Perancangan Sistem Keamanan Perumahan Menggunakan Face Recognition Berbasis Android
DOI:
https://doi.org/10.29240/arcitech.v2i2.5833Keywords:
System, Security, Android, Face RecognitionAbstract
Downloads
References
Aryani, D., Ihsan, M. N., & Septiyani, P. (2017). Prototype Sistem Absensi Dengan Metode Face Recogniton Berbasis Arduino Pada SMK Negeri 5 Kabupaten Tangerang. Seminar Nasional Teknologi Informasi dan Multimedia 2017 (pp. 37-42). Yogyakarta: STMIK AMIKOM Yogyakarta.
Astuti, P. (2018). Penggunaan Metode Black Box Testing (Boundary Value Analysis) Pada Sistem Akademik (SMA/SMK). Faktor Exacta, 186-195.
BPS. (2019). Statistik Kriminal 2019. Badan Pusat Statistik.
Fatoni, A., & Dwi, D. (2016). Rancang Bangun Sistem Extreme Programming Sebagai Metodologi Pengembangan Sistem. Jurnal PROSISKO, 17-20.
Gozali, F., & Basori, Y. I. (2016). Sistem keamanan lingkungan perumahan berbasis web menggunakan Raspberry P. JETri, Jurnal Ilmiah Teknik Elektro, 35-48.
Indartono, K., & Jahir, A. (2018). Aplikasi Sistem Keamanan Mobil Menggunakan Quick Response Code Berbasis Android. Jurnal Informatika, 14-20.
Jusia, P. A. (2016). Face Recognition Menggunakan Metode Algoritma Viola Jones Dalam Penerapan Computer Vision. Jurnal Ilmiah Media Processor, 663-675.
Manual Desain Sistem Keamanan Bangunan. (2016). Retrieved from multisite.itb.ac.id: https://www.google.co.id/search?q=manual+desain+sistem+keamanan+lingkungan&ei=TWqAY6n0MbqaseMPm6eYEA&ved=0ahUKEwjpzsew48j7AhU6TWwGHZsTBgIQ4dUDCA4&uact=5&oq=manual+desain+sistem+keamanan+lingkungan&gs_lcp=Cgxnd3Mtd2l6LXNlcnAQAzIFCCEQoAEyBQghEKABOgoIABBHENY
Monika, S., Rakhman, A., & Lindawati, L. (2017). Pengaman Rumah Dengan Sistem Face Recognition Secara Real Time Menggunakan Metode Principal Component Analysis. Prosiding SNATIF ke 4 (pp. 395-401). Kudus: Universitas Muria Kudus.
Piarsa, I. N., & Wibawa, K. S. (2017). Prototipe Deteksi dan Pengenalan Wajah Pada Sistem Monitoring dan Kontrol Visual Keamanan Rumah. Seminar Nasional Sains dan Teknologi IV (pp. 1-7). Bali: Universitas Udayana.
Pramadita, M. A. (2017). Perencanaan dan Pembuatan Sistem Keamanan Pintu Berbasis Biometrik Citra Wajah. Surabaya: Institur Teknologi Sepuluh Novemver.
Priskila, R. (2018). Perancangan Sistem Informasi Persediaan Barang Pada Perusahaan Karya Cipta Buana Sentosa Berbasis Web dengan Metode Extreme Programming. CESS (Journal of Computer Engineering System and Science), 94-99.
Putra, I. T., & Harjoko, A. (2018). Pengenalan Wajah Berbasis Mobile Menggunakan Fisherface dan Distance Classifier. Jurnal Sains & Teknologi, 135-145.
Setiadi, H., Astuti, R. D., & Anggrainingsih, R. (2019). Implementasi Smart Security Camera Pendukung Sistem Keamanan Lingkungan Mandiri Berbasis Internet of Thing. Konferensi Nasional Pengabdian Kepada Masyarakat dan Corporate Social Responsibility, (pp. 89-94).
Setiyani, L. (2019). Pengujian Sistem Informasi Inventory Pada Perusahaan Distributor Farmasi Menggunakan Metode Black Box Testing. Jurnal Xplore, 20-27.
Downloads
Published
How to Cite
Issue
Section
Citation Check
License
Authors who publish with Arcitech: Journal of Computer science and Artificial Intelligence agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).