
by water level, but operation of pump in practice needs more expert’s experience. Actually the inflow 
of WWTP is dynamic, the flowrate and the concentration of wastewater is variant and not the same 
as  the condition  of  original  design.  Even  a small  rainfall,  a significant  raise  at  inlet  flowrate could 
suddenly  happen.  Such  a  changing  inflow  will  cause  an  unstable  operation  of  WWTP,  moreover 
severe situation during storm will induce combined sewage overflow. Thus operating rules extracted 
from historic records or expert’s experiences from long career are of critical in the automatic control 
of  pumping  system,  and  are suggested  to  be  developed  as  a  technical  service  from  IoT.  Based  on 
such  a  smart  water  management  model,  the  IoT  suppliers  can  access  a  wider  global  market  via 
providing  decision support,  monitoring  and water governance of a pumping  system. 
Activated sludge process is very popular used to degrade the nutrients, e.g. BOD, in wastewater. 
Most of sludge in this process is alive and aerobic, so a lot of air is continuously transported into this 
process  via  blower.  A  complex  biodegradation  is  only  executed  by  those  activated  sludge.  So  we 
have to waste the old sludge out and recycle the active back. This is not an easy job to operator, as 
we see, most of demands in Table 2 focuses on sludge. We suggest the supplier of IoT to make data 
mining  from  mega  data  of  monitoring  system  in  activated  sludge  process  and  then  to  provide 
operator a web-service with artificial  intelligent  about feeding sludge.    
Next  we  evaluated  the  measurement  of  oxygen  profile  at  aeration  tank,  the  measurement  of 
concentration at dosage, the alarm of health risk and the alarm of machine shift as the items which 
need technical support from  network  layer in IoT. So far the signal processing,  the noise filter, the 
detecting way, the communication path for the measurements in these procedures are still  immature. 
It is an opportunity  for those IoT suppliers  if they own critical  patent at these new measurements. 
3.2. Optimization of IoT in WWTP 
After  re-organizing  the  messages  of evaluation  hierarchical  maps  from  Figure  3  and  4,  we  create 
three procedures as below to fulfil  optimization  of IoT we proposed in this study.    
Principle I: Minimizing the negative concern from managers is the first step, so the IoT supplier 
have to meet data management in a high reliability. 
Principle  II:  Then  IoT  supplier  have  to  fast  fix  disorder,  provide  an  efficient  service  at  data 
management,  effectively  reduce  the  staff’s  accident  to  maximize  the  positive  cognitions  from 
managers, but any plan for principle  II must be not against the first principle. 
Principle  III:  “simple”,  “easily  access  data”,  “real-time  control”  would  be  essential  functions  in 
order to maximize the positive cognitions from operators. However designing these function must be 
not against principle  I and II.  
As  you  see  in  Figure  4  negative  concerns  connected  with  reliability  are  primarily  focused  on 
“security” and “noise at monitoring”. Indeed there is a growing worry that control system of WWTP 
is  too  vulnerable  to  prevent  cyber-attack.  In  addition  to  malicious  intruder,  adopting  easy  but 
vulnerable  coding  method,  open  to  connect  other  networks,  insecure  remote  connection  are 
recognized  to  escalate  the  cyber  risk  of  control  system.  In  terms  of  security  technologies  and 
experiences,  SCADA  is  more  mature  to  securing  control  system  than  IoT  at  present.  For  meeting 
principle I, we suggest the decision maker of WWTP carefully extends the IoT tentacle on the basis 
of SCADA to operation. 
To be contrary, the IoT supplier must make much more efforts on developing web services with 
predictive analysis to forecast system’s risk and cloud  knowledge base with prescriptive analysis to 
avoid  staff  stuck  in  the  trouble  of  system’s  disorder.  Any  service  created  for  principal  II  must  be 
qualified  by  the  standards  of  high  information  security.  Here  I suggest  the control  system  and  the 
web service adopt different communication networks and make a gap to avoid connecting each other 
networks  for  security.  For  example,  the  control  system  is  connected  with  SCADA  on  the  fiber 
network and the predictive analysis and the prescriptive analysis from IoT are transfer to smart phone 
on the wireless network. 
Optimize IoT for Operating Wastewater Treatment Plant based on Visualizing User’S Thinking
449