Tobacco Seedling Automation Management

Authors

  • Laili Romadona Author
  • Siti fathiar rohmah Author

Keywords:

Keywords: Internet of Things, Automatic Irrigation, Tobacco Nursery, Smart Agriculture, Resource Efficiency

Abstract

Tobacco seedling cultivation is an early stage that determines the success of tobacco cultivation because it directly affects seed quality and plant productivity in the next phase. Seedling cultivation practices at the farmer level are generally still carried out conventionally, with manual watering and unmeasured environmental monitoring, which can potentially cause water wastage, high workload, and unsuitable planting media conditions. The development of Internet of Things (IoT) technology offers a data-driven approach to support automation and efficiency in agricultural management. This study aims to implement and evaluate an IoT-based tobacco seedling automation management system to improve water use efficiency and reduce farmers' working hours. The study uses a design and field test method with a quantitative and qualitative approach. The system was developed by integrating soil moisture sensors, air temperature and humidity sensors, rain sensors, a time scheduling module, and instant messaging-based notifications. The evaluation was conducted through system performance testing, observation of watering responses, and comparison of water use and farmers' working hours before and after the system implementation. The results showed that the system was able to work stably and responsively. Irrigation can be carried out adaptively based on soil moisture conditions and stopped automatically when rain is detected. The application of the system has successfully reduced water usage significantly and reduced farmers' working time from 420–595 minutes per week to 210–315 minutes per week, or a reduction of around 45%. In conclusion, the IoT-based tobacco seedling automation management system is effective in improving seedling management efficiency and supporting smart farming practices. Further research is recommended to develop the system on a larger scale and utilize historical data for more adaptive decision-making.

Downloads

Download data is not yet available.

Author Biographies

  • Laili Romadona

    University students at Madura University

  • Siti fathiar rohmah

    University students at Madura University

References

REFERENSI

[1] F. P. E. Putra, Y. Setiawan, S. Arifin, and W. Hidayatullah, “Peran VPN dalam Menjaga Privasi Pengguna Jaringan Pub-lik,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5834.

[2] F. P. E. Putra, D. E. Arissandi, A. Rofiqi, and M. F. Hidayat, “Pemanfaatan Mikrotik Dalam Manajemen Bandwidth Pada Jaringan Sekolah,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5938.

[3] F. P. Eka Putra, Amir Hamzah, W. Agel, and R. O. Firmansyah Kusuma, “Impelementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking,” J. Sistim Inf. dan Teknol., pp. 82–87, 2024, doi: 10.60083/jsisfotek.v5i4.329.

[4] N. Haidar Hari, F. P. Eka Putra, U. Hasanah, S. R. Sutarsih, and Riyan, “Transformasi Jaringan Telekomunikasi dengan Teknologi 5G: Tantangan, Potensi, dan Implikasi,” J. Inf. dan Teknol., pp. 146–150, 2023, doi: 10.37034/jidt.v5i2.357.

[5] F. P. E. Putra, D. A. M. Putra, A. Firdaus, and A. Hamzah, “Analisis Kecepatan Dan Kinerja Jaringan 5G (generasi ke 5) Pada Wilayah Perkotaan,” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 47, 2023, doi: 10.51211/itbi.v8i1.2439.

[6] F. P. E. Putra, S. R. Sutarsih, S. Sofiyulloh, and ..., “Optimalisasi Perancangan Aplikasi Manajemen Data Koloman, Di Desa Pulau Mandangin Sampang–Madura Berbasis Website,” 2024, jurnal.univrab.ac.id. doi: 10.36341/rabit.v9i2.4840.

[7] F. P. E. Putra and N. Saadah, “Interaktif dan Personalisasi Peningkatan Pembelajaran IoT di Sekolah,” J. Sistim Inf. dan Teknol., vol. 5, no. 2, pp. 175–181, 2023, doi: 10.37034/jsisfotek.v5i2.236.

[8] F. P. E. Putra, F. Fauzan, S. Syirofi, M. Mursidi, D. Wahid, and A. Nuraini, “Sistem Pengendali Lingkungan Pertanian Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik,” 2024. doi: 10.47709/digitech.v3i2.3461.

[9] N. Muhammad Akbar, F. Prasetyo Eka Putra, K. Zulfana Imam, and M. Umar Mansyur, “Analisis Kinerja dan Interopabilitas STB Sebagai Server Penilaian Akhir Tahun,” J. Inf. dan Teknol., pp. 91–96, 2023, doi: 10.37034/jidt.v5i2.365.

[10] A. Zulfikri, F. P. E. Putra, M. A. Huda, H. Hasbullah, M. Mahendra, and M. Surur, “Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking,” 2023. doi: 10.47709/digitech.v3i2.3379.

[11] D. Thi Sang, R. Imamura, T. Akabe, and Y. Nakashima, “Energy Consumption Optimization of Multi-Dimensional U-Nets on CGLA,” IEEE Access, vol. 13, pp. 29476–29492, 2025, doi: 10.1109/ACCESS.2025.3539417.

[12] X. Dou, X. Chen, D. Liang, and B. Lin, “A Time-Delay Overlapping Modulation-Based High Spectral Efficiency and Secure DCSK System,” IEEE Access, vol. 9, pp. 122685–122695, 2021, doi: 10.1109/ACCESS.2021.3108808.

[13] X.-F. Feng and J.-W. Liu, “Biomimetic array actuators for multisituation low-grade energy harvesting,” Chem. Eng. J., vol. 490, 2024, doi: 10.1016/j.cej.2024.151631.

[14] Z. Zhang, C. Zhan, S. Zhao, and M.-K. Law, “A High-Efficiency Low-Cost Multi-Antenna Energy Harvesting System With Leakage Suppression,” IEEE J. Solid-State Circuits, vol. 59, no. 9, pp. 2995–3007, 2024, doi: 10.1109/JSSC.2024.3387025.

[15] N. Saba, P. Lassila, K. Ruttik, R. Jäntti, and J. Salo, “Radio Network Planning for 5G FWA at 3.5 GHz and 26 GHz: A Link- and Flow-Level Approach,” IEEE Access, vol. 13, pp. 152782–152799, 2025, doi: 10.1109/ACCESS.2025.3603906.

[16] X. Li, H. Gao, J. Zhang, S. Yang, X. Jin, and K.-K. R. Choo, “GPU Accelerated Full Homomorphic Encryption Cryptosystem, Library, and Applications for IoT Systems,” IEEE Internet Things J., vol. 11, no. 4, pp. 6893–6903, 2024, doi: 10.1109/JIOT.2023.3313443.

[17] S. Alam, M. M. Islam, M. S. Hossain, A. Jaiswal, and A. Aziz, “Cryogenic In-Memory Bit-Serial Addition Using Quantum Anomalous Hall Effect-Based Majority Logic,” IEEE Access, vol. 11, pp. 60717–60723, 2023, doi: 10.1109/ACCESS.2023.3285604.

[18] B. Abolhassani, J. Tadrous, and A. Eryilmaz, “Optimal Load-Splitting and Distributed-Caching for Dynamic Content over the Wireless Edge,” IEEE/ACM Trans. Netw., vol. 31, no. 5, pp. 2178–2190, 2023, doi: 10.1109/TNET.2023.3244039.

[19] M. Graba et al., “Toward Safer and Energy Efficient Global Trajectory Planning of Self-Guided Vehicles for Material Handling System in Dynamic Environment,” IEEE Access, vol. 11, pp. 30753–30767, 2023, doi: 10.1109/ACCESS.2023.3260646.

[20] L. Anchidin, A. Lavric, P.-M. Mutescu, A. I. Petrariu, and V. Popa, “The Design and Development of a Microstrip Antenna for Internet of Things Applications,” Sensors, vol. 23, no. 3, 2023, doi: 10.3390/s23031062.

[21] S. Jeon and J. T. Seo, “A Synthetic Time-Series Generation Using a Variational Recurrent Autoencoder with an Attention Mechanism in an Industrial Control System,” Sensors, vol. 24, no. 1, 2024, doi: 10.3390/s24010128.

[22] S. Bhattacharya and M. Pandey, “Deploying an energy efficient, secure & high-speed sidechain-based TinyML model for soil quality monitoring and management in agriculture,” Expert Syst. Appl., vol. 242, 2024, doi: 10.1016/j.eswa.2023.122735.

[23] N. Ramadevi, M. V Subramanyam, and C. S. Shoba Bindu, “Mobility target tracking with meta-heuristic aided target movement prediction scheme in WSN using adaptive distributed extended Kalman filtering,” Int. J. Commun. Syst., vol. 37, no. 11, 2024, doi: 10.1002/dac.5789.

[24] X. Zhang, Z. Jiang, X. Zhang, Y. Xie, and Z. X. Zhang, “Sustainable fabrication of porous bio-based polyurethane as triboelectric material realized by dynamic bond and scN2 foaming,” Chem. Eng. J., vol. 514, 2025, doi: 10.1016/j.cej.2025.163012.

[25] Z. Yang, Q. Li, Y. Yuan, and Q. Wang, “HCNet: Hierarchical Feature Aggregation and Cross-Modal Feature Alignment for Remote Sensing Image Captioning,” IEEE Trans. Geosci. Remote Sens., vol. 62, pp. 1–11, 2024, doi: 10.1109/TGRS.2024.3401576.

[26] M. A. Matheen and S. Sundar, “A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN,” Sensors, vol. 23, no. 4, 2023, doi: 10.3390/s23042218.

[27] D. Zhao, Z. Zhou, S. Wang, B. Liu, and W. Gaaloul, “Reinforcement learning–enabled efficient data gathering in underground wireless sensor networks,” Pers. Ubiquitous Comput., vol. 27, no. 3, pp. 581–598, 2023, doi: 10.1007/s00779-020-01443-x.

[28] A. K. Rao, K. K. Nagwanshi, and M. K. Shukla, “An optimized secure cluster-based routing protocol for IoT-based WSN structures in smart agriculture with blockchain-based integrity checking,” Peer-to-Peer Netw. Appl., vol. 17, no. 5, pp. 3159–3181, 2024, doi: 10.1007/s12083-024-01748-1.

[29] S. Bharany, A. Almogren, and A. Altameem, “Optimizing IoT Connectivity: A Quantitative Exploration of the Comprehensive Adaptive Sensing and Clustering System for Smart Sensor Networks in Smart Cities,” Wirel. Pers. Commun., vol. 140, no. 1, pp. 353–375, 2025, doi: 10.1007/s11277-024-11719-7.

[30] C. Zhao, D. Han, C. Li, and H. Wang, “A Blockchain Consensus Mechanism to Optimize Reputation-Based Distributed Energy Trading in Urban Energy System,” IEEE Access, vol. 12, pp. 53698–53712, 2024, doi: 10.1109/ACCESS.2024.3387715.

[31] T. Mahjoub, A. Ben Mnaouer, M. B. Ben Said, and H. Boujemâa, “LoRa signal propagation and path loss prediction in Tunisian date palm oases,” Comput. Electron. Agric., vol. 222, 2024, doi: 10.1016/j.compag.2024.109027.

[32] S. K. Panda, M. Lin, and T. Zhou, “Energy-Efficient Computation Offloading With DVFS Using Deep Reinforcement Learning for Time-Critical IoT Applications in Edge Computing,” IEEE Internet Things J., vol. 10, no. 8, pp. 6611–6621, 2023, doi: 10.1109/JIOT.2022.3153399.

[33] Q. Tang, Y. Ren, Z. Shan, C. Bao, and Y. Liu, “Dual-branch aggregation and edge refinement network for few shot semantic segmentation,” Multimed. Syst., vol. 31, no. 2, 2025, doi: 10.1007/s00530-025-01718-4.

[34] S. Arora and P. K. Atrey, “SecureC2Edit: A Framework for Secure Collaborative and Concurrent Document Editing,” IEEE Trans. Dependable Secur. Comput., vol. 21, no. 4, pp. 2227–2241, 2024, doi: 10.1109/TDSC.2023.3302810.

[35] P. Ren et al., “Resonance-enhanced hybrid-principle droplet electricity generator based on femtosecond laser-ablated superhydrophobic surface,” Nano Energy, vol. 138, 2025, doi: 10.1016/j.nanoen.2025.110829.

[36] G. Yang et al., “High-efficiency thermal diodes enabled by unidirectional capillary fluid transport and phase change,” Cell Reports Phys. Sci., vol. 6, no. 9, 2025, doi: 10.1016/j.xcrp.2025.102793.

[37] X. Li et al., “Multiperson Detection and Vital-Sign Sensing Empowered by Space-Time-Coding Reconfigurable Intelligent Surfaces,” IEEE Internet Things J., vol. 11, no. 17, pp. 28169–28183, 2024, doi: 10.1109/JIOT.2024.3400960.

[38] T. Kawano et al., “Power-Over-Fiber System With Intermittent Operation Based on Capacitor Voltage Estimation for High-Efficiency Energy Charging,” IEEE Access, vol. 12, pp. 54999–55006, 2024, doi: 10.1109/ACCESS.2024.3388021.

[39] Z. Mao, C. Chen, Y. Zhang, K. Suzuki, and Y. Suzuki, “AI-Driven Discovery of Amorphous Fluorinated Polymer Electret with Improved Charge Stability for Energy Harvesting,” Adv. Mater., vol. 36, no. 52, 2024, doi: 10.1002/adma.202303827.

[40] G. A. Thomopoulos, D. P. Lyras, and C. A. Fidas, “A systematic review and research challenges on phishing cyberattacks from an electroencephalography and gaze-based perspective,” Pers. Ubiquitous Comput., vol. 28, no. 3–4, pp. 449–470, 2024, doi: 10.1007/s00779-024-01794-9.

[41] V. Verma and V. K. Jha, “Secure and Energy-Aware Data Transmission for IoT-WSNs with the Help of Cluster-Based Secure Optimal Routing,” Wirel. Pers. Commun., vol. 134, no. 3, pp. 1665–1686, 2024, doi: 10.1007/s11277-024-10983-x.

[42] S. K. Saranya, S. Nallagonda, Y. K. Choukiker, and A. Bhowmick, “Performance Analysis of a CR-Enabled Energy-Efficient Device-to-Device Network With Ambient Backscattering and NOMA,” Int. J. Commun. Syst., vol. 38, no. 4, 2025, doi: 10.1002/dac.6005.

[43] M. A. Saparin, H. Salleh, C. K. Hen, and S. N. A. Amnuruddin, “Performance of A Triboelectric Nanogenerator Utilising Coconut Husk Layer,” J. Mech. Eng., vol. 21, no. 3, pp. 123–143, 2024, doi: 10.24191/jmeche.v21i3.27350.

[44] M. I. Zabezhailo, “On the Problem of Explaining the Results of Intelligent Data Analysis,” Pattern Recognit. Image Anal., vol. 34, no. 3, pp. 498–502, 2024, doi: 10.1134/S1054661824700263.

[45] M. Markiewicz, P. Dziurdzia, and T. Skotnicki, “Randomly moving thermoelectric energy harvester for wearables and industrial Internet of Things,” Nano Energy, vol. 126, 2024, doi: 10.1016/j.nanoen.2024.109565.

[46] R. Chaudhary and N. Kumar, “SecGreen: Secrecy Ensured Power Optimization Scheme for Software-Defined Connected IoV,” IEEE Trans. Mob. Comput., vol. 22, no. 4, pp. 2370–2386, 2023, doi: 10.1109/TMC.2021.3116954.

[47] V. S. Kavarthapu et al., “Wireless Alerts and Data Monitoring from BNNO-MWCNTs/PDMS Composite Film-Based TENG Integrated Inhaler for Smart Healthcare Application,” Small, vol. 20, no. 44, 2024, doi: 10.1002/smll.202403218.

[48] R. Khan, A. Mehmood, C. Maple, K. Curran, and H. Song, “Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review,” IEEE Trans. Intell. Transp. Syst., vol. 25, no. 6, pp. 4773–4784, 2024, doi: 10.1109/TITS.2023.3341358.

[49] H. Li, D. He, Q. Feng, and M. Luo, “Verifiable and Forward-Secure Multikeyword Query in Internet of Medical Things,” IEEE Internet Things J., vol. 12, no. 13, pp. 23809–23822, 2025, doi: 10.1109/JIOT.2025.3553754.

[50] M. Boudouane, L. Elmahni, R. Zriouile, and S. A. Ait El Ouahab, “Advancing solar energy harvesting: Artificial intelligence approaches to maximum power point tracking,” Int. J. Power Electron. Drive Syst., vol. 16, no. 1, pp. 55–69, 2025, doi: 10.11591/ijpeds.v16.i1.pp55-69.

[51] G. Su, C.-C. Chang, C.-C. Lin, and C.-C. Chang, “Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation,” Vis. Comput., vol. 40, no. 9, pp. 6421–6447, 2024, doi: 10.1007/s00371-023-03174-5.

[52] M. Maravarman, B. Babu, and P. Pitchai, “Horse herd optimised elliptic curve cryptography for secure data aggregation in WSN,” Int. J. Ad Hoc Ubiquitous Comput., vol. 46, no. 4, pp. 231–247, 2024, doi: 10.1504/IJAHUC.2024.140442.

[53] P. Zhu, L. Qin, J. Wang, Y. Li, X. Li, and W. Xie, “Optimized Trajectory and Passive Beamforming for STAR-RIS-Assisted UAV-Empowered O2I WPCN,” IEEE Wirel. Commun. Lett., vol. 13, no. 1, pp. 163–167, 2024, doi: 10.1109/LWC.2023.3324635.

[54] F. P. E. Putra, A. B. Tamam, R. W. Efendi, and ..., “Optimasi Keamanan DNS: Eksplorasi Optimal dengan Implementasi DNS Security Extensions (DNSSEC),” REMIK Ris. dan E …, 2024, doi: 10.33395/remik.v8i1.13398.

[55] F. P. Eka Putra, F. Muslim, N. Hasanah, Holipah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. dan Teknol., pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.

[56] F. P. E. Putra, F. Muslim, N. Hasanah, R. Paradina, and ..., “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. …, 2023, doi: 10.60083/jsisfotek.v5i4.325.

Published

25-12-2025

How to Cite

Tobacco Seedling Automation Management. (2025). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 1(01). https://ejournal.omahtabing.com/knj/article/view/144

Most read articles by the same author(s)