This website uses cookies to ensure you have the best experience. Learn more

Information Theory & Optimization For Location Of Sensors In Water Distribution For Contaminant Detection

3483 words - 14 pages

Abstract: The fresh drinking water is basic need of every human being. With the increase in population the dependency on water resources increasing day by day which are all ready in scared. But the population expands on the banks of rivers, nalas, and lakes or on water ponds. Because in this they can easily access water and there sewerage enters in these water bodies. In this way the lakes and water resources polluted which are dangerous for the health of downstream population. The Rawal Dam is a key water supply resource for citizens of Rawalpindi and cantonment. The increasing population nearby of this dam such as Bari Imam, Noor pur shahan, Banigala, diplomatic Enclave and Quiad-e-Azam University contributing a lot of contamination in the dam. The increasing in the technology there are a number of new and advanced system which can be used for detection of contamination and alarming systems to alarm about any contamination before it happened. There are a number of different types of sensors which are using for detection of contamination. The use of GIS (Geographic Information System) with sensors to detect about exact location and analysis that how much it effects can easily perform. In this paper the focus area is that how different sensors which are used for detection of different sensors can be integrated to detect of different contaminations for water resources or water distribution channels.

General Terms: Geographic Information System (GIS)
Keywords: service-oriented architecture (SOA), Remote Sensing (RS), Sensors, GPS (Global Position System), Relational Database, watershed, sensors ontology, TDS (Total Dissolved Solids), CWS (contamination water systems), SPOT (Sensor Placement Optimization Toolkit)

1. Introduction:

14, 000 people died daily due to water pollution in the world [1]. According to 2nd UN World Water Development Report that a billion people which are more than one-fifth of the total populations are away from safe dirking water.
Geographic information system (GIS) have wide-spread utility in a variety of domains for the management of complex data obtained from Remote Sensing, automated mapping and facilities management systems, and myriad of other applications. Recently, some researchers are applying GIS to manage the placement of wired and wireless sensors and sensor networks across large, and often remote geographic regions, as wells developing GIS interfaces to dynamically discover, query and task sensors within a service-oriented architecture (SOA) [2,3].
There are two types of sensing equipment (devices), which are stand alone sensors and sensors within network. Sensor network composed of node of the more sensing devices on the node stand alone sensors perform functions autonomously and don not rely on other senores, many stand alone devices have a programmer’s interface (API) to task and received data from the snores stand alone sensors can be integrated into a network, but are not regards as nodes...

Find Another Essay On Information Theory & Optimization for Location of Sensors in Water Distribution for Contaminant Detection

Investigating The Reasons for the Original Location of the Iron and Steel Industry in South Wales

2632 words - 11 pages proximity to the point where the iron ore arrived, the location also possessed plentiful flat land for the easy construction of integrated steel works, easy transportation of coal downhill to the coast from the South Wales coalfield and plentiful water required for the cooling process in the steel works. The deepwater ports along the coast were also beneficial, as they were needed for the bulk carriers, which were used

FISH Technique: A Powerful Technique for the in Situ Detection of Organisms in Environmental Samples

578 words - 3 pages FISH is a powerful set of technique for the in situ detection of active growing organisms in environmental samples, a procedure that allows researchers to locate the positions of particular DNA or RNA sequences in the cytoplasm, organelles or nucleus [59]. In FISH a labeled DNA or RNA sequence is used as a probe to identify or quantify the natural occurring counterpart of the sequence in a biological sample. FISH probes often target sequences of

Security based volt/var control in distribution system in presence of distributed generators using teaching-learning-based optimization

925 words - 4 pages the same time, minimizing the predefined objective functions. Recently, multi-objective optimization problem of voltage and reactive power control has been considered by researchers [1-9]. For example, Ramakrishna et al. proposed volt/var control in distribution systems In order to reduce losses in the network without violating the voltage security of the system [1]. Yutian liu et al. present the optimal control is to find optimal dispatch schedule

Ethical Dilemma for Location Approvals

689 words - 3 pages line, but once he pays the bribe, he will be expected to every time. It’s only a matter of time before someone finds out. If caught, the punishment will be a lot worse than risking his job. It is unethical to pay bribes and in most areas illegal. My recommendation would be for Raul to go to Ian, and explain to him that the zoning approvals are taking longer than expected. As Raul’s manager, it is Ian’s responsibility to pass that information along to corporate. In the future, D&R Company needs to plan ahead for the delays, and start the process of getting the zoning approvals a lot sooner.

An Advanced Grammatical Evolution Approach for Intrusion Detection in Manet

1347 words - 6 pages Proceedings of the 17th International Symposium on Computer and Information Sciences, 2002. [7] G. Vigna, S. Gwalani, K. Srinivasan, E. M. Belding-Royer, and R. A. Kemmerer. An intrusion detection tool for aodv-based ad hoc wireless networks. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC’04), pages 16–27,Washington, DC, USA, 2004. IEEE Computer Society. [8] B. Sun, K. Wu, and U. Pooch. Zone-based intrusion detection

FPGA Implementation of Image Processing Architecture for Target Detection

1047 words - 5 pages -image block is taken from the top-left corner of the original image. C. Algorithm invloved in Target detection system • Step 1. Read the target image of size 128 x 128 and 256 x 256. • Step 2. Obtain quantization of original image. • Step 3. Obtain 16 × 16 sub-image blocks, starting from the top-left corner. • Step 4. Derive cooccurrence matrices for quantized sub-image blocks. • Step 5. Calculate features such as contrast, cluster shade, and

Best Practices for the Prevention and Detection of Fraud

1679 words - 7 pages process are the best practices for the prevention and detection of fraud. In 2002, after a chain of highly publicized corporate scandals, Congress passed the Sarbanes-Oxley Act, intending to restore investor confidence in publicly traded securities. Traditionally, management and the board of directors were in charge of managing the company and preparing financial statements. However, this new law makes it clear that they are also in charge

MULTI-SCALE MATCHING FOR THE AUTOMATIC LOCATION OF CONTROL POINTS IN LARGE SCALE AERIAL IMAGES USING TERRESTRIAL SCENES

2263 words - 10 pages 1. INTRODUCTION The proposed technique aims at the automatic location and measurement of Ground Control Points (GCPs) in aerial images using vertical terrestrial chips and considering large search spaces. The availability of data derived by integrated Global Navigation Satellite System (GNSS) and Inertial Navigation System (INS) systems have been used for the direct sensor orientation (DSO) in photogrammetric processes. The correction of

Discuss the significance of food in Like Water for Chocolate

694 words - 3 pages Essay Final1. Discuss the significance of food in Like Water for Chocolate.Food equals memory and memory equals immortality. In the recipes we pass downfrom generation to generation, in the food of our mothers, we reawaken the past, make the present more real, perhaps capture a bit of the future. Food is about history, with handed down recipes such as in Like Water for Chocolate, the chef can remember the past. Tita when she cooked could

Significance Of Fire In Like Water For Chocolate

1045 words - 4 pages The Significance of Fire in Like Water for Chocolate In the novel Like Water for Chocolate, by Laura Esquivel, fire is used as imagery to symbolize the release of strong, intense passion by the characters of the novel. Fire as well as coldness ( which is used to describe the absense of passion) influences the way that the reader views the characters, Mama Elena, Tita, Pedro, Rosaura and Gertrudis and illustrates the love, lust and emotion that

Well Density Optimization for Shale Oil Pay

1345 words - 6 pages of the model and the history of a reservoir. In the past, history matching is conducted by hand at which continuing to adjust the parameters of a reservoir by hand until achieve a satisfactory match is extremely complex and waste of time [16]. Therefore, simulation software based optimization system is gradually developed by the oil company for assisting history matching more easily. Once becoming proficiency in handling method for software, it

Similar Essays

Optimization Of Ritalin For More Effective Results

1301 words - 5 pages psychiatric population seen at the clinic. Methylphenidate (figure 1) serves as the dominant drug used in medications counteracting the symptoms of ADHD. (1) Among those medications, Ritalin is currently prescribed for daily use to 1.5 million school children in the United States, making it one of the most widely used prescription medications today. (2) The optimization of Ritalin is of utmost importance and will therefore, be the topic of

Communication Technologies For Implantable Sensors Essay

1346 words - 5 pages , implantable insulin pump, and so on. Figure 1.1 Wireless Body Area Network The network for medical application around the patient’s body is termed as Wireless Body Area Network (WBAN), which can be seen in Figure 1.1. A WBAN consists of sensors (implanted or wearable) and a gateway node. The gateway node in the figure is called Personnel Control Unit (PCU), although other terminologies such as Body Control Unit (BCU) or Central Control Unit (CCU

Principle, Applications And Challenges Of Time Of Flight Camera, And Sensors In Depth Detection And 3 D Modelling

1224 words - 5 pages the increasing use of the depth detection and 3D modelling is evident in modern applications such as mixed reality, gesture recognition and preventing collisions. Likewise, laser scanning could be named as one of their remarkable and expensive applications. Sensing elements are necessary tools for the purpose of depth detection. A sensor is defined as “an electronic device that produces electrical, optical, or digital data derived from a physical

Detection Techniques For Exoplanets Essay

1962 words - 8 pages The research area of detecting exoplanets, planets outside our own solar system, is a huge area of interest and funding. The importance of being able to detect these planets is they can give us information and an insight into planetary formation, to help the search for ”Earth- like” planets in the habitable zone, and of course the ever-present question of extraterrestrial life. So on order to attempt to gather information about these things we