Design and Implementation of Automatic Irrigation ControlSystem
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 4
Abstract
Abstract: The objective of irrigation is to keep measure on food security and the aim of automatic irrigationcontrol system is to minimize the intervention of the human operator (gardener) in irrigation activities. Theautomatic irrigation control system is used to achieve this aim. This control system is built aroundATMEGA32microcontroller programmed using embedded C language. Inputs are the signals from four sensorsnamely soil moisture sensor using hygrometer module, water level sensor using the LM 324 Op-amp wasconfigured here as comparator, light sensorwith the aid of Light dependent resistor and temperature sensorusing LM 35. The microcontroller processes the input signals by using the control software embedded in itsinternal ROM to generate three output signals, using one of the output signals to control a water pump thatirrigates the garden, the second output signals to control a water pump that draws water from the river to thereservoir or storage tank while the other to switch a buzzer that alerts the gardener when there is shortage ofwater in a tank that supplies the garden.The project can be applied in agricultural area of any type where waterreadily available for irrigation. It can also be applied in agricultural research institutes such as the MichaelOkpara University of Agriculture, (MOUAU).Umudike.
Authors and Affiliations
Oborkhale,Lawrence I (Ph. D. ) , Abioye, A. E , Egonwa B. O , Olalekan T. A.
Darksecretofsns’spopularity
Abstract:-Facebook pages promisingpossibilitytoreachmassaudiencesimplybyusingFacebook advertisingplatforms. Lately, thenum beroflikesin Facebookplayitroleas ananalysistocheckitsdemandandadvantage, thisconduceboosti...
An Efficient implementation of PKI architecture based Digital Signature using RSA and various hash functions (MD5 and SHA variants
Digital Signature technique is widely being used to detect unauthorized modification to data and to authenticate the identity of the signatory. It is essential for secure transaction over unsecure/ open networks....
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
Steganography involves transferring data through a given channel in such a way that the communication channel itself is hidden from all involved parties. It is a form of security through obscurity; this technique p...
Proposed Hough Technique for Estimating Climatic Conditions recorded in the Cross Section of Tree Images
Abstract: Complex ensemble of shapes in an image is very difficult for segmentation. Hough transform is one of the robust algorithms for detecting geometric shapes in the images. The modification of this Hough transformi...
Skill Acquisition: An E-Learning Approach
The attention of the Nigerian Government for over twenty years now has been on youth’s empowerment through skill acquisition for self-realisation and economic independence. The Government and individuals, both in the pas...