Self-Powered IoT-Enabled Water Monitoring System

Naram Mhaisen, Omran Abazeed, Youssef Al Hariri, Abdullah Alsalemi, Osama Halabi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract / Description of output

While usable water on earth is sparse and costly to treat, statistics show excessive use worldwide. Penalties are issued to limit the excessive consumption; however, their impact is marginal as they do not identify the reason for the exorbitant consumption. Therefore, giving users the full awareness about their water consumption will greatly help in minimizing the water waste. This article aims to present a smart self-powered water monitoring system that leverages IoT and cloud computing. The system consists of an IoT device that can be installed at any water source, a cloud application to receive the data from the devices, and a mobile app to visualize the water consumption at every monitored source. This system gives the user the ability to identify the location and time of the excessive usage and leaks on the mobile phone. Experiment results confirm the self-powered premise of the solution. A prototype of mobile application and backend have been developed and tested.
Original languageEnglish
Title of host publicationProceedings of the 2018 International Conference on Computer and Applications (ICCA)
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages5
ISBN (Electronic)978-1-5386-4371-6, 978-1-5386-4370-9
ISBN (Print)978-1-5386-4372-3
Publication statusPublished - 13 Sept 2018
EventThe 2018 International Conference on Computer and Applications - Beirut, Lebanon
Duration: 25 Jul 201826 Jul 2018
Conference number: 3


ConferenceThe 2018 International Conference on Computer and Applications
Abbreviated titleICCA 2018

Keywords / Materials (for Non-textual outputs)

  • Internet-of-things (IoT)
  • self-powered
  • water consumption
  • water monitoring
  • mobile application


Dive into the research topics of 'Self-Powered IoT-Enabled Water Monitoring System'. Together they form a unique fingerprint.

Cite this