Action Recommendation Model Development for Hydromon Application Using Deep Neural Network (DNN) Method

Meida Cahyo Untoro, Eko Dwi Nugroho, Mugi Praseptiawan, Aidil Afriansyah, Muhammad Nadhif Athalla

Abstract


Controlling hydroponic plants, which is currently being carried out
manually, can be said to be less effective because it still involves the
hard work of farmers to continuously monitor the condition of the
hydroponic plants. Therefore, the general objective of this research is
to develop a model that can be used as a recommendation system for
actions that farmers need to take based on hydroponic crop conditions.
The model formed with this machine learning method will then be
used in the Hydromon application which allows farmers to manage
and monitor the condition of hydroponic plants and take action based
on the recommendations given. This model was developed using a
deep neural network algorithm consisting of five layers with the help
of the TensorFlow framework. The results show that the model is
accurate with an accuracy value of 96.47% on the test data to classify
plant conditions so that it can be used in the Hydromon application.


Full Text:

PDF

References


I. Rahmawati, “ANALISIS

MANAJEMEN RISIKO ANCAMAN

KEJAHATAN SIBER (CYBER

CRIME) DALAM PENINGKATAN

CYBER DEFENSE,” J. Pertahanan

Bela Negara, p. 7, 2017, doi:

33172/jpbh.v7i2.179.

A. Kusumaningrum, H. Wijayanto, and

B. D. Raharja, “Pengukuran Tingkat

Kesadaran Keamanan Siber di Kalangan

Mahasiswa saat Study From Home

dengan Multiple Criteria Decision

Jurnal Teknik Informatika Vol. 15 No. 2, 2022 (129-136)

ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)

DOI: https://doi.org/10.15408/jti.v15i2.25842

Warsino: Hacking as a Cybercrime, Reviewed from…

Analysis (MCDA),” J. Ilm. SINUS, vol.

, no. 1, p. 69, 2022, doi:

30646/sinus.v20i1.586.

M. F. Noordin, “Application of privacy,

security and ethics in islamic concerned

ICT,” Middle East J. Sci. Res., vol. 14,

no. 11, pp. 1548–1554, 2013, doi:

5829/idosi.mejsr.2013.14.11.2035.

A. S. Ahmad, Tafsir Ayat-ayat Ahkam,

st ed. Depok: Keira Publishing, 2016.

F. Widiyaningsih, “Tindak Pidana

Pengaksesan Sistem Elektronik dalam

UU No. 11 Tahun 2008 Tentang

Informasi dan Transaksi Elektronik

(dalam Perspektif Fiqih Jinayah),” no.

, 2012.

W. Z. Khan, M. Zahid, M. Y. Aalsalem,

H. M. Zangoti, and Q. Arshad, “Ethical

aspects of internet of things from islamic

perspective,” 2017 9th IEEE-GCC Conf.

Exhib. GCCCE 2017, 2018, doi:

1109/IEEEGCC.2017.8448105.

M. Danuri, “Cyber Religious,” in Cyber

Religious, 2020.

K. Mur, A. Q. Dalam, and P. Hadis, “(

Studi Analisis Kritik Sanad dan Matan

),” 2017.




DOI: https://doi.org/10.15408/jti.v15i2.26762 Abstract - 0 PDF - 0

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Mugi MPS Praseptiawan

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

3rd Floor, Dept. of Informatics, Faculty of Science and Technology, UIN Syarif Hidayatullah Jakarta
Jl. Ir. H. Juanda No.95, Cempaka Putih, Ciputat Timur.
Kota Tangerang Selatan, Banten 15412
Tlp/Fax: +62 21 74019 25/ +62 749 3315
Handphone: +62 8128947537
E-mail: jurnal-ti@apps.uinjkt.ac.id


Creative Commons Licence
Jurnal Teknik Informatika by Prodi Teknik Informatika Universitas Islam Negeri Syarif Hidayatullah Jakarta is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Based on a work at http://journal.uinjkt.ac.id/index.php/ti.

JTI Visitor Counter: View JTI Stats

 Flag Counter