گروه مطالعاتی فنی مهندسی و سرمایه گذاری امپا ( امکان سنجی پروژه های اقتصادی) ایده ها و طرح های تجاری شما را با مشارکت شما و اطلاعات مالی موجود با استفاده از نرم افزار کامفار (مدل کامپیوتری برای تجزیه و تحلیل امکان سنجی و گزارش گیری) مورد بررسی و تحلیل قرار می دهد و شما با استفاده از اطلاعات ارائه شده می توانید شناخت بهتری نسبت به پروژه اقتصادی خود داشته باشید
https://comfar-project.ir/
گروه مطالعاتی فنی مهندسی و سرمایه گذاری امپا ( امکان سنجی پروژه های اقتصادی) ایده ها و طرح های تجاری شما را با مشارکت شما و اطلاعات مالی موجود با استفاده از نرم افزار کامفار (مدل کامپیوتری برای تجزیه و تحلیل امکان سنجی و گزارش گیری) مورد بررسی و تحلیل قرار می دهد و شما با استفاده از اطلاعات ارائه شده می توانید شناخت بهتری نسبت به پروژه اقتصادی خود داشته باشید
https://comfar-project.ir/
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Fyp proposal-GSM based piped water theft detection by Khabusi Simon Peter
1. BUSITEMA UNIVERSITY
FACULTY OF ENGINEERING
DEPARTMENT OF COMPUTER ENGINEERING
FINAL YEAR PROJECT PROPOSAL
GSM BASED PIPED WATER THEFT DETECTION SYSTEM
BY
KHABUSI SIMON PETER
REG No: BU/UG/2012/67
Email: simonkhabusi@gmail.com
Tel: +256 774 576 410
SUPERVISOR: MR. ALUNYU ANDREW
A PROJECT PROPOSAL SUBMITTED TO THE DEPARTMENT OF
COMPUTER ENGINEERING IN PARTIAL FULFILMENT OF THE
REQUIREMENTS FOR THE AWARD OF A BACHELOR OF COMPUTER
ENGINEERING OF BUSITEMA UNIVERSITY
November, 2015
2. ii
DECLARATION
I, KHABUSI SIMON PETER BU/UG/2012/67 hereby declare that this project proposal is my
original work except where explicit citation has been made and it has not been presented to any
Institution of higher learning for any academic award.
Signature: ………………………
Date: ……………………………
3. iii
APPROVAL
This is to certify that the project proposal under the title “GSM based piped water theft detection
system” has been done under my supervision and is now ready for examination
Mr. Alunyu Andrew
Department of Computer Engineering
Sign: …………………………..……
Date: ……………………………….
4. iv
LIST OF ACRONYMS
NWSC: National Water and Sewerage Corporation
WALOPU: Water Loss Prevention Unit
NRW: Non-Revenue Water
GSM: Global Systems for Mobile Communication
TDMA: Time Division Multiple Access
FDMA: Frequency Division Multiple Access
SMS: Short Message Service
LCD: Liquid Crystal Display
PCB: Printed Circuit Board
uPVC: Unplasticized Polyvinyl Chloride
µC: Microcontroller
HDPE: High density polyethylene
5. v
TABLE OF FIGURES
Figure 1: Showing Branched and Looped water distribution networks ....................................... 11
Figure 2: Showing piped water house connection........................................................................ 12
Figure 3: Block diagram of the proposed system ......................................................................... 21
Figure 4: Flow Chart of the proposed system............................................................................... 22
LIST OF TABLES
Table 1: Reflecting the advantages, disadvantages, and cost of the different water meter types... 8
Table 2: Showing time frame for the proposed project ................................................................ 27
Table 3: Showing the proposed budget......................................................................................... 27
6. vi
CONTENTS
DECLARATION............................................................................................................................ ii
APPROVAL ..................................................................................................................................iii
LIST OF ACRONYMS ................................................................................................................. iv
TABLE OF FIGURES.................................................................................................................... v
CHAPTER ONE:............................................................................................................................ 1
1.0 Introduction........................................................................................................................... 1
1.1 Background of Study........................................................................................................ 1
1.2 Problem Statement ................................................................................................................ 3
1.3 Objectives.............................................................................................................................. 3
1.3.1 Main Objective ............................................................................................................... 3
1.3.2 Specific Objectives......................................................................................................... 3
1.3 Justification and Significance................................................................................................ 3
1.4 Scope..................................................................................................................................... 4
1.4.1 Technical Scope.............................................................................................................. 4
1.4.2 Geographical Scope........................................................................................................ 4
1.4.3 Time Scope..................................................................................................................... 4
1.5 Limitations and Assumptions................................................................................................ 4
1.5.1 Limitations...................................................................................................................... 4
CHAPTER TWO: LITERATURE REVIEW................................................................................. 5
2.0 Introduction........................................................................................................................... 5
2.1 Concepts, Descriptions and Definitions:............................................................................... 5
2.1.1 Piped Water .................................................................................................................... 5
2.1.2 Flow Rate:....................................................................................................................... 5
2.1.3 Water Meter/Flow Meter................................................................................................ 6
2.1.4 Water Theft..................................................................................................................... 9
2.1.5 Water distribution........................................................................................................... 9
2.2 Existing systems.................................................................................................................. 14
7. vii
2.2.1 Main metering............................................................................................................... 14
2.2.2 E-coder solid state absolute Encoder............................................................................ 14
2.2.3 Prepaid metering system............................................................................................... 15
2.2.4 Physical Monitoring system. ........................................................................................ 16
2.3 The proposed GSM based piped water theft detection system ........................................... 18
2.3.1 Functionality of the Proposed System.......................................................................... 18
2.3.2 Strengths of the proposed system ................................................................................. 18
2.3.3 Technologies in the proposed system........................................................................... 18
CHAPTER THREE: METHODOLOGY .................................................................................... 19
3.0 Introduction......................................................................................................................... 19
3.1 Requirements Elicitation..................................................................................................... 20
3.1.1 Data collection methods ............................................................................................... 20
3.1.2 Data Analysis................................................................................................................ 21
3.2 System Design..................................................................................................................... 21
3.2.1 Circuit design................................................................................................................ 21
3.2.2 Software Design ........................................................................................................... 21
3.2.3 Integrated System design.............................................................................................. 22
3.3 Implementation.................................................................................................................... 22
3.3.1 Implementation tools.................................................................................................... 22
3.4 Testing and Validation ........................................................................................................ 23
3.4.1 Unit testing ................................................................................................................... 23
3.4.2 Integration testing......................................................................................................... 23
3.4.3 Front-end testing........................................................................................................... 23
REFERENCES ............................................................................................................................. 24
APPENDICES .............................................................................................................................. 26
A.1 Tentative projective schedule......................................................................................... 27
A.2 Proposed budget............................................................................................................. 27
A.3 Sample interview guiding questions................................................................................... 28
8. 1
CHAPTER ONE:
1.0 Introduction
This chapter gives a brief introduction of the study of the GSM based piped water theft detection
system i.e.; background, problem statement, objectives, justification/ significance and the scope
of the study.
1.1Background of Study
In urban areas, there is tremendous need of water and water distribution network plays an
important role in delivering water to individual families, offices, construction sites, etc. For the
efficient delivery of water is dependent on water flow rate, pressure of water and purity of water
but sometimes it is found that some individuals run motors to suck more water from pipelines to
drain point to serve their excessive need of water [1]. This in turn disturbs steady flow of water
which is meant to flow at a constant flow rate in town areas [2][3][4] and due to that, other
consumers in that particular area get affected because of this misuse of water. This is just one of
the ways in which people steal water. Other ways include; meter bypass, Meter tampering, Meter
reversals and vandalism [5].
A lecture given on February 20, 2015 at Brookings Mountain West Lecture Series, Vanda
Felbab-Brown explains that Water theft and smuggling are perpetrated by both the wealthy and
those who are chronically deprived of water, as she provides examples from California, southern
Europe, Nigeria, Kenya, the Middle East, and South Asia [6]. In many parts of the world,
elaborate smuggling of water with complex network chains and water mafias has emerged.
Smuggling modes vary and among others include the development of illegal pipelines, and
illegal truck deliveries.
Felbab-Brown further explains that, “For many reasons, the illegal use and delivery of water are
difficult to address [6]. Large-scale agriculture and industry often exercise great influence over
regulators and law enforcement. In slum areas, mostly unconnected to legal pipelines, the
suppression of illegal water distribution can sever access to water and hence threaten the physical
survival of the most marginalized and poor. Across the world, citizens tend to be vehemently
opposed to increased water pricing, yet without effective regulation, appropriate pricing, and
9. 2
suppression of water crimes, the sustainability, long-term viability, and inclusive and equitable
use of water cannot easily be achieved [6].”
National Water and Sewerage Cooperation, (NWSC), a Public Utility Company, completely
owned by the Government of Uganda, established in 1972, with the mandate to operate and
provide water and sewerage services in the areas entrusted to it, on a sound commercial and
financially viable basis face a great challenge of water theft [5]. The Managing Director of
NWSC, Dr. Silver Mugisha stated that one of the biggest challenges facing most water utilities in
developing countries is the high level of Non-Revenue Water (NRW) that includes both physical
and commercial losses (mainly caused by illegal water use and water theft) [7].
A statement by Vivien Newumbe the public relations officer Kampala Water in New Vision on
15th
September, 2015, says “the National Water and Sewerage Corporation (NWSC) is facing a
challenge of water theft and increased vandalism of its water installations” [8]. She further
explained that Majority of people especially those staying in higher altitude areas are greatly
affected. Bursting a water pipe or tapping water illegally creates low pressure zones (the pressure
and volume reduce). This leads to intermittent water supply affecting the enjoyment of services
by most times paying customers. Illegal water connections are also a source of unsafe water.
“When one bursts a water pipe there is the risk of contamination as in most cases water is drawn
from the ground using cups or containers,” she said. In the same article, Agnes Kyotalengerire
reports that the problem of un-authorized water use cannot be under-estimated and its negative
impact on the operations of the corporation as a whole and Kampala water in general is obvious.
February 2012 data alone revealed that 20% of water produced is unaccounted for which greatly
affects the operations since this water is in reality lost or stolen revenue.
In this regard, Phiona Wall, the public relations officer NWSC observed that the company incurs
losses of about 30 to 35 % in uncollected revenue annually.
Despite attempts made by water supply and distribution companies to curb water theft through
use of various measures to detect water theft like indentifying meter readings that are lower than
previous readings, low consumption based on knowledge of average water consumption, refusal
of access into a property for NWSC employees to inspect water meter or water service; pro-
active community-based illegal use reduction programme through the WALOPU (Water Loss
10. 3
Prevention Unit) where the corporation partnered with the Police and community to fight illegal
water use and reduce NRW, the situation has remained alarming [5].
1.2 Problem Statement
National water and Sewerage Corporation has constantly incurred cases of water theft such as
illegal connections and reconnections, meter bypass, meter tampering, meter reversals and
vandalism. In spite of attempts such as use of police and penalties by National Water to solve
these problems, the problem of water theft has remained a big challenge in the operation of
NWSC due to lack of a dedicated system to solve this problem. Therefore, this project aims at
designing a GSM based piped water theft detection system that detects water theft and alerts the
authorities via an SMS.
1.3 Objectives
1.3.1 Main Objective
To Design and develop a piped water theft detection system that detects water theft and alerts the
authorities via an SMS.
1.3.2 Specific Objectives
i. To review existing literature and identify the requirements for the design of the GSM
based piped water theft detection system.
ii. To design a GSM Based piped water theft Detection system.
iii. To implement the designed system.
iv. To test and validate the system.
1.3 Justification and Significance
Water theft does not only affect the operation of NWSC in Uganda but also affects the quality
and quantity of water supplied to individual families, offices, institutions and construction sites.
Often times, illegal connections causes contamination of water hence increasing the risk of
contracting water born diseases by the consumers. The amount of water also supplied will reduce
due to diversions of water to unauthorized destinations and the ultimate reduction of water flow
rate hence far destinations may not be reached. This is just one of the challenges imposed by one
of the ways of water stealing. However, others such as meter bypass, meter tampering, meter
reversals and vandalism greatly affects revenue collected from water. In addition to consumer
11. 4
challenges that may arise from water theft, the operation of NWSC is compromised due to loss
of revenue. The government at the end is also affected as this water theft directly affects revenue.
Proper handling of these problems will help in solving the different challenges that may result as
mentioned above.
By the fact that water is a basic need of life, its quality and availability is very necessary in the
lives of all Ugandans. Hence proper regulation and monitoring of the water distribution networks
with the help of a dedicated system is very paramount.
1.4 Scope
1.4.1 Technical Scope
Using the identified requirements of this project, the system will be simulated in Proteus and
Arduino 1.5.6 –r2. This simulation will be implemented on a bread board with all the physical
components in the simulation. The Simulated and implemented system will be limited to
detecting theft along the water distribution lines and alerting the authorities via an SMS.
1.4.2 Geographical Scope
The system will be designed to be used along the water distribution networks in Uganda by
NWSC. If further developed, it will be deployed at the individual families, offices, institutions
and construction sites.
1.4.3 Time Scope
The review of literature and existing systems, system design, implementation, and testing and
validation will take five months from November 2015 to April 2016.
1.5 Limitations and Assumptions
1.5.1 Limitations
This system will be limited to piped water theft prevention.
12. 5
CHAPTER TWO: LITERATURE REVIEW
2.0 Introduction
Here, there is review of various methods and systems used in piped water theft detection
employed by National Water and Sewerage Cooperation and other Water Corporations in other
parts of the world. In this chapter an examination of these systems will be revealed and a
criticism of such systems as well. Lastly how my system differs from these systems and how it is
going to cover the gaps that these systems leave.
2.1 Concepts, Descriptions and Definitions:
2.1.1 Piped Water
Piped Water refers to a transparent, odorless, tasteless liquid, a compound of hydrogen and
oxygen, freezing at 32°F or 0°C and boiling at 212°F or 100°C [9]. It constitutes of rain, oceans,
lakes, rivers, etc in a more or less impure state. Water contains 11.188% hydrogen and 88.812%
oxygen, by weight distributed to different destination through pipes. In urban areas piped water
supply to residence and commercial establishments are provided at a fixed flow rate [3].
The channel used by water supply corporations to deliver water to the consumers is pipes which
are mainly of uPVC material. Other materials could be; Ductile iron, Plastic (HDPE/PVC),
Concrete, and Steel [10].
2.1.2 Flow Rate:
Flow rate refers to the quantity of fluid flowing through a pipe or channel within a given or
standard time [9].
The equation below is used to calculate flow rate [11];
Q = A x v, Where; Q is flow rate, A is the cross sectional area of the pipe, and v is the average
fluid velocity in the pipe. Putting this equation into action, the flow of a fluid traveling at an
average velocity of 1 meter per second through a pipe with a 1 square meter cross-sectional area
is 1 cubic meter per second. Note that Q is a volume per unit time, so Q is commonly denoted as
the “volumetric” flow rate.
2.1.2.1 Factors determining pipe flow rates
Hydraulics is concerned with the properties and behavior of fluids when at rest and in motion.
The factors that affect the flow of water in pipes are as follow [12]:
a) Cross sectional area of the pipe;
13. 6
b) Roughness of the pipe’s inner surface;
c) Condition and type of flow;
d) Obstructions; and
e) Energy head
2.1.3 Water Meter/Flow Meter
A flow meter is an instrument used to measure linear, nonlinear, mass or volumetric flow rate of
a liquid or a gas. When choosing flow meters, one should consider such intangible factors as
familiarity of plant personnel, their experience with calibration and maintenance, spare parts
availability, and mean time between failure history, etc., at the particular plant site [13].
Meters are very important for all aspects of the water supply operations. They make it possible to
charge customers based upon the quantities of water that they consume. They record usage and
therefore make billing fair for all customers. They can encourage conservation by making
customers aware of their usage. Selection of a meter for a given application depends on many
factors including; Meter operating principles, Debris and particle tolerance, required accuracy,
Temporary vs. permanent installation, Convenience and ease of use, Calibration and required
maintenance, Volume of flow and flow rate, Size of pipe, types of flow (laminar vs. turbulent),
Type of pipe, Range of flow, Pressure drop, Installation location and orientation, Meter
orientation, Required power, Flow obstruction tolerance, Data logging requirements, Meter
reading methods, Durability, Temperature and environment [14].
Meters are classified into two basic types: positive displacement and velocity. Each of these
meter types has variations, leading to the perception that there are several different kinds.
2.1.3.1Positive Displacement Meters
In this type of meter, a known volume of liquid in a tiny compartment moves with the flow of
water. Positive displacement flow meters operate by repeatedly filling and emptying these
compartments. The flow rate is calculated based on the number of times these compartments are
filled and emptied. The movement of a disc or piston drives an arrangement of gears that
registers and records the volume of liquid exiting the meter. There are two types of positive
displacement meters: nutating disc and piston [15].
Positive displacement meters are sensitive to low flow rates and have high accuracy over a wide
range of flow rates. Positive displacement meters are used in homes, small businesses, hotels,
and apartment complexes. They are available in sizes from 5/8” to two inches [15].
14. 7
2.1.3.2 Velocity Meters
Velocity meters operate on the principle that water passing through a known cross-sectional area
with a measured velocity can be equated into a volume of flow. Velocity meters are good for
high flow applications. Velocity meters come in different types, including turbine, multi-jet,
propeller, ultrasonic, venture, and orifice meters. These meters are available in sizes of two
inches and larger with the exception of multi-jet meters, which are between 5/8” and two inches
[16].
15. 8
Table 1: Reflecting the advantages, disadvantages, and cost of the different water meter types
Source: United States Environmental Protection Agency, Control and mitigation of drinking
water losses in distribution systems, pg 4-9 [14].
16. 9
2.1.4 Water Theft
It refers to the use of town water without the consent of the water department [18] or generally
the illegal use of water. Water theft can be in the following forms; Meter tampering, meter
reversals, illegal connections and reconnections, and meter by-pass.
2.1.4.1 Meter Tampering
Physically altering the meter or the unauthorized removal and reinstallation of the water meter
[17]. The customer intentionally corrupts the meter so as to affect its efficiency. This may
include; reducing or distorting mechanical gears, boiling meter so as to melt internal
components, breaking meter reading glass, introducing impurities, etc [18].
2.1.4.2 Meter reversals:
The customer installs the meter in reverse order so that it counts backwards to a desired reading.
When satisfied they turn the meter to the correct position. Meter reversal may entail reversing the
meter readings manually [18].
2.1.4.3 Illegal Connections and Reconnections
Illegal Connections refer to where the consumer is not even a customer to the water supply
system. They have simply connected themselves to the network. In other words, Illegal
Reconnections refer to where the customer has been disconnected for non-payment, but they go
ahead and reconnect themselves to the network [18].
2.1.4.4 Meter Bypass.
Here, the consumer is a customer, with a meter. The customer has an alternative pipe taping
water before the meter [18]. There are incidents of excess water drawing by certain
customers/users by connecting motor-pump sets to the water pipeline hence drawing more water
to them [1]. Meter bypass could take the form of disconnecting the water meter and replacing it
with a pipe or connecting a “T-Junction pipe” before the meter.
2.1.5 Water distribution
Refers to the network of water mains and related appurtenances [17]. Water distribution systems
convey water drawn from the water source or treatment facility, to the point where it is delivered
to the users. It is necessary to maintain sufficient pressure in the distribution system to protect it
against contamination by the ingress of polluted seepage water.
17. 10
Water distribution process starts with getting water from a water source and channeled to tanks
for treatment. When treatment is done, it is channeled to the supply network which delivers
water to individual families, offices, institutions, and construction sites [3]. The basic processes
in water distribution are; getting water from the source to the water tanks, water treatment, filling
the water reservoirs and finally channeling it in the distribution tanks [12].
2.1.5.1 Water Reservoirs
In small town distribution systems, whether water is obtained by gravity or by pumping,
distribution reservoirs are usually necessary for the following reasons [12]:
a) To balance the supply and demand in the system. In small distribution systems, variations
in demand may be three or more times the average hourly consumption.
b) To maintain adequate and fairly uniform pressure throughout the distribution system.
c) To avoid the total interruption of water service when repairing pipes between the source of
supply and the reservoir.
d) To allow pumps to be operated uniformly throughout the day. Such pumps may be much
smaller than would otherwise be required.
2.1.5.1.1 Terminologies
a) Minimum Water Level: The lowest water level in the tank sufficient to give the minimum
residual pressure at the remotest end of the system.
b) Maximum Water Level: Is the highest water level in the tank.
c) Working Pressure: The minimum pressure at which the system will operate.
d) Safe Working Pressure: The working pressure multiplied by a factor of safety.
2.1.5.1.2 Types of Reservoirs
Reservoirs may be classified according to their function, their relative position with respect to
the earth’s surface, manner of operation, and the type of material of construction.
a) Elevated Reservoirs
Reservoirs are constructed in elevated or hilly areas. In case of flat areas, a supporting frame or
tower is installed to support the storage tank. This is known as an elevated reservoir. Standpipes
are reservoirs with height greater than their diameter.
b) Ground Level Reservoirs
Ground level reservoirs may be made of reinforced concrete pipe, fiber glass, concrete hollow
blocks, steel or ferro-cement. These may be single ground level tanks or multiple type tanks.
18. 11
2.1.5.1.3 Operation of Reservoirs
Reservoirs may be operated on the following basis [12]:
1. Floating-on-the-Line Reservoir: Water is pumped both into the reservoir and to the
consumers; water goes up the tank when the water demand is low or if there is a residual
water supply. During peak demand, water goes to the customers directly from the source
and from the tank. This system requires fairly continuous pumping at low pumping
capacity.
2. Fill-And-Draw Reservoir: Water flows or is pumped directly into the reservoir and from
the reservoir, water supply is distributed to the consumers through gravity flow. The tank is
usually installed near the water source to minimize head losses due to friction losses. In the
fill-and-draw system, however, water is conveyed to the storage tank at high pumping
capacity at shorter time duration, and always against the maximum head [12].
2.1.5.2 Types of Distribution Systems.
Branched configuration: Branched networks are predominantly used for small-capacity
community supplies delivering the water mostly through public standpipes and having few house
connections, if any.
Looped (or “grid”) configuration: A looped network usually has a skeleton of secondary mains
that can also be in a form of branch, one loop (’ring’), or a number of loops. From there, the
water is conveyed towards the distribution pipes and further to the consumers. The secondary
mains are connected to one or more loops or rings [19].
Figure 1: Showing Branched and Looped water distribution networks
Source: Water Distribution, 2010, Page 467 [19]
19. 12
A house connection is a water service pipe connected with in-house plumbing to one or more
taps, e.g. in the kitchen and bathroom. Usually 3/8 inch (9 mm) and 1/2 inch (12 mm) taps are
used. A typical layout is shown.
Figure 2: Showing piped water house connection
Source: Water Distribution, 2010, Page 469 [19]
The service pipe is connected to the distribution main in the street by means of a T-piece (on
small-diameter pipes), a special insert piece (ferrule) or a saddle (on larger-size secondary
pipes). A special insert piece is mostly used for cast iron and ductile iron pipes [19].
2.1.5.3 Water Distribution Pressure
Pressure is defined as the force (F) exerted per unit area (A), i.e. P = F/A. There are basically
two types of water pressures [12], i.e.; Static and dynamic water pressure.
2.1.5.3.1 Static Water Pressure
Static water pressure is the pressure in the system when water is not flowing. It is an indication
of the potential pressure available to the system. This pressure is produced by [12]:
a) Placing the water at an elevation above the location of water use (for example, in an
elevated reservoir;
b) Imparting energy to the water through a pump; and
c) Air pressure in hydro-pneumatic tanks
20. 13
2.1.5.3.2 Dynamic Water Pressure
The dynamic water pressure is the pressure at any particular point with a given quantity of water
flowing past that point. Dynamic pressure differs from static pressure in that it varies throughout
the system due to the friction losses during the transport of water [12].
2.1.5.3.3 Loss of Pressure
A pressure-loss event occurs when pressure in the water distribution system drops significantly
below normal [20]. These events may be planned or unplanned and they can happen at any time,
day or night. For example, system operators may intentionally reduce pressure in the distribution
system when they install, replace, or repair water lines. Broken water mains, failed pumping
systems, power outages, leaking storage reservoirs, and high demand, such as fire flow, can
cause unplanned pressure loss within parts of the distribution system, or throughout the system
[20]. The pressure criterion is dependent on topographic conditions, availability of water at the
source and overall condition of the pipes [19].
2.1.5.3.4 Remedies to Loss of water distribution pressure.
Water distribution pressure can be maintained by;
a) Ensuring that reservoirs are full of water at all times
b) Avoiding cases that affect the overall condition of the pipes such as leaks, debris, illegal
connections on the distribution lines [19].
c) Control of surges through controlling the rate of switching pumps to make the change in
flow gradual, so that the network can absorb the effect of the change in flow.
d) Use of Gate valves to control pressure depending on the need.
2.1.5.3.5 Maintaining Pressure Up-hill and down hill
At an average height of about 120 feet, water towers can properly pressurize the water
distribution pipes within a ‘pressure zone.’ A water pressure zone is a geographic section of a
water distribution network. A pressure zone is determined by the elevation of the area served.
Within a pressure zone, a maximum pressure is established by pumping stations or reservoirs.
Water does not flow between pressure zones unless it flows from a higher pressure zone to a
lower pressure zone, though a pressure reducing valve [21].
Pressure reducing valves may be added within a pressure zone to create what is called a ‘pressure
district.’ Water systems strive to deliver water to the customer at a pressure between 40 and 80
psi, because higher pressures increase the chance for aging pipes and fittings to leak. If the
21. 14
pressure of the distribution system cannot be reduced, pressure reducing valves must be added to
customer lines. Gate valves are used in high-pressure locations, such as on the outlet side of
water storage tanks and water towers. Gate valves are either open or closed; they do not regulate
the flow of water and are non-adjustable [21].
2.2 Existing systems
2.2.1 Main metering
This involves measuring the water that is supplied to a given network segment. At the end of the
month, the total volume of water supplied to that area will be compared to the total sum of
volumes from the individual meters and if the values overlap negatively, then theft is detected
hence can be investigated. This system was initiated by The Japan International Cooperation
Agency (JICA) and has been implemented in Yangon City. The installation of these meters was
started under a program called Technical Transfer Program that was aimed at installing 300 new
water meters at 280 households and schools and monasteries. These meters have the capacity to
record water usage in a wider area [22].
2.2.1.1 Challenges, Limitations, and Weaknesses of Main Metering
It can compare the total water supply to a given area and compare with the consumption on
individual meters. The challenge with this system is that it cannot alert the authorities in case of
water theft and it is very expensive to afford.
2.2.2 E-coder solid state absolute Encoder.
ARB Mobile, utilities have the ability to detect cut-wire situations at the register should a
customer try to sever the connection to prevent recording of consumption. Instead of the usual
numerical reading, the E-Coder or its sister, the ProRead, displays a series of colons (::::::) when
the connection is lost between the register and remote device. Without this diagnostic message,
cut-wire conditions could potentially go undetected for extended periods of time. Reverse flow
tampering can be caught quickly by the E-Coder's reverse flow flag. Utility personnel can track
every meter in the system showing reverse flow as well as the number of days the condition has
been present and water theft can be caught and stopped more quickly [23].
22. 15
2.2.2.1 Challenges, Limitations, and Weaknesses of E-coder solid state absolute Encoder
Though trying to fight water theft, this system has the following limitations.
a) Its accuracy is not guaranteed.
b) May not detect an illegal connection.
c) It is very expensive.
2.2.3 Prepaid metering system.
With prepaid metering, the consumer is in control of their own water usage, as they decide how
much water to purchase. The Elster Kent prepaid metering solution ensures that the consumer
can budget for their water bill. At any time the system that has been installed on the consumer’s
own property shows how much credit is on the meter and how much has been used.
Prepaid domestic water dispenser is designed for individual households, to control the dispensing
of prepaid quantities of water. It uses simple technology with three components; a card, an
Internal Unit and a meter. The system comprises three main components, which include the
electronic module, latching valve and water meter with pulse output.
It is a multi-tier step tariff system, which monitors the monthly consumption of the consumer,
and charges them according to the appropriate tariff. A monthly consumption profile is
generated, which in turn is loaded back onto the token. This profile is uploaded to the
management system the next time the consumer purchases credit. The management system also
caters for a multitude of reports that can be generated and used by water services authorities. The
system comes with tamper switches which prevent tampering from unauthorized persons. Any
tampering with the system results in the switch being activated and water is then shut-off [24].
2.2.3.1 Challenges, Limitations, and Weaknesses of Prepaid Metering System
With the introduction of prepaid meters in Uganda and other parts of the world, water theft has to
a certain extent been reduced because of their capacity to do the following.
Encourages Water Consumption Control
Shows Current credit and the corresponding water left
Customer can see current and past consumption
Identification of leaks
Smart Card – Simplicity
Emergency Water – Flexibility
23. 16
However, the following are the limitations of this system.
a) Since a customer pays in advance for the amount of water he/she requires in a given
period of time, vandalism is reduced. However, this does not guarantee the end of
practices such as Meter by pass.
b) Network challenges may limit the efficiency of remote access to the data saved on the
prepaid meter.
c) These meters are very expensive, one is estimated at 1.5million shillings making it hard
to deploy them throughout the country and that is why prepaid meters are only found in a
few areas in Kampala.
d) A prepaid meter may also not be able to detect illegal connections.
e) Cannot detect water theft such as meter bypass, Meter reversals, meter tampering. The
readings can still be manipulated.
d) It cannot alert the authorities in case of meter tampering.
2.2.4 Physical Monitoring system.
Here, there are basically physical methods of detecting water theft. These methods are currently
employed in NWSC to identify piped water theft.
a) Detection of meter bypass
The following steps are currently being used to identify and investigate a meter by pass
1. Close the stop cock, feel the pipe just before the meter, if there is a vibration in the pipe, then
there is reason to suspect a meter by pass as water flow induces a vibration in the pipe.
2. Check the water tank; press the ball valve down to see if there is water inflow. No water is
expected to reach the roof tank once the stop cork is closed. Presence of water implies that
there is a meter by pass
3. Close off the distribution lines from the tank and check taps in the house. No water is
expected, presence of water implies that there is a by-pass. Note however that when these
taps are opened there may be back flow from the pipe between the tank and the tap for
about 1 minute.
4. Now reverse the above process, Open all the lines to ensure full water supply, on doing this
all taps should be receiving water. If there is any tap that does not receive water it is very
likely that it is an illegal line (it implies that a gate valve has been closed).
24. 17
5. Now check if the direct lines (commonly the garden tap and or the kitchen line) still receive
water.
6. At this stage we do not expect any water at any tap at all.
7. Reverse the process and check the taps which don’t have water. Note that all taps should be
having water after opening the taps. If there is a tap without water, it implies that a control
valve has been closed [18].
b) Illegal Connections and reconnections
To identify this theft, the Community is involved in reporting water theft. The police is also
involved in investigations of a suspect [18].
c) Fetching before the meter
Make a list of customers whose consumption is inconsistent and those whose consumption is too
low. Fetching before the meter is common in the evening and during the week ends when the
customers do not expect the service provider to visit them at all. So revisit these customers at the
appropriate time [18].
d) Meter reversals
Ensure that arrows on the meter point in the direction of flow; otherwise it implies that the meter
has been reversed. The position of the stop cork also suggests the direction of flow.
Conventionally, the stop cork is at the upstream part of the flow direction (Before the meter).
Another indicator of a meter reversal is a lower reading than previous reading. Figure 3 shows a
typical flow chart of the steps to take when identifying an illegal connection or meter by pass.
Another way of identifying these cases is through sampling meter readings (meter reading
audits). Pick on a set of customers and monitor their customer meter readings several times
through the month. Once a reduction is noticed this should be reported as an illegal case of meter
reversal [18].
e) Meter Tampering
Physical marks are used to suspect meter tampering. Signs of a meter that has been tampered
with include:
A shiny body of water meter implying that it is being held every now and then.
Loose fittings at the meter connection, implying that the fittings are opened so often
an evidence of leaking at the fittings.
Pipe wrench marks on the fittings.
25. 18
2.2.4.1 Challenges, Limitations, and Weaknesses of Physical Monitoring System.
This method of theft detection has a number of limitations. They include;
a) It has so many assumptions that may not satisfactorily aid in theft detection.
b) Some methods that involve going to the consumers’ premises before detecting theft may
not totally work because no consumer is so stupid to wait until he/she is captured before
they can put things back rightly.
c) In some cases where police and community are entrusted, the chances of detecting theft
are too low since most people are very corrupt.
2.3 The proposed GSM based piped water theft detection system
2.3.1 Functionality of the Proposed System
Once implemented, the system will be deployed at the branch point of the water distribution
network to every consumer’s home. It will take record of the water usage towards that line. It
will also detect illegal connections and “T-Junction connections” on the line and alert the
authorities via an SMS.
2.3.2 Strengths of the proposed system
1. It can remotely alert the authorities of any theft immediately it occurs.
2. This system is able to store the quantity of water supplied to every individual consumer in
that even if the consumer manipulates, tampers, bypasses the physical meter (current
meters being used), the system will still keep the right records hence at the end of the day,
when the actual volume on the system is compared with the value on the consumer meter,
theft will be detected so long as they do not correlate.
3. Its unit cost will be low once implemented.
4. This system can be programmed to work in any water distribution system with any flow
rate.
2.3.3 Technologies in the proposed system
The proposed system will basically utilize the GSM technology
2.3.3.1 GSM Technology.
GSM makes use of two principles. The first called Time division Multiplex (TDMA) where
radio frequency say 890 MHz is shared by different users in time. The second principle that
26. 19
GSM uses is Frequency Division Multiplex (FDMA) where multiple users use different
frequencies for their respective communications.
Advantages of GSM
1. Low cost entry handsets
2. Wide choice and availability of handsets
3. International roaming
4. Easy subscription
27. 20
CHAPTER THREE: METHODOLOGY
3.0 Introduction
This chapter describes the different techniques and tools that shall be used to achieve the
objectives stated in chapter one in order to design and develop a GSM based piped water theft
detection system. These techniques include; Data collection techniques, System design and
implementation, testing and Evaluation. Finding the appropriate research methodologies is very
critical in drawing up model solutions/systems to identified problems [25].
3.1 Requirements Elicitation
This section is the most important stage in the proposed system development because it acts as
the foundation study and determines the requirements necessary for coming up with the system.
This will involve the process of gathering information about the system to be developed and
existing systems, and later determining the user and system requirements from this information.
An understanding of the principles of the GSM based piped water theft identification will be
used to determine some requirements of the system.
3.1.1 Data collection methods
The Major methods of data collection that shall be used include; Documentary Review, and
Interviews.
3.1.1.1 Documentary Review
Various documentations shall be reviewed. This involves reading of documentaries whose major
source is the internet and other documentaries such as text books, and other related research
papers. The advantages of this method are;
a) Internet is readily available
b) It is not very expensive.
3.1.1.2 Interview:
This will involve mainly the Engineers of NWSC and other resourceful persons.
3.1.1.3 Observation
This will involve visiting sites of NWSC to ascertain the existence of water theft in the
distribution networks and how the management has tried to solve the problem so far.
28. 21
3.1.2 Data Analysis
Data analysis is a means of making sense of data before presenting it in an understandable
manner. “The purpose of data analysis is to organize, provide structure to, and elicit meaning
from research data” [26] hence data analysis helps in generating a list of requirements. The data
will be collected and then analyzed basing on the objectives specified in this proposal.
3.2 System Design
The design of GSM based piped water theft detection system will be composed of the circuit design,
software design and finally the integrated system design.
3.2.1 Circuit design
The circuit design shall be designed in proteus. The block diagram below will help in the design.
3.2.1.1 Block Diagram
Figure 3: Block diagram of the proposed system
3.2.2 Software Design
The code shall be written in Arduino 1.5.6 –r2. The block diagram below will guide in the
software design.
29. 22
3.2.2.1 Flow Chart
Figure 4: Flow Chart of the proposed system
3.2.3 Integrated System design
The software and circuit designs will be integrated to come up with the entire system.
3.3 Implementation
3.3.1 Implementation tools
A number of tools will be employed in the implementation which will range from both hardware
development tools to software development tools.
3.3.1.1 Hardware
The prototype of this System will have the resources as listed.
- ATmega644P chip for Arduino.
- GSM module
30. 23
- Electronic components (Diodes, capacitors, resistors and transistors). Different components
will be used mainly to regulate and direct rightful amounts of current in the system.
- Electrical equipments (Soldering gun, soldering wires, multimeters)
- 40x2 Alphanumeric LCD-Liquid Crystal Display
- Water motor pump
- Plastic water pipe
- Head on tank
- Two water flow rate sensors
- Bread board and a PCB will both used for holding and housing the system components
- Timer
3.3.1.2 Software
- Proteus simulation software
- Arduino 1.5.6 –r2
- VSM studio.
3.4 Testing and Validation
In order to construct a working system, testing will be done at different stages of the system's
development using the techniques below:
3.4.1 Unit testing
This will involve testing different individual units of hardware components to determine whether
they are fit for use. It will also involve testing the pieces of code to ensure that they work as
expected.
3.4.2 Integration testing
The different components will be brought together and tested for inter-component
communication. This will help to find out if the different integrated components give the
expected outputs for the respective inputs
3.4.3 Front-end testing
This will be carried out after system completion to ensure that the system is able to perform the
required functional requirements. This will be aimed to seeing that the system communicates
effectively and ensuring that any form of water theft is detected and an alert message sent to the
authorities.
31. 24
REFERENCES
[1] H. A. Gaikwad and P. V. G. Puranik, "Automated urban water supply system and theft
identification," International Journal of Electronics and Communication Engineering &
Technology (IJECET), pp. Volume 6, Issue 6, June 2015.
[2] J. THARANYAA, A.JAGADEESAN and A.LAVANYA, "THEFT IDENTIFICATION
AND AUTOMATED WATER SUPPLY SYSTEM USING EMBEDDED
TECHNOLOGY," International Journal of Advanced Research in Electrical, Electronics
and Instrumentation Engineering, vol. Vol.2, no. Issue 8, p. 3727, August, 2013.
[3] P. D. B. Madihalli and P. S. S. Ittannavar, "Smart Water Supply Management,"
International Journal of Emerging Trends in Electrical and Electronics (IJETEE – ISSN:
2320-9569), vol. Vol. 10, no. Issue. 9, pp. 77-79, October, 2014.
[4] "Automated Drinking Water Supply System and Theft Identification Using Embedded
Technology," International Journal of Innovative Research in Computer and
Communication Engineering, IJIRCCE, vol. Vol. 3, no. Issue. 3, pp. 2267-2272, March,
2015.
[5] "National Water and Sewerage Corporation," February 2014. [Online]. Available:
http:www.nwsc.com. [Accessed October 2015].
[6] V. Felbab-Brown, "Brookings," Brookings Mountain West Lecture Series, University of
Nevada, Las Vegas, 20 February 2015. [Online]. [Accessed October 2015].
[7] "Littlegate publishing," National Water and Sewerage Corporation (NWSC), 01 April 2015.
[Online]. Available: http://www.littlegatepublishing.com. [Accessed October 2015].
[8] A. Kyotalengerire, Kampala: New Vision, September 15, 2015.
[9] Dictionary.com, Dictionary.com, 2015.
[10] P. I. SHAHROUR, "Sustainable and Smart City," Lillel University, February 2014.
[Online]. Available: http://www.lillel.fr.com. [Accessed 2015].
32. 25
[11] "Introduction to flow measurement," Omega, 2014. [Online]. [Accessed 2015].
[12] BENIGNO. S. AQUINO. III, Design Manual, Water Partnership Program, Rural water
Supply, Vol. 1, Manila, Philipines, February, 2012.
[13] " Flow meters," Omega, 2014. [Online]. [Accessed 2015].
[14] U. S. E. P. Agency, Control and Mitigation of Drinking Water Losses in Distribution
Systems, EPA 816-R-10-019, November, 2010.
[15] Zane. Satterfield and E. S. P.E and Vipin Bhardwaj, "Tech Brief, Water Meters," vol. Vol.
4, no. Issue. 2, Summer 2004.
[16] Zane. Satterfield and P. E. Vipin Bhardwaj, Water Meters, National Environmental Services
Center, 2014.
[17] Board of Water and Sewer Charge Review (BWSCR), Water Service Rules and
Regulations, City of Dayton.
[18] United Nations Human Settlements Programme (UN Habitat), Reduction of Illegal Water,
Nairobi, 2012.
[19] N. Trifunovic, Water Distribution, 2010.
[20] Washington State Department of Health, Environmental Public Health Office of Drinking
Water, June, 2014. DOH 331-338.
[21] THE MOLITOR, "Underspance," 22 October 2012. [Online]. Available:
http://underspace.com. [Accessed Thursday November 2015].
[22] Z. Nyein, "myanmar, Japan International Cooperation Agency (JICA) to help Yangon City
Development Committee (YCDC) Battle Water theft, Vol. 3, Issue 7," 11 February 2015.
[Online]. Available: http:// www.myanmar.com. [Accessed October 2015].
[23] W. World, Advanced Detection of Unauthorized Water Use through Radio Frequency
33. 26
AMR/AMI Systems., 2014.
[24] "Elstermetering," Elster Metering, 2015. [Online]. Available: http/:elstermetering.com.
[25] Polit D.F. & Hunglar B.P. (1999). Nursing Research: Principles and Methods. 6th Edition.
Lipponcott Williams and Wilkins. NY, USA.
[26] Polit D.F and Beck C.T.(2008). Nursing Research: Generating and Assessing Evidence for
Nursing Practice. 8th
Edition. Lipponcott Williams and Wilkins. NY, USA.
34. 27
APPENDICES
A.1 Tentative projective schedule
N0. Activity Period
2015 2016
Aug Sept Oct Nov Dec Jan Feb Mar Apr May
1. Title identification
2. Problem identification
3. Preparation of project proposal
4. Proposal presentation
5. Research, literature review and
requirements elicitation
6. System design and implementation
7. System testing and validation
8. Preparation of Project report
9. Project Presentation
10. Final Submission of project report
Table 2: Showing time frame for the proposed project
A.2 Proposed budget
No. Item Quantity Unit Cost Total Cost
1. Microcontrollers 1 250,000/= 250,000/=
2. GSM Module 1 350,000/= 350,000/=
3. Buzzer alarm 1 10000/= 10,000/=
4. Flow rate sensors 2 50,000/= 50,000/=
5. Suction Pump (Motor) 1 500,000/= 500,000/=
6. Water pipe (plastic) 1 20,000/= 20,000/=
7. Head on tank 1 30,000/= 30,000/=
8. LCD 1 50,000/= 50,000/=
4. Electronic components 1 50000/= 50,000/=
5. Timer 1 10,000/= 10,000/=
6. Stationary 50,000/= 50,000/=
7. Airtime 50000 50,000/=
8. Transport 150,000/= 150,000/=
9. Internet costs 30,000/= 30,000
10. Miscellaneous 100,000/= 100,000/=
Total 1,700,000/=
Table 3: Showing the proposed budget
35. 28
A.3 Sample interview guiding questions
1) Your mandate as National Water and Sewerage Corporation is to distribute and deliver
clean water to people in the areas entrusted to you, what stages are undertaken to deliver
water to the final consumer?
2) What is the significance of each of these stages in water distribution?
3) How do you ensure constant supply of water to the consumers?
4) It is stated by a number of professors in the world that piped water in town areas is
distributed at a constant flow rate, how do you archive this?
5) Then, what is the optimum flow rate used in each of the towns here in Uganda?
6) For water to be delivered to the consumers, there is need for a given distribution pressure to
be maintained, how do you archive this?
7) What are the types of pipes used in water distribution here in Uganda? Why these types?
8) What distribution network is best suitable for water distribution here in Uganda?
9) What are some of the technical challenges you face in the water distribution networks?
10) What remedies have you so far undertaken to curb these challenges?
11) What is the economic value of each of these remedies stated in (11) above?
12) What future plans do you have towards solving the challenges mentioned in (10) above?