A Monitoring System for the Safety of Building Structure Based on W2T Methodology

Haiyuan Wang, Zhisheng Huang, Ning Zhong, Jiajin Huang, Yuzhong Han, Feng Zhang

Research output: Chapter in Book / Report / Conference proceedingChapterAcademicpeer-review

Abstract

With the development of the Internet of things, monitoring systems for the safety of building structure (SBS) provide people with the important data about the main supporting points in the buildings. More and more data give the engineers an overload work problem, which can be solved by a systematic method making these monitoring systems more reliable, efficient and intelligent. Under the framework of the Wisdom Web of Things (W2T), we design a monitoring system for the SBS, by using the semantic technology. This system establishes a data cycle among the physical world (buildings), the social world (humans) and the cyber world (computers), and provides various services in the monitoring process to alleviate the engineers’ workload. In this system, the sensors which are connected via cable or wireless way, are used to monitor the different parameters of building structure. The semantic data can be obtained and represented by RDF to describe the meanings of sensor data, and can provide the application background for users. LarKC, a platform for scalable semantic data processing, is used for semantic querying about the data. Based on this uniform representation of data and semantic processing, intelligent services can be provided by the effective data analysis. This provides the possibility to integrate all of the monitoring systems for the safety of building structure in urban computing.
Original languageEnglish
Title of host publicationWisdom Web of Things
EditorsNing Zhong, Jianhua Ma, Jiming Liu, Runhe Huang, Xiaohui Tao
PublisherSpringer
Pages323-335
ISBN (Electronic)978-3-319-44198-6
ISBN (Print)978-3-319-44196-2
DOIs
Publication statusPublished - 8 Nov 2016

Fingerprint

Dive into the research topics of 'A Monitoring System for the Safety of Building Structure Based on W2T Methodology'. Together they form a unique fingerprint.

Cite this