Industrial Waste Monitoring
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33090
Industrial Waste Monitoring

Authors: Khairuddin Bin Osman, Ngo Boon Kiat, A. Hamid Bin hamidon, Khairul Azha Bin A. Aziz, Hazli Rafis Bin Abdul Rahman, Mazran Bin Esro

Abstract:

Conventional industrial monitoring systems are tedious, inefficient and the at times integrity of the data is unreliable. The objective of this system is to monitor industrial processes specifically the fluid level which will measure the instantaneous fluid level parameter and respond by text messaging the exact value of the parameter to the user when being enquired by a privileged access user. The development of the embedded program code and the circuit for fluid level measuring are discussed as well. Suggestions for future implementations and efficient remote monitoring works are included.

Keywords: Industrial monitoring system, text messaging, embedded programming.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1062448

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1682

References:


[1] Environmental Quality Act 1974 and Regulations Malaysia. Retrieved from http://openlibrary.org/b/OL22508292M/Environmental_Quality_A ct_1974_and_regulations.
[2] Moss, A.D., 2005, K4e, Program transformation of embedded systems, Ph.D., Bristol, 56-5121 (BL: DXN103086)
[3] Prof. Dr. Friedel Hoβfeld, Super-Computer Evolution - Along Moore-s Law and Beyond. Retrieved from http://www.emldevelopment. de/deutsch/veranstaltungen/kolloquien.php?we_obje ctID=238
[4] Noergaard T., Embedded Systems Architecture - A Comprehensive Guide for Engineers and Programmers.
[5] Wiley J. & Sons, Mobile Messaging Technologies and Services: SMS, EMS and MMS.
[6] Mulchandani D., JAVA for Embedded Systems. IEEE explore.
[7] A. Weaver, J. Luo, and X. Zhang, Monitoring and control using the internet and java, in Proceedings of the 25th Annual Conference of the IEEE Industrial Electronics Society (IECON-99), vol. 3, 1999, pp. 1152-1158.
[8] M. J. Callaghan, J. Harkin, T. M. McGinnity, and L. Maguire, An internet-based methodology for remotely accesses embedded systems, in Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 6, Oct. 2002.
[9] F. Chen and G. Ros┬©u. Java-MOP: A Monitoring Oriented Programming Environment for Java. In Proceedings of the Eleventh International Conference on Tools and Algorithms for the construction and analysis of systems (TACAS-05), LNCS 3440, pages 546-550. Springer-Verlag, 2005.
[10] J. Ligatti. Policy Enforcement via ProgramMonitoring. PhD thesis, Princeton University, Department of Computer Science, 2006.
[11] R. Sekar, C. R. Ramakrishnan, I. V. Ramakrishnan, and S. A. Smolka. Model-Carrying Code (MCC): a new paradigm for mobile-code security. In Proceedings of the 2001 Workshop on New Security Paradigms, NSPW-01, pages 23-30, New York, NY, USA, 2001. ACM Press.
[12] Fei Xie, Guowu Yang , Xiaoyu Song, Component-based hardware/software co-verification for building trustworthy embedded systems, The Journal of Systems and Software,2007, 80,pp: 643-654
[13] Carlos Eduardo Pereira , Luigi Carro, Distributed real-time embedded systems: Recent advances, future trends and their impact on manufacturing plant control, Annual Reviews in Control ,2007,31,pp: 81-92