Implementasi Metode Unsupervised Learning Pada Sistem Keamanan Dengan Optimalisasi Penyimpanan Kamera IP

2021 ◽  
Vol 5 (6) ◽  
pp. 1099-1105
Author(s):  
Desta Yolanda ◽  
Mohammad Hafiz Hersyah ◽  
Eno Marozi

Security monitoring systems using face recognition can be applied to CCTV or IP cameras. This is intended to improve the security system and make it easier for users to track criminals is theft. The experiment was carried out by detecting human faces for 24 hours using different cameras, namely an HD camera that was active during the day and a Night Vision camera that was active at night. The application of Unsupervised Learning method with the concept of an image cluster, aims to distinguish the faces of known or unknown people according to the dataset built in the Raspberry Pi 4. The user interface media of this system is a web-based application built with Python Flask and Python MySQL. This application can be accessed using the domain provided by the IP Forwarding device which can be accessed anywhere. According to the test results on optimization of storage, the system is able to save files only when a face is detected with an average file size of ± 2.28 MB for 1x24 hours of streaming. So that this storage process becomes more efficient and economical compared to the storage process for CCTV or IP cameras in general.

2016 ◽  
Vol 19 (1) ◽  
pp. 22
Author(s):  
Muhammad Khoiru Syabibi ◽  
Arkhan Subari

Muhammad Khoiru Syabibi, Arkhan Subari  in this paper explain that Along with the progress of era, the development of advanced technology also impacts on the development of security systems. Sophisticated security systems that digitally integrated has been growing, one of them is a web-based security system. This web-based home security monitoring system uses a raspberry pi b + that serves as a server and media controller, then for the web programming, it uses HTML, CSS and Javascript. This web-based home security monitoring system home uses a webcam (web camera) that functions like CCTV which can be monitored via a web browser, magnetic switch as security detector, keypad as access control to turn off security monitoring system for 10 seconds, and the buzzer and LED as security indicators. When someone enter the house, he/she must press the keypad. If keypad input is correct according to the passcode then the LED will turn off, indicate that home security monitoring system off for 10 seconds. If he/she enter the house without pressing the keypad according to the passcode then when the door opens, a switch magnetic will active, then buzzer will sound and the indicator on the web will change, indicate that he/she is a person who will do the crime.Keyword : raspberry pi b+, webcam, magnetic switch, keypad, buzzer and LED. ReferencesAndre. 2014. Sejarah PHP dan Perkembangan Versi PHP. http://www.duniailkom.com/sejarah-php-dan-perkembangan-versi-php.Apache Software Foundation. About the Apache HTTP Server Project. http://httpd.apache.org/ABOUT_APACHE.html.Arfa. 2014. Akses Kontrol Kendaraan Bermotor Roda Empat Menggunakan Password dan Sensor. Skripsi. Jakarta: STMIK Raharja.Aziz, Abdul. 2012. Pengertian, Fungsi, Serta Cara Kerja Web Server. http://www.dedeerik.com/pengertian-fungsi-serta-cara-kerja-web-server.Baharudin, M. 2011. Pengertian Website. http://www.naevaweb.com/pengertian-website/arsip.html.Cox, Tim. 2014. Raspberry Pi Cookbook. Birmingham: Packt Publishing.Embedded Linux Wiki. Raspberry Pi, Low-level Peripherals. http://elinux.org/RPi_Low- level_peripherals.Embededdlinux. Raspberry Mode B-Block diagram. Diunduh http://embeddelinux01.com.Faizal. 2011. Prinsip Kerja Piezoelectric. http://www.insinyoer.com/prinsip-kerja-piezoelectric.Friedl, Stave. 2015. Secure Linux/Unix Access With Putty and Open SSH. http://unixwiz.net/techtips/putty-openssh.html/2015.Gudang Linux. 2011. Python. http://gudanglinux.com/glossary/python.Gurevich, Vladimir. 2011. Electric Relays: Principles and Applications. London: CRC Press.Harian Android. 2014. Pengertian dan Fungsi SD Card. http://www.harianandroid.com/2014/04/pengertian-dan-fungsi-sd-card.html.Heranudin. 2011. Rancang Bangun Sistem Keamanan Ruangan Menggunakan Radio Frequency. Skripsi. Depok: FT UI.Iswan, Agusta. 2012. Sistem Proteksi Brankas Berpassword Menggunakan Magnetic Doorlock sebagai Penggerak Doorstrike Berbasis Mikrokontroller. Tugas Akhir D3 Teknik Elektro. Semarang: FT UNNES.Kho, Dickson. 2012. Dioda dan Fungsi Dioda. http://teknikelektronika.com/-dioda-fungsi-dioda.Kho, Dickson. 2012. Pengertian LED (Light Emitting Diode) dan Cara Kerjanya. http://teknikelektronika.com/pengertian-led-light-emitting-diode-cara-kerja.Kho, Dickson. Pengertian Resistor dan Jenis Resistor. http://teknikelektronika.com/pengertian-resistor-jenis-jenis-resistor.Komponen Elektronika. 2011. Rangkaian Buzzer. http://komponenelektronika.com/rangkaian- buzzer.html.MS-1 Magnetic Door Switch datasheet. http://www.braude.ac.il/files/departments/electrical_electronic_engineering/labs/data_pages/p3.pdfNasih, Muhammad Usman. 2013. Alat Pengaman Kendaraan Bermotor Menggunakan Password dan SMS. Tugas Akhir. Yogyakarta: STMIK El Rahma.Özcan, Yakut. 2014. Piezoelektrik.Paul Malvino, Albert. 2010. Prinsip-Prinsip Elektronika. Jakarta: Erlangga.Pemrograman Komputer. 2012. Petunjuk Praktikum Pemrograman Komputer. Semarang: D3 Teknik Elektro UNDIP.Prayitno, Indra. 2010. Kupas Tuntas Malwar. Jakarta: Elex Media Komputindo.Raspberry Pi Fondation. GPIO Raspberry Pi Model A dan B. https://www.raspberrypi.org/documentation/usage/gpio/2009Raspberry Pi Fondation. Setting Up And Apache Web Server On A Raspberry Pi. https://www.raspberrypi.org/documentation/remote-access/web-server/apache.md.Raspberrry Pi Fondation. SSH Using Windows. http://raspberrypi.org/documentation/remote-access/ssh/windows.md/2014Richardson, Matt dan Shawn Wallace. 2015. Make: Getting Started with Raspberry Pi. Sebastopol: Maker Media.Robinson, Andrew dan Mike Cook. 2014. Raspberry Pi Projects. Chichester: John Wiley & Sons Ltd.Rohiman, Ao. 2011. Pengertian dan cara kerja router.http://www.catatanteknisi.com/2011/05/pengertian-cara-kerja-router.html.Sidik, Betha. 2011. Javascript. Jakarta: Informatika.Wahyu. Pengertian Webcam dan Fungsinya. http://wahyu.blog.fisip.uns.ac.id/2011/12/06/pengertian-web-cam-dan-fungsinya.Wikipedia. Secure Digital. https://en.wikipedia.org/wiki/Secure_Digital#Micro. 


2017 ◽  
Vol 4 (1) ◽  
pp. 1-7
Author(s):  
Adi Putra Wijaya

The bus is one of the mass transportation used by many people. With the rapid development of technology to find out the position of the bus, you can use a GPS tracker which has the ability to transmit real-time data. Use the barcode added to the bus ticket to find out the status of passengers getting on or off. Raspberry Pi functions to control Modem, Barcode Scanner, GPS Tracker. Raspberry Pi will process the GPS Tracker data on the bus to find out the coordinates of the bus. Barcode and GPS Tracker information will be retrieved from the webserver. Users will get bus information via a web smartphone by sending the bus police ID number. The application features contain agent information, bus destination code information, bus departure hours, bus tracking, and passenger status. Based on the test results, the tolerance value is 0.1" for latitude, the distance meter longitude value is 0.2". GPS Tracker will send more accurate data when in the city. In the Malang-Jakarta GPS Tracker test, there were not too many tree obstacles. Barcodes that have been scanned using a barcode reader will turn the seats on the display green.


2018 ◽  
Vol 31 ◽  
pp. 10007 ◽  
Author(s):  
Aryanti Aryanti ◽  
Ikhthison Mekongga

Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.


2019 ◽  
Vol 9 (01) ◽  
pp. 47-54
Author(s):  
Rabbai San Arif ◽  
Yuli Fitrisia ◽  
Agus Urip Ari Wibowo

Voice over Internet Protocol (VoIP) is a telecommunications technology that is able to pass the communication service in Internet Protocol networks so as to allow communicating between users in an IP network. However VoIP technology still has weakness in the Quality of Service (QoS). VOPI weaknesses is affected by the selection of the physical servers used. In this research, VoIP is configured on Linux operating system with Asterisk as VoIP application server and integrated on a Raspberry Pi by using wired and wireless network as the transmission medium. Because of depletion of IPv4 capacity that can be used on the network, it needs to be applied to VoIP system using the IPv6 network protocol with supports devices. The test results by using a wired transmission medium that has obtained are the average delay is 117.851 ms, jitter is 5.796 ms, packet loss is 0.38%, throughput is 962.861 kbps, 8.33% of CPU usage and 59.33% of memory usage. The analysis shows that the wired transmission media is better than the wireless transmission media and wireless-wired.


2007 ◽  
Vol 9 (1) ◽  
pp. 95-98 ◽  
Author(s):  
Matthew J. McGinniss ◽  
Rebecca Chen ◽  
Victoria M. Pratt ◽  
Arlene Buller ◽  
Franklin Quan ◽  
...  

Author(s):  
Miss Payal W. Paratpure

Tracking of public bus location requires a GPS device to be installed, and lots of bus operators in developing countries don't have such an answer in situ to supply an accurate estimation of bus time of arrival (ETA). Without ETA information, it's very difficult for the overall public to plan their journey effectively. In this paper, implementation of an innovative IOT solution to trace the real time location of buses without requiring the deployment of a GPS device is discussed. It uses Bluetooth Low Energy (BLE) proximity beacon to trace the journey of a bus by deploying an Estimate location beacon on the bus. BLE detection devices (Raspberry Pi 4) are installed at selected bus stops along the path to detect the arrival of buses. Once detected, the situation of the bus is submitted to a cloud server to compute the bus ETAs. A field trial is currently being conducted in Johor, Malaysia together with an area bus operator on one single path. Our test results showed that the detection of BLE beacons is extremely accurate and it's feasible to trace the situation of buses without employing a GPS device during a cost-effective way.


Author(s):  
Wahyuni Kurniasih ◽  
Abdul Rakhman ◽  
Irma Salamah

The house is the most valuable asset, therefore security at home is also very important. Therefore a home security system is created that combines a microcontroller with an Android smartphone application. The microcontroller used is the Raspberry Pi which is equipped with a camera as a home security monitoring system and various sensors as detectors such as magnetic, PIR sensors and solenoids as automatic door locks. So if the sensors that are installed detect something at home, then the homeowner will immediately get a notification sent by the database to the smartphone application, and the homeowner can monitor the state of the house right then through photos and videos recorded by cameras that have been installed at home.


Sign in / Sign up

Export Citation Format

Share Document