Agriculture sensors play an important role in modern agriculture. The use of sensors in various agriculture sectors minimizes the environmental impact on crops, helps in increasing yield and saving cost of operation. Among all agriculture industries in Malaysia, the mushroom industry is a comparatively new and small. As most of the mushroom farms in Malaysia are small-scaled, their production capability is limited by inadequate environmental control system and the lack of financial resources to upgrade the systems. This paper presents an environmental monitoring and controlling system to monitor and control the environmental conditions in a mushroom farm. It enables user to monitor temperature, humidity, carbon dioxide concentration and light intensity in a mushroom farm on an android device by using ThingSpeak online platform. The control algorithm is able to control devices in a mushroom farm automatically based on feedback from the sensors to maintain the environment in an optimum condition for mushroom growth. The measured percentage error of temperature, humidity, carbon dioxide and the light using the developed system was as low as 0.4%, 1.5%, 2.2% and 1.34% respectively
Global Digital Sukuk (GDS) - A basic frameworkTariqullah Khan
GDS is a suggested digital Sukuk based on the idea of Bitcoin, but is proposed to be a registered and regulated digital(crypto)-asset as a perpetual Mudharabah issued on Public Blockchain by a credible SDGs oriented entity based on the entity’s overall balance sheet strength. The keywords are:
a. Digital(Crypto)-asset that is registered and regulated
b. On Public Blockchain
c. Perpetual Mudharabah Sukuk
d. Based on the overall balance sheet strength of the issuer
e. The issuer is a SDGs oriented business entity having track record of issuing Sukuk.
The most relevant platforms overview for blockchain developers in 2020Blockchain Council
In addition to its versatile capabilities, blockchain technology still has the potential for growth. Blockchain platforms enable blockchain developers to develop apps to enhance and expand the uses and tools of the technology. Despite their cutting edge technology, blockchain platforms’ pros and cons still need to be considered when you intend to be involved in the blockchain industry.
The huge volume of text documents available on the internet has made it difficult to find valuable
information for specific users. In fact, the need for efficient applications to extract interested knowledge
from textual documents is vitally important. This paper addresses the problem of responding to user
queries by fetching the most relevant documents from a clustered set of documents. For this purpose, a
cluster-based information retrieval framework was proposed in this paper, in order to design and develop
a system for analysing and extracting useful patterns from text documents. In this approach, a pre-
processing step is first performed to find frequent and high-utility patterns in the data set. Then a Vector
Space Model (VSM) is performed to represent the dataset. The system was implemented through two main
phases. In phase 1, the clustering analysis process is designed and implemented to group documents into
several clusters, while in phase 2, an information retrieval process was implemented to rank clusters
according to the user queries in order to retrieve the relevant documents from specific clusters deemed
relevant to the query. Then the results are evaluated according to evaluation criteria. Recall and Precision
(P@5, P@10) of the retrieved results. P@5 was 0.660 and P@10 was 0.655.
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATIONijcsit
Along by a continuous improvement to composite electronic devices, a safety to technicians takes
additionally become the matter to good concern, as a result to technicians' lives is in jeopardy while their
work through shutting down circuit breakers, even that even once the breaker takes been switched off,
someone will inadvertently flip to while a technician remains working. That should be a system to
guarantee safety that technicians. Also, individuals do not love switching all the time toward turn on / off
appliances like fans/lighting/air conditioners. It ends in wasted energy thanks to unnecessarily placing the
instrument. To address these issues, we tend to come up through the system through mobile app-controlled
circuit breakers that degrade wireless management to home appliances to hunt down a golem app. That
replaces a traditional breaker through the mobile app-controlled system in the on / off system, where no
one will activate the breaker, while not the word. The remote of home appliances helps a user to save
electricity. That enhances a quality of life and luxury. Additionally, a system includes the home security
mechanism against drone intrusion using the mobile app-controlled door lock system besides the
mechanism that sleuthing dangerous gas leaks. A formation of the system subtracts the degree of victim
associate ESP 32 microcontroller, the Bluetooth module, matrix 4x4 keyboards, and the paraffin gas
detector associate with a golem mobile application. The entire system is usually compact systems
Agriculture is one of the areas where blockchain technology could bring a revolution by solving the
existing problem of Agri-product fraud, its traceability, price manipulation, and lack of customer trust in
the product. This paper aims to demonstrate the potential application of blockchain technology in the
agriculture industry and how it could address the existing issues by surveying the existing paper and
following case studies of the blockchain start-up companies. Blockchain technology shows a promising
approach to fostering a safer, better, more sustainable, and dependable agri-foods system in the future.
While the application of blockchain in agriculture is in the initial phase and faces various issues like cost
of implementation, privacy, security scalability, performance, and infancy, it can bring a revolution in the
agriculture industry.
Global Digital Sukuk (GDS) - A basic frameworkTariqullah Khan
GDS is a suggested digital Sukuk based on the idea of Bitcoin, but is proposed to be a registered and regulated digital(crypto)-asset as a perpetual Mudharabah issued on Public Blockchain by a credible SDGs oriented entity based on the entity’s overall balance sheet strength. The keywords are:
a. Digital(Crypto)-asset that is registered and regulated
b. On Public Blockchain
c. Perpetual Mudharabah Sukuk
d. Based on the overall balance sheet strength of the issuer
e. The issuer is a SDGs oriented business entity having track record of issuing Sukuk.
The most relevant platforms overview for blockchain developers in 2020Blockchain Council
In addition to its versatile capabilities, blockchain technology still has the potential for growth. Blockchain platforms enable blockchain developers to develop apps to enhance and expand the uses and tools of the technology. Despite their cutting edge technology, blockchain platforms’ pros and cons still need to be considered when you intend to be involved in the blockchain industry.
The huge volume of text documents available on the internet has made it difficult to find valuable
information for specific users. In fact, the need for efficient applications to extract interested knowledge
from textual documents is vitally important. This paper addresses the problem of responding to user
queries by fetching the most relevant documents from a clustered set of documents. For this purpose, a
cluster-based information retrieval framework was proposed in this paper, in order to design and develop
a system for analysing and extracting useful patterns from text documents. In this approach, a pre-
processing step is first performed to find frequent and high-utility patterns in the data set. Then a Vector
Space Model (VSM) is performed to represent the dataset. The system was implemented through two main
phases. In phase 1, the clustering analysis process is designed and implemented to group documents into
several clusters, while in phase 2, an information retrieval process was implemented to rank clusters
according to the user queries in order to retrieve the relevant documents from specific clusters deemed
relevant to the query. Then the results are evaluated according to evaluation criteria. Recall and Precision
(P@5, P@10) of the retrieved results. P@5 was 0.660 and P@10 was 0.655.
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATIONijcsit
Along by a continuous improvement to composite electronic devices, a safety to technicians takes
additionally become the matter to good concern, as a result to technicians' lives is in jeopardy while their
work through shutting down circuit breakers, even that even once the breaker takes been switched off,
someone will inadvertently flip to while a technician remains working. That should be a system to
guarantee safety that technicians. Also, individuals do not love switching all the time toward turn on / off
appliances like fans/lighting/air conditioners. It ends in wasted energy thanks to unnecessarily placing the
instrument. To address these issues, we tend to come up through the system through mobile app-controlled
circuit breakers that degrade wireless management to home appliances to hunt down a golem app. That
replaces a traditional breaker through the mobile app-controlled system in the on / off system, where no
one will activate the breaker, while not the word. The remote of home appliances helps a user to save
electricity. That enhances a quality of life and luxury. Additionally, a system includes the home security
mechanism against drone intrusion using the mobile app-controlled door lock system besides the
mechanism that sleuthing dangerous gas leaks. A formation of the system subtracts the degree of victim
associate ESP 32 microcontroller, the Bluetooth module, matrix 4x4 keyboards, and the paraffin gas
detector associate with a golem mobile application. The entire system is usually compact systems
Agriculture is one of the areas where blockchain technology could bring a revolution by solving the
existing problem of Agri-product fraud, its traceability, price manipulation, and lack of customer trust in
the product. This paper aims to demonstrate the potential application of blockchain technology in the
agriculture industry and how it could address the existing issues by surveying the existing paper and
following case studies of the blockchain start-up companies. Blockchain technology shows a promising
approach to fostering a safer, better, more sustainable, and dependable agri-foods system in the future.
While the application of blockchain in agriculture is in the initial phase and faces various issues like cost
of implementation, privacy, security scalability, performance, and infancy, it can bring a revolution in the
agriculture industry.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Secure and Smart IoT using Blockchain and AIAhmed Banafa
The first 29 pages of my book "Secure and Smart IoT Using Blockchain and AI " Including Forward, Preface, Table of Contents , list of Figures, and Chapter 1. https://www.amazon.com/Secure-Smart-Internet-Things-IoT/dp/8770220301/
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
Second line of defense for cybersecurity : BlockchainAhmed Banafa
With the fact that cybercrime and cyber security attacks hardly seem to be out of the news these days and the threat is growing globally.
Nobody would appear immune to malicious and offensive acts targeting computer networks, infrastructures and personal computer devices.
Firms clearly must invest to stay resilient.
Gauging the exact size of cybercrime and putting a precise US dollar value on it is nonetheless tricky.
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIESijcsit
Ransomware attacks are on the rise and attackers are hijacking valuable information from different
critical infrastructures and businesses requiring ransom payments to release the encrypted files. Payments
in cryptocurrencies are designed to evade tracing the transactions and the recipients. With anonymity
being paramount, tracing cryptocurrencies payments due to malicious activity and criminal transactions is
a complicated process. Therefore, the need to identify these transactions and label them is crucial to
categorize them as legitimate digital currency trade and exchange or malicious activity operations.
Machine learning techniques are utilized to train the machine to recognize specific transactions and trace
them back to malicious transactions or benign ones. I propose to work on the Bitcoin Heist data set to
classify the different malicious transactions. The different transactions features are analyzed to predict a
classifier label among the classifiers that have been identified as ransomware or associated with malicious
activity. I use decision tree classifiers and ensemble learning to implement a random forest classifier.
Results are assessed to evaluate accuracy, precision, and recall. I limit the study design to known
ransomware identified previously and made available under the Bitcoin transaction graph from January
2009 to December 2018.
A decentralized consensus application using blockchain ecosystem IJECEIAES
The consensus is a critical operation of any decision-making process. It involves a set of eligible members; whose decision need to be honored by taking their acknowledgment before making any decision. The traditional consensus process follows centralized architecture, the members need to rely on and trust this architecture. The proposed system aims to develop a secure decentralized consensus application in the untrusted environment by making use of blockchain technology along with smart contract and interplanetary file system (IPFS).
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond.
Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models.
The Blockchain Wave in 2019 and BeyondAhmed Banafa
We’re still in the early days of Blockchain as a technology, and so we’re yet to see the full impact that it will have on the world that we live in. Still, it’s already showing potential across a range of industries and started to enter the public consciousness, so the real question is what will happen when Blockchain technology starts to mature.
The adoption of bitcoins technology: The difference between perceived future ...IJECEIAES
Bitcoin is a decentralized system that tries to become a solution to the shortcomings of fiat and gold-based currencies. Considering its newness, the adoption level of bitcoin is yet understood. Hence, several variables are proposed in this work in examining user perceptions regarding performance expectancy, effort expectancy, trust, adoption risk, decentralization and social influence interplay, with the context of user’s future expectation and behavioral intentions to use bitcoins. Data were gathered from 293 completed questionnaire and analised using AMOS 18. The outcomes prove the sound predictability of the proposed model regarding user’s future expectations and intentions toward bitcoins. All hypotheses were supported, they were significantly affecting the dependent variables. Social influence was found as the highest predictor of behavioral intention to negatively utilize bitcoins. The significant impact of social influence, adoption risk and effort expectancy which affect behavioral intention to use bitcoins the most, are demonstrated in this study. Bitcoins should thus, present an effective, feasible and personalized program which will assist efficient usage among users. Additionally, the impacts of social influence, adoption risk and perceived trust on behavioral intention to utilize new technology were compared, and their direct path was tested together, for the first time in this context.
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.
Seminar of the Web Security and Privacy course of the Master Degree in Engineering in Computer Science (Cyber Security) of the University of Rome "La Sapienza".
The presentation is about a research project called "Smart Home" in which the Block Chain method is applied in a Smart Home environment to assure Privacy and Security in an IoT context.
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Tyrone Systems
Blockchain offers the potential of greatly improving the overall security of the IoT environment. The verifiable, secure and permanent method of recording data processed by “smart” machines in the IoT.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Secure and Smart IoT using Blockchain and AIAhmed Banafa
The first 29 pages of my book "Secure and Smart IoT Using Blockchain and AI " Including Forward, Preface, Table of Contents , list of Figures, and Chapter 1. https://www.amazon.com/Secure-Smart-Internet-Things-IoT/dp/8770220301/
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
Second line of defense for cybersecurity : BlockchainAhmed Banafa
With the fact that cybercrime and cyber security attacks hardly seem to be out of the news these days and the threat is growing globally.
Nobody would appear immune to malicious and offensive acts targeting computer networks, infrastructures and personal computer devices.
Firms clearly must invest to stay resilient.
Gauging the exact size of cybercrime and putting a precise US dollar value on it is nonetheless tricky.
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIESijcsit
Ransomware attacks are on the rise and attackers are hijacking valuable information from different
critical infrastructures and businesses requiring ransom payments to release the encrypted files. Payments
in cryptocurrencies are designed to evade tracing the transactions and the recipients. With anonymity
being paramount, tracing cryptocurrencies payments due to malicious activity and criminal transactions is
a complicated process. Therefore, the need to identify these transactions and label them is crucial to
categorize them as legitimate digital currency trade and exchange or malicious activity operations.
Machine learning techniques are utilized to train the machine to recognize specific transactions and trace
them back to malicious transactions or benign ones. I propose to work on the Bitcoin Heist data set to
classify the different malicious transactions. The different transactions features are analyzed to predict a
classifier label among the classifiers that have been identified as ransomware or associated with malicious
activity. I use decision tree classifiers and ensemble learning to implement a random forest classifier.
Results are assessed to evaluate accuracy, precision, and recall. I limit the study design to known
ransomware identified previously and made available under the Bitcoin transaction graph from January
2009 to December 2018.
A decentralized consensus application using blockchain ecosystem IJECEIAES
The consensus is a critical operation of any decision-making process. It involves a set of eligible members; whose decision need to be honored by taking their acknowledgment before making any decision. The traditional consensus process follows centralized architecture, the members need to rely on and trust this architecture. The proposed system aims to develop a secure decentralized consensus application in the untrusted environment by making use of blockchain technology along with smart contract and interplanetary file system (IPFS).
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond.
Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models.
The Blockchain Wave in 2019 and BeyondAhmed Banafa
We’re still in the early days of Blockchain as a technology, and so we’re yet to see the full impact that it will have on the world that we live in. Still, it’s already showing potential across a range of industries and started to enter the public consciousness, so the real question is what will happen when Blockchain technology starts to mature.
The adoption of bitcoins technology: The difference between perceived future ...IJECEIAES
Bitcoin is a decentralized system that tries to become a solution to the shortcomings of fiat and gold-based currencies. Considering its newness, the adoption level of bitcoin is yet understood. Hence, several variables are proposed in this work in examining user perceptions regarding performance expectancy, effort expectancy, trust, adoption risk, decentralization and social influence interplay, with the context of user’s future expectation and behavioral intentions to use bitcoins. Data were gathered from 293 completed questionnaire and analised using AMOS 18. The outcomes prove the sound predictability of the proposed model regarding user’s future expectations and intentions toward bitcoins. All hypotheses were supported, they were significantly affecting the dependent variables. Social influence was found as the highest predictor of behavioral intention to negatively utilize bitcoins. The significant impact of social influence, adoption risk and effort expectancy which affect behavioral intention to use bitcoins the most, are demonstrated in this study. Bitcoins should thus, present an effective, feasible and personalized program which will assist efficient usage among users. Additionally, the impacts of social influence, adoption risk and perceived trust on behavioral intention to utilize new technology were compared, and their direct path was tested together, for the first time in this context.
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.
Seminar of the Web Security and Privacy course of the Master Degree in Engineering in Computer Science (Cyber Security) of the University of Rome "La Sapienza".
The presentation is about a research project called "Smart Home" in which the Block Chain method is applied in a Smart Home environment to assure Privacy and Security in an IoT context.
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Tyrone Systems
Blockchain offers the potential of greatly improving the overall security of the IoT environment. The verifiable, secure and permanent method of recording data processed by “smart” machines in the IoT.
This article focuses on providing solutions for one important application termed as agriculture. In India, one major occupation for people living in urban and rural areas is agriculture where an economic rate depends only on the crops they yield. In such cases, if an intelligent monitoring device is not integrated then it becomes difficult for the farmers to grow their crops and to accomplish marginal income from what they have invested. Also existing methods have been analyzed in the same field where some devices have been installed and checked for increasing the productivity of horticulture crops. But existing methods fail to install an intelligent monitoring device that can provide periodic results within short span of time. Therefore, a sensor based technology with Internet of Things (IoT) has been implemented in the projected work for monitoring major parameters that support the growth and income of farmers. Also, an optimization algorithm for identifying the loss in different crops has been incorporated for maximizing the system boundary and to transmit data to farmers located in different areas. To prove the cogency of proposed method some existing methods have been compared and the results prove the projected technique produces improved results for
about 58%.
Design and Layout of Automatic Soil Moisture, Temperature and Humidity Regula...ijtsrd
This paper proposes an automated irrigation and temperature cum humidity regulation system which monitors and maintains the desire Soil Moisture, Temperature and Humidity content accordingly within a polyhouse. Microcontroller ATMEGA328P on Arduino UNO platform is used to implement the control unit. The setup uses soil moisture sensor and DHT22 temperature and humidity sensor to measure the exact value of moisture, temperature and humidity levels. An LCD display is used to monitor the required levels. Deepika S | Anushya. J | Raaghul. B | Vinopalan. P | Nithya U "Design and Layout of Automatic Soil Moisture, Temperature and Humidity Regulation in Polyhouse" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49590.pdf Paper URL: https://www.ijtsrd.com/engineering/agricultural-engineering/49590/design-and-layout-of-automatic-soil-moisture-temperature-and-humidity-regulation-in-polyhouse/deepika-s
Cloud IoT Based Greenhouse Monitoring SystemIJERA Editor
This project explains the design and implementation of an electronic system based on GSM (Global System for
Mobile communication), cloud computing and Internet of Things (IoT) for sensing the climatic parameters in
the greenhouse. Based on the characteristics of accurate perception, efficient transmission and intelligent
synthesis of Internet of Things and cloud computing, the system can obtain real-time environmental information
for crop growth and then be transmitted. The system can monitor a variety of environmental parameters in
greenhouse effectively and meet the actual agricultural production requirements. Devices such as temperature
sensor, light sensor, relative humidity sensor and soil moisture sensor are integrated to demonstrate the proposed
system. This research focuses on developing a system that can automatically measure and monitor changes of
temperature, light, Humidity and moisture level in the greenhouse. The quantity and quality of production in
greenhouses can be increased. The procedure used in our system provides the owner with the details online
irrespective of their presence onsite. The main system collects environmental parameters inside greenhouse
tunnel every 30 seconds. The parameters that are collected by a network of sensors are being logged and stored
online using cloud computing and Internet of Things (IoT) together called as CloudIoT.
Control Based On the Temperature and Moisture, Using the Fuzzy Logic.IJERA Editor
This paper explains the design and implementation of an electronic system based on a for remote control of several experimental greenhouses. This system enables its user to consult the climatic parameters and to order the greenhouses sub-systems equipment’s by SMS. The climate Sensors are packaged using the electronic circuits, and the whole is being interfaced with maps of acquisitions (Arduino) via a radio frequency connection. These sensors provide information used for the control of ventilation, heating and water pumping by SMS. The acquisitions boards contain fuzzy controllers who manage the climate for local agricultural greenhouses. The procedure used in our system offers the operator an optimal control and monitoring without traveling to the place where the greenhouses are located, using his mobile phone, and being able to view at any moment the state of the greenhouse climate via the send and receive SMS function.
Today, majority of the farmers are dependent on agriculture for their survival. But
majority of the agricultural tools and practices are outdated and it yields less crop
products, because everything is depends on environment and Government support. The
world population is becoming more comparatively cultivation land and crop yield. It is
essential for the world to increase the yielding of the crop by adopting information
technology and communication plays a vital role in smart farming. The objective of this
research paper to present tools and best practices for understanding the role of
information and communication technologies in agriculture sector, motivate and make
the illiterate farmers to understand the best insights given by the big data analytics using
machine learning
IoT Based Smart Horticulture Monitoring Systemijtsrd
For smart horticulture system, one person take care of everything is some difficult due to his busy life style, but the healthy food and financially feasible life time is very important. Now a days the vegetables containing more chemical wastages that affect the human life time. The smart horticulture systems provide the each one to create the food healthy and ensure the quality of the vegetables to create home itself using this horticulture. The normal person can keep the horticulture running and the plants healthy in case the primary person becomes unavailable. The horticulture production needs less labour, less capital, has faster returns than normal production. And it cannot be easily influenced by the climate. Therefore the nurseries are wanted subsequent to next to vegetable under growers. It be extremely easier said than done en route for be alive inside incriminate of scattered horticulture lacking a isolated atmosphere monitor arrangement. In current technology, there appeared a canopy remote monitoring system based on Ethernet. In this system we make use of dissimilar module such since Global System Monitoring, 8051 next to the alike moment as organizer, be on fire detecting antenna, warmth detect feeler, dampness detect feeler, and exhibit the being there of gab resting on 16X2 LCD lying on the receiver surface. If any gas exceeds the value automatically send alert message has to be given to concerned person .whether prediction can be predicted by using machine learning technique so we aware of the whether condition due to climate changes. This project is created as a product and gives the healthy life and small scale level business. Shahin. K | Kanimozhi. R | Balachandar. A ""IoT Based Smart Horticulture Monitoring System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23466.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23466/iot-based-smart-horticulture-monitoring-system/shahin-k
The global agriculture system faces significant challenges in meeting the
growing demand for food production, particularly given projections that the
world's population will reach 70% by 2050. Hydroponic farming is an
increasingly popular technique in this field, offering a promising solution to
these challenges. This paper will present the improvement of the current
traditional hydroponic method by providing a system that can be used to
monitor and control the important element in order to help the plant grow up
smoothly. This proposed system is quite efficient and user-friendly that can
be used by anyone. This is a combination of a traditional hydroponic system,
an automatic control system and a smartphone. The primary objective is to
develop a smart system capable of monitoring and controlling potential
hydrogen (pH) levels, a key factor that affects hydroponic plant growth.
Ultimately, this paper offers an alternative approach to address the challenges
of the existing agricultural system and promote the production of clean,
disease-free, and healthy food for a better future.
Here we measure soil and atmospheric parameters in a polyhouse. When the temperature exceeds a limit, motor for spraying the water will be turned ON and if the moisture content of soil goes below a predefined value, motor for drip irrigation will be turned ON. The LCD will display the measured parameters in a fixed interval of time. We are using pot to represent sensors. The contrast of LCD can be controlled using a pot connected to the breadboard.
WEB-BASED IRRIGATION MONITORING AND CONTROL SYSTEMijcseit
In Uganda, as well as other developing countries, the increasing population stimulates the
agricultural-related activities such as irrigation. Irrigation is basically done by humans and generally
requires exhaustive physical efforts and involves exposure to errors during irrigation. Despite the
advances in the irrigation and its wide spreading applications, irrigation remains majorly manual. Since
irrigating is a difficult process especially when irrigating a big piece of land, it is necessary to simplify the
process, thus web based system in irrigating was introduced and existing implementations have limitations
such as irrigating at wrong hours, continued wastage of water, so prevent all this, a new system that uses a
web control to remotely irrigate from a distance has been developed ,therefore main objective of this
project is to design and develop a web based irrigation monitoring and control system since it is observed
that this method is more reliable and efficient compared to the existing methods. The developed system is
able to automatically receive the moisture levels from the field, responds to the different commands sent by
the user to do the irrigation and the user is also able to switch on and off the pump.
WEB-BASED IRRIGATION MONITORING AND CONTROL SYSTEMijcseit
In Uganda, as well as other developing countries, the increasing population stimulates the agricultural-related activities such as irrigation. Irrigation is basically done by humans and generally requires exhaustive physical efforts and involves exposure to errors during irrigation. Despite the advances in the irrigation and its wide spreading applications, irrigation remains majorly manual. Since irrigating is a difficult process especially when irrigating a big piece of land, it is necessary to simplify the process, thus web based system in irrigating was introduced and existing implementations have limitations such as irrigating at wrong hours, continued wastage of water, so prevent all this, a new system that uses a web control to remotely irrigate from a distance has been developed ,therefore main objective of this project is to design and develop a web based irrigation monitoring and control system since it is observed that this method is more reliable and efficient compared to the existing methods. The developed system is able to automatically receive the moisture levels from the field, responds to the different commands sent by the user to do the irrigation and the user is also able to switch on and off the pump.
Similar to Environmental Monitoring and Controlling System for Mushroom Farm with Online Interface (20)
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This paper describes the outcome of an attempt to implement the same transitive closure (TC) algorithm
for Apache MapReduce running on different Apache Hadoop distributions. Apache MapReduce is a
software framework used with Apache Hadoop, which has become the de facto standard platform for
processing and storing large amounts of data in a distributed computing environment. The research
presented here focuses on the variations observed among the results of an efficient iterative transitive
closure algorithm when run against different distributed environments. The results from these comparisons
were validated against the benchmark results from OYSTER, an open source Entity Resolution system. The
experiment results highlighted the inconsistencies that can occur when using the same codebase with
different implementations of Map Reduce.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Environmental Monitoring and Controlling System for Mushroom Farm with Online Interface
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 4, August 2017
DOI:10.5121/ijcsit.2017.9402 17
ENVIRONMENTAL MONITORING AND
CONTROLLING SYSTEM FOR MUSHROOM FARM
WITH ONLINE INTERFACE
Arjuna Marzuki and Soh Yan Ying
School of Electrical and Electronic Engineering, Universiti Sains Malaysia, Penang,
Malaysia
ABSTRACT
Agriculture sensors play an important role in modern agriculture. The use of sensors in various agriculture
sectors minimizes the environmental impact on crops, helps in increasing yield and saving cost of
operation. Among all agriculture industries in Malaysia, the mushroom industry is a comparatively new
and small. As most of the mushroom farms in Malaysia are small-scaled, their production capability is
limited by inadequate environmental control system and the lack of financial resources to upgrade the
systems. This paper presents an environmental monitoring and controlling system to monitor and control
the environmental conditions in a mushroom farm. It enables user to monitor temperature, humidity,
carbon dioxide concentration and light intensity in a mushroom farm on an android device by using
ThingSpeak online platform. The control algorithm is able to control devices in a mushroom farm
automatically based on feedback from the sensors to maintain the environment in an optimum condition for
mushroom growth. The measured percentage error of temperature, humidity, carbon dioxide and the light
using the developed system was as low as 0.4%, 1.5%, 2.2% and 1.34% respectively.
KEYWORDS
Agriculture, Interface Circuit, Internet of Things, Monitoring and Control, Sensor, Wireless.
1. INTRODUCTION
The contribution of agriculture to the Malaysia’s national GDP (gross domestic product) has
declined from nearly 50% in the 1950s to 9.7% in year 2008 [1, 2]. The decline is due to several
challenges. Some of the major challenges faced by agriculture sector in Malaysia are persistent
poverty among rural farming community, food insecurity, labour intensive and high cost of land
[3].
Among all agriculture products in Malaysia, mushroom is found to be a viable option to develop
more reliable sources of income, especially for small-scale farmers [4]. In fact, mushrooms are
listed as one of the seven high-valued crops by Malaysian government [5]. Besides generating
income, it can also improve food security by increasing diversity. This is because mushrooms
have short growing time, requires limited land and low investment as the growing medium is
widely available [4].
Mushroom industry is comparatively new in Malaysia compared to other agricultural industry [6].
The productivity of domestic production of mushrooms is low and is unable to meet the demand
of the market. Thus, Malaysia has to import tons of mushrooms every year since 2009. The
import has reached more than 10 million tons in 2012, driven by high local demand [6]. Besides,
mushroom farming is very labor-intensive [7]. Thus, to expand the industry in Malaysia, an
automatic system is needed to increase the yield of mushrooms with less labor.
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 4, August 2017
18
Currently, a timer-controlled misting system is used to control the humidity in most of the small-
scale mushroom farms in Malaysia. This method is not accurate as humidity in the air varies
according to the weather. A timer-controlled system may cause excess moisture, which
encourages certain contaminates.
Mushrooms are a type of fungus and they do not contain chlorophyll [8]. Generally, the
conditions can be summarized into temperature, humidity, light and fresh air [9]. Air flow of the
mushroom growing room is an important aspect of mushroom growing as it directly affects the
carbon dioxide content of the room [10].
Growth cycle of mushrooms can be simplified into two stages — the vegetative phase, which
consists of mycelia expansion and maturation, and the reproductive phase [11]. To cultivate
mushrooms, a mycelium culture is allowed to propagate on sterilized cereal grains, forming
spawn. The spawn is inoculated into a sterilised substrate and the substrate is allowed to incubate.
During incubation, mycelium grows throughout the substrate and uses up the nutrients in it. This
process is called spawn run [12]. During spawn run, the optimum temperature is around 25
degrees Celsius and high carbon dioxide concentration is favorable. After that, the mycelium
reaches the reproductive stage and is capable of producing mushrooms. Key factors which
induces the production of mushrooms are sudden decrease in temperature (decrease of 5 to 10
degrees Celsius), and sudden decrease in carbon dioxide concentration [8]. After that, the
optimum temperature for growth is around 10 to 25 degrees Celsius, 85% to 92 %RH (relative
humidity), carbon dioxide concentration less than 600 ppm (parts per million) and 500 lux to
2,000 lux for 12 hours [9]. As different phases require different humidity, temperature, carbon
dioxide and carbon dioxide concentration, a system with pre-set conditions for different phases
could make it easier for mushroom farmers.
Mushroom farming is labor-intensive and requires precision. Without suitable environmental
condition, mushrooms could hardly reproduce. Timer-controlled humidifier used by most of the
mushroom farmers in Malaysia is not consistent in maintaining the humidity and temperature in
the mushroom farms, causing lower productivity. Thus, sensor-based environment control system
is needed.
Most of the mushroom farmers in Malaysia are small-scaled farmers with just a few workers or
none at all which do not operate 24 hours. Most of the time no one is at the mushroom farm.
Thus, a remote monitoring system is needed to monitor the condition of the mushroom farm to
prevent undesired conditions that might cause the death of mushrooms.
In order to overcome the problems stated above, a system that can monitor and control the
environmental condition remotely is required. The objectives of this work are to design an
interface circuit for agricultural sensors such as light sensor, carbon dioxide sensor and
temperature and humidity sensor, and to design a remote monitoring system which includes a user
interface to display correct data from the sensors and a close-loop control system to maintain
optimum growth environment for mushrooms by controlling temperature, humidity, carbon
dioxide concentration and light intensity.
2. RELATED WORK
There are a number of proposed systems in the past few years. One of them is a temperature and
humidity monitoring system using AT89S52 as the controller, SHT10 as temperature and
humidity sensor and TC35i GSM (Global System for Mobile communication) Module for
wireless communication. The system is able to detect temperature and humidity and display via a
Nokia 3310 LCD (liquid crystal display) module. When temperature or humidity exceeds the
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 4, August 2017
19
limit, the system will send short messages to mobile phones to alert the user [13]. Another system
is a greenhouse monitoring and control system based on GSM. This system is more complicated
compared to the previous system, as it does not only allow data acquisition, it also allows user to
control humidity, temperature and soil moisture via SMS (Short Message Service). The
temperature sensor used is LM35DZ and the humidity sensor used is HIH-4000-001 [14]. Some
effort in the design and implementations of an indoor environmental monitoring system based on
Arduino microcontroller had also been made. The system consists of a wireless module, a main
module and dialer module. The dialer module will make a call when there is fire and send an
SMS if two or more reading are out of acceptable range for more than 10 seconds. It also allows
user to set four phone numbers which the dialer will call or send sms to by sending a SMS to the
dialer [15]. A more recent system is a ZigBee-based energy efficient environmental monitoring
alerting and controlling system. The system consists of an ARM7 processor, various sensors and
ZigBee module. Sensors gather various physical data such as temperature, humidity and soil
moisture from the field and transmit it to the processor and to the end user via ZigBee
communication [16].
All these mentioned works do not allow monitoring and controlling via a graphical user interface.
In addition, low cost implementation of Internet of Things for control and monitoring in
mushroom agriculture sector could hardly be found. Also, many of the systems available in the
market is not designed especially for mushroom cultivation but for general environment
monitoring and control.
3. METHODOLOGY
Figure 1 shows the flow chart of this work. Firstly, the system functionality was designed. Then,
the interface circuits were designed and built one by one. The first interface circuit designed was
the interface circuit of temperature and humidity sensor, followed by the interface circuit of light-
dependent resistor and interface circuit of CO2 (carbon dioxide) sensor. Next, the source code
was drafted. Then, the circuits were combined and tested to see if it fulfills the requirement. The
troubleshooting process was repeated until the system worked well and fulfilled its requirements.
Lastly, testing was done and results were evaluated.
Figure 1. Flow chart of the project
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 4, August 2017
20
3.1. System Overview
The system consists of two main parts: the monitoring system and the control system. The
monitoring part starts with data acquisition from the temperature and humidity sensor, carbon
dioxide sensor and LDR (light-dependent resistor) using Arduino Uno. The data is then sent to
the Cloud. The graphs of temperature, humidity, carbon dioxide concentration and light intensity
can be viewed using ThingSpeak. ThingSpeak is an online interface for IoT (Internet of Things)
projects. The control system includes processing data acquired from the sensors and controls
appliances such and humidifier, fan and light to regulate the environment inside the mushroom
farm according to the mode of environment selected. There are three modes of environment:
spawn-run, pin head initiation and cropping. Different modes have different set of required
environmental conditions as shown in Table 1 [9].
Table 1. Environmental conditions in different operating modes.
Spawn-run mode Pin head initiation mode
Cropping
mode
Humidity 90%RH 95%RH 85%RH
Temperature 25 °C 19 °C 20 to 25 °C
Carbon dioxide 20,000 ppm 600 ppm Less than 600 ppm
Light Off 2,000 lux for 12 hours Above 500 lux for 12 hours
3.2. Hardware Implementation
The schematic diagram of the interface circuit is shown in Figure 2. The circuit consists of
temperature and humidity sensor DHT22, gas sensor MQ135, LDR, WiFi module ESP8266-01,
solid state relay G3MB, and AC (alternating current) control device, push button switch, Arduino
UNO microcontroller, switch, LEDs (light - emitting diode) and various resistors.
In Figure 2, the power socket was represented by the AC power supply symbol. Live wire was
connected to the G3MB relay, while neutral wire was connected to the AC device. G3MB relay,
DHT22, MQ135, LDR, switch and LEDs were connected to the 5 V dc power supply from
Arduino Uno, while ESP8266-01 were connected to 3.3 V dc power supply of Arduino Uno. The
switch was for user to switch among 3 modes of the system: pin-head initiation mode, spawn run
mode and cropping mode, and the LEDs were to indicate the current active mode.
Figure 2. Schematic diagram of the interface circuit
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 4, August 2017
21
3.3. Software Implementation
The overall program flow is shown in Figure 3. The program starts with data acquisition from the
temperature and humidity sensor, carbon dioxide sensor and LDR. Next, the control algorithm
enables the control system to take appropriate actions based on the data acquired to control and
maintain the environmental condition in the mushroom farm at the desired condition. Then, the
system transmits the data from the sensors to a cloud for remote monitoring. The whole program
is developed using Arduino IDE.
Data acquired from the sensors was monitored via ThingSpeak online interface. The first step was
to sign up for a free account. Then, a new channel was created. In this project, four fields in the
channel were used to record temperature, humidity, carbon dioxide concentration and light
intensity. The channel was set to private and API keys were used to write data to the channel or
read data from the channel. Data from the sensors was written to this ThingSpeak channel via
ESP8266 WiFi module. Data stored in ThingSpeak cloud can be accessed anytime via WiFi
connection.
The data can also be downloaded in CSV (Comma- Separated Values) format for storage and
further analysis. Figure 4 shows the sample of CSV file downloaded from ThingSpeak.
An Android app interface was designed using Virtuino to display data from ThingSpeak channel
247738 for ease of monitoring, as mobile phone is more portable compared to a personal
computer. As the ThingSpeak channel was set to private, the read API key had to be used to read
data from the channel. Figure 5 shows the android app interface.
Besides displaying the values of sensors, the app was also designed to alert the user when any of
the sensor values goes beyond the threshold. Alarm in the mobile phone will be triggered by the
app and notification will be shown in the mobile phone when the relative humidity drops below
85%RH, when temperature rises above 25 degrees Celsius, or when carbon dioxide concentration
rises above 600 ppm. Figure 6 shows the notification when a threshold is crossed.
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 4, August 2017
22
Figure 3. Main program flowchart
Figure 4. CSV file downloaded from ThingSpeak
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 4, August 2017
23
Figure 5. Android app interface
Figure 6. Notification shown when humidity is less than 85%RH.
3.4. Performance Testing
After the interface circuit was built, the results and performance of the system was systematically
recorded in a spreadsheet. Sensor values acquired were validated first by comparing it to a
reliable source or device. Then, behavior of the monitoring and control system was examined by
placing the system in an actual mushroom farm.
The control devices in the mushroom farm should be controlled automatically to maintain the
environment in a specific range. The range depends on the mode (spawn-run, pinhead initiation,
cropping) selected. The performance index is measured at the completion of the system by taking
the recording and analyzing the data from sensor after the system was turned on.
4. RESULTS AND DISCUSSION
The developed interface circuit was able to measure temperature, humidity, light intensity and
carbon dioxide concentration, and was able to control LED, fan and humidifier based on the data
measured. Figure 7 shows the developed interface circuit.
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 4, August 2017
24
Figure 7. Interface circuit
Performance test was done for each sensor after the interface circuit was developed. The results
were recorded and compared with a commercial device in Table 2 to 5.
Table 2 and 3 shows the comparison of temperature and humidity measured using the interface
circuit developed and HTC-1 digital temperature and humidity meter. Using HTC-1 meter as
reference, the average error of temperature measure by the interface circuit was ±0.3°C. The
maximum percentage error is 2.2%, while the minimum percentage error of temperature is 0.4%.
The average error of humidity measured was ±1.8%RH. The minimum percentage error of
humidity is 1.5%.
The measured light intensity using the interface circuit was compared with the data measured by
using TASI-8720 lux meter. From Table 4, the minimum percentage error of the light sensor is
3.5%, while the maximum percentage error is 14.3%.
The carbon dioxide sensor MQ135 was placed outdoor to measure carbon dioxide level and the
value measured was compared to the atmospheric carbon dioxide level shown at www.co2.earth.
As of April 2017, the atmospheric carbon dioxide level was 409.01ppm. Table 4 shows the
carbon dioxide concentration measured using MQ135. Based on Table 5, the minimum
percentage error of the carbon dioxide measured is 1.34%, while the maximum percentage error
is 4.89%.
Table 2. Comparison of temperature measured using the interface circuit and HTC-1 meter.
Time
Data from interface
circuit
Data from HTC-1 Error Percentage
(°C) (°C) (°C) Error (%)
9:00 26.2 26.6 0.4 1.5
9:05 26.2 26.8 0.6 2.2
9:10 26.1 26.5 0.4 1.5
9:15 26.5 26.7 0.2 0.7
9:20 26.5 26.6 0.1 0.4
9:25 26.5 26.6 0.1 0.4
9:30 26.5 26.7 0.2 0.7
Table 3. Comparison of humidity measured using the interface circuit and HTC-1 meter.
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 4, August 2017
25
Time
Data from interface
circuit
Data from HTC-1 Error Percentage
(%RH) (%RH) (%RH) Error (%)
9:00 62.1 60 2.1 3.5
9:05 64.7 63 1.7 2.7
9:10 71.5 70 1.5 2.1
9:15 69.4 67 2.4 3.6
9:20 66 65 1 1.5
9:25 65.9 64 1.9 3
9:30 64.2 62 2.2 3.5
Table 4. Comparison of light intensity measured using the interface circuit and TASI-8720 lux
meter.
Condition
Data from
interface circuit
(lux)
Data from TASI-
8720 (lux)
Error Percentage
(lux) Error (%)
Indoor with lights
on (day time)
311 324 13 4
Indoor without
lights (day time)
30 35 5 14.3
Outdoor (day
time)
12229 12400 441 3.5
Outdoor (7pm) 690 740 50 6.8
Table 5. Comparison of CO2 concentration measured using the interface circuit and atmospheric
CO2 concentration.
Date
Data from interface
circuit (ppm)
Error (ppm)
Percentage Error
(%)
26-Apr-17 392.4 16.61 4.06
27-Apr-17 414.5 5.49 1.34
28-Apr-17 389 20.01 4.89
29-Apr-17 415.2 6.19 1.51
30-Apr-17 398.1 10.91 2.67
Two on-site performance tests were carried out in a mushroom farm at Batu Lancang, Penang.
The first test was carried out on 8 May 2017 and the second test was carried out on 9 May 2017.
In both performance tests, temperature, humidity, light intensity and carbon dioxide concentration
were measured by the system and sent to ThingSpeak server every 10 minutes.
During the first test, a timer was used to control an ac powered humidifier. Results of the first test
shows that temperature, humidity and light intensity in the mushroom farm on 8 May 2017 did
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 4, August 2017
26
not reach the optimum condition. The average temperature, humidity and light intensity measured
on the day were 27.6 degrees Celsius, 75.4%RH, and 90.36lux respectively, while the optimum
condition is temperature below 25 degrees Celsius, humidity above 85%RH and light intensity
above 500lux.
During the second test, the humidifier in the farm was connected to the relay in the interface
circuit designed, instead of the timer. “Cropping” mode was selected as to maintain humidity at
85%RH or above and temperature at 25 degrees Celsius or below by controlling the existing
humidifier, fluorescent light and fan in the mushroom farm.
In the second test where the sensor-based control system was used, the environmental condition
of the mushroom farm was much nearer to the optimum condition. Average temperature in the
second test was 26.4 degrees Celsius and minimum temperature achieved was 25.7 degrees
Celsius. Humidity, carbon dioxide concentration and light intensity were successfully maintained
in the range of optimum condition throughout the second test. The result recorded during both
tests is as shown in Figure 8. The data labelled as “uncontrolled” is the data recorded in the first
test while the data labelled as “controlled” is the data recorded in the second test.
(a) (b)
(c) (d)
Figure 8. Graph of (a) Temperature (b) Humidity (c) Carbon Dioxide Concentration (d) Light Intensity
recorded in Batu Lancang mushroom farm during the first and second tests.
5. CONCLUSIONS
The interface circuit for agriculture sensors was developed successfully. The circuit includes a
monitoring function, which enables user to monitor temperature, humidity, carbon dioxide
concentration and light intensity in a mushroom farm wirelessly, and a control function, which is
able to control the condition in the mushroom farm, based on the feedback of the sensors.
The measured percentage error of temperature, humidity, carbon dioxide and the light intensity
using the circuit was as low as 0.4%, 1.5%, 2.2% and 1.34% respectively.
The monitoring system was able to acquire sensor data and send the data to ThingSpeak online
cloud for monitoring and storage. The data could be accessed by the user anytime by using a
computer that is connected to the Internet. It could also be downloaded into .CSV file for further
analysis. An Android app interface was also designed to ease data monitoring.
The control system was able to control ac-powered humidifier, light and fan based on the
feedback of the sensors to maintain temperature, humidity, carbon dioxide concentration and light
intensity at optimum growth condition in an actual mushroom farm.
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 4, August 2017
27
ACKNOWLEDGEMENTS
This research work had been supported the Ministry of High Education Malaysia
(MOHE)/Universiti Sains Malaysia (USM) under the project/grant number
FRGS:203/PELECT/6071348.
REFERENCES
[1] Unit Pengurusan Prestasi dan Pelaksanaan (2010) Economic Transformation Programme: A
Roadmap for Malaysia (1 Malaysia). Performance Management and Delivery Unit, Jabatan
Perdana Menteri.
[2] Istikoma Qurat-ul-Ain., & Dahlan A. R. A, (2015) “The Transformation of Agriculture Based
Economy to an Industrial Sector through Crowd Sourcing In Malaysia”, Int. J. Comput. Sci. Inf.
Technol. Res., Vol. 3, No. 1, pp.34–41.
[3] Bakar B.B., (2009) “The Malaysian Agricultural Industry in the New Millennium – Issues and
Challenges,” pp. 337–356.
[4] Rosmiza M., Davies W., Aznie R. C., Jabil M., & Mazdi M, (2016) “Prospects for Increasing
Commercial Mushroom Production in Malaysia: Challenges and Opportunities”, Mediterr. J. Soc.
Sci., Vol. 7, No. 1, pp. 406–415.
[5] Haimid M. T., Rahim H., & Dardak R. A, (2013) “Understanding the mushroom industry and its
marketing strategies for fresh produce in Malaysia”, Econ. Technol. Manag. Rev., Vol. 8, pp. 27–
37.
[6] Mat Amin M. Z., & Harun A, (2015) “Competitiveness of the Mushroom Industry in Malaysia”
[Online]. Available: http://ap.fftc.agnet.org/ap_db.php?id=481&print=1. [Accessed: 18-Oct-2016].
[7] Australian Mushroom Growers Association, “Introduction to Mushroom Growing,” AMGA, pp. 1-
16.
[8] Van Nieuwenhuijzen, Bram., & Oei, P (2005) Small-scale mushroom cultivation oyster, shiitake
and wood ear mushrooms, Agrodok;40. Agromisa/CTA, Wageningen, The Netherlands.
[9] Stamets P., & Chilton, J. S, (1983) “The Mushroom Cultivator: A Practical Guide to Growing
Mushrooms at Home”, S. Cal. L. Rev., p. 416.
[10] Grant, J.J (2002) An investigation of the airflow in mushroom growing structures, the development
of an improved, three-dimensional solution technique for fluid flow and its evaluation for the
modelling of mushroom growing structures. PhD thesis, Dublin City University.
[11] Kwon H., & Kim, B. S (2004) Mushroom Grow. Handb. 1, pp. 192–196.
[12] Tisdale T. E (2004) Cultivation of the Oyster Mushroom (Pleurotussp.) on Wood Substrates in
Hawaii. MSc thesis, University of Hawai’i.
[13] Wang X., (2014) “Temperature and Humidity Monitoring System Based on GSM Module”,
International Journal of Computer, Consumer and Control., Vol. 3, No. 1, pp. 41–49.
[14] Rahali A., Guerbaoui M., Ed-dahhak A., El Afou Y., Tannouche A., Lachhab A., & Bouchikhi, B,
(2011) “Development of a data acquisition and greenhouse control system based on GSM”, Int. J.
Eng. Sci. Technol., Vol. 3, No. 8, pp. 297–306.
[15] Kalinin Y. S., Velikov E. K., & Markova, V. I, (2015) “Design of Indoor Environment Monitoring
System Using Arduino”, Int. J. Innov. Sci. Mod. Eng., Vol. 3, No. 7, pp. 46–49, 20.
[16] Lokesh Krishna K., Madhuri J., & Anuradha K, (2016) “A ZigBee based Energy Efficient
Environmental Monitoring Alerting and Controlling System”, in International Conference On
Information Communication And Embedded Systems (ICICES2016).
12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 4, August 2017
28
Authors
Arjuna Marzuki is a lecturer at Universiti Sains Malaysia. He teaches Analog Circuit design
at School of Electrical and Electronic Engineering
Yan Ying Soh is a student of electronic engineering at School of Electrical and Electronic Engineering