A Model of Pipeline Flow Monitoring in Wide Area Wireless Sensor Network
Journal Title: Scholars Journal of Engineering and Technology - Year 2015, Vol 3, Issue 4
Abstract
Designing a model for pipeline flow monitoring using Wide Area Network (WAN) as well as low power wireless sensor nodes has been the general goal of design engineers. Such network desires to have a Wide Area Wireless Sensor Network (WAWSN) that will run on little power (if possible, none at all) thereby saving cost, and the inconveniences of having to replace batteries in some difficult to access areas of usage. This paper then developed a Structural Monitoring Hierarchy (SMH) starting with pipeline design considerations, pipeline energy models, fluid pressure losses, fluid flow modelling, event location model and WAN WSN output or battery model for sustainable transceiver energy consumption for a typical node deployment architecture. By studying the energy consumption map of the transceiver of a WSN node battery model, this research developed an energy consumption model of the transceiver unit of a typical sensor node battery. Important metrics like Depth of Charge (DOC), State of Charge (SOC), Load current and Load Voltage were derived and plotted using MATLAB. The mathematical characterizations for the pipeline designs, flow equations, and pipeline leak detection and localization parameters (event location) were captured in the simulation using a standard reference guide and related design assumptions. Proteus 7.6 ISIS was used to implement the unified behavioural model of the Wide Area Wireless Sensor Network based pipeline monitoring. Simulations done on the model shows that the model can work. Keywords: Power, Sensor, SMH, WAWSN, WAN, WSN, Transceiver, Pipeline, DOC, SOC, Battery or Output model
Authors and Affiliations
Umunna Chike Odogwu, Ezechukwu . , Aneke Jude, Okolo Chidiebere
The Development Direction and Strategy of New Urbanization from the Perspective of Ecology Theory
The new urbanization development in China can't develop like some western developed countries, which have experienced the urbanization, industrialization, then globalization, informatization and are pursuing the ecology...
A New Algorithm of Network Intrusion Detection base on the Application of Conditional Random Fields
While the network brings convenience to people, its own fragility offers intrusion opportunities for hackers and malicious attackers. Along with the diversity and complexity of intrusion attack, high performance intrusio...
Comparative Study and Analysis of Various Edge Detection Algorithms in Digital Image Processing
In the field of image processing, edge detection is an important step for extracting relevant and meaningful information from digital images. The main goal of edge detection techniques is to obtain and detect thin edges...
Design and Implementation of A Knowledge-Based Typhoid Fever Diagnosis Expert Advisor Using Forward Chaining Inference Mechanism
Abstract:The medical field is experiencing setbacks, medical cases almost always seems to outnumber the number of medical experts required to attend to them. This in part is due to lack of qualified doctors to handle spe...
Mechanical Spider Using Klann Mechanism
Since the wheel was invented back in the Stone Age, it was the primary component used in all forms of mechanical transportation. Even today it is the component of choice for almost any type of moving machine like cars. H...