Real Time Monitoring Of Urban Water Systems for Developing Countries
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: The safe and satisfactory provision of water related services in urban areas of developing countries remain a major challenge mainly attributed to limited resources and inability to promptly detect operational failures (blockage, leakage, organic infiltration etc..) in water infrastructure. In this paper we investigated the feasibility of real time monitoring for contexts similar to developing countries and developed a decision support tool to prioritize/optimize water management practice. Wireless sensors were use to generate data and identification of opportunities /challenges/strategies for setting up a viable real time monitoring mechanism. The application of wireless sensor networks is composed of a number of sensor nodes that have the capability of carrying out network activities and can work continuously for the sake of monitoring. This paper proposes how urban water monitoring systems for developing countries and emerging economies can be developed with emphasis on cost effectiveness, easy ad hoc installation such that the mechanism will be easy to handle and maintained. The use of wireless network for this purpose reduced the manpower required, set up cost and provided flexibility in terms of distance. The paper made use of Zigbee technology because of its low power consumption and it can be used to realize water quality parameters, remote probing and real time monitoring function. Several results are presented and the feasibility of using wireless sensor network is presented.
Authors and Affiliations
Offiong N. M. 1 *, Abdullahi S. A. 1, Nweze N. O. 1 , Chile-Agada, B. U. N. , Raji-Lawal H. Y
Driving Simulator
Abstract: Simulators which are developed by suppliers individually for specific application purpose are known as Driving Simulator. Most of the conventional driving simulators provide some flexibility for construc...
Role of Women in Information and Communication Technologies in India
Computational Method for Forensic Verification of offline Signatures
Signature verification models based on personal model have been reported by many researchers in past but the method proposed here is a forensic document examination approach using computational methods, unlike ot...
An Efficient Hybrid Multilevel Intrusion Detection System in Cloud Environment
Abstract: Cloud Computing offers latest computing paradigm where application, data and IT services are provided online over the Internet. One of the significant concerns in Cloud Computing is security. Since data is expo...
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
In organizations sensitive data transaction is having less security because there may be a misusability of data from one to other from past years. In previous methods they calculated how much data is leaked...