine project
, http://alpineproject.altec.gr (
2015
).
2.
D.
Hartwig
,
Zeitschrift fur Jagdwissenschaft
37
,
55
62
(
1991
).
3.
D.
Vardalis
and
V.
Tsaoussidis
,
Journal of Systems and Software
90
,
91
103
(
2014
).
4.
A. T.
Campbell
,
S. B.
Eisenman
,
N. D.
Lane
,
E.
Miluzzo
, and
R. A.
Peterson
,
Proceedings of the 2nd annual International Workshop on Wireless Internet
18
,
18
31
(
2006
).
5.
E.
Katsiri
, “
A context-aware notification service
,” in
The First Workshop of Location Based Services
(
2002
).
6.
A.
Mainwaring
,
D.
Culler
,
J.
Polastre
,
R.
Szewczyk
, and
J.
Anderson
, “
Wireless sensor networks for habitat monitoring
,” in
Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications
,
WSNA ’02 (New York, NY, USA
,
2002
), pp.
88
97
.
7.
T.
Liu
,
C. M.
Sadler
,
P.
Zhang
, and
M.
Martonosi
, “
Implementing software on resource-constrained mobile sensors: Experiences with impala and zebranet
,” in
Proceedings of the 2Nd International Conference on Mobile Systems, Applications, and Services
,
MobiSys ’04
(
New York, NY, USA
,
2004
), pp.
256
269
.
8.
T.
Liu
,
C. M.
Sadler
,
P.
Zhang
, and
M.
Martonosi
, “
Hardware design experiences in zebranet
,” in
Proceedings of the 2Nd International Conference on Embedded Networked Sensor Systems
,
SenSys ’04
(
New York, NY, USA
,
2004
), pp.
227
238
.
9.
V.
Dyo
,
S. A.
Ellwood
,
D.
Macdonald
,
A.
Markham
,
N.
Trigoni
,
R.
Wohlers
,
C.
Mascolo
,
B.
Pásztor
,
S.
Scellato
, and
K.
Yousef
,
ACM Trans. Sen. Netw.
8
,
29
:
1
29
:33September (
2012
).
10.
R. R.
Roy
,
Handbook of Mobile Ad Hoc Networks for Mobility Models
, 1st ed. (
Springer-Verlag New York, Inc.
,
New York, NY, USA
,
2010
).
11.
X.
Yu
,
J.
Wang
,
R.
Kays
,
P. A.
Jansen
,
T.
Wang
, and
T.
Huang
,
EURASIP Journal on Image and Video Processing
2013
, p.
52
sept (
2013
).
12.
I. F.
Abdalslam
AL
Romimah
.
Amr
Badr
, “
Medical images understanding based on computational intelligent techniques
,” in
Proceedings of the 1st International Conference on Mathematical Methods and Computational Techniques in Science and Engineering (MMCTSE 2014)
(
2014
), pp.
230
239
.
13.
J.
Makhoul
, “
Pattern recognition properties of neural networks
,” in
Neural Networks for Signal Processing Proceedings of the 1991 IEEE Workshop
(
1991
), pp.
173
187
.
14.
I. H.
Witten
and
E.
Frank
, Data Mining Practical Machine Learning Tools and Techniques,
Data Management Systems
, Vol. 2nd edition (
Morgan Kaufmann Series
,
2005
) Chap. 6.6.
15.
G.
Heinz
,
L. J.
Peterson
,
R. W.
Johnson
, and
C. J.
Kerk
,
Journal of Statistics Education
11
, p. Online (
2003
).
This content is only available via PDF.