You are on page 1of 10

ICAESMT19 (International Conference on Advances in Engineering Science Management &

Technology 2019)
IOT based automation project using Raspberry Pi
“AUTOMATIC SELF WATERING SYSTEM”

Srishti Gautama
Madhu Kirolab
a
Computer science and engineering, Uttaranchal University, Dehradun,248007

b
Assistant Professor, Computer Science and Engineering, Uttaranchal University, Dehradun,248007

ARTICLE INFO ABSTRACT

Article history: This project mainly focuses on implementing automatic self watering system in the irrigation
Received 00 December 00 fields and vertical gardens. In order to supersede manual activities and making work easier,
Received in revised form 00 January 00 we will make modified plant watering structure. It will empower all of our plants to
Accepted 00 February 00 accomplish their fullest potential similarly as preserving water. Using sprinklers, spill
makers, or a blend of both, we can structure a system that is ideal for each plant in our yard.
Keywords:
For execution of programmed plant watering framework, we will utilize blend of sprinkler
Internet Of Things
Raspberry Pi frameworks, channels, and spouts. This undertaking utilizes the Raspberry Pi 3 model B. It
Soil moisture sensor will be modified to detect moisture dimension of plants at explicit instance of time. In the
GPIO pins event that the dampness content is not precisely decided breaking point which is predefined
according to explicit plant's water need by then needed proportion of water is given till it
accomplishes edge. The framework will be customized to water plants two times each day.
Framework will be planned so that it will report its ebb and flow status just as remind the
client to add water to the tank. These warnings can be made through portable application or
any site.

© 2019 Uttaranchal University, Dehradun. Hosting by Elsevier SSRN (ISN) All rights reserved.
Peer review under responsibility of Uttaranchal University, Dehradun.

Introduction

This framework will be planned and customized so that soil moisture sensor detects the moisture level of the plant at a particular occasion of
time, if moisture level of sensor is not exactly the predetermined degree of limit as indicated by the specific plant's need, at that point the ideal
measure of water is provided till it ranges to the predefined edge esteem. This project is not limited to agricultural fields only, but has vast
implementations in the vertical garden concept as well. This automatic self-watering system mainly works on the idea of Internet of Things and
uses the Raspberry Pi 3 model B to operate the system and uses a microcontroller to convert the analog reading to digital readings.

1.Internet of Things (IoT)


The Internet of things (IoT) is the system of gadgets and home apparatuses, and so on that contain hardware, programming, and availability which
enables these things to associate, collaborate and trade data.IoT includes giving Internet network past standard gadgets, for example, work areas,
workstations, telephones and tablets, to any scope of customarily non-web empowered physical gadgets and ordinary items. These gadgets are
implanted with innovation and can impart and associate over the Internet, and furthermore they can be remotely checked and controlled. IoT

http://ssrn.com/link/ICAESMT-2019.html=xyz
Information Systems &eBusiness Network (ISN)

Electronic copy available at: https://ssrn.com/abstract=3418180


2

contraptions are a bit of the greater thought of home computerization, which can join lighting, warming and cooling, media and security frameworks.
Whole deal favorable circumstances could join essentialness reserves by means of therefore ensuring lights and equipment are slaughtered.

An insightful home or motorized home could be established on a phase or focuses that control sharp devices and machines. For instance, using
Apple's HomeKit, producers can have their home things and additional items obliged by an application in iOS contraptions, for instance, the iPhone
and the Apple Watch. This could be a dedicated application or iOS neighborhood applications, for instance, Siri. This can be appeared because of
Lenovo's Shrewd Home Fundamentals, which is a line of splendid home contraptions that are controlled through Apple's Home application or Siri
without the necessity for a Wi-Fi connect. There are furthermore committed splendid home focus focuses that are offered as free stages to relate
particular sharp home things and these fuse the Amazon Reverberation, Google Home, Apple's HomePod, and Samsung's SmartThings Hub. IoT
contraptions can be used to screen and control the mechanical, electrical and electronic systems used in various sorts of structures (e.g., open and
private, current, associations, or private) in home motorization and building computerization structures. In this special circumstance, three crucial
zones are being solicited in writing:

The blend of the Web with structure essentialness the officials systems to make imperativeness successful and IOT-driven "sharp structures".

The potential strategies for steady watching for diminishing imperativeness utilization and checking occupant practices. The consolidation of canny
contraptions in the amassed condition and how they may to understand that how for the most part will be used in future applications.

The IoT can comprehend the steady compromise of various gathering contraptions outfitted with identifying, ID, taking care of, correspondence,
incitation, and frameworks organization limits. In light of such an exceedingly joined sharp cyberphysical space, it opens the best approach to make
very surprising business and market open entryways for assembling. Framework control and the administrators of amassing equipment, asset and
condition the board, or gathering procedure control bring the IoT inside the area of mechanical applications and splendid collecting too. The IoT
adroit structures enable quick gathering of new things, dynamic response to thing solicitations, and consistent upgrade of collecting creation and
generation arrange frameworks, by frameworks organization mechanical assembly, sensors and control systems together.

Modernized control systems to robotize procedure controls, manager instruments and organization information structures to improve plant
prosperity and security are inside the area of the IoT. Anyway it moreover stretches out itself to asset the board through judicious help, verifiable
evaluation, and estimations to intensify dependability. Sharp present day organization structures can in like manner be composed with the Savvy
Network, thusly engaging consistent imperativeness improvement. Estimations, automated controls, plant upgrade, prosperity and security the
board, and various limits are given by a far reaching number of sorted out sensors.

The term mechanical Web of things (IIoT) is routinely experienced in the amassing organizations, insinuating the cutting edge subset of the IoT.
IIoT in amassing could deliver so much business regard that it will at last lead to the Fourth Modern Upheaval, so the supposed Business 4.0. It is
surveyed that later on, productive associations will presumably assemble their salary through Web of things by making new arrangements of activity
and improve gainfulness, abuse examination for advancement, and change workforce. The ability of advancement by executing IIoT may create
$12 trillion of overall Gross household item by 2030.
1.1.Use of Internet Of Things in the field of agriculture
There are different IoT applications in cultivating, for example, gathering information on temperature, precipitation, moistness, wind speed, and
soil content. This information can be utilized to mechanize cultivating systems and take educated choices to improve quality, amount and limit
hazard and waste, decrease exertion required to oversee crops. For instance, screen soil temperature and dampness from a far distance, and apply
IoT-procured information to accuracy preparation programs.

There are various examples of use of IoT in practical application and one of them is explained below:

In August 2018, Toyota Tsusho began an organization with Microsoft to make fish cultivating devices utilizing the Microsoft Azure application
suite for IoT advancements identified with water the board, which was created to some degree by analysts from Kindai University, the water siphon
systems utilized man-made brainpower to tally the quantity of fish on a transport line and break down the quantity of fishes and in the long run
reason the viability of water stream from the information the fish give.

The particular PC projects utilized in the process are under the Azure Machine Learning and the Azure IoT Hub stages.

Various networks used for working with IOT:

The Internet of things handles a huge amount of data in everyday life and to handle such heavy data scalability is the major factor to manage
data received from billions of devices, IPv6 network architecture will prove to be a boon for handling the network layer scalability requires huge

http://ssrn.com/link/ICAESMT-2019.html=xyz
Information Systems &eBusiness Network (ISN)

Electronic copy available at: https://ssrn.com/abstract=3418180


3

scalability. To enable light weight data transport IETF's Constrained Application Protocol will provide a great platform. Fog computing is a
feasible method to handle the outburst of huge amount of data.
 Various methods of connectivity
 Wireless connectivity for short range devices:

o Bluetooth mesh networking – Specification providing a mesh networking variant to Bluetooth low energy with increased number of
nodes and standardized application layer.
o Light-Fidelity – Wireless communication technology similar to the Wi-Fi standard, but using visible light communication for increased
bandwidth.
o Near-field communication – Communication protocols enabling two electronic devices to communicate within a 4 cm range.
o QR codes and barcodes – Machine readable optical tags that contain information about the product to which they are attached.
o Radio-frequency identification (RFID) – It is a technology which uses electromagnetic fields to read data stored in tags embedded in
other items.
o Transport Layer Security – Network security protocol.
o Wi-Fi – technology for local area networking based on the IEEE 802.11 standard, where devices may communicate through a shared
access point or directly between individual devices.
o ZigBee – It is a communication protocol for personal area networking based on the IEEE 802.15.4 standard. It provides low power
consumption, low data rate, low cost, and high throughput.

 Medium-range wireless
o LTE-Advanced – It is high-speed communication specification for mobile networks. It provides enhancements to the LTE standard
with extended coverage, higher throughput, and lower latency.

 Long-range wireless
Low-control wide-area networking – Remote frameworks are proposed to allow long-go correspondence with uninformed rate,
definitely decreasing power and cost for transmission. Available technologies and protocols are: LoRaWan, Sigfox, NB-IoT,
Weightless.

 Wired
o Ethernet – It is broadly useful systems administration standard utilizing twisted pair and fiber optic connections alongside hubs or
switches.
o Power-line communication (PLC) – It is a communication technology which uses electrical wiring to carry power and data. For eg:
HomePlug use PLC for networking IoT devices.

1.2 What is Raspberry Pi?

The Raspberry Pi is a compact, incredible and lightweight PC which performs a significant number of the things like work area PC. The
fundamental highlights that make it perfect for sight and sound applications, for example, media focuses and narrowcasting arrangements are
amazing designs capacities and HDMI video yield. The Raspberry Pi is fundamentally founded on a Broadcom BCM2835 chip. It does exclude
an inherent hard plate or strong state drive, rather contains a SD card for booting and long haul stockpiling.

Most of the Raspberry pi board have USB ports, HDMI post, DSI port, Audio jack, 40 GPIO pins, In-built Bluetooth, WIFI and so on.
Raspberry pi has its own working framework. Raspbian, Ubuntu mate, smart Ubuntu, etc are the different working frameworks utilized for the
Raspberry pi. Raspberry pi works with various programming dialects like C++, Python, SQL, and HTSQL. C++ utilizes for programming
Arduino. HTSQL (Hyper Text Structured Query Language) to give a web interface to database that is anything but difficult to inquiry through the
internet browser. It likewise bolsters java, java content, php and so forth.
The main power modes of Raspberry Pi are as follows:
1. The run mode – The CPU and all usefulness of the ARM11 center are accessible and controlled up.

2. The standby mode – The fundamental center timekeepers are closed down, despite the fact that the power circuits on the center are as yet

http://ssrn.com/link/ICAESMT-2019.html=xyz
Information Systems &eBusiness Network (ISN)

Electronic copy available at: https://ssrn.com/abstract=3418180


4

dynamic. Diminishes mode is otherwise called ''W ait for Interrupt'' (WFI) mode. A hinder is a procedure creating an uncommon call to the CPU
to rapidly awaken the center. Any present preparing will be halted by this hinder and do what the calling procedure has requested.
3. Shutdown mode – there is no power.
4. Dormant mode – the center is shut down and all reserves are left controlled on.

GPIO pins
The term GPIO is defined as "General Purpose Input/output." While most sticks have a committed reason, for example, sending a
sign to a specific segment, GPIO is a kind of stick found on a coordinated circuit that does not have a particular capacity, the capacity
of a GPIO stick is adaptable and can be constrained by programming. The raspberry Pi utilizes GPIO pins.

The different functionalities of GPIO pins are characterized underneath:

It give the interface between the Raspberry Pi and different segments and it incorporates a line of GPIO sticks along the edge of the
board that. These pins go about as switches, it gives yield 3.3 volts when set to HIGH and zero voltage when set to LOW. We can
interface a gadget to explicit GPIO pins to control it with a product program. For instance, if a product program advises the GPIO
stick to turn on, the LED will illuminate by wiring a LED to a GPIO and a ground stick on a Raspberry Pi.

GPIOs are utilized in an assorted assortment of utilizations, restricted just by the electrical and timing details of the GPIO interface
and the capacity of programming to communicate with GPIOs in an adequately convenient way. GPIOs ordinarily utilize standard
rationale levels and can't supply critical current to yield loads. At the point when pursued by a fitting high-current yield cushion
(or mechanical or strong state hand-off), a GPIO might be utilized to control high-control gadgets, for example, lights, solenoids,
warmers, and engines (e.g., fans and blowers). So also, an info cradle, transfer or opto-isolator is regularly used to interpret a
generally contrary flag (e.g., high voltage) to the rationale levels required by a GPIO. Incorporated circuit GPIOs are regularly used
to control or screen other hardware (counting different ICs) on a board. Instances of this incorporate empowering and crippling
the task of (or capacity to) other hardware, perusing the conditions of on-board switches and setup shunts, and driving Drove
status pointers. In the last case, a GPIO can, as a rule, supply enough yield current to legitimately control a Drove without utilizing
a moderate support. Numerous GPIOs are once in a while utilized together as a bit-slammed correspondence interface. For instance,
two GPIOs might be utilized to execute a sequential correspondence transport, for example, I²C, and four GPIOs can be utilized to
actualize a SPI transport; these are regularly used to encourage sequential correspondence with ICs and different gadgets which
have perfect sequential interfaces, for example, sensors (e.g., temperature sensors, weight sensors, accelerometers) and engine
controllers. Taken to the outrageous, this strategy might be utilized to execute a whole parallel transport, along these lines
permitting correspondence with transport arranged ICs or circuit sheets.

The various functionalities of GPIO pins are defined below:

Fig: 1.2 GPIO pin description in Raspberry Pi


1.1 Moisture sensor

http://ssrn.com/link/ICAESMT-2019.html=xyz
Information Systems &eBusiness Network (ISN)

Electronic copy available at: https://ssrn.com/abstract=3418180


5

Soil moisture sensors are utilized to gauge the volumetric water content in soil , the soil moisture sensors measure the volumetric water content by
implication by utilizing some other property of the soil, for example, electrical opposition, dielectric consistent, as an intermediary for the moisture
content as the direct gravimetric estimation of free soil moisture requires expelling, drying, and weighting of an example. The connection among the
deliberate property and soil moisture must be adjusted and it might change contingent upon natural factors, for example, soil type, temperature, or electric
conductivity. Ranchers or cultivators can utilize versatile test instruments.

Soil moisture sensor is chiefly characterized as the sensor that gauges the volumetric water content. Another kind of sensors measure distinctive property
of moisture in soils called water potential; these sensors are generally incorporate densitometers and gypsum squares and are alluded to as soil water
potential sensors.

2.Connectivity technologies and interaction amongst various internet of things (I0T) devices
The main objective of the Internet of Things is the automatic exchange of useful data among two or more devices without manually operating
the device. Various communication methods using advanced technologies are used to exchange information between these devices, some of
these technologies are defined below:

2.1 Wireless Sensor Networks (WSN):


The Wireless Sensor Network are defined as the composition of various nodes independent in nature in which communication takes place
in wireless mode over a limited bandwidth and frequency. The different parts of the nodes used for communicating through WSN are
given below:
i. Sensor
ii. Microcontroller
iii. Memory
iv. Radio Transceiver
v. Battery
Multi-jump hand-off of information occur between the source and the base station on account of the compelled correspondence extent of each sensor center
of a WSN. The data is assembled by the sensors with the help of facilitated exertion made among the different center points, which is then sent to the sink
center point for composed coordinating towards the base station. The data transmission process between the center points occurs with the help of remote
radio handsets molded by the correspondence sort out.

2.2 Radio Frequency Identification (RFID)


The following correspondence innovation utilized in the area of the Internet of Things (IOT) is RFID innovation. It is intended to make
connection of data labels with one another simpler. The radio frequencies are utilized by the RFID labels for trade of helpful data among each
other with no physical restictions, for example, arrangement in a similar viewable pathway or physical contact. It utilizes the remote innovation

http://ssrn.com/link/ICAESMT-2019.html=xyz
Information Systems &eBusiness Network (ISN)

Electronic copy available at: https://ssrn.com/abstract=3418180


6

of Automatic Identification and Data Capture (AIDC).The two main components of RFID technology are given below:
2.2.1 RFID tags mainly known as Transponders:

A RFID tag consists of an antenna which is attached in a microchip by embedding method. They also contain memory units which consists of a unique
identifier known as (EPC). The main function of Electronic Product Code is to provide a universal numerical data in each tag which helps in
recognizing a particular tag universally.

There are mainly two types of RFID tags which are defined below:

i. Active tag: The active tags consists of an internal battery which helps in the interaction of its unique Electronic Product Code with the
neighboring surrounded Electronic Product Code remotely from a limited distance.

ii. Passive tag: The passive tags does not contain any internal battery. It substitutes the lack of internal battery by utilizing the electromagnetic
signal emitted by a tag reader through inductive coupling as a source of energy. The information relay of the tag’s Electronic Product Code
occurs only by its activation by a transceiver from a pre-defined range of the tag.
2.2.2 RFID readers mainly known as Transceivers:
The main function of a RFID reader is to work as identification detector of each and every tag with the help of interaction with the Electronic Product Code
of the tag which is currently under its scan.
3 Reasons for need of security in IOT
Many security and privacy issues are present in the Internet of Things technology based on the various above-mentioned security flaws. Some of them are
listed below:
i. Sensitive information like bank passwords are at high risk.

ii. Personal details like contact number, address, etc. ate easily available.

iii. Open access to private and highly confidential information.

iv. Interconnectivity leads to a huge risk to the entire network of devices as if one device is found under attack it can make all the other
connected devices vulnerable to security attack this leading to compromise its integrity.

v. The working of IOT mainly relies on the internet which makes it vulnerable to various virus attacks and worm attacks and all security
drawbacks which are related to an internet dependent computing device.

4. Security Measures
 Secure booting:
The realness and trustworthiness of the item on the device is confirmed using cryptographically made computerized marks when power is first
acquainted with the gadget similarly as when an individual signs an authoritative record, an advanced picture is joined with a computerized signature
and afterward checked by the gadget which ensures that solitary the approved programming to continue running on that device, and set apart by the
substance that endorsed it, will be stacked. The trust commendable establishment has been built up, even subsequent to giving computerized signature
the gadget must be shielded from malevolent expectations and run time dangers.
 Access control:
Different sort of access control and asset control are connected. The gadget parts and applications have worked in compulsory or job based access
controls in the working framework which restricts the benefits so they get to just the assets which are obligatory to finish their activity. Access control
dependably ensures that the gatecrasher has the insignificant access to different pieces of the framework if on the off chance that any part is
undermined this makes the working a lot more secure in nature. Gadget based access control instruments are practically equivalent to arrange based
access control frameworks, regardless of whether somebody figured out how to take corporate qualifications to access a system, traded off data
would be restricted to just those zones of the system approved by those specific accreditations. The guideline of least benefit is characterized as the
base access required to play out a capacity is given to limit the impacts of rupture of security.

http://ssrn.com/link/ICAESMT-2019.html=xyz
Information Systems &eBusiness Network (ISN)

Electronic copy available at: https://ssrn.com/abstract=3418180


7

 Device authentication:
The gadget ought to verify before accepting or transmitting information when the gadget is associated with the system. To guarantee that a profoundly
implanted gadgets are distinguished effectively before approval, as these kinds of gadgets don't have physical clients utilizing consoles to enter
qualifications to get to the system. The machine verification is utilized to enable a contraption to get to a framework dependent on a comparable
arrangement of certifications put away in a safe stockpiling region same as client confirmation requires client name and secret word to get to a
corporate system.

 Firewalling and IPS:


A firewall and profound parcel assessment are required by the gadget to control the traffic which will end at the gadget. The different explicit industry
related convention sifting and profound bundle examination capacities are required by the gadget to recognize pernicious payloads covering up in
non-IT conventions. The system apparatuses deal with sifting higher-level, normal Internet traffic, however it needs to channel the specific data
bound to finish on that contraption so that uses the limited computational resources available.

 Updates and patches:


A gadget gets hot patches and programming refreshes once the gadget is in activity, the executives need to take off patches, and the contraptions
needs to confirm them, with the goal that it doesn't expend data transfer capacity or does not debilitate the working security of the gadget. For
instance, when a client is attached to their workstations for 15 minutes when Microsoft sends updates to Windows® clients. The best possible
approach to convey a product update and a wellbeing patch is that it should monitor the restricted data transfer capacity and discontinuous availability
of an implanted gadget which thusly totally takes out the likelihood of trading off the practical security.

 Start with OS:


The security to the product ought to be presented in the working framework level as it is a fundamental piece of a product's dependable working. To
keep up a trust commendable registering base the ability of cutting edge equipment security joined with gadget stack ought to be utilized. A safe
domain for working of working framework is essential and a group of exceptionally competent engineers and fashioners is required to arrange
frameworks to relieve dangers and guarantee their stages are sheltered as ordinary assignments relies upon the best possible and safe working of the
working framework.
5. Problem statement
 Irregular watering prompts mineral defeciency in the soil resulting in rotting of plants.
 The exact time at which plant needs to be watered can be monitored using soil moisture sensor leading to save water wastage.
 Arduino based projects have less processing speed (8-16MHz) as compared to Raspberry Pi (1GHz).

Difference between Arduino and Raspberry Pi


 Raspberry pi
Some of the main advantages of Raspberry Pi are as follows:
 It has easy internet connectivity.
• Entire Linux programming stack is

accessible.

 Can be modified utilizing an assortment of

programming languages

Limitations of Raspberry Pi are as follows:

• Accessing equipment is anything but a constant. Interfacing with the equipment can be postponed, if CPU is occupied.

• Doesn't contain enough capacity to drive inductive burdens.

• No accessibility of inbuilt Analog to Digital converter.

• No open source equipment structure.

http://ssrn.com/link/ICAESMT-2019.html=xyz
Information Systems &eBusiness Network (ISN)

Electronic copy available at: https://ssrn.com/abstract=3418180


8

 Arduino
The main advantages of Arduino are as follows:

 Very easy to use.


 Can be used for real-time applications for hardware, software and IDE is open source.
 No need of advanced programming knowledge for basic working.
 Easy to extend and includes various user contributed shields and libraries.

The main limitations of Arduino are as follows:


 Less powerful than Raspberry Pi.
 Can be programmed only by using either Arduino or C/C++.
 Internet connectivity is slightly difficult, but not impossible.
 Arduino based systems are not efficient at multitasking.
 Watering vertical gardens without wastage and leakage.

6. Proposed work
 This automatic self watering system senses the moisture content of the soil with the help of soil moisture sensors.
 The desired amount of water is transmitted depending on the threshold value set with the help of water pump.
 This mechanism helps the plants and crops to grow at their maximum potential and thus helps in saving the land reserved water.
 This system can be further programmed to work with different variety of crops and their individual water requirements.
 This system is can work efficiently for large scale vertical gardens

7. Methodology

Fig: 7.1 flow chart of automatic self watering system

http://ssrn.com/link/ICAESMT-2019.html=xyz
Information Systems &eBusiness Network (ISN)

Electronic copy available at: https://ssrn.com/abstract=3418180


9

Fig 7.2 : connections in automatic self watering system

8. Conclusion:
The best way to predict the future is to create it and for a better future advancement in technology and security is mandatory. Thus,
through this paper we have studied about automatic self-watering system and security in Internet of things and various flaws in the
technologies used in the IOT, which may prove to be unfavorable in its implementation. In order to develop better irrigation techniques
and advancement in self watering of vertical gardens we need to focus on use of various types of sensors and wireless methods to
implement the system which will lead to an efficient functioning of the automatic self-watering system. By concluding we would like to
suggest that for an advanced, safe and secure world ahead we should pay more attention towards a technology’s development.

9. Acknowledgement
I would like to offer my true thanks to my mentor Prof. Madhu kirola, Dept. Of Computer Science, Uttaranchal University, for the continuous
help on my research, for her understanding, inspiration, and tremendous learning. Her direction helped me in all the season of research and
composing of this paper. I thank everyone for their assistance straightforwardly and in a roundabout way to help me complete this research.

10. References
[1] security-in-the-internet-of-things by Wind River

[2] Shen, Guicheng, and Bingwu Liu. "The visions, technologies, applications and security issues of Internet of Things." E-Business and E-
Government (ICEE), 2011 International Conference on. IEEE, 2011.

[3] http://www.kscst.iisc.ernet.in/spp/40_series/SPP40S/02.../210_40S_BE_2125.pdf , Aishwarya T , Chaithra M, Meghana M R ,


Shushma R Krishnan(raspberry pi and aurdino based automated irrigation system) ,sponsored by IISC, Banglore2017
[4] https://www.onlinejournal.in/IJIRV2I4/211.pdf , Abhishek Gupta, Shailesh Kumawat, Shubham Garg( Automatic Plant Watering System ),
(IJIR)
Vol-2, Issue-4, 2016
[5] https://www.ijsr.net/archive/v5i6/NOV164836.pdf, Jadhav,S., & Hambarde.S. , (Android based Automated Irrigation System

http://ssrn.com/link/ICAESMT-2019.html=xyz
Information Systems &eBusiness Network (ISN)

Electronic copy available at: https://ssrn.com/abstract=3418180


10

using Raspberry Pi) , International Journal of Science and Research,5(6),2345-51,2016.


[6] Wikipedia
[7] ijisset.org
[8] Drashti Divani, Pallavi Patil, Sunil K. Punjabi. "Automated plant Watering system", 2016 International Conference on Computation of
Power, Energy Information and Commuincation (ICCPEIC), 2016
[9] Chandan Kumar Sahu, Pramitee Behera. "A low cost smart irrigation control system", 2015 2nd International Conference on Electronics
and Communication Systems (ICECS), 2015
[10] Ashwini B V. "A Study on Smart Irrigation System Using IoT for Surveillance of CropField", International Journal of Engineering &
Technology, 2018
[11] Vujović, Vladimir, and Mirjana Maksimović. "Raspberry Pi as a Sensor Web node for home automation", Computers & Electrical
Engineering, 2015.

http://ssrn.com/link/ICAESMT-2019.html=xyz
Information Systems &eBusiness Network (ISN)

Electronic copy available at: https://ssrn.com/abstract=3418180

You might also like