Wednesday, June 5, 2019

Literature Review About Meter Reading Techniques Computer Science Essay

Literature Review About prison term Reading Techniques Computer Science EssayIn this chapter we eitherow explore to a greater extent about how bar denotation is d one and only(a), the different type of techniques that exist to read grands, and involuntary beat reading specially the use of Bluetooth technology for automatic pulsation reading. A world wide-eyed view allow for be explored before we look to the context of Mauritius. heartbeatsA one thousand is a device that trick comments and displays the charter quantity of an element, substance or any quantifiable matter, whitethorn it be electrons, water, gas, glucose and many others. in that location ar many uses of meters and in many different sectors of our world. For example, in health sector meters atomic number 18 employ to measure the level of glucose in the blood, to measure pulse rate, and many others. The return sector, corresponding gas, water or electrical energy companies, uses a very large numbers of meters. These companies acquire to monitor the usage of the re ancestors utilise by their customers so that they push aside be charged for the amount they oblige use. on that point atomic number 18 as well other meters like gauss meters, geomagnetic meters, microwave meters, and many to a greater extent.As we have seen, there argon many sectors in which meters be be utilise we stacknot focus our attention in all of them. So, we pass on concentrate our effort in the utility sector, more specifically the one for electricity companies. wherefore this choice? Because Energy sector is a driving force in our world and that many gear upments and advances are thanks to electricity. So from here on we exit focus our attention on that specific domain.Types of metersThere are many types of meters depending on the area of use. The main types of electric meters areElectromechanical Induction Meter (Standard Meter) It is a meter which counts the number of turns an aluminium disc d oes. The amount of electricity used is directly proportional to the number of revolutions of the aluminium disc. The electricity is measured in kilowatt- mos and the rate of charge remains constant all over the day. These types of meters are commonly used on single phase alternating current supply.electronic Meters These meters have an electronic display and make use of wireless technologies like Bluetooth, GSM and GPRS to transfer in fashionation about electrical pulmonary tuberculosis. They have inbuilt automatic sensors which helps to detect electrical energy theft or meter tampering.Prepaid meters are like the standard meters the only difference is that, or else getting a honker at the end of the month, it is a pay as you use service. I.e. the consumer pays in advance for the electricity function.Smart meter These meters record the amount of electricity consumption for a certain(p)(p) period of condemnation. The recorded info is then sent to the utility company for monitor ing and commission purposes. Smart meters butt end transfer data from and to the meter, i.e. it is a two way communication.Meter readingElectric meters measure electricity mostly in kilowatt hour (kWh). One kilowatt hour is equal to the amount of energy used by a load of one kilowatt over a period of one hour, or 3,600,000 joules. The meter reading process is through with(p) periodically, so that consumers nookie be account for that period of time. There are different method actings used by different companies for metering. There are two ways that bathroom be identified. Namely the traditional way and new techniques.The traditional way, which uses the standard meter, bed be described as The meter ratifier goes to the consumers place. There, the meter indorser reads the current value on the meter and note it down on the bill for the previous electricity consumption period. The bill is then given to the consumer. The meter reader will then enter the current value in the compa nys organization, so that the consumer can be billed for that current period.The new techniques, which uses, electronic and smart meter are as follows The meter reader makes use of new technologies to read the meter value, and meters have an electronic display. There are many different new techniques used for meter reading, and they will be further elaborated below. automatic pistol meter reading (AMR)Automatic meter reading (AMR), is the technology where data about consumption and the status of the meter device is collected automatically. The data is sent to a central database for it to be analysed and billing purpose. Meters for water, gas, and electricity can use the AMR technique.With the uses of AMR, there can be one way or two-way communication. In the one way communication, query is done only to know the reading value from the meter. Whereas in the two way communication functions can besides be implemented to the meter.Techniques for automatic meter readingThere are several techniques for automatic meter reading some of them are listed below.Touch TechnologyIn the touch technology, a meter reader have a device, it may be a handheld computer or specialised data collection device. When the meter reader in close mould to the meter the latter press a button. A signal is sent firm the device to the meter and the reading of the meter is relieve on the device. That saved data is downloaded to a data collection computer for billing purpose. This technique is besides referred as on-site AMR, as the meter reader needs to go on site to read the meter reading.Radio Frequency NetworkAs its name suggest, the network uses radio wave to progress with the meters. There are automatic reading agreements which uses the radio based technology such Wi-Fi, ZigBee, Bluetooth and many others. around of them are listed below.Handheld a meter reader collects meter reading from meters which support AMR brass. The meter reader carries a take-away computer with a radio r elative frequency receiver and transceiver which reads the meter readings value. 2Mobile it is also referred to as drive-by is a technique where the meter reading device is installed in a vehicle. The meter reader needs only to drive the vehicle along the path where the meters are found and the meter reading value is read automatically by the device installed in the vehicle. 2Fixed network it is a method where there is a network which is installed permanently to read meter reading. The network consists of many repeaters, collectors and a lot of other equipments so that values read are transferred to a central database. This method does not need the intervention of any human to read the metering value.Some time a hybrid AMR system is implemented so that when the fixed network goes down, the restless system come into action. 2Assessing the traditional meter reading and AMRThe advantage and disadvantage of both traditional meter reading and AMR techniques are listed in the table below .Traditional Meter ReadingAdvantageDisadvantageCreation of job, as more mess are needed to discharge meter readingSocial contact with consumersThere can be error when reading the value.Difficult to detect fraud on meters.Some people consider the meter reader as an intruder in their privacy.Security of the person performing the reading the person may be attacked by dogs dishearten 21 Traditional Meter ReadingAutomatic meter readingAdvantageDisadvantageEnable theft detection.More accurate meter reading.Reduce operating cost.There is no need to enter consumers property (except for exceptional cases).If the system is down, billing will be affected.The use of radio waves can be a source of concern to a minority of peopleTable 22 AMRExisting system using Automatic Meter readingThere are many AMR systems implemented in many in different countries and using many of the different techniques listed above. Some of the existing AMR systems are listedNew Mexico Gas Company is using the AMR ser vice. This has greatly helped to improve the working of the company. 4The Ontario government introduced legislation on Nov. 3, 2005 to start the process of getting smart meters into every(prenominal) home and small business in the province by 2010. 5Meridian Energy has started replacing traditional electricity meters with new smart electricity meters which will set a new benchmark for electricity retailing in New Zealand 6Existing system of Bluetooth enable meter readingThere are some companies which are using Bluetooth enabled meter for the reading of their meters, and there are some supplies of Bluetooth enabled meters. The topic is further true below.Existing systemCambridge Consultants has delivered a archetype design of a Bluetooth-based radio module to the leading utility metering company, Actaris. Based on a single-chip Bluetooth device, the module provides new opportunities to drive down the cost of remote control metering, allowing meters to be wireless-enabled at very l ow cost and opening the door to high-integrity consumer-activated schemes. Consumers with Bluetooth active phones, laptops or PDAs would have the option of taking meter readings themselves and communicating them to the utility company over the internet or GSM. 7Bluetooth enabled meters suppliersThere are many suppliers of Bluetooth enabled meters. Some of the suppliers are listed below.Landis+Gyr, is a company which design and manufactures electricity meters. This company have also design a Bluetooth reading system where they can read meters using Bluetooth. 8 contour 21 Bluetooth reader 8Metex Corporation limited is a company which is manufacture meter readers, and the company has meters with Bluetooth technology. These meters can be used in an AMR system. 9Current situation in MauritiusIn Mauritius, we have the Central electricity Board (CEB), Central Water Authority (CWA) and Waste Water Authority (WMA) as the main utilities companies. All these utilities companies are using th e traditional way for their billing purposes. .I.e. a meter reader will go home by home and read their respective standard meter.The CEB is doing research on how to implement automatic meter reading and they have some electronic meters for test purposes. CEB has also intention to implement prepaid meters.The AMR system on which CEB is experimenting consist of meter which has a modem. Then a communication is set with the modem and concerned data is read. That data is used for the billing purpose. As mentioned, the system is still at a testing phase, so a lot are still need to be done. To be able to implement AMR system all standard meters need to be changed to AMR supported meters, and meter readers need to be trained to be able to use the new system.Bluetooth TechnologyWhat isBluetooth?Bluetoothis a wireless technology for short range communications which was developed to replace the cables connecting devices, may it be fixed or portable ones. much(prenominal) devices are mobile p hones, printers, cameras, desktop computer, and many others. The Bluetoothtechnology is a low power, low cost and maintains high levels of security.Bluetooth technology operates in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHz, using a spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec. 10The Bluetooth Special Interest Group (SIG), an organization of several companies work together to maintain and develop the Bluetooth technology. 10The name Bluetooth comes from Danish King Harold Bluetooth. He was influential in uniting warring factions in parts of what is now Norway, Sweden and Denmark. 11Bluetooth technology can withstand hurly burly from wireless technologies which uses the 2.4 GHz spectrum. Adaptive frequency hopping (AFH) of Bluetooth technology detects other devices in the spectrum and avoid the frequency they are using. 11According to Martin Reynolds, an analyst with Gartner Groups Dataquest, The thin g about Bluetooth is that it truly will ship in the billions of units once it gains momentum. Its really a multibillion-dollar market. 12Bluetooth LogoFigure 22 Bluetooth logo 13Bluetooth rangeBluetooth radio waves use certain amount of energy and can goes up to a maximum of certain diameter. The table below show Bluetooth class and its limit up to where it can go. stratumPower use (mW)Range (approximate) in meters110010022.510311Table 23 Bluetooth class rangeBLUETOOTH NetworkThere are two type of networkPiconet is made up of one master and one or more slaves but only up to a maximum of seven active slaves at a time. The device initiating the connection automatically becomes the master and is the master of the piconet. Slaves may not communicate directly with each other they can only communicate with the master and transfer data when they are granted transmission time by the latter. Slaves synchronize their frequency hopping with the master using the masters clock and Bluetooth add ress.Figure 23 Typical piconet 14Scatternet Multiple piconets with overlapping coverage areas form a scatternet. Each piconet may have only one master, but slaves may participate in different piconets on a time-division multiplex basis. A device may be a master in one piconet and a slave in another or a slave in more than one piconet.Figure 24 Typical scatternet 15Bluetooth protocol tonsThe Bluetooth protocol stack allows Bluetooth devices from different manufactures to work with one another. Some of Bluetooth protocol stacksLMP (Link Management Protocol) configure and control links to other devices.L2CAP (Logical Link Control Adaptation Protocol) links upper layer protocols over the Baseband and the passing on of quality of service information.RFCOMM (Cable replacement protocol) protocol provides emulation of serial ports over the L2CAP protocol.Service Discovery Protocol provide a way for discovering services provided by or available through a Bluetooth device. It also allows maskings to know about the characteristics of the services which are available.HCI (Host/Controller Interface) access the hardware status and control register. It also provides a command interface to the Link Manager and Baseband Link Controller.Bluetooth radio is a transceiver which transmits and receives modulated Bluetooth radio waves for the devices.Figure 25 Bluetooth protocol stacks 15Bluetooth pro shoot downsBluetooth profiles help two devices which have the same profile to communicate with each other. Each Bluetooth device must support at least one profile. There are a wide range of Bluetooth profiles that explain many different types of finishings.Generic Access Profile (GAP) Provides the basis Bluetooth functionality for all profiles. Some of the functionalities are like setting up L2CAP links, handling security modes and discoverable modes.Serial Port Profile (SPP) Provides serial port (RS-232) emulation based on the RFCOMM part of the Bluetooth stack. control Up Network ing Profile (DUNP) Defines how to a Bluetooth device can be used as a Dial Up Networking gatewayFAX Profile Defines how a Bluetooth device can be used as a FAX gatewayHeadset Profile Defines what is required to transfer audio e.g. a wireless Bluetooth headsetlocal area network Access Point Profile Defines how a Bluetooth device can be used as a LAN access pointGeneric aspiration Exchange Profile (GOEP) Provides support for the OBjext EXchange (OBEX) protocol over Bluetooth linksObject Push Profile Defines how to exchange vCard and vCalendar intentions, based on the GOEPFile rapture Profile Defines functionality of how to navigate through folders and copying, deleting or creating a file or folder on a Bluetooth device, based on the GOEP.Figure 26 Bluetooth Profiles 16THE ADVANTAGES OF BLUETOOTHShort transmission range up to a maximum of 100 meters with class 1.Low Power Bluetooth takes relatively low power, thus it is suitable for devices with dependent battery capacity.Interope rability as it have standardised protocols.Robustness capable of operating in an environment strongly where there are many other radio wavesTechnologies for developing the systemThere are many phase for the development of a system and there are many tools available for their development. Two categories can be identified for a system hardware and package. The hardware part is the part that can be hold by hands and move if it is portable. The software part can be seen as the one who make the hardware works correctly. Without the software, the hardware cannot be used fully.Programming talking toThere are a series of programming languages that are available to programmers to calculate systems. Each programming language has an area of application where it is better. Some of the programming languages are listed below. coffee berryJava is cross platform and GNU General Public Licenseprogramming language. Java is an object-oriented, class-based, all-purpose, and concurrent language. It i s intended to let application developers write once, graze anywhere. Java programming languages is used in many systems ranging from applications software to web applications. Java can be use for Bluetooth programming. Java Communication Process (JCP) developed JSR 82, Java API for Bluetooth, so that Bluetooth enabled devices can be code easily using J2ME.Integrated development environment (IDE) help to code with java, some examples areNetBeansThe NetBeans IDE is pen in Java and needs JVM run. It can run on different operating system like Windows, Mac OS, Linux, and Solaris. A JDK is required for the functionality of Java development. Netbeans also has a GUI design tool that help developers to design GUIs.EclipseEclipse was mostly written in java and can be used to develop java application. There are a lot of plug-in which helps to for development.J2MEJ2ME is Java platform used to code embedded devices, like mobile phones. Java ME source code is licensed low the GNU General Publi c License. J2ME can be use to code systems with wireless connection.C programming languageC is a general-purpose computer programming language that can run on many platforms. C can be use for developing portable application software.PythonPython is a multi-paradigm programming language and it is cross platform, i.e. it can work on different operation systems. Python can be use for Bluetooth programming. optic Basic.Net (VB.Net)Visual basic is implemented on .Net framework. VB.Net was designed by Microsoft and it is an object oriented language.Relational Database Management System (RDMS)Some of RDMS are listed belowMySQLMySQL is a relational database management system which is released under the GNU General Public License. It offers multi-user access to databases and it is cross platform software.PostgreSQLPostgreSQL is an object-relational database management system (ORDBMS) and it is released under PostgreSQL License. Thus it can be modified and distributed in any form desired.Web ServerA Web server is responsible to process users request and reply back. The replies are principally HyperText Markup Language (HTML) documents. Web servers are mainly used t host Web sites.Apache HTTP ServerApache HTTP Server is a Web server which is licensed under Apache License 2.0, which means that it is an open source HTTP server. It is platform independent, highly secure and efficient.Internet Information Server (IIS)IIS was created and is owned by Microsoft. There is need to bargain for it license to use it.Web Development ToolsThere are many server side scripting languages that are used. Some of them are listed belowPHPPHP (Hypertext Preprocessor) is a general-purpose scripting language that was designed for web development so as to have dynamic web pages. PHP can work on most servers and operating system.ASP.NETASP.NET allows programmers to found dynamic web pages, web services and web application. It is a web application framework developed and marketed by Microsoft.H ardwareSome of the hardware that can be used is listed below.Mobile phoneMobiles phones have become a common electronic device. It offers many options than just make call and send messages. present we can access the Internet via mobile phones, and there are many applications that where developed on mobile phone. New generation mobile phones are render with camera and Bluetooth.Laptop/ ComputersComputer is like the tool that enables programmers to work. All most all programming languages, not to say all, can work on computers. They are also equipped with many wireless devices like Wi-Fi and Bluetooth.Embedded devicesThere are embedded devices that are designed specifically to do certain things. Some examples are MP3 player, washing machines, Bluetooth meter reader, and many others.Evaluation of ToolsProgramming languageThe programming language is what will help to make the software. Each programming language has positive and negative points depending on the type of software that nee d to be developed. The pros and cons of certain programming languages are listed below.J2MEProsConsOffer better networking capabilityAvailable on various platformsJ2ME applications are portableRich user interfaceRobust security features.There is a wide range of mobiles which support Java, thus having wide range of mobile phone that can be used.Midlet cannot access all native resources without authorization.Application need to adapt for phones which have different CLDC, MIDP, JSR and Bluetooth.Table 34 J2MEJavaProsConsJava code can work on many different platforms.Java is secure, robust and reliable.Java provides use of multithreading.Java is object oriented and allows creation of modular programs and reusable code.Java have an API for Bluetooth programmingJava is slower and consumes more memory when compared to languages such as C or C++.Table 35 JavaWeb ServersWeb servers are what will enable the data to be access over a network in a convenient way. There are a lot of web servers, some of them are described below.ApacheProsConsApache is open and thus can be customised easily according to requirementsMulti-platform. It runs on a wide variety of operating systems, including all variants of UNIX, Windows 9x/NT, and Mac OSApache is not regularly updatedRequires more skilful knowledge to install and configureTable 36 ApacheIISProsConsGUI mode installation.Works with a wide range of operating systems and browsers.Source code is proprietary.Can only work within Windows environment.Table 37 IISWeb Development LanguagesWeb development language will be used to code for application at server side. There is a wide pool of language that is available. Some of them are listed below with their some of their pros and cons.PHPProsConsPHP is set down and promiscuous to use.PHP help to interact with database easily.Can support many operating systems, like Windows, Linux and Mac OS.PHP engine need to be installed on server to use PHP.Debugging can be durationy for complex prog ram.Table 38 PHPASP.NETProsConsASP.NET code is compiled at server before being sent to the browser thus faster.ASP.NET pages are simple to write and can cope with heavy traffic without affecting performance adverselyASP.NET runs on only windows platform.ActiveX objects are platform specific, thus it will not work easily on many Web servers.Table 39 ASP.NetRDBMSRelational Database Management System (RDMS) will be used to store all data. It is very all important(p) as all sensitive data will be there and data will be used to do billing purpose.MySQLProsConsEasy to use.Free and Open source system.Runs on a range of different platforms.Can handle large sets of data.It is secure. Passwords are encrypted recuperation of database is not guaranteed in case of a power cut.Operates over known IP ports which facilitate the task of intrudersTable 310 MySQLPostgreSQLProsConsIt is a free and Open source softwarePostgreSQL can work on different platformPostgreSQL is very scalable and extensibleIt is slow compared to MySQLLacks binary distribution for all the supported platforms.Table 311 PostgresSQLChoice of Final ToolsJava is appropriate for the desktop application as it can work on many different platforms and have an API for Bluetooth.J2ME is used for the mobile application development as many mobile phones can support java and have an API for Bluetooth.Bluecove API for Bluetooth programming as it is open source and support java.PHP will be used for the web application as it is free and easy to interact with database.MySQL is more suitable for database system as it is free and work well with Web servers.DesignThe design section gives an overview of the structure of the software and architecture of the system. It also includes the data involved, the interfaces between system components, algorithm and protocol to be used for the system implementation.System Design IssuesSeveral system design issues like performance, quality of service, fault tolerance, and security, which are important in the design of a system, are discussed below.Performance IssuesThe performance issues are concerned with the limitation of computers in term of processing power and communication capacities. These issues can be described in the followings waysResponsiveness It is how fast the system processes given input to give an output. The use of threading allows multiple tasks to process simultaneously. Threads can be used for processor intensive process. Threads can be implemented in Java Environment.Applications running on networks depend greatly on the load and performance of servers and also the network load itself. Server and network load balancing can be used to prevent them from being overloaded. Such technique is beyond the scope of this project. When using the Internet, there is a probability of communication delays and data being corrupted, this beyond of ones control.Throughput It is of the system corresponds to the amount of data transmit between the client and serv er in a given time interval.On a wireless network is takes a long time to examine connection between the server and the client and the latency time of HTTP is significantly high. So, the number of HTTP round trips in the application must be kept to the stringent minimum.RobustnessRobustness is the ability of the system to operate in the presence of incorrect input or cope with errors when the system is running.Validations check like length check and data type check can be used to prevent wrong input and catch errors where shared resources are being accessed.Interactivity interaction with the system can be in many different ways. Data or command input to the system will make it produce certain result. Some of the ways that can interact with the system are listed below.The use of graphical user interface (GUI) to facilitate user to communicate with the system.Providing options and menus where possible instead of typing data.Users using the mobile application need to enter data via p hone keypad.Use of meaningful icons, so that user can interact apace with the system.FlexibilityThe web application can support multiple users at a time and can receive and process multiple requests a time. The system must be able to cope if there is significant increase in the number of users and additional resources can be added if needed to.PortabilityThe mobile application can be run on Java enabled mobiles phones which support MIDP 2.0. The web application can run on multiples types of servers.Limit size of JAR fileThe mobile application has limited resources to use. So the application is obfuscated to reduce its size. The obfuscation process helps to remove unused classes and libraries.Error, Exception Handling and Fault ToleranceThe application should continue to work correctly in presence of software, hardware and network faults. Errors will be caught in try-catch blocks to alert user of the error.SecuritySecurity is one of the focal point of a system. There is no system on earth which can be tagged as impenetrable. What can be done is, to make the system less vulnerable to attacks. The system needs to protect data from unauthorized users. The ways to protect the system is listed below.Users need a username and tidings to be able to access the system. User will be identified and authenticated before they can use the system.The database will be protected with password.architectural DesignIn this section, the different components of the system are illustrated and how they interact between them.Overall ArchitectureThe system is made up of three main components the meter, the mobile application and the server application. The mobile application will be used to read a value via Bluetooth from the meter and will send that value via mobile network operator to the server. The connection between the mobile and the server is done via wireless connection such as GPRS, WAP, EDGE or Wi-Fi.The meter will be a simulated meter on a laptop that will be accessed via B luetooth by a mobile application.The server will be used to host the web site and connect to the database. That database will be used to store all information needed.The figure below shows the overall architecture.Figure 47 Overall architectureDetailed architectureFigure 48 Component diagram

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.