SlideShare a Scribd company logo
BUSITEMA UNIVERSITY
FACULTY OF ENGINEERING
DEPARTMENT OF COMPUTER ENGINEERING
FINAL YEAR PROJECT PROPOSAL
GSM BASED PIPED WATER THEFT DETECTION SYSTEM
BY
KHABUSI SIMON PETER
REG No: BU/UG/2012/67
Email: simonkhabusi@gmail.com
Tel: +256 774 576 410
SUPERVISOR: MR. ALUNYU ANDREW
A PROJECT PROPOSAL SUBMITTED TO THE DEPARTMENT OF
COMPUTER ENGINEERING IN PARTIAL FULFILMENT OF THE
REQUIREMENTS FOR THE AWARD OF A BACHELOR OF COMPUTER
ENGINEERING OF BUSITEMA UNIVERSITY
November, 2015
ii
DECLARATION
I, KHABUSI SIMON PETER BU/UG/2012/67 hereby declare that this project proposal is my
original work except where explicit citation has been made and it has not been presented to any
Institution of higher learning for any academic award.
Signature: ………………………
Date: ……………………………
iii
APPROVAL
This is to certify that the project proposal under the title “GSM based piped water theft detection
system” has been done under my supervision and is now ready for examination
Mr. Alunyu Andrew
Department of Computer Engineering
Sign: …………………………..……
Date: ……………………………….
iv
LIST OF ACRONYMS
NWSC: National Water and Sewerage Corporation
WALOPU: Water Loss Prevention Unit
NRW: Non-Revenue Water
GSM: Global Systems for Mobile Communication
TDMA: Time Division Multiple Access
FDMA: Frequency Division Multiple Access
SMS: Short Message Service
LCD: Liquid Crystal Display
PCB: Printed Circuit Board
uPVC: Unplasticized Polyvinyl Chloride
µC: Microcontroller
HDPE: High density polyethylene
v
TABLE OF FIGURES
Figure 1: Showing Branched and Looped water distribution networks ....................................... 11
Figure 2: Showing piped water house connection........................................................................ 12
Figure 3: Block diagram of the proposed system ......................................................................... 21
Figure 4: Flow Chart of the proposed system............................................................................... 22
LIST OF TABLES
Table 1: Reflecting the advantages, disadvantages, and cost of the different water meter types... 8
Table 2: Showing time frame for the proposed project ................................................................ 27
Table 3: Showing the proposed budget......................................................................................... 27
vi
CONTENTS
DECLARATION............................................................................................................................ ii
APPROVAL ..................................................................................................................................iii
LIST OF ACRONYMS ................................................................................................................. iv
TABLE OF FIGURES.................................................................................................................... v
CHAPTER ONE:............................................................................................................................ 1
1.0 Introduction........................................................................................................................... 1
1.1 Background of Study........................................................................................................ 1
1.2 Problem Statement ................................................................................................................ 3
1.3 Objectives.............................................................................................................................. 3
1.3.1 Main Objective ............................................................................................................... 3
1.3.2 Specific Objectives......................................................................................................... 3
1.3 Justification and Significance................................................................................................ 3
1.4 Scope..................................................................................................................................... 4
1.4.1 Technical Scope.............................................................................................................. 4
1.4.2 Geographical Scope........................................................................................................ 4
1.4.3 Time Scope..................................................................................................................... 4
1.5 Limitations and Assumptions................................................................................................ 4
1.5.1 Limitations...................................................................................................................... 4
CHAPTER TWO: LITERATURE REVIEW................................................................................. 5
2.0 Introduction........................................................................................................................... 5
2.1 Concepts, Descriptions and Definitions:............................................................................... 5
2.1.1 Piped Water .................................................................................................................... 5
2.1.2 Flow Rate:....................................................................................................................... 5
2.1.3 Water Meter/Flow Meter................................................................................................ 6
2.1.4 Water Theft..................................................................................................................... 9
2.1.5 Water distribution........................................................................................................... 9
2.2 Existing systems.................................................................................................................. 14
vii
2.2.1 Main metering............................................................................................................... 14
2.2.2 E-coder solid state absolute Encoder............................................................................ 14
2.2.3 Prepaid metering system............................................................................................... 15
2.2.4 Physical Monitoring system. ........................................................................................ 16
2.3 The proposed GSM based piped water theft detection system ........................................... 18
2.3.1 Functionality of the Proposed System.......................................................................... 18
2.3.2 Strengths of the proposed system ................................................................................. 18
2.3.3 Technologies in the proposed system........................................................................... 18
CHAPTER THREE: METHODOLOGY .................................................................................... 19
3.0 Introduction......................................................................................................................... 19
3.1 Requirements Elicitation..................................................................................................... 20
3.1.1 Data collection methods ............................................................................................... 20
3.1.2 Data Analysis................................................................................................................ 21
3.2 System Design..................................................................................................................... 21
3.2.1 Circuit design................................................................................................................ 21
3.2.2 Software Design ........................................................................................................... 21
3.2.3 Integrated System design.............................................................................................. 22
3.3 Implementation.................................................................................................................... 22
3.3.1 Implementation tools.................................................................................................... 22
3.4 Testing and Validation ........................................................................................................ 23
3.4.1 Unit testing ................................................................................................................... 23
3.4.2 Integration testing......................................................................................................... 23
3.4.3 Front-end testing........................................................................................................... 23
REFERENCES ............................................................................................................................. 24
APPENDICES .............................................................................................................................. 26
A.1 Tentative projective schedule......................................................................................... 27
A.2 Proposed budget............................................................................................................. 27
A.3 Sample interview guiding questions................................................................................... 28
1
CHAPTER ONE:
1.0 Introduction
This chapter gives a brief introduction of the study of the GSM based piped water theft detection
system i.e.; background, problem statement, objectives, justification/ significance and the scope
of the study.
1.1Background of Study
In urban areas, there is tremendous need of water and water distribution network plays an
important role in delivering water to individual families, offices, construction sites, etc. For the
efficient delivery of water is dependent on water flow rate, pressure of water and purity of water
but sometimes it is found that some individuals run motors to suck more water from pipelines to
drain point to serve their excessive need of water [1]. This in turn disturbs steady flow of water
which is meant to flow at a constant flow rate in town areas [2][3][4] and due to that, other
consumers in that particular area get affected because of this misuse of water. This is just one of
the ways in which people steal water. Other ways include; meter bypass, Meter tampering, Meter
reversals and vandalism [5].
A lecture given on February 20, 2015 at Brookings Mountain West Lecture Series, Vanda
Felbab-Brown explains that Water theft and smuggling are perpetrated by both the wealthy and
those who are chronically deprived of water, as she provides examples from California, southern
Europe, Nigeria, Kenya, the Middle East, and South Asia [6]. In many parts of the world,
elaborate smuggling of water with complex network chains and water mafias has emerged.
Smuggling modes vary and among others include the development of illegal pipelines, and
illegal truck deliveries.
Felbab-Brown further explains that, “For many reasons, the illegal use and delivery of water are
difficult to address [6]. Large-scale agriculture and industry often exercise great influence over
regulators and law enforcement. In slum areas, mostly unconnected to legal pipelines, the
suppression of illegal water distribution can sever access to water and hence threaten the physical
survival of the most marginalized and poor. Across the world, citizens tend to be vehemently
opposed to increased water pricing, yet without effective regulation, appropriate pricing, and
2
suppression of water crimes, the sustainability, long-term viability, and inclusive and equitable
use of water cannot easily be achieved [6].”
National Water and Sewerage Cooperation, (NWSC), a Public Utility Company, completely
owned by the Government of Uganda, established in 1972, with the mandate to operate and
provide water and sewerage services in the areas entrusted to it, on a sound commercial and
financially viable basis face a great challenge of water theft [5]. The Managing Director of
NWSC, Dr. Silver Mugisha stated that one of the biggest challenges facing most water utilities in
developing countries is the high level of Non-Revenue Water (NRW) that includes both physical
and commercial losses (mainly caused by illegal water use and water theft) [7].
A statement by Vivien Newumbe the public relations officer Kampala Water in New Vision on
15th
September, 2015, says “the National Water and Sewerage Corporation (NWSC) is facing a
challenge of water theft and increased vandalism of its water installations” [8]. She further
explained that Majority of people especially those staying in higher altitude areas are greatly
affected. Bursting a water pipe or tapping water illegally creates low pressure zones (the pressure
and volume reduce). This leads to intermittent water supply affecting the enjoyment of services
by most times paying customers. Illegal water connections are also a source of unsafe water.
“When one bursts a water pipe there is the risk of contamination as in most cases water is drawn
from the ground using cups or containers,” she said. In the same article, Agnes Kyotalengerire
reports that the problem of un-authorized water use cannot be under-estimated and its negative
impact on the operations of the corporation as a whole and Kampala water in general is obvious.
February 2012 data alone revealed that 20% of water produced is unaccounted for which greatly
affects the operations since this water is in reality lost or stolen revenue.
In this regard, Phiona Wall, the public relations officer NWSC observed that the company incurs
losses of about 30 to 35 % in uncollected revenue annually.
Despite attempts made by water supply and distribution companies to curb water theft through
use of various measures to detect water theft like indentifying meter readings that are lower than
previous readings, low consumption based on knowledge of average water consumption, refusal
of access into a property for NWSC employees to inspect water meter or water service; pro-
active community-based illegal use reduction programme through the WALOPU (Water Loss
3
Prevention Unit) where the corporation partnered with the Police and community to fight illegal
water use and reduce NRW, the situation has remained alarming [5].
1.2 Problem Statement
National water and Sewerage Corporation has constantly incurred cases of water theft such as
illegal connections and reconnections, meter bypass, meter tampering, meter reversals and
vandalism. In spite of attempts such as use of police and penalties by National Water to solve
these problems, the problem of water theft has remained a big challenge in the operation of
NWSC due to lack of a dedicated system to solve this problem. Therefore, this project aims at
designing a GSM based piped water theft detection system that detects water theft and alerts the
authorities via an SMS.
1.3 Objectives
1.3.1 Main Objective
To Design and develop a piped water theft detection system that detects water theft and alerts the
authorities via an SMS.
1.3.2 Specific Objectives
i. To review existing literature and identify the requirements for the design of the GSM
based piped water theft detection system.
ii. To design a GSM Based piped water theft Detection system.
iii. To implement the designed system.
iv. To test and validate the system.
1.3 Justification and Significance
Water theft does not only affect the operation of NWSC in Uganda but also affects the quality
and quantity of water supplied to individual families, offices, institutions and construction sites.
Often times, illegal connections causes contamination of water hence increasing the risk of
contracting water born diseases by the consumers. The amount of water also supplied will reduce
due to diversions of water to unauthorized destinations and the ultimate reduction of water flow
rate hence far destinations may not be reached. This is just one of the challenges imposed by one
of the ways of water stealing. However, others such as meter bypass, meter tampering, meter
reversals and vandalism greatly affects revenue collected from water. In addition to consumer
4
challenges that may arise from water theft, the operation of NWSC is compromised due to loss
of revenue. The government at the end is also affected as this water theft directly affects revenue.
Proper handling of these problems will help in solving the different challenges that may result as
mentioned above.
By the fact that water is a basic need of life, its quality and availability is very necessary in the
lives of all Ugandans. Hence proper regulation and monitoring of the water distribution networks
with the help of a dedicated system is very paramount.
1.4 Scope
1.4.1 Technical Scope
Using the identified requirements of this project, the system will be simulated in Proteus and
Arduino 1.5.6 –r2. This simulation will be implemented on a bread board with all the physical
components in the simulation. The Simulated and implemented system will be limited to
detecting theft along the water distribution lines and alerting the authorities via an SMS.
1.4.2 Geographical Scope
The system will be designed to be used along the water distribution networks in Uganda by
NWSC. If further developed, it will be deployed at the individual families, offices, institutions
and construction sites.
1.4.3 Time Scope
The review of literature and existing systems, system design, implementation, and testing and
validation will take five months from November 2015 to April 2016.
1.5 Limitations and Assumptions
1.5.1 Limitations
This system will be limited to piped water theft prevention.
5
CHAPTER TWO: LITERATURE REVIEW
2.0 Introduction
Here, there is review of various methods and systems used in piped water theft detection
employed by National Water and Sewerage Cooperation and other Water Corporations in other
parts of the world. In this chapter an examination of these systems will be revealed and a
criticism of such systems as well. Lastly how my system differs from these systems and how it is
going to cover the gaps that these systems leave.
2.1 Concepts, Descriptions and Definitions:
2.1.1 Piped Water
Piped Water refers to a transparent, odorless, tasteless liquid, a compound of hydrogen and
oxygen, freezing at 32°F or 0°C and boiling at 212°F or 100°C [9]. It constitutes of rain, oceans,
lakes, rivers, etc in a more or less impure state. Water contains 11.188% hydrogen and 88.812%
oxygen, by weight distributed to different destination through pipes. In urban areas piped water
supply to residence and commercial establishments are provided at a fixed flow rate [3].
The channel used by water supply corporations to deliver water to the consumers is pipes which
are mainly of uPVC material. Other materials could be; Ductile iron, Plastic (HDPE/PVC),
Concrete, and Steel [10].
2.1.2 Flow Rate:
Flow rate refers to the quantity of fluid flowing through a pipe or channel within a given or
standard time [9].
The equation below is used to calculate flow rate [11];
Q = A x v, Where; Q is flow rate, A is the cross sectional area of the pipe, and v is the average
fluid velocity in the pipe. Putting this equation into action, the flow of a fluid traveling at an
average velocity of 1 meter per second through a pipe with a 1 square meter cross-sectional area
is 1 cubic meter per second. Note that Q is a volume per unit time, so Q is commonly denoted as
the “volumetric” flow rate.
2.1.2.1 Factors determining pipe flow rates
Hydraulics is concerned with the properties and behavior of fluids when at rest and in motion.
The factors that affect the flow of water in pipes are as follow [12]:
a) Cross sectional area of the pipe;
6
b) Roughness of the pipe’s inner surface;
c) Condition and type of flow;
d) Obstructions; and
e) Energy head
2.1.3 Water Meter/Flow Meter
A flow meter is an instrument used to measure linear, nonlinear, mass or volumetric flow rate of
a liquid or a gas. When choosing flow meters, one should consider such intangible factors as
familiarity of plant personnel, their experience with calibration and maintenance, spare parts
availability, and mean time between failure history, etc., at the particular plant site [13].
Meters are very important for all aspects of the water supply operations. They make it possible to
charge customers based upon the quantities of water that they consume. They record usage and
therefore make billing fair for all customers. They can encourage conservation by making
customers aware of their usage. Selection of a meter for a given application depends on many
factors including; Meter operating principles, Debris and particle tolerance, required accuracy,
Temporary vs. permanent installation, Convenience and ease of use, Calibration and required
maintenance, Volume of flow and flow rate, Size of pipe, types of flow (laminar vs. turbulent),
Type of pipe, Range of flow, Pressure drop, Installation location and orientation, Meter
orientation, Required power, Flow obstruction tolerance, Data logging requirements, Meter
reading methods, Durability, Temperature and environment [14].
Meters are classified into two basic types: positive displacement and velocity. Each of these
meter types has variations, leading to the perception that there are several different kinds.
2.1.3.1Positive Displacement Meters
In this type of meter, a known volume of liquid in a tiny compartment moves with the flow of
water. Positive displacement flow meters operate by repeatedly filling and emptying these
compartments. The flow rate is calculated based on the number of times these compartments are
filled and emptied. The movement of a disc or piston drives an arrangement of gears that
registers and records the volume of liquid exiting the meter. There are two types of positive
displacement meters: nutating disc and piston [15].
Positive displacement meters are sensitive to low flow rates and have high accuracy over a wide
range of flow rates. Positive displacement meters are used in homes, small businesses, hotels,
and apartment complexes. They are available in sizes from 5/8” to two inches [15].
7
2.1.3.2 Velocity Meters
Velocity meters operate on the principle that water passing through a known cross-sectional area
with a measured velocity can be equated into a volume of flow. Velocity meters are good for
high flow applications. Velocity meters come in different types, including turbine, multi-jet,
propeller, ultrasonic, venture, and orifice meters. These meters are available in sizes of two
inches and larger with the exception of multi-jet meters, which are between 5/8” and two inches
[16].
8
Table 1: Reflecting the advantages, disadvantages, and cost of the different water meter types
Source: United States Environmental Protection Agency, Control and mitigation of drinking
water losses in distribution systems, pg 4-9 [14].
9
2.1.4 Water Theft
It refers to the use of town water without the consent of the water department [18] or generally
the illegal use of water. Water theft can be in the following forms; Meter tampering, meter
reversals, illegal connections and reconnections, and meter by-pass.
2.1.4.1 Meter Tampering
Physically altering the meter or the unauthorized removal and reinstallation of the water meter
[17]. The customer intentionally corrupts the meter so as to affect its efficiency. This may
include; reducing or distorting mechanical gears, boiling meter so as to melt internal
components, breaking meter reading glass, introducing impurities, etc [18].
2.1.4.2 Meter reversals:
The customer installs the meter in reverse order so that it counts backwards to a desired reading.
When satisfied they turn the meter to the correct position. Meter reversal may entail reversing the
meter readings manually [18].
2.1.4.3 Illegal Connections and Reconnections
Illegal Connections refer to where the consumer is not even a customer to the water supply
system. They have simply connected themselves to the network. In other words, Illegal
Reconnections refer to where the customer has been disconnected for non-payment, but they go
ahead and reconnect themselves to the network [18].
2.1.4.4 Meter Bypass.
Here, the consumer is a customer, with a meter. The customer has an alternative pipe taping
water before the meter [18]. There are incidents of excess water drawing by certain
customers/users by connecting motor-pump sets to the water pipeline hence drawing more water
to them [1]. Meter bypass could take the form of disconnecting the water meter and replacing it
with a pipe or connecting a “T-Junction pipe” before the meter.
2.1.5 Water distribution
Refers to the network of water mains and related appurtenances [17]. Water distribution systems
convey water drawn from the water source or treatment facility, to the point where it is delivered
to the users. It is necessary to maintain sufficient pressure in the distribution system to protect it
against contamination by the ingress of polluted seepage water.
10
Water distribution process starts with getting water from a water source and channeled to tanks
for treatment. When treatment is done, it is channeled to the supply network which delivers
water to individual families, offices, institutions, and construction sites [3]. The basic processes
in water distribution are; getting water from the source to the water tanks, water treatment, filling
the water reservoirs and finally channeling it in the distribution tanks [12].
2.1.5.1 Water Reservoirs
In small town distribution systems, whether water is obtained by gravity or by pumping,
distribution reservoirs are usually necessary for the following reasons [12]:
a) To balance the supply and demand in the system. In small distribution systems, variations
in demand may be three or more times the average hourly consumption.
b) To maintain adequate and fairly uniform pressure throughout the distribution system.
c) To avoid the total interruption of water service when repairing pipes between the source of
supply and the reservoir.
d) To allow pumps to be operated uniformly throughout the day. Such pumps may be much
smaller than would otherwise be required.
2.1.5.1.1 Terminologies
a) Minimum Water Level: The lowest water level in the tank sufficient to give the minimum
residual pressure at the remotest end of the system.
b) Maximum Water Level: Is the highest water level in the tank.
c) Working Pressure: The minimum pressure at which the system will operate.
d) Safe Working Pressure: The working pressure multiplied by a factor of safety.
2.1.5.1.2 Types of Reservoirs
Reservoirs may be classified according to their function, their relative position with respect to
the earth’s surface, manner of operation, and the type of material of construction.
a) Elevated Reservoirs
Reservoirs are constructed in elevated or hilly areas. In case of flat areas, a supporting frame or
tower is installed to support the storage tank. This is known as an elevated reservoir. Standpipes
are reservoirs with height greater than their diameter.
b) Ground Level Reservoirs
Ground level reservoirs may be made of reinforced concrete pipe, fiber glass, concrete hollow
blocks, steel or ferro-cement. These may be single ground level tanks or multiple type tanks.
11
2.1.5.1.3 Operation of Reservoirs
Reservoirs may be operated on the following basis [12]:
1. Floating-on-the-Line Reservoir: Water is pumped both into the reservoir and to the
consumers; water goes up the tank when the water demand is low or if there is a residual
water supply. During peak demand, water goes to the customers directly from the source
and from the tank. This system requires fairly continuous pumping at low pumping
capacity.
2. Fill-And-Draw Reservoir: Water flows or is pumped directly into the reservoir and from
the reservoir, water supply is distributed to the consumers through gravity flow. The tank is
usually installed near the water source to minimize head losses due to friction losses. In the
fill-and-draw system, however, water is conveyed to the storage tank at high pumping
capacity at shorter time duration, and always against the maximum head [12].
2.1.5.2 Types of Distribution Systems.
Branched configuration: Branched networks are predominantly used for small-capacity
community supplies delivering the water mostly through public standpipes and having few house
connections, if any.
Looped (or “grid”) configuration: A looped network usually has a skeleton of secondary mains
that can also be in a form of branch, one loop (’ring’), or a number of loops. From there, the
water is conveyed towards the distribution pipes and further to the consumers. The secondary
mains are connected to one or more loops or rings [19].
Figure 1: Showing Branched and Looped water distribution networks
Source: Water Distribution, 2010, Page 467 [19]
12
A house connection is a water service pipe connected with in-house plumbing to one or more
taps, e.g. in the kitchen and bathroom. Usually 3/8 inch (9 mm) and 1/2 inch (12 mm) taps are
used. A typical layout is shown.
Figure 2: Showing piped water house connection
Source: Water Distribution, 2010, Page 469 [19]
The service pipe is connected to the distribution main in the street by means of a T-piece (on
small-diameter pipes), a special insert piece (ferrule) or a saddle (on larger-size secondary
pipes). A special insert piece is mostly used for cast iron and ductile iron pipes [19].
2.1.5.3 Water Distribution Pressure
Pressure is defined as the force (F) exerted per unit area (A), i.e. P = F/A. There are basically
two types of water pressures [12], i.e.; Static and dynamic water pressure.
2.1.5.3.1 Static Water Pressure
Static water pressure is the pressure in the system when water is not flowing. It is an indication
of the potential pressure available to the system. This pressure is produced by [12]:
a) Placing the water at an elevation above the location of water use (for example, in an
elevated reservoir;
b) Imparting energy to the water through a pump; and
c) Air pressure in hydro-pneumatic tanks
13
2.1.5.3.2 Dynamic Water Pressure
The dynamic water pressure is the pressure at any particular point with a given quantity of water
flowing past that point. Dynamic pressure differs from static pressure in that it varies throughout
the system due to the friction losses during the transport of water [12].
2.1.5.3.3 Loss of Pressure
A pressure-loss event occurs when pressure in the water distribution system drops significantly
below normal [20]. These events may be planned or unplanned and they can happen at any time,
day or night. For example, system operators may intentionally reduce pressure in the distribution
system when they install, replace, or repair water lines. Broken water mains, failed pumping
systems, power outages, leaking storage reservoirs, and high demand, such as fire flow, can
cause unplanned pressure loss within parts of the distribution system, or throughout the system
[20]. The pressure criterion is dependent on topographic conditions, availability of water at the
source and overall condition of the pipes [19].
2.1.5.3.4 Remedies to Loss of water distribution pressure.
Water distribution pressure can be maintained by;
a) Ensuring that reservoirs are full of water at all times
b) Avoiding cases that affect the overall condition of the pipes such as leaks, debris, illegal
connections on the distribution lines [19].
c) Control of surges through controlling the rate of switching pumps to make the change in
flow gradual, so that the network can absorb the effect of the change in flow.
d) Use of Gate valves to control pressure depending on the need.
2.1.5.3.5 Maintaining Pressure Up-hill and down hill
At an average height of about 120 feet, water towers can properly pressurize the water
distribution pipes within a ‘pressure zone.’ A water pressure zone is a geographic section of a
water distribution network. A pressure zone is determined by the elevation of the area served.
Within a pressure zone, a maximum pressure is established by pumping stations or reservoirs.
Water does not flow between pressure zones unless it flows from a higher pressure zone to a
lower pressure zone, though a pressure reducing valve [21].
Pressure reducing valves may be added within a pressure zone to create what is called a ‘pressure
district.’ Water systems strive to deliver water to the customer at a pressure between 40 and 80
psi, because higher pressures increase the chance for aging pipes and fittings to leak. If the
14
pressure of the distribution system cannot be reduced, pressure reducing valves must be added to
customer lines. Gate valves are used in high-pressure locations, such as on the outlet side of
water storage tanks and water towers. Gate valves are either open or closed; they do not regulate
the flow of water and are non-adjustable [21].
2.2 Existing systems
2.2.1 Main metering
This involves measuring the water that is supplied to a given network segment. At the end of the
month, the total volume of water supplied to that area will be compared to the total sum of
volumes from the individual meters and if the values overlap negatively, then theft is detected
hence can be investigated. This system was initiated by The Japan International Cooperation
Agency (JICA) and has been implemented in Yangon City. The installation of these meters was
started under a program called Technical Transfer Program that was aimed at installing 300 new
water meters at 280 households and schools and monasteries. These meters have the capacity to
record water usage in a wider area [22].
2.2.1.1 Challenges, Limitations, and Weaknesses of Main Metering
It can compare the total water supply to a given area and compare with the consumption on
individual meters. The challenge with this system is that it cannot alert the authorities in case of
water theft and it is very expensive to afford.
2.2.2 E-coder solid state absolute Encoder.
ARB Mobile, utilities have the ability to detect cut-wire situations at the register should a
customer try to sever the connection to prevent recording of consumption. Instead of the usual
numerical reading, the E-Coder or its sister, the ProRead, displays a series of colons (::::::) when
the connection is lost between the register and remote device. Without this diagnostic message,
cut-wire conditions could potentially go undetected for extended periods of time. Reverse flow
tampering can be caught quickly by the E-Coder's reverse flow flag. Utility personnel can track
every meter in the system showing reverse flow as well as the number of days the condition has
been present and water theft can be caught and stopped more quickly [23].
15
2.2.2.1 Challenges, Limitations, and Weaknesses of E-coder solid state absolute Encoder
Though trying to fight water theft, this system has the following limitations.
a) Its accuracy is not guaranteed.
b) May not detect an illegal connection.
c) It is very expensive.
2.2.3 Prepaid metering system.
With prepaid metering, the consumer is in control of their own water usage, as they decide how
much water to purchase. The Elster Kent prepaid metering solution ensures that the consumer
can budget for their water bill. At any time the system that has been installed on the consumer’s
own property shows how much credit is on the meter and how much has been used.
Prepaid domestic water dispenser is designed for individual households, to control the dispensing
of prepaid quantities of water. It uses simple technology with three components; a card, an
Internal Unit and a meter. The system comprises three main components, which include the
electronic module, latching valve and water meter with pulse output.
It is a multi-tier step tariff system, which monitors the monthly consumption of the consumer,
and charges them according to the appropriate tariff. A monthly consumption profile is
generated, which in turn is loaded back onto the token. This profile is uploaded to the
management system the next time the consumer purchases credit. The management system also
caters for a multitude of reports that can be generated and used by water services authorities. The
system comes with tamper switches which prevent tampering from unauthorized persons. Any
tampering with the system results in the switch being activated and water is then shut-off [24].
2.2.3.1 Challenges, Limitations, and Weaknesses of Prepaid Metering System
With the introduction of prepaid meters in Uganda and other parts of the world, water theft has to
a certain extent been reduced because of their capacity to do the following.
 Encourages Water Consumption Control
 Shows Current credit and the corresponding water left
 Customer can see current and past consumption
 Identification of leaks
 Smart Card – Simplicity
 Emergency Water – Flexibility
16
However, the following are the limitations of this system.
a) Since a customer pays in advance for the amount of water he/she requires in a given
period of time, vandalism is reduced. However, this does not guarantee the end of
practices such as Meter by pass.
b) Network challenges may limit the efficiency of remote access to the data saved on the
prepaid meter.
c) These meters are very expensive, one is estimated at 1.5million shillings making it hard
to deploy them throughout the country and that is why prepaid meters are only found in a
few areas in Kampala.
d) A prepaid meter may also not be able to detect illegal connections.
e) Cannot detect water theft such as meter bypass, Meter reversals, meter tampering. The
readings can still be manipulated.
d) It cannot alert the authorities in case of meter tampering.
2.2.4 Physical Monitoring system.
Here, there are basically physical methods of detecting water theft. These methods are currently
employed in NWSC to identify piped water theft.
a) Detection of meter bypass
The following steps are currently being used to identify and investigate a meter by pass
1. Close the stop cock, feel the pipe just before the meter, if there is a vibration in the pipe, then
there is reason to suspect a meter by pass as water flow induces a vibration in the pipe.
2. Check the water tank; press the ball valve down to see if there is water inflow. No water is
expected to reach the roof tank once the stop cork is closed. Presence of water implies that
there is a meter by pass
3. Close off the distribution lines from the tank and check taps in the house. No water is
expected, presence of water implies that there is a by-pass. Note however that when these
taps are opened there may be back flow from the pipe between the tank and the tap for
about 1 minute.
4. Now reverse the above process, Open all the lines to ensure full water supply, on doing this
all taps should be receiving water. If there is any tap that does not receive water it is very
likely that it is an illegal line (it implies that a gate valve has been closed).
17
5. Now check if the direct lines (commonly the garden tap and or the kitchen line) still receive
water.
6. At this stage we do not expect any water at any tap at all.
7. Reverse the process and check the taps which don’t have water. Note that all taps should be
having water after opening the taps. If there is a tap without water, it implies that a control
valve has been closed [18].
b) Illegal Connections and reconnections
To identify this theft, the Community is involved in reporting water theft. The police is also
involved in investigations of a suspect [18].
c) Fetching before the meter
Make a list of customers whose consumption is inconsistent and those whose consumption is too
low. Fetching before the meter is common in the evening and during the week ends when the
customers do not expect the service provider to visit them at all. So revisit these customers at the
appropriate time [18].
d) Meter reversals
Ensure that arrows on the meter point in the direction of flow; otherwise it implies that the meter
has been reversed. The position of the stop cork also suggests the direction of flow.
Conventionally, the stop cork is at the upstream part of the flow direction (Before the meter).
Another indicator of a meter reversal is a lower reading than previous reading. Figure 3 shows a
typical flow chart of the steps to take when identifying an illegal connection or meter by pass.
Another way of identifying these cases is through sampling meter readings (meter reading
audits). Pick on a set of customers and monitor their customer meter readings several times
through the month. Once a reduction is noticed this should be reported as an illegal case of meter
reversal [18].
e) Meter Tampering
Physical marks are used to suspect meter tampering. Signs of a meter that has been tampered
with include:
 A shiny body of water meter implying that it is being held every now and then.
 Loose fittings at the meter connection, implying that the fittings are opened so often
an evidence of leaking at the fittings.
 Pipe wrench marks on the fittings.
18
2.2.4.1 Challenges, Limitations, and Weaknesses of Physical Monitoring System.
This method of theft detection has a number of limitations. They include;
a) It has so many assumptions that may not satisfactorily aid in theft detection.
b) Some methods that involve going to the consumers’ premises before detecting theft may
not totally work because no consumer is so stupid to wait until he/she is captured before
they can put things back rightly.
c) In some cases where police and community are entrusted, the chances of detecting theft
are too low since most people are very corrupt.
2.3 The proposed GSM based piped water theft detection system
2.3.1 Functionality of the Proposed System
Once implemented, the system will be deployed at the branch point of the water distribution
network to every consumer’s home. It will take record of the water usage towards that line. It
will also detect illegal connections and “T-Junction connections” on the line and alert the
authorities via an SMS.
2.3.2 Strengths of the proposed system
1. It can remotely alert the authorities of any theft immediately it occurs.
2. This system is able to store the quantity of water supplied to every individual consumer in
that even if the consumer manipulates, tampers, bypasses the physical meter (current
meters being used), the system will still keep the right records hence at the end of the day,
when the actual volume on the system is compared with the value on the consumer meter,
theft will be detected so long as they do not correlate.
3. Its unit cost will be low once implemented.
4. This system can be programmed to work in any water distribution system with any flow
rate.
2.3.3 Technologies in the proposed system
The proposed system will basically utilize the GSM technology
2.3.3.1 GSM Technology.
GSM makes use of two principles. The first called Time division Multiplex (TDMA) where
radio frequency say 890 MHz is shared by different users in time. The second principle that
19
GSM uses is Frequency Division Multiplex (FDMA) where multiple users use different
frequencies for their respective communications.
Advantages of GSM
1. Low cost entry handsets
2. Wide choice and availability of handsets
3. International roaming
4. Easy subscription
20
CHAPTER THREE: METHODOLOGY
3.0 Introduction
This chapter describes the different techniques and tools that shall be used to achieve the
objectives stated in chapter one in order to design and develop a GSM based piped water theft
detection system. These techniques include; Data collection techniques, System design and
implementation, testing and Evaluation. Finding the appropriate research methodologies is very
critical in drawing up model solutions/systems to identified problems [25].
3.1 Requirements Elicitation
This section is the most important stage in the proposed system development because it acts as
the foundation study and determines the requirements necessary for coming up with the system.
This will involve the process of gathering information about the system to be developed and
existing systems, and later determining the user and system requirements from this information.
An understanding of the principles of the GSM based piped water theft identification will be
used to determine some requirements of the system.
3.1.1 Data collection methods
The Major methods of data collection that shall be used include; Documentary Review, and
Interviews.
3.1.1.1 Documentary Review
Various documentations shall be reviewed. This involves reading of documentaries whose major
source is the internet and other documentaries such as text books, and other related research
papers. The advantages of this method are;
a) Internet is readily available
b) It is not very expensive.
3.1.1.2 Interview:
This will involve mainly the Engineers of NWSC and other resourceful persons.
3.1.1.3 Observation
This will involve visiting sites of NWSC to ascertain the existence of water theft in the
distribution networks and how the management has tried to solve the problem so far.
21
3.1.2 Data Analysis
Data analysis is a means of making sense of data before presenting it in an understandable
manner. “The purpose of data analysis is to organize, provide structure to, and elicit meaning
from research data” [26] hence data analysis helps in generating a list of requirements. The data
will be collected and then analyzed basing on the objectives specified in this proposal.
3.2 System Design
The design of GSM based piped water theft detection system will be composed of the circuit design,
software design and finally the integrated system design.
3.2.1 Circuit design
The circuit design shall be designed in proteus. The block diagram below will help in the design.
3.2.1.1 Block Diagram
Figure 3: Block diagram of the proposed system
3.2.2 Software Design
The code shall be written in Arduino 1.5.6 –r2. The block diagram below will guide in the
software design.
22
3.2.2.1 Flow Chart
Figure 4: Flow Chart of the proposed system
3.2.3 Integrated System design
The software and circuit designs will be integrated to come up with the entire system.
3.3 Implementation
3.3.1 Implementation tools
A number of tools will be employed in the implementation which will range from both hardware
development tools to software development tools.
3.3.1.1 Hardware
The prototype of this System will have the resources as listed.
- ATmega644P chip for Arduino.
- GSM module
23
- Electronic components (Diodes, capacitors, resistors and transistors). Different components
will be used mainly to regulate and direct rightful amounts of current in the system.
- Electrical equipments (Soldering gun, soldering wires, multimeters)
- 40x2 Alphanumeric LCD-Liquid Crystal Display
- Water motor pump
- Plastic water pipe
- Head on tank
- Two water flow rate sensors
- Bread board and a PCB will both used for holding and housing the system components
- Timer
3.3.1.2 Software
- Proteus simulation software
- Arduino 1.5.6 –r2
- VSM studio.
3.4 Testing and Validation
In order to construct a working system, testing will be done at different stages of the system's
development using the techniques below:
3.4.1 Unit testing
This will involve testing different individual units of hardware components to determine whether
they are fit for use. It will also involve testing the pieces of code to ensure that they work as
expected.
3.4.2 Integration testing
The different components will be brought together and tested for inter-component
communication. This will help to find out if the different integrated components give the
expected outputs for the respective inputs
3.4.3 Front-end testing
This will be carried out after system completion to ensure that the system is able to perform the
required functional requirements. This will be aimed to seeing that the system communicates
effectively and ensuring that any form of water theft is detected and an alert message sent to the
authorities.
24
REFERENCES
[1] H. A. Gaikwad and P. V. G. Puranik, "Automated urban water supply system and theft
identification," International Journal of Electronics and Communication Engineering &
Technology (IJECET), pp. Volume 6, Issue 6, June 2015.
[2] J. THARANYAA, A.JAGADEESAN and A.LAVANYA, "THEFT IDENTIFICATION
AND AUTOMATED WATER SUPPLY SYSTEM USING EMBEDDED
TECHNOLOGY," International Journal of Advanced Research in Electrical, Electronics
and Instrumentation Engineering, vol. Vol.2, no. Issue 8, p. 3727, August, 2013.
[3] P. D. B. Madihalli and P. S. S. Ittannavar, "Smart Water Supply Management,"
International Journal of Emerging Trends in Electrical and Electronics (IJETEE – ISSN:
2320-9569), vol. Vol. 10, no. Issue. 9, pp. 77-79, October, 2014.
[4] "Automated Drinking Water Supply System and Theft Identification Using Embedded
Technology," International Journal of Innovative Research in Computer and
Communication Engineering, IJIRCCE, vol. Vol. 3, no. Issue. 3, pp. 2267-2272, March,
2015.
[5] "National Water and Sewerage Corporation," February 2014. [Online]. Available:
http:www.nwsc.com. [Accessed October 2015].
[6] V. Felbab-Brown, "Brookings," Brookings Mountain West Lecture Series, University of
Nevada, Las Vegas, 20 February 2015. [Online]. [Accessed October 2015].
[7] "Littlegate publishing," National Water and Sewerage Corporation (NWSC), 01 April 2015.
[Online]. Available: http://www.littlegatepublishing.com. [Accessed October 2015].
[8] A. Kyotalengerire, Kampala: New Vision, September 15, 2015.
[9] Dictionary.com, Dictionary.com, 2015.
[10] P. I. SHAHROUR, "Sustainable and Smart City," Lillel University, February 2014.
[Online]. Available: http://www.lillel.fr.com. [Accessed 2015].
25
[11] "Introduction to flow measurement," Omega, 2014. [Online]. [Accessed 2015].
[12] BENIGNO. S. AQUINO. III, Design Manual, Water Partnership Program, Rural water
Supply, Vol. 1, Manila, Philipines, February, 2012.
[13] " Flow meters," Omega, 2014. [Online]. [Accessed 2015].
[14] U. S. E. P. Agency, Control and Mitigation of Drinking Water Losses in Distribution
Systems, EPA 816-R-10-019, November, 2010.
[15] Zane. Satterfield and E. S. P.E and Vipin Bhardwaj, "Tech Brief, Water Meters," vol. Vol.
4, no. Issue. 2, Summer 2004.
[16] Zane. Satterfield and P. E. Vipin Bhardwaj, Water Meters, National Environmental Services
Center, 2014.
[17] Board of Water and Sewer Charge Review (BWSCR), Water Service Rules and
Regulations, City of Dayton.
[18] United Nations Human Settlements Programme (UN Habitat), Reduction of Illegal Water,
Nairobi, 2012.
[19] N. Trifunovic, Water Distribution, 2010.
[20] Washington State Department of Health, Environmental Public Health Office of Drinking
Water, June, 2014. DOH 331-338.
[21] THE MOLITOR, "Underspance," 22 October 2012. [Online]. Available:
http://underspace.com. [Accessed Thursday November 2015].
[22] Z. Nyein, "myanmar, Japan International Cooperation Agency (JICA) to help Yangon City
Development Committee (YCDC) Battle Water theft, Vol. 3, Issue 7," 11 February 2015.
[Online]. Available: http:// www.myanmar.com. [Accessed October 2015].
[23] W. World, Advanced Detection of Unauthorized Water Use through Radio Frequency
26
AMR/AMI Systems., 2014.
[24] "Elstermetering," Elster Metering, 2015. [Online]. Available: http/:elstermetering.com.
[25] Polit D.F. & Hunglar B.P. (1999). Nursing Research: Principles and Methods. 6th Edition.
Lipponcott Williams and Wilkins. NY, USA.
[26] Polit D.F and Beck C.T.(2008). Nursing Research: Generating and Assessing Evidence for
Nursing Practice. 8th
Edition. Lipponcott Williams and Wilkins. NY, USA.
27
APPENDICES
A.1 Tentative projective schedule
N0. Activity Period
2015 2016
Aug Sept Oct Nov Dec Jan Feb Mar Apr May
1. Title identification
2. Problem identification
3. Preparation of project proposal
4. Proposal presentation
5. Research, literature review and
requirements elicitation
6. System design and implementation
7. System testing and validation
8. Preparation of Project report
9. Project Presentation
10. Final Submission of project report
Table 2: Showing time frame for the proposed project
A.2 Proposed budget
No. Item Quantity Unit Cost Total Cost
1. Microcontrollers 1 250,000/= 250,000/=
2. GSM Module 1 350,000/= 350,000/=
3. Buzzer alarm 1 10000/= 10,000/=
4. Flow rate sensors 2 50,000/= 50,000/=
5. Suction Pump (Motor) 1 500,000/= 500,000/=
6. Water pipe (plastic) 1 20,000/= 20,000/=
7. Head on tank 1 30,000/= 30,000/=
8. LCD 1 50,000/= 50,000/=
4. Electronic components 1 50000/= 50,000/=
5. Timer 1 10,000/= 10,000/=
6. Stationary 50,000/= 50,000/=
7. Airtime 50000 50,000/=
8. Transport 150,000/= 150,000/=
9. Internet costs 30,000/= 30,000
10. Miscellaneous 100,000/= 100,000/=
Total 1,700,000/=
Table 3: Showing the proposed budget
28
A.3 Sample interview guiding questions
1) Your mandate as National Water and Sewerage Corporation is to distribute and deliver
clean water to people in the areas entrusted to you, what stages are undertaken to deliver
water to the final consumer?
2) What is the significance of each of these stages in water distribution?
3) How do you ensure constant supply of water to the consumers?
4) It is stated by a number of professors in the world that piped water in town areas is
distributed at a constant flow rate, how do you archive this?
5) Then, what is the optimum flow rate used in each of the towns here in Uganda?
6) For water to be delivered to the consumers, there is need for a given distribution pressure to
be maintained, how do you archive this?
7) What are the types of pipes used in water distribution here in Uganda? Why these types?
8) What distribution network is best suitable for water distribution here in Uganda?
9) What are some of the technical challenges you face in the water distribution networks?
10) What remedies have you so far undertaken to curb these challenges?
11) What is the economic value of each of these remedies stated in (11) above?
12) What future plans do you have towards solving the challenges mentioned in (10) above?

More Related Content

Similar to Fyp proposal-GSM based piped water theft detection by Khabusi Simon Peter

INSTALLATION OF FIBER OPTIC CABLES IN DEVELOPING COUNTRIES USING LINK SENSOR ...
INSTALLATION OF FIBER OPTIC CABLES IN DEVELOPING COUNTRIES USING LINK SENSOR ...INSTALLATION OF FIBER OPTIC CABLES IN DEVELOPING COUNTRIES USING LINK SENSOR ...
INSTALLATION OF FIBER OPTIC CABLES IN DEVELOPING COUNTRIES USING LINK SENSOR ...Bernard Blewusi Agblevor
 
JOHNSON_BENJAMIN_11379847_Report
JOHNSON_BENJAMIN_11379847_ReportJOHNSON_BENJAMIN_11379847_Report
JOHNSON_BENJAMIN_11379847_ReportBen Johnson
 
SOUND MANAGEMENT AND PERFORMANCE OF MICROFINANCE INSTITUTIONS
SOUND MANAGEMENT AND PERFORMANCE OF MICROFINANCE INSTITUTIONSSOUND MANAGEMENT AND PERFORMANCE OF MICROFINANCE INSTITUTIONS
SOUND MANAGEMENT AND PERFORMANCE OF MICROFINANCE INSTITUTIONS
innocent25
 
Mk proposal re_submitted4_july2
Mk proposal re_submitted4_july2Mk proposal re_submitted4_july2
Mk proposal re_submitted4_july2
Theoneste Ntalindwa
 
plasma cutting.pdf
plasma cutting.pdfplasma cutting.pdf
plasma cutting.pdf
Mahamad Jawhar
 
Iec61366 3
Iec61366 3Iec61366 3
Iec61366 3
NITINSHARMA1338
 
bubble deck pdf from net.pdf
bubble deck pdf from net.pdfbubble deck pdf from net.pdf
bubble deck pdf from net.pdf
ahmedali718563
 
Internship report_Georgios Katsouris
Internship report_Georgios KatsourisInternship report_Georgios Katsouris
Internship report_Georgios KatsourisGeorgios Katsouris
 
Last paper 1 edited1
Last paper 1 edited1Last paper 1 edited1
Last paper 1 edited1
shushay hailu
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone Jammer
Mohamed Atef
 
Utility-Scale Solar Photovoltaic Power Plants - A Project Developer’s Guide
Utility-Scale Solar Photovoltaic Power Plants - A Project Developer’s GuideUtility-Scale Solar Photovoltaic Power Plants - A Project Developer’s Guide
Utility-Scale Solar Photovoltaic Power Plants - A Project Developer’s Guide
Private Consultants
 
Grid connected pv power system
Grid connected pv power systemGrid connected pv power system
Grid connected pv power system
Zelalem Girma
 
Ifc+solar+report web+ 08+05
Ifc+solar+report web+ 08+05Ifc+solar+report web+ 08+05
Ifc+solar+report web+ 08+05
Mohammed Selim
 
Solar Energy - A Complete Guide
Solar Energy - A Complete GuideSolar Energy - A Complete Guide
Solar Energy - A Complete Guide
Naman Pratap Singh
 
Cict6640 sandis wanjala wamalwa
Cict6640 sandis wanjala wamalwaCict6640 sandis wanjala wamalwa
Cict6640 sandis wanjala wamalwa
SandisWanjala
 
BRIEF THEORY OF SIGNATURE BRIDGE
BRIEF THEORY OF SIGNATURE BRIDGEBRIEF THEORY OF SIGNATURE BRIDGE
BRIEF THEORY OF SIGNATURE BRIDGE
Pravin Gaurav
 
Allen S John (PROJECT)
Allen S John (PROJECT)Allen S John (PROJECT)
Allen S John (PROJECT)Allen John
 

Similar to Fyp proposal-GSM based piped water theft detection by Khabusi Simon Peter (20)

INSTALLATION OF FIBER OPTIC CABLES IN DEVELOPING COUNTRIES USING LINK SENSOR ...
INSTALLATION OF FIBER OPTIC CABLES IN DEVELOPING COUNTRIES USING LINK SENSOR ...INSTALLATION OF FIBER OPTIC CABLES IN DEVELOPING COUNTRIES USING LINK SENSOR ...
INSTALLATION OF FIBER OPTIC CABLES IN DEVELOPING COUNTRIES USING LINK SENSOR ...
 
JOHNSON_BENJAMIN_11379847_Report
JOHNSON_BENJAMIN_11379847_ReportJOHNSON_BENJAMIN_11379847_Report
JOHNSON_BENJAMIN_11379847_Report
 
SOUND MANAGEMENT AND PERFORMANCE OF MICROFINANCE INSTITUTIONS
SOUND MANAGEMENT AND PERFORMANCE OF MICROFINANCE INSTITUTIONSSOUND MANAGEMENT AND PERFORMANCE OF MICROFINANCE INSTITUTIONS
SOUND MANAGEMENT AND PERFORMANCE OF MICROFINANCE INSTITUTIONS
 
Mk proposal re_submitted4_july2
Mk proposal re_submitted4_july2Mk proposal re_submitted4_july2
Mk proposal re_submitted4_july2
 
plasma cutting.pdf
plasma cutting.pdfplasma cutting.pdf
plasma cutting.pdf
 
Student handbook2
Student handbook2Student handbook2
Student handbook2
 
Iec61366 3
Iec61366 3Iec61366 3
Iec61366 3
 
bubble deck pdf from net.pdf
bubble deck pdf from net.pdfbubble deck pdf from net.pdf
bubble deck pdf from net.pdf
 
Internship report_Georgios Katsouris
Internship report_Georgios KatsourisInternship report_Georgios Katsouris
Internship report_Georgios Katsouris
 
Last paper 1 edited1
Last paper 1 edited1Last paper 1 edited1
Last paper 1 edited1
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone Jammer
 
Utility-Scale Solar Photovoltaic Power Plants - A Project Developer’s Guide
Utility-Scale Solar Photovoltaic Power Plants - A Project Developer’s GuideUtility-Scale Solar Photovoltaic Power Plants - A Project Developer’s Guide
Utility-Scale Solar Photovoltaic Power Plants - A Project Developer’s Guide
 
Grid connected pv power system
Grid connected pv power systemGrid connected pv power system
Grid connected pv power system
 
Ifc+solar+report web+ 08+05
Ifc+solar+report web+ 08+05Ifc+solar+report web+ 08+05
Ifc+solar+report web+ 08+05
 
Solar Energy - A Complete Guide
Solar Energy - A Complete GuideSolar Energy - A Complete Guide
Solar Energy - A Complete Guide
 
FINAL YEAR REPORT
FINAL YEAR REPORTFINAL YEAR REPORT
FINAL YEAR REPORT
 
MD's
MD'sMD's
MD's
 
Cict6640 sandis wanjala wamalwa
Cict6640 sandis wanjala wamalwaCict6640 sandis wanjala wamalwa
Cict6640 sandis wanjala wamalwa
 
BRIEF THEORY OF SIGNATURE BRIDGE
BRIEF THEORY OF SIGNATURE BRIDGEBRIEF THEORY OF SIGNATURE BRIDGE
BRIEF THEORY OF SIGNATURE BRIDGE
 
Allen S John (PROJECT)
Allen S John (PROJECT)Allen S John (PROJECT)
Allen S John (PROJECT)
 

Recently uploaded

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 

Fyp proposal-GSM based piped water theft detection by Khabusi Simon Peter

  • 1. BUSITEMA UNIVERSITY FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER ENGINEERING FINAL YEAR PROJECT PROPOSAL GSM BASED PIPED WATER THEFT DETECTION SYSTEM BY KHABUSI SIMON PETER REG No: BU/UG/2012/67 Email: simonkhabusi@gmail.com Tel: +256 774 576 410 SUPERVISOR: MR. ALUNYU ANDREW A PROJECT PROPOSAL SUBMITTED TO THE DEPARTMENT OF COMPUTER ENGINEERING IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE AWARD OF A BACHELOR OF COMPUTER ENGINEERING OF BUSITEMA UNIVERSITY November, 2015
  • 2. ii DECLARATION I, KHABUSI SIMON PETER BU/UG/2012/67 hereby declare that this project proposal is my original work except where explicit citation has been made and it has not been presented to any Institution of higher learning for any academic award. Signature: ……………………… Date: ……………………………
  • 3. iii APPROVAL This is to certify that the project proposal under the title “GSM based piped water theft detection system” has been done under my supervision and is now ready for examination Mr. Alunyu Andrew Department of Computer Engineering Sign: …………………………..…… Date: ……………………………….
  • 4. iv LIST OF ACRONYMS NWSC: National Water and Sewerage Corporation WALOPU: Water Loss Prevention Unit NRW: Non-Revenue Water GSM: Global Systems for Mobile Communication TDMA: Time Division Multiple Access FDMA: Frequency Division Multiple Access SMS: Short Message Service LCD: Liquid Crystal Display PCB: Printed Circuit Board uPVC: Unplasticized Polyvinyl Chloride µC: Microcontroller HDPE: High density polyethylene
  • 5. v TABLE OF FIGURES Figure 1: Showing Branched and Looped water distribution networks ....................................... 11 Figure 2: Showing piped water house connection........................................................................ 12 Figure 3: Block diagram of the proposed system ......................................................................... 21 Figure 4: Flow Chart of the proposed system............................................................................... 22 LIST OF TABLES Table 1: Reflecting the advantages, disadvantages, and cost of the different water meter types... 8 Table 2: Showing time frame for the proposed project ................................................................ 27 Table 3: Showing the proposed budget......................................................................................... 27
  • 6. vi CONTENTS DECLARATION............................................................................................................................ ii APPROVAL ..................................................................................................................................iii LIST OF ACRONYMS ................................................................................................................. iv TABLE OF FIGURES.................................................................................................................... v CHAPTER ONE:............................................................................................................................ 1 1.0 Introduction........................................................................................................................... 1 1.1 Background of Study........................................................................................................ 1 1.2 Problem Statement ................................................................................................................ 3 1.3 Objectives.............................................................................................................................. 3 1.3.1 Main Objective ............................................................................................................... 3 1.3.2 Specific Objectives......................................................................................................... 3 1.3 Justification and Significance................................................................................................ 3 1.4 Scope..................................................................................................................................... 4 1.4.1 Technical Scope.............................................................................................................. 4 1.4.2 Geographical Scope........................................................................................................ 4 1.4.3 Time Scope..................................................................................................................... 4 1.5 Limitations and Assumptions................................................................................................ 4 1.5.1 Limitations...................................................................................................................... 4 CHAPTER TWO: LITERATURE REVIEW................................................................................. 5 2.0 Introduction........................................................................................................................... 5 2.1 Concepts, Descriptions and Definitions:............................................................................... 5 2.1.1 Piped Water .................................................................................................................... 5 2.1.2 Flow Rate:....................................................................................................................... 5 2.1.3 Water Meter/Flow Meter................................................................................................ 6 2.1.4 Water Theft..................................................................................................................... 9 2.1.5 Water distribution........................................................................................................... 9 2.2 Existing systems.................................................................................................................. 14
  • 7. vii 2.2.1 Main metering............................................................................................................... 14 2.2.2 E-coder solid state absolute Encoder............................................................................ 14 2.2.3 Prepaid metering system............................................................................................... 15 2.2.4 Physical Monitoring system. ........................................................................................ 16 2.3 The proposed GSM based piped water theft detection system ........................................... 18 2.3.1 Functionality of the Proposed System.......................................................................... 18 2.3.2 Strengths of the proposed system ................................................................................. 18 2.3.3 Technologies in the proposed system........................................................................... 18 CHAPTER THREE: METHODOLOGY .................................................................................... 19 3.0 Introduction......................................................................................................................... 19 3.1 Requirements Elicitation..................................................................................................... 20 3.1.1 Data collection methods ............................................................................................... 20 3.1.2 Data Analysis................................................................................................................ 21 3.2 System Design..................................................................................................................... 21 3.2.1 Circuit design................................................................................................................ 21 3.2.2 Software Design ........................................................................................................... 21 3.2.3 Integrated System design.............................................................................................. 22 3.3 Implementation.................................................................................................................... 22 3.3.1 Implementation tools.................................................................................................... 22 3.4 Testing and Validation ........................................................................................................ 23 3.4.1 Unit testing ................................................................................................................... 23 3.4.2 Integration testing......................................................................................................... 23 3.4.3 Front-end testing........................................................................................................... 23 REFERENCES ............................................................................................................................. 24 APPENDICES .............................................................................................................................. 26 A.1 Tentative projective schedule......................................................................................... 27 A.2 Proposed budget............................................................................................................. 27 A.3 Sample interview guiding questions................................................................................... 28
  • 8. 1 CHAPTER ONE: 1.0 Introduction This chapter gives a brief introduction of the study of the GSM based piped water theft detection system i.e.; background, problem statement, objectives, justification/ significance and the scope of the study. 1.1Background of Study In urban areas, there is tremendous need of water and water distribution network plays an important role in delivering water to individual families, offices, construction sites, etc. For the efficient delivery of water is dependent on water flow rate, pressure of water and purity of water but sometimes it is found that some individuals run motors to suck more water from pipelines to drain point to serve their excessive need of water [1]. This in turn disturbs steady flow of water which is meant to flow at a constant flow rate in town areas [2][3][4] and due to that, other consumers in that particular area get affected because of this misuse of water. This is just one of the ways in which people steal water. Other ways include; meter bypass, Meter tampering, Meter reversals and vandalism [5]. A lecture given on February 20, 2015 at Brookings Mountain West Lecture Series, Vanda Felbab-Brown explains that Water theft and smuggling are perpetrated by both the wealthy and those who are chronically deprived of water, as she provides examples from California, southern Europe, Nigeria, Kenya, the Middle East, and South Asia [6]. In many parts of the world, elaborate smuggling of water with complex network chains and water mafias has emerged. Smuggling modes vary and among others include the development of illegal pipelines, and illegal truck deliveries. Felbab-Brown further explains that, “For many reasons, the illegal use and delivery of water are difficult to address [6]. Large-scale agriculture and industry often exercise great influence over regulators and law enforcement. In slum areas, mostly unconnected to legal pipelines, the suppression of illegal water distribution can sever access to water and hence threaten the physical survival of the most marginalized and poor. Across the world, citizens tend to be vehemently opposed to increased water pricing, yet without effective regulation, appropriate pricing, and
  • 9. 2 suppression of water crimes, the sustainability, long-term viability, and inclusive and equitable use of water cannot easily be achieved [6].” National Water and Sewerage Cooperation, (NWSC), a Public Utility Company, completely owned by the Government of Uganda, established in 1972, with the mandate to operate and provide water and sewerage services in the areas entrusted to it, on a sound commercial and financially viable basis face a great challenge of water theft [5]. The Managing Director of NWSC, Dr. Silver Mugisha stated that one of the biggest challenges facing most water utilities in developing countries is the high level of Non-Revenue Water (NRW) that includes both physical and commercial losses (mainly caused by illegal water use and water theft) [7]. A statement by Vivien Newumbe the public relations officer Kampala Water in New Vision on 15th September, 2015, says “the National Water and Sewerage Corporation (NWSC) is facing a challenge of water theft and increased vandalism of its water installations” [8]. She further explained that Majority of people especially those staying in higher altitude areas are greatly affected. Bursting a water pipe or tapping water illegally creates low pressure zones (the pressure and volume reduce). This leads to intermittent water supply affecting the enjoyment of services by most times paying customers. Illegal water connections are also a source of unsafe water. “When one bursts a water pipe there is the risk of contamination as in most cases water is drawn from the ground using cups or containers,” she said. In the same article, Agnes Kyotalengerire reports that the problem of un-authorized water use cannot be under-estimated and its negative impact on the operations of the corporation as a whole and Kampala water in general is obvious. February 2012 data alone revealed that 20% of water produced is unaccounted for which greatly affects the operations since this water is in reality lost or stolen revenue. In this regard, Phiona Wall, the public relations officer NWSC observed that the company incurs losses of about 30 to 35 % in uncollected revenue annually. Despite attempts made by water supply and distribution companies to curb water theft through use of various measures to detect water theft like indentifying meter readings that are lower than previous readings, low consumption based on knowledge of average water consumption, refusal of access into a property for NWSC employees to inspect water meter or water service; pro- active community-based illegal use reduction programme through the WALOPU (Water Loss
  • 10. 3 Prevention Unit) where the corporation partnered with the Police and community to fight illegal water use and reduce NRW, the situation has remained alarming [5]. 1.2 Problem Statement National water and Sewerage Corporation has constantly incurred cases of water theft such as illegal connections and reconnections, meter bypass, meter tampering, meter reversals and vandalism. In spite of attempts such as use of police and penalties by National Water to solve these problems, the problem of water theft has remained a big challenge in the operation of NWSC due to lack of a dedicated system to solve this problem. Therefore, this project aims at designing a GSM based piped water theft detection system that detects water theft and alerts the authorities via an SMS. 1.3 Objectives 1.3.1 Main Objective To Design and develop a piped water theft detection system that detects water theft and alerts the authorities via an SMS. 1.3.2 Specific Objectives i. To review existing literature and identify the requirements for the design of the GSM based piped water theft detection system. ii. To design a GSM Based piped water theft Detection system. iii. To implement the designed system. iv. To test and validate the system. 1.3 Justification and Significance Water theft does not only affect the operation of NWSC in Uganda but also affects the quality and quantity of water supplied to individual families, offices, institutions and construction sites. Often times, illegal connections causes contamination of water hence increasing the risk of contracting water born diseases by the consumers. The amount of water also supplied will reduce due to diversions of water to unauthorized destinations and the ultimate reduction of water flow rate hence far destinations may not be reached. This is just one of the challenges imposed by one of the ways of water stealing. However, others such as meter bypass, meter tampering, meter reversals and vandalism greatly affects revenue collected from water. In addition to consumer
  • 11. 4 challenges that may arise from water theft, the operation of NWSC is compromised due to loss of revenue. The government at the end is also affected as this water theft directly affects revenue. Proper handling of these problems will help in solving the different challenges that may result as mentioned above. By the fact that water is a basic need of life, its quality and availability is very necessary in the lives of all Ugandans. Hence proper regulation and monitoring of the water distribution networks with the help of a dedicated system is very paramount. 1.4 Scope 1.4.1 Technical Scope Using the identified requirements of this project, the system will be simulated in Proteus and Arduino 1.5.6 –r2. This simulation will be implemented on a bread board with all the physical components in the simulation. The Simulated and implemented system will be limited to detecting theft along the water distribution lines and alerting the authorities via an SMS. 1.4.2 Geographical Scope The system will be designed to be used along the water distribution networks in Uganda by NWSC. If further developed, it will be deployed at the individual families, offices, institutions and construction sites. 1.4.3 Time Scope The review of literature and existing systems, system design, implementation, and testing and validation will take five months from November 2015 to April 2016. 1.5 Limitations and Assumptions 1.5.1 Limitations This system will be limited to piped water theft prevention.
  • 12. 5 CHAPTER TWO: LITERATURE REVIEW 2.0 Introduction Here, there is review of various methods and systems used in piped water theft detection employed by National Water and Sewerage Cooperation and other Water Corporations in other parts of the world. In this chapter an examination of these systems will be revealed and a criticism of such systems as well. Lastly how my system differs from these systems and how it is going to cover the gaps that these systems leave. 2.1 Concepts, Descriptions and Definitions: 2.1.1 Piped Water Piped Water refers to a transparent, odorless, tasteless liquid, a compound of hydrogen and oxygen, freezing at 32°F or 0°C and boiling at 212°F or 100°C [9]. It constitutes of rain, oceans, lakes, rivers, etc in a more or less impure state. Water contains 11.188% hydrogen and 88.812% oxygen, by weight distributed to different destination through pipes. In urban areas piped water supply to residence and commercial establishments are provided at a fixed flow rate [3]. The channel used by water supply corporations to deliver water to the consumers is pipes which are mainly of uPVC material. Other materials could be; Ductile iron, Plastic (HDPE/PVC), Concrete, and Steel [10]. 2.1.2 Flow Rate: Flow rate refers to the quantity of fluid flowing through a pipe or channel within a given or standard time [9]. The equation below is used to calculate flow rate [11]; Q = A x v, Where; Q is flow rate, A is the cross sectional area of the pipe, and v is the average fluid velocity in the pipe. Putting this equation into action, the flow of a fluid traveling at an average velocity of 1 meter per second through a pipe with a 1 square meter cross-sectional area is 1 cubic meter per second. Note that Q is a volume per unit time, so Q is commonly denoted as the “volumetric” flow rate. 2.1.2.1 Factors determining pipe flow rates Hydraulics is concerned with the properties and behavior of fluids when at rest and in motion. The factors that affect the flow of water in pipes are as follow [12]: a) Cross sectional area of the pipe;
  • 13. 6 b) Roughness of the pipe’s inner surface; c) Condition and type of flow; d) Obstructions; and e) Energy head 2.1.3 Water Meter/Flow Meter A flow meter is an instrument used to measure linear, nonlinear, mass or volumetric flow rate of a liquid or a gas. When choosing flow meters, one should consider such intangible factors as familiarity of plant personnel, their experience with calibration and maintenance, spare parts availability, and mean time between failure history, etc., at the particular plant site [13]. Meters are very important for all aspects of the water supply operations. They make it possible to charge customers based upon the quantities of water that they consume. They record usage and therefore make billing fair for all customers. They can encourage conservation by making customers aware of their usage. Selection of a meter for a given application depends on many factors including; Meter operating principles, Debris and particle tolerance, required accuracy, Temporary vs. permanent installation, Convenience and ease of use, Calibration and required maintenance, Volume of flow and flow rate, Size of pipe, types of flow (laminar vs. turbulent), Type of pipe, Range of flow, Pressure drop, Installation location and orientation, Meter orientation, Required power, Flow obstruction tolerance, Data logging requirements, Meter reading methods, Durability, Temperature and environment [14]. Meters are classified into two basic types: positive displacement and velocity. Each of these meter types has variations, leading to the perception that there are several different kinds. 2.1.3.1Positive Displacement Meters In this type of meter, a known volume of liquid in a tiny compartment moves with the flow of water. Positive displacement flow meters operate by repeatedly filling and emptying these compartments. The flow rate is calculated based on the number of times these compartments are filled and emptied. The movement of a disc or piston drives an arrangement of gears that registers and records the volume of liquid exiting the meter. There are two types of positive displacement meters: nutating disc and piston [15]. Positive displacement meters are sensitive to low flow rates and have high accuracy over a wide range of flow rates. Positive displacement meters are used in homes, small businesses, hotels, and apartment complexes. They are available in sizes from 5/8” to two inches [15].
  • 14. 7 2.1.3.2 Velocity Meters Velocity meters operate on the principle that water passing through a known cross-sectional area with a measured velocity can be equated into a volume of flow. Velocity meters are good for high flow applications. Velocity meters come in different types, including turbine, multi-jet, propeller, ultrasonic, venture, and orifice meters. These meters are available in sizes of two inches and larger with the exception of multi-jet meters, which are between 5/8” and two inches [16].
  • 15. 8 Table 1: Reflecting the advantages, disadvantages, and cost of the different water meter types Source: United States Environmental Protection Agency, Control and mitigation of drinking water losses in distribution systems, pg 4-9 [14].
  • 16. 9 2.1.4 Water Theft It refers to the use of town water without the consent of the water department [18] or generally the illegal use of water. Water theft can be in the following forms; Meter tampering, meter reversals, illegal connections and reconnections, and meter by-pass. 2.1.4.1 Meter Tampering Physically altering the meter or the unauthorized removal and reinstallation of the water meter [17]. The customer intentionally corrupts the meter so as to affect its efficiency. This may include; reducing or distorting mechanical gears, boiling meter so as to melt internal components, breaking meter reading glass, introducing impurities, etc [18]. 2.1.4.2 Meter reversals: The customer installs the meter in reverse order so that it counts backwards to a desired reading. When satisfied they turn the meter to the correct position. Meter reversal may entail reversing the meter readings manually [18]. 2.1.4.3 Illegal Connections and Reconnections Illegal Connections refer to where the consumer is not even a customer to the water supply system. They have simply connected themselves to the network. In other words, Illegal Reconnections refer to where the customer has been disconnected for non-payment, but they go ahead and reconnect themselves to the network [18]. 2.1.4.4 Meter Bypass. Here, the consumer is a customer, with a meter. The customer has an alternative pipe taping water before the meter [18]. There are incidents of excess water drawing by certain customers/users by connecting motor-pump sets to the water pipeline hence drawing more water to them [1]. Meter bypass could take the form of disconnecting the water meter and replacing it with a pipe or connecting a “T-Junction pipe” before the meter. 2.1.5 Water distribution Refers to the network of water mains and related appurtenances [17]. Water distribution systems convey water drawn from the water source or treatment facility, to the point where it is delivered to the users. It is necessary to maintain sufficient pressure in the distribution system to protect it against contamination by the ingress of polluted seepage water.
  • 17. 10 Water distribution process starts with getting water from a water source and channeled to tanks for treatment. When treatment is done, it is channeled to the supply network which delivers water to individual families, offices, institutions, and construction sites [3]. The basic processes in water distribution are; getting water from the source to the water tanks, water treatment, filling the water reservoirs and finally channeling it in the distribution tanks [12]. 2.1.5.1 Water Reservoirs In small town distribution systems, whether water is obtained by gravity or by pumping, distribution reservoirs are usually necessary for the following reasons [12]: a) To balance the supply and demand in the system. In small distribution systems, variations in demand may be three or more times the average hourly consumption. b) To maintain adequate and fairly uniform pressure throughout the distribution system. c) To avoid the total interruption of water service when repairing pipes between the source of supply and the reservoir. d) To allow pumps to be operated uniformly throughout the day. Such pumps may be much smaller than would otherwise be required. 2.1.5.1.1 Terminologies a) Minimum Water Level: The lowest water level in the tank sufficient to give the minimum residual pressure at the remotest end of the system. b) Maximum Water Level: Is the highest water level in the tank. c) Working Pressure: The minimum pressure at which the system will operate. d) Safe Working Pressure: The working pressure multiplied by a factor of safety. 2.1.5.1.2 Types of Reservoirs Reservoirs may be classified according to their function, their relative position with respect to the earth’s surface, manner of operation, and the type of material of construction. a) Elevated Reservoirs Reservoirs are constructed in elevated or hilly areas. In case of flat areas, a supporting frame or tower is installed to support the storage tank. This is known as an elevated reservoir. Standpipes are reservoirs with height greater than their diameter. b) Ground Level Reservoirs Ground level reservoirs may be made of reinforced concrete pipe, fiber glass, concrete hollow blocks, steel or ferro-cement. These may be single ground level tanks or multiple type tanks.
  • 18. 11 2.1.5.1.3 Operation of Reservoirs Reservoirs may be operated on the following basis [12]: 1. Floating-on-the-Line Reservoir: Water is pumped both into the reservoir and to the consumers; water goes up the tank when the water demand is low or if there is a residual water supply. During peak demand, water goes to the customers directly from the source and from the tank. This system requires fairly continuous pumping at low pumping capacity. 2. Fill-And-Draw Reservoir: Water flows or is pumped directly into the reservoir and from the reservoir, water supply is distributed to the consumers through gravity flow. The tank is usually installed near the water source to minimize head losses due to friction losses. In the fill-and-draw system, however, water is conveyed to the storage tank at high pumping capacity at shorter time duration, and always against the maximum head [12]. 2.1.5.2 Types of Distribution Systems. Branched configuration: Branched networks are predominantly used for small-capacity community supplies delivering the water mostly through public standpipes and having few house connections, if any. Looped (or “grid”) configuration: A looped network usually has a skeleton of secondary mains that can also be in a form of branch, one loop (’ring’), or a number of loops. From there, the water is conveyed towards the distribution pipes and further to the consumers. The secondary mains are connected to one or more loops or rings [19]. Figure 1: Showing Branched and Looped water distribution networks Source: Water Distribution, 2010, Page 467 [19]
  • 19. 12 A house connection is a water service pipe connected with in-house plumbing to one or more taps, e.g. in the kitchen and bathroom. Usually 3/8 inch (9 mm) and 1/2 inch (12 mm) taps are used. A typical layout is shown. Figure 2: Showing piped water house connection Source: Water Distribution, 2010, Page 469 [19] The service pipe is connected to the distribution main in the street by means of a T-piece (on small-diameter pipes), a special insert piece (ferrule) or a saddle (on larger-size secondary pipes). A special insert piece is mostly used for cast iron and ductile iron pipes [19]. 2.1.5.3 Water Distribution Pressure Pressure is defined as the force (F) exerted per unit area (A), i.e. P = F/A. There are basically two types of water pressures [12], i.e.; Static and dynamic water pressure. 2.1.5.3.1 Static Water Pressure Static water pressure is the pressure in the system when water is not flowing. It is an indication of the potential pressure available to the system. This pressure is produced by [12]: a) Placing the water at an elevation above the location of water use (for example, in an elevated reservoir; b) Imparting energy to the water through a pump; and c) Air pressure in hydro-pneumatic tanks
  • 20. 13 2.1.5.3.2 Dynamic Water Pressure The dynamic water pressure is the pressure at any particular point with a given quantity of water flowing past that point. Dynamic pressure differs from static pressure in that it varies throughout the system due to the friction losses during the transport of water [12]. 2.1.5.3.3 Loss of Pressure A pressure-loss event occurs when pressure in the water distribution system drops significantly below normal [20]. These events may be planned or unplanned and they can happen at any time, day or night. For example, system operators may intentionally reduce pressure in the distribution system when they install, replace, or repair water lines. Broken water mains, failed pumping systems, power outages, leaking storage reservoirs, and high demand, such as fire flow, can cause unplanned pressure loss within parts of the distribution system, or throughout the system [20]. The pressure criterion is dependent on topographic conditions, availability of water at the source and overall condition of the pipes [19]. 2.1.5.3.4 Remedies to Loss of water distribution pressure. Water distribution pressure can be maintained by; a) Ensuring that reservoirs are full of water at all times b) Avoiding cases that affect the overall condition of the pipes such as leaks, debris, illegal connections on the distribution lines [19]. c) Control of surges through controlling the rate of switching pumps to make the change in flow gradual, so that the network can absorb the effect of the change in flow. d) Use of Gate valves to control pressure depending on the need. 2.1.5.3.5 Maintaining Pressure Up-hill and down hill At an average height of about 120 feet, water towers can properly pressurize the water distribution pipes within a ‘pressure zone.’ A water pressure zone is a geographic section of a water distribution network. A pressure zone is determined by the elevation of the area served. Within a pressure zone, a maximum pressure is established by pumping stations or reservoirs. Water does not flow between pressure zones unless it flows from a higher pressure zone to a lower pressure zone, though a pressure reducing valve [21]. Pressure reducing valves may be added within a pressure zone to create what is called a ‘pressure district.’ Water systems strive to deliver water to the customer at a pressure between 40 and 80 psi, because higher pressures increase the chance for aging pipes and fittings to leak. If the
  • 21. 14 pressure of the distribution system cannot be reduced, pressure reducing valves must be added to customer lines. Gate valves are used in high-pressure locations, such as on the outlet side of water storage tanks and water towers. Gate valves are either open or closed; they do not regulate the flow of water and are non-adjustable [21]. 2.2 Existing systems 2.2.1 Main metering This involves measuring the water that is supplied to a given network segment. At the end of the month, the total volume of water supplied to that area will be compared to the total sum of volumes from the individual meters and if the values overlap negatively, then theft is detected hence can be investigated. This system was initiated by The Japan International Cooperation Agency (JICA) and has been implemented in Yangon City. The installation of these meters was started under a program called Technical Transfer Program that was aimed at installing 300 new water meters at 280 households and schools and monasteries. These meters have the capacity to record water usage in a wider area [22]. 2.2.1.1 Challenges, Limitations, and Weaknesses of Main Metering It can compare the total water supply to a given area and compare with the consumption on individual meters. The challenge with this system is that it cannot alert the authorities in case of water theft and it is very expensive to afford. 2.2.2 E-coder solid state absolute Encoder. ARB Mobile, utilities have the ability to detect cut-wire situations at the register should a customer try to sever the connection to prevent recording of consumption. Instead of the usual numerical reading, the E-Coder or its sister, the ProRead, displays a series of colons (::::::) when the connection is lost between the register and remote device. Without this diagnostic message, cut-wire conditions could potentially go undetected for extended periods of time. Reverse flow tampering can be caught quickly by the E-Coder's reverse flow flag. Utility personnel can track every meter in the system showing reverse flow as well as the number of days the condition has been present and water theft can be caught and stopped more quickly [23].
  • 22. 15 2.2.2.1 Challenges, Limitations, and Weaknesses of E-coder solid state absolute Encoder Though trying to fight water theft, this system has the following limitations. a) Its accuracy is not guaranteed. b) May not detect an illegal connection. c) It is very expensive. 2.2.3 Prepaid metering system. With prepaid metering, the consumer is in control of their own water usage, as they decide how much water to purchase. The Elster Kent prepaid metering solution ensures that the consumer can budget for their water bill. At any time the system that has been installed on the consumer’s own property shows how much credit is on the meter and how much has been used. Prepaid domestic water dispenser is designed for individual households, to control the dispensing of prepaid quantities of water. It uses simple technology with three components; a card, an Internal Unit and a meter. The system comprises three main components, which include the electronic module, latching valve and water meter with pulse output. It is a multi-tier step tariff system, which monitors the monthly consumption of the consumer, and charges them according to the appropriate tariff. A monthly consumption profile is generated, which in turn is loaded back onto the token. This profile is uploaded to the management system the next time the consumer purchases credit. The management system also caters for a multitude of reports that can be generated and used by water services authorities. The system comes with tamper switches which prevent tampering from unauthorized persons. Any tampering with the system results in the switch being activated and water is then shut-off [24]. 2.2.3.1 Challenges, Limitations, and Weaknesses of Prepaid Metering System With the introduction of prepaid meters in Uganda and other parts of the world, water theft has to a certain extent been reduced because of their capacity to do the following.  Encourages Water Consumption Control  Shows Current credit and the corresponding water left  Customer can see current and past consumption  Identification of leaks  Smart Card – Simplicity  Emergency Water – Flexibility
  • 23. 16 However, the following are the limitations of this system. a) Since a customer pays in advance for the amount of water he/she requires in a given period of time, vandalism is reduced. However, this does not guarantee the end of practices such as Meter by pass. b) Network challenges may limit the efficiency of remote access to the data saved on the prepaid meter. c) These meters are very expensive, one is estimated at 1.5million shillings making it hard to deploy them throughout the country and that is why prepaid meters are only found in a few areas in Kampala. d) A prepaid meter may also not be able to detect illegal connections. e) Cannot detect water theft such as meter bypass, Meter reversals, meter tampering. The readings can still be manipulated. d) It cannot alert the authorities in case of meter tampering. 2.2.4 Physical Monitoring system. Here, there are basically physical methods of detecting water theft. These methods are currently employed in NWSC to identify piped water theft. a) Detection of meter bypass The following steps are currently being used to identify and investigate a meter by pass 1. Close the stop cock, feel the pipe just before the meter, if there is a vibration in the pipe, then there is reason to suspect a meter by pass as water flow induces a vibration in the pipe. 2. Check the water tank; press the ball valve down to see if there is water inflow. No water is expected to reach the roof tank once the stop cork is closed. Presence of water implies that there is a meter by pass 3. Close off the distribution lines from the tank and check taps in the house. No water is expected, presence of water implies that there is a by-pass. Note however that when these taps are opened there may be back flow from the pipe between the tank and the tap for about 1 minute. 4. Now reverse the above process, Open all the lines to ensure full water supply, on doing this all taps should be receiving water. If there is any tap that does not receive water it is very likely that it is an illegal line (it implies that a gate valve has been closed).
  • 24. 17 5. Now check if the direct lines (commonly the garden tap and or the kitchen line) still receive water. 6. At this stage we do not expect any water at any tap at all. 7. Reverse the process and check the taps which don’t have water. Note that all taps should be having water after opening the taps. If there is a tap without water, it implies that a control valve has been closed [18]. b) Illegal Connections and reconnections To identify this theft, the Community is involved in reporting water theft. The police is also involved in investigations of a suspect [18]. c) Fetching before the meter Make a list of customers whose consumption is inconsistent and those whose consumption is too low. Fetching before the meter is common in the evening and during the week ends when the customers do not expect the service provider to visit them at all. So revisit these customers at the appropriate time [18]. d) Meter reversals Ensure that arrows on the meter point in the direction of flow; otherwise it implies that the meter has been reversed. The position of the stop cork also suggests the direction of flow. Conventionally, the stop cork is at the upstream part of the flow direction (Before the meter). Another indicator of a meter reversal is a lower reading than previous reading. Figure 3 shows a typical flow chart of the steps to take when identifying an illegal connection or meter by pass. Another way of identifying these cases is through sampling meter readings (meter reading audits). Pick on a set of customers and monitor their customer meter readings several times through the month. Once a reduction is noticed this should be reported as an illegal case of meter reversal [18]. e) Meter Tampering Physical marks are used to suspect meter tampering. Signs of a meter that has been tampered with include:  A shiny body of water meter implying that it is being held every now and then.  Loose fittings at the meter connection, implying that the fittings are opened so often an evidence of leaking at the fittings.  Pipe wrench marks on the fittings.
  • 25. 18 2.2.4.1 Challenges, Limitations, and Weaknesses of Physical Monitoring System. This method of theft detection has a number of limitations. They include; a) It has so many assumptions that may not satisfactorily aid in theft detection. b) Some methods that involve going to the consumers’ premises before detecting theft may not totally work because no consumer is so stupid to wait until he/she is captured before they can put things back rightly. c) In some cases where police and community are entrusted, the chances of detecting theft are too low since most people are very corrupt. 2.3 The proposed GSM based piped water theft detection system 2.3.1 Functionality of the Proposed System Once implemented, the system will be deployed at the branch point of the water distribution network to every consumer’s home. It will take record of the water usage towards that line. It will also detect illegal connections and “T-Junction connections” on the line and alert the authorities via an SMS. 2.3.2 Strengths of the proposed system 1. It can remotely alert the authorities of any theft immediately it occurs. 2. This system is able to store the quantity of water supplied to every individual consumer in that even if the consumer manipulates, tampers, bypasses the physical meter (current meters being used), the system will still keep the right records hence at the end of the day, when the actual volume on the system is compared with the value on the consumer meter, theft will be detected so long as they do not correlate. 3. Its unit cost will be low once implemented. 4. This system can be programmed to work in any water distribution system with any flow rate. 2.3.3 Technologies in the proposed system The proposed system will basically utilize the GSM technology 2.3.3.1 GSM Technology. GSM makes use of two principles. The first called Time division Multiplex (TDMA) where radio frequency say 890 MHz is shared by different users in time. The second principle that
  • 26. 19 GSM uses is Frequency Division Multiplex (FDMA) where multiple users use different frequencies for their respective communications. Advantages of GSM 1. Low cost entry handsets 2. Wide choice and availability of handsets 3. International roaming 4. Easy subscription
  • 27. 20 CHAPTER THREE: METHODOLOGY 3.0 Introduction This chapter describes the different techniques and tools that shall be used to achieve the objectives stated in chapter one in order to design and develop a GSM based piped water theft detection system. These techniques include; Data collection techniques, System design and implementation, testing and Evaluation. Finding the appropriate research methodologies is very critical in drawing up model solutions/systems to identified problems [25]. 3.1 Requirements Elicitation This section is the most important stage in the proposed system development because it acts as the foundation study and determines the requirements necessary for coming up with the system. This will involve the process of gathering information about the system to be developed and existing systems, and later determining the user and system requirements from this information. An understanding of the principles of the GSM based piped water theft identification will be used to determine some requirements of the system. 3.1.1 Data collection methods The Major methods of data collection that shall be used include; Documentary Review, and Interviews. 3.1.1.1 Documentary Review Various documentations shall be reviewed. This involves reading of documentaries whose major source is the internet and other documentaries such as text books, and other related research papers. The advantages of this method are; a) Internet is readily available b) It is not very expensive. 3.1.1.2 Interview: This will involve mainly the Engineers of NWSC and other resourceful persons. 3.1.1.3 Observation This will involve visiting sites of NWSC to ascertain the existence of water theft in the distribution networks and how the management has tried to solve the problem so far.
  • 28. 21 3.1.2 Data Analysis Data analysis is a means of making sense of data before presenting it in an understandable manner. “The purpose of data analysis is to organize, provide structure to, and elicit meaning from research data” [26] hence data analysis helps in generating a list of requirements. The data will be collected and then analyzed basing on the objectives specified in this proposal. 3.2 System Design The design of GSM based piped water theft detection system will be composed of the circuit design, software design and finally the integrated system design. 3.2.1 Circuit design The circuit design shall be designed in proteus. The block diagram below will help in the design. 3.2.1.1 Block Diagram Figure 3: Block diagram of the proposed system 3.2.2 Software Design The code shall be written in Arduino 1.5.6 –r2. The block diagram below will guide in the software design.
  • 29. 22 3.2.2.1 Flow Chart Figure 4: Flow Chart of the proposed system 3.2.3 Integrated System design The software and circuit designs will be integrated to come up with the entire system. 3.3 Implementation 3.3.1 Implementation tools A number of tools will be employed in the implementation which will range from both hardware development tools to software development tools. 3.3.1.1 Hardware The prototype of this System will have the resources as listed. - ATmega644P chip for Arduino. - GSM module
  • 30. 23 - Electronic components (Diodes, capacitors, resistors and transistors). Different components will be used mainly to regulate and direct rightful amounts of current in the system. - Electrical equipments (Soldering gun, soldering wires, multimeters) - 40x2 Alphanumeric LCD-Liquid Crystal Display - Water motor pump - Plastic water pipe - Head on tank - Two water flow rate sensors - Bread board and a PCB will both used for holding and housing the system components - Timer 3.3.1.2 Software - Proteus simulation software - Arduino 1.5.6 –r2 - VSM studio. 3.4 Testing and Validation In order to construct a working system, testing will be done at different stages of the system's development using the techniques below: 3.4.1 Unit testing This will involve testing different individual units of hardware components to determine whether they are fit for use. It will also involve testing the pieces of code to ensure that they work as expected. 3.4.2 Integration testing The different components will be brought together and tested for inter-component communication. This will help to find out if the different integrated components give the expected outputs for the respective inputs 3.4.3 Front-end testing This will be carried out after system completion to ensure that the system is able to perform the required functional requirements. This will be aimed to seeing that the system communicates effectively and ensuring that any form of water theft is detected and an alert message sent to the authorities.
  • 31. 24 REFERENCES [1] H. A. Gaikwad and P. V. G. Puranik, "Automated urban water supply system and theft identification," International Journal of Electronics and Communication Engineering & Technology (IJECET), pp. Volume 6, Issue 6, June 2015. [2] J. THARANYAA, A.JAGADEESAN and A.LAVANYA, "THEFT IDENTIFICATION AND AUTOMATED WATER SUPPLY SYSTEM USING EMBEDDED TECHNOLOGY," International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. Vol.2, no. Issue 8, p. 3727, August, 2013. [3] P. D. B. Madihalli and P. S. S. Ittannavar, "Smart Water Supply Management," International Journal of Emerging Trends in Electrical and Electronics (IJETEE – ISSN: 2320-9569), vol. Vol. 10, no. Issue. 9, pp. 77-79, October, 2014. [4] "Automated Drinking Water Supply System and Theft Identification Using Embedded Technology," International Journal of Innovative Research in Computer and Communication Engineering, IJIRCCE, vol. Vol. 3, no. Issue. 3, pp. 2267-2272, March, 2015. [5] "National Water and Sewerage Corporation," February 2014. [Online]. Available: http:www.nwsc.com. [Accessed October 2015]. [6] V. Felbab-Brown, "Brookings," Brookings Mountain West Lecture Series, University of Nevada, Las Vegas, 20 February 2015. [Online]. [Accessed October 2015]. [7] "Littlegate publishing," National Water and Sewerage Corporation (NWSC), 01 April 2015. [Online]. Available: http://www.littlegatepublishing.com. [Accessed October 2015]. [8] A. Kyotalengerire, Kampala: New Vision, September 15, 2015. [9] Dictionary.com, Dictionary.com, 2015. [10] P. I. SHAHROUR, "Sustainable and Smart City," Lillel University, February 2014. [Online]. Available: http://www.lillel.fr.com. [Accessed 2015].
  • 32. 25 [11] "Introduction to flow measurement," Omega, 2014. [Online]. [Accessed 2015]. [12] BENIGNO. S. AQUINO. III, Design Manual, Water Partnership Program, Rural water Supply, Vol. 1, Manila, Philipines, February, 2012. [13] " Flow meters," Omega, 2014. [Online]. [Accessed 2015]. [14] U. S. E. P. Agency, Control and Mitigation of Drinking Water Losses in Distribution Systems, EPA 816-R-10-019, November, 2010. [15] Zane. Satterfield and E. S. P.E and Vipin Bhardwaj, "Tech Brief, Water Meters," vol. Vol. 4, no. Issue. 2, Summer 2004. [16] Zane. Satterfield and P. E. Vipin Bhardwaj, Water Meters, National Environmental Services Center, 2014. [17] Board of Water and Sewer Charge Review (BWSCR), Water Service Rules and Regulations, City of Dayton. [18] United Nations Human Settlements Programme (UN Habitat), Reduction of Illegal Water, Nairobi, 2012. [19] N. Trifunovic, Water Distribution, 2010. [20] Washington State Department of Health, Environmental Public Health Office of Drinking Water, June, 2014. DOH 331-338. [21] THE MOLITOR, "Underspance," 22 October 2012. [Online]. Available: http://underspace.com. [Accessed Thursday November 2015]. [22] Z. Nyein, "myanmar, Japan International Cooperation Agency (JICA) to help Yangon City Development Committee (YCDC) Battle Water theft, Vol. 3, Issue 7," 11 February 2015. [Online]. Available: http:// www.myanmar.com. [Accessed October 2015]. [23] W. World, Advanced Detection of Unauthorized Water Use through Radio Frequency
  • 33. 26 AMR/AMI Systems., 2014. [24] "Elstermetering," Elster Metering, 2015. [Online]. Available: http/:elstermetering.com. [25] Polit D.F. & Hunglar B.P. (1999). Nursing Research: Principles and Methods. 6th Edition. Lipponcott Williams and Wilkins. NY, USA. [26] Polit D.F and Beck C.T.(2008). Nursing Research: Generating and Assessing Evidence for Nursing Practice. 8th Edition. Lipponcott Williams and Wilkins. NY, USA.
  • 34. 27 APPENDICES A.1 Tentative projective schedule N0. Activity Period 2015 2016 Aug Sept Oct Nov Dec Jan Feb Mar Apr May 1. Title identification 2. Problem identification 3. Preparation of project proposal 4. Proposal presentation 5. Research, literature review and requirements elicitation 6. System design and implementation 7. System testing and validation 8. Preparation of Project report 9. Project Presentation 10. Final Submission of project report Table 2: Showing time frame for the proposed project A.2 Proposed budget No. Item Quantity Unit Cost Total Cost 1. Microcontrollers 1 250,000/= 250,000/= 2. GSM Module 1 350,000/= 350,000/= 3. Buzzer alarm 1 10000/= 10,000/= 4. Flow rate sensors 2 50,000/= 50,000/= 5. Suction Pump (Motor) 1 500,000/= 500,000/= 6. Water pipe (plastic) 1 20,000/= 20,000/= 7. Head on tank 1 30,000/= 30,000/= 8. LCD 1 50,000/= 50,000/= 4. Electronic components 1 50000/= 50,000/= 5. Timer 1 10,000/= 10,000/= 6. Stationary 50,000/= 50,000/= 7. Airtime 50000 50,000/= 8. Transport 150,000/= 150,000/= 9. Internet costs 30,000/= 30,000 10. Miscellaneous 100,000/= 100,000/= Total 1,700,000/= Table 3: Showing the proposed budget
  • 35. 28 A.3 Sample interview guiding questions 1) Your mandate as National Water and Sewerage Corporation is to distribute and deliver clean water to people in the areas entrusted to you, what stages are undertaken to deliver water to the final consumer? 2) What is the significance of each of these stages in water distribution? 3) How do you ensure constant supply of water to the consumers? 4) It is stated by a number of professors in the world that piped water in town areas is distributed at a constant flow rate, how do you archive this? 5) Then, what is the optimum flow rate used in each of the towns here in Uganda? 6) For water to be delivered to the consumers, there is need for a given distribution pressure to be maintained, how do you archive this? 7) What are the types of pipes used in water distribution here in Uganda? Why these types? 8) What distribution network is best suitable for water distribution here in Uganda? 9) What are some of the technical challenges you face in the water distribution networks? 10) What remedies have you so far undertaken to curb these challenges? 11) What is the economic value of each of these remedies stated in (11) above? 12) What future plans do you have towards solving the challenges mentioned in (10) above?