Industrial Waste Monitoring

Conventional industrial monitoring systems are tedious, inefficient and the at times integrity of the data is unreliable. The objective of this system is to monitor industrial processes specifically the fluid level which will measure the instantaneous fluid level parameter and respond by text messaging the exact value of the parameter to the user when being enquired by a privileged access user. The development of the embedded program code and the circuit for fluid level measuring are discussed as well. Suggestions for future implementations and efficient remote monitoring works are included.




References:
[1] Environmental Quality Act 1974 and Regulations Malaysia.
Retrieved from
http://openlibrary.org/b/OL22508292M/Environmental_Quality_A
ct_1974_and_regulations.
[2] Moss, A.D., 2005, K4e, Program transformation of embedded
systems, Ph.D., Bristol, 56-5121 (BL: DXN103086)
[3] Prof. Dr. Friedel Hoβfeld, Super-Computer Evolution - Along
Moore-s Law and Beyond. Retrieved from http://www.emldevelopment.
de/deutsch/veranstaltungen/kolloquien.php?we_obje
ctID=238
[4] Noergaard T., Embedded Systems Architecture - A Comprehensive
Guide for Engineers and Programmers.
[5] Wiley J. & Sons, Mobile Messaging Technologies and Services:
SMS, EMS and MMS.
[6] Mulchandani D., JAVA for Embedded Systems. IEEE explore.
[7] A. Weaver, J. Luo, and X. Zhang, Monitoring and control using
the internet and java, in Proceedings of the 25th Annual
Conference of the IEEE Industrial Electronics Society
(IECON-99), vol. 3, 1999, pp. 1152-1158.
[8] M. J. Callaghan, J. Harkin, T. M. McGinnity, and L. Maguire, An
internet-based methodology for remotely accesses embedded
systems, in Proceedings of the IEEE International Conference on
Systems, Man and Cybernetics, vol. 6, Oct. 2002.
[9] F. Chen and G. Ros┬©u. Java-MOP: A Monitoring Oriented
Programming Environment for Java. In Proceedings of the
Eleventh International Conference on Tools and Algorithms for
the construction and analysis of systems (TACAS-05), LNCS
3440, pages 546-550. Springer-Verlag, 2005.
[10] J. Ligatti. Policy Enforcement via ProgramMonitoring. PhD
thesis, Princeton University, Department of Computer Science,
2006.
[11] R. Sekar, C. R. Ramakrishnan, I. V. Ramakrishnan, and S. A.
Smolka. Model-Carrying Code (MCC): a new paradigm for
mobile-code security. In Proceedings of the 2001 Workshop on
New Security Paradigms, NSPW-01, pages 23-30, New York, NY,
USA, 2001. ACM Press.
[12] Fei Xie, Guowu Yang , Xiaoyu Song, Component-based
hardware/software co-verification for building trustworthy
embedded systems, The Journal of Systems and Software,2007,
80,pp: 643-654
[13] Carlos Eduardo Pereira , Luigi Carro, Distributed real-time
embedded systems: Recent advances, future trends and their
impact on manufacturing plant control, Annual Reviews in
Control ,2007,31,pp: 81-92