Arduino Uno-based water turbidity meter using LDR and LED sensors


  • A P. U. Siahaan Universitas Pembangunan Panca Budi
  • Nogar Silitonga Universitas Methodist Indonesia
  • Muhammad Iqbal Universitas Pembangunan Panca Budi
  • Solly Aryza Universitas Pembangunan Panca Budi
  • Wirda Fitriani Universitas Pembangunan Panca Budi
  • Zuhri Ramadhan Universitas Pembangunan Panca Budi
  • Zuraidah Tharo Universitas Pembangunan Panca Budi
  • Rusiadi . Universitas Pembangunan Panca Budi
  • Rahmad Hidayat Universitas Pembangunan Panca Budi
  • M D. T. P. Nasution Universitas Pembangunan Panca Budi
  • Ali Ikhwan Universitas Pembangunan Panca Budi
  • Zulfi Azhar UINSU Medan
  • Mhd. Irwan Dwitama Harahap Universitas Pembangunan Panca Budi





Arduino Uno, Turbidity, Water Clarity.


Arduino Uno water turbidity gauge has been successfully designed and manufactured. This tool is made using LDR as sensor and led as a light source to measure the water turbidity value and Arduino Uno for data processing. The existence of this tool is already familiar and comfortable to find. However, the price is relatively higher to make this tool is only owned by certain circles only. Nephelometric Method is a method of measuring the turbidity of water by passing a light source on water so that the intensity of light reflected by the substances causing turbidity can be known. With the use of led as a light source and photodiode as a light detector, and combined with processing using Arduino Uno then the voltage obtained from the LDR sensor in the form of analog data is processed into digital data and can be displayed in the LCD.




[1] S. Aryza, M. Irwanto, Z. Lubis, A. P. U. Siahaan, R. Rahim, and M. Furqan, “A Novelty Design of Minimization of Electrical Losses in A Vector Controlled Induction Machine Drive,†in IOP Conference Series: Materials Science and Engineering, 2018, vol. 300, no. 1.

[2] A. P. U. Siahaan et al., “Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of Document Equivalence Level,†Int. J. Eng. Technol., vol. 7, no. 2.27, pp. 17–21, 2018.

[3] A. P. U. Siahaan, “The Analysis of Average Waiting Time in Managing Concurrent Process.â€

[4] L. Marlina, Muslim, and A. P. U. Siahaan, “Data Mining Classification Comparison (Naïve Bayes and C4.5 Algorithms),†Inte rnational J. Eng. Trends Technol., vol. 38, no. 7, pp. 380–383, 2016.

[5] Z. Ramadhan and A. P. U. Siahaan, “Dining Philosophers Theory and Concept in Operating System Scheduling,†IOSR J. Comput. Eng., vol. 18, no. 6, pp. 45–50, 2016.

[6] D. Kurnia, H. Dafitri, and A. P. U. Siahaan, “RSA 32-bit Implementation Technique,†Int. J. Recent Trends Eng. Res., vol. 3, no. 7, pp. 279–284, 2017.

[7] S. Hartanto, M. Furqan, A. P. U. Siahaan, and W. Fitriani, “Haversine Method in Looking for the Nearest Masjid,†Int. J. Recent Trends Eng. Res., vol. 3, no. 8, pp. 187–195, Aug. 2017.

[8] H. M. Ritonga, A. P. U. Siahaan, and Suginam, “Marketing Strategy through Markov Optimization to Predict Sales on Specific Periods,†Int. J. Innov. Res. Multidiscip. F., vol. 3, no. 8, pp. 184–190, 2017.

[9] I. Sumartono, A. P. U. Siahaan, and Arpan, “Base64 Character Encoding and Decoding Modeling,†Int. J. Recent Trends Eng. Res., vol. 2, no. 12, pp. 63–68, 2016.

[10] W. Fitriani, R. Rahim, B. Oktaviana, and A. P. U. Siahaan, “Vernam Encypted Text in End of File Hiding Steganography Technique,†Int. J. Recent Trends Eng. Res., vol. 3, no. 7, pp. 214–219, Jul. 2017.

[11] W. Fitriani and A. P. U. Siahaan, “Comparison Between WEKA and Salford System in Data Mining Software,†Int. J. Mob. Comput. Appl., vol. 3, no. 4, pp. 1–4, 2016.

[12] Mesran, K. Tampubolon, R. D. Sianturi, F. T. Waruwu, and A. P. U. Siahaan, “Determination of Education Scholarship Recipients Using Preference Selection Index,†Int. J. Sci. Res. Sci. Technol., vol. 3, no. 6, pp. 230–234, 2017.

[13] M. Iqbal, M. A. S. Pane, and A. P. U. Siahaan, “SMS Encryption Using One-Time Pad Cipher,†IOSR J. Comput. Eng., vol. 18, no. 6, pp. 54–58, 2016.

[14] B. Oktaviana and A. P. U. Siahaan, “Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography,†IOSR J. Comput. Eng., vol. 18, no. 4, pp. 26–29, 2016.

[15] A. P. U. Siahaan, “Comparison Analysis of CPU Scheduling : FCFS, SJF and Round Robin,†Int. J. Eng. Dev. Res., vol. 4, no. 3, pp. 124–131, 2016.

[16] A. P. U. Siahaan and R. Rahim, “Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm,†Int. J. Secur. Its Appl., vol. 10, no. 8, pp. 173–180, Aug. 2016.

[17] A. P. U. Siahaan, “Adler-32 Integrity Validation in 24bit Color Image.â€

[18] S. Bin Ibrahim, “Turbidity Measurement Using An Optical Tomography System,†Int. J. Sci. Eng., vol. 5, no. 2, Oct. 2013.

[19] Prerana, M. R. Shenoy, B. P. Pal, and B. D. Gupta, “Design, Analysis, and Realization of a Turbidity Sensor Based on Collection of Scattered Light by a Fiber-Optic Probe,†IEEE Sens. J., vol. 12, no. 1, pp. 44–50, Jan. 2012.

[20] J. Park, K. Park, K. Han, and K. Park, “Design and implementation of 2 channels turbidity sensor modules,†in 2013 10th International Conference on Ubiquitous Robots and Ambient Intelligence (URAI), 2013, pp. 447–450.

[21] S. C. Liew, B. Saengtuksin, and L. K. Kwoh, “Monitoring turbidity and suspended sediment concentration of coastal and inland waters using satellite data,†in 2009 IEEE International Geoscience and Remote Sensing Symposium, 2009, p. II-837-II-839.

[22] A. Lubis and A. P. U. Siahaan, “Network Forensic Application in General Cases,†IOSR J. Comput. Eng., vol. 18, no. 6, pp. 41–44, 2016.

[23] A. P. U. Siahaan, “Genetic Algorithm in Hill Cipher Encryption,†Am. Int. J. Res. Sci. Technol. Eng. Math., vol. 15, no. 1, pp. 84–89, 2016.

[24] A. P. U. Siahaan, “Rail Fence Cryptography in Securing Information.â€

[25] A. P. U. Siahaan, “Huffman Text Compression Technique.â€

[26] R. D. Sari, Supiyandi, A. P. U. Siahaan, M. Muttaqin, and R. B. Ginting, “A Review of IP and MAC Address Filtering in Wireless Network Security,†Int. J. Sci. Res. Sci. Technol., vol. 3, no. 6, pp. 470–473, 2017.

[27] A. P. U. Siahaan, “Securing Short Message ServiceUsing Vernam Cipher in Android Operating System,†IOSR, Apr. 2016.

[28] A. P. U. Siahaan, “A Three-Layer Visual Hash Function Using Adler-32,†Int. J. Comput. Sci. Softw. Eng., vol. 5, no. 7, pp. 142–147, 2016.

[29] A. P. U. Siahaan, “Vernam Conjugated Manipulation of Bit-Plane Complexity Segmentation.â€

[30] A. P. U. Siahaan, “Adjustable Knapsack in Travelling Salesman Problem Using Genetic Process,†Int. J. Sci. Technoledge, vol. 4, no. 9, pp. 46–55, 2016.

[31] A. P. U. Siahaan, “Penyelarasan Pada Masalah Dining Philosophers Menggunakan Algoritma Lock & Release,†Techsi, vol. 6, no. 1, 2014.

[32] A. P. U. Siahaan, “High Complexity Bit-Plane Security Enchancement in BPCS Steganography,†Int. J. Comput. Appl., vol. 148, no. 3, pp. 17–22, 2016.

[33] Z. Sitorus and A. P. U. Siahaan, “Heuristic Programming in Scheduling Problem Using A* Algorithm,†IOSR J. Comput. Eng., vol. 18, no. 5, pp. 71–79, 2016.

[34] A. P. U. Siahaan, “Blum Blum Shub in Generating Key in RC4,†Int. J. Sci. Technoledge, vol. 4, no. 10, pp. 1–5, 2016.

[35] T. P. Lambrou, C. C. Anastasiou, and C. G. Panayiotou, “A Nephelometric Turbidity System for Monitoring Residential Drinking Water Quality,†2010, pp. 43–55.

[36] M. Asrafuzzaman, A. N. M. Fakhruddin, and M. A. Hossain, “Reduction of Turbidity of Water Using Locally Available Natural Coagulants,†ISRN Microbiol., vol. 2011, pp. 1–6, 2011.

[37] M. T. Mohd Khairi, S. Ibrahim, M. A. Md Yunus, and M. Faramarzi, “A review on the design and development of turbidimeter,†Sens. Rev., vol. 35, no. 1, pp. 98–105, Jan. 2015.

[38] Y. A. Badamasi, “The working principle of an Arduino,†in 2014 11th International Conference on Electronics, Computer and Computation (ICECCO), 2014, pp. 1–4.

[39] Febrianto, “Apa itu Arduino Uno?,†Referensi Teknologi dan Elektronika Indonesia, 2018. [Online]. Available: [Accessed: 01-Jun-2018].

[40] M. A. B. Sidik et al., “Arduino-Uno Based Mobile Data Logger with GPS Feature,†TELKOMNIKA (Telecommunication Comput. Electron. Control., vol. 13, no. 1, p. 250, Mar. 2015.

View Full Article: