5 ming+
Yuklanmalar
Yoshga oid cheklov
Hamma uchun
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot
Skrinshot

Bu ilova haqida

Radio-controlled acoustic zone monitoring is setting the benchmark in terms of pipe network monitoring. Any leakage-borne noise created by water pouring fourth when a pipe or a fitting is damaged generates a noise level, which can be measured, evaluated, and saved by the radio data loggers. The closer the operator with the measuring equipment is to the leakage spot, the more intensive is the noise. Especially fittings such as valves, hydrants, or water meters are perfect spots to locate the leakage and to make radio data loggers record the noise development.
By applying the AZA-OAD program, the time required to locate a leakage is reduced considerably as regular monitoring procedures and simultaneous data acquisition and data evaluation processes allow an early detection of a new leakage.
The software enables the operator to acquire the data from the loggers by radio and to display the values both acoustically and optically. Also, the particular leakage spot will be indicated and can be interpreted by the operator. And all this can be done from a moving service van passing the particular pipe section.
The mobile AZA-OAD program supports the operator by calculating the leakage status on the basis of the acquired measurement data and by displaying the results. This allows graphical processing of the gained data and also makes the measurement results comparable to previous monitoring results thus providing the operator with an easy-to-assess overview of the noise level history of the individual data logger locations. Furthermore, the leakage status resulting from the evaluation of the measure data is displayed graphically allowing realistic conclusions.
If the software is applied in combination with the Water Cloud System (www.water-cloud.de) by F.A.S.T. GmbH, the data gained through mobile data acquisition can be transferred to the office at the push of a button and is available instantly at the central server.
Oxirgi yangilanish
20-dek, 2023

Maʼlumotlar xavfsizligi

Xavfsizlik — dastur ishlab chiquvchilar maʼlumotlaringizni qanday jamlashi va ulashishini tushinishdan boshlanadi. Maʼlumotlar maxfiyligi va xavfsizlik amaliyotlari ilovadan foydalanish, hudud va yoshga qarab farq qilishi mumkin. Bu axborot dastur ishlab chiquvchi tomonidan taqdim etilgan va keyinchalik yangilanishi mumkin.
Tashqi hamkorlarga hech qanday axborot ulashilmagan
Dastur ishlab chiquvchilar axborot ulashilishini qanday aytishi haqida batafsil
Hech qanday maʼlumot jamlanmagan
Dastur ishlab chiquvchilar axborot jamlanishini qanday aytishi haqida batafsil