L. M. Silalahi, M. Ikhsan, S. Budiyanto, Imelda Uli Vistalina Simanjuntak, Gunawan Osman, A. D. Rochendi
{"title":"基于香蕉派M2+的图像视觉捕捉方法和电子邮件通知的小偷检测原型设计","authors":"L. M. Silalahi, M. Ikhsan, S. Budiyanto, Imelda Uli Vistalina Simanjuntak, Gunawan Osman, A. D. Rochendi","doi":"10.1109/IC2IE56416.2022.9970065","DOIUrl":null,"url":null,"abstract":"The problem in this research is the use of technology on digitalization devices and integrated in one device module designed, namely an intruder detection prototype using visual methods controlled by Banana Pi $\\mathrm{M}2+$ equipped with a webcam, Python programming language, and information output in the form of email notifications making this prototype has been equipped with security and surveillance systems. The proposed research method is an openCV-based image processing method whose output produces a visual display. This prototype has several features including image capture in monitoring remotely. The result of this research is that when the prototype gets a visual intruder or a person's face in a room then this prototype will use the face detection feature and then analyzed by the system. If the captured face is not a face stored in the system then the photo will send information in the form of an E-mail to the owner / user that has been detected an intruder. The delivery and reception time of E-mail notifications ranges from 3–5 seconds so that this prototype successfully works and the concept of the Internet of Things runs as long as the device is facilitated by a stable internet and sufficient power to monitor the coverage area of the monitor.","PeriodicalId":151165,"journal":{"name":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Designing a Thief Detection Prototype using Banana Pi M2+ Based Image Visual Capture Method and Email Notifications\",\"authors\":\"L. M. Silalahi, M. Ikhsan, S. Budiyanto, Imelda Uli Vistalina Simanjuntak, Gunawan Osman, A. D. Rochendi\",\"doi\":\"10.1109/IC2IE56416.2022.9970065\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The problem in this research is the use of technology on digitalization devices and integrated in one device module designed, namely an intruder detection prototype using visual methods controlled by Banana Pi $\\\\mathrm{M}2+$ equipped with a webcam, Python programming language, and information output in the form of email notifications making this prototype has been equipped with security and surveillance systems. The proposed research method is an openCV-based image processing method whose output produces a visual display. This prototype has several features including image capture in monitoring remotely. The result of this research is that when the prototype gets a visual intruder or a person's face in a room then this prototype will use the face detection feature and then analyzed by the system. If the captured face is not a face stored in the system then the photo will send information in the form of an E-mail to the owner / user that has been detected an intruder. The delivery and reception time of E-mail notifications ranges from 3–5 seconds so that this prototype successfully works and the concept of the Internet of Things runs as long as the device is facilitated by a stable internet and sufficient power to monitor the coverage area of the monitor.\",\"PeriodicalId\":151165,\"journal\":{\"name\":\"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)\",\"volume\":\"135 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC2IE56416.2022.9970065\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference of Computer and Informatics Engineering (IC2IE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC2IE56416.2022.9970065","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Designing a Thief Detection Prototype using Banana Pi M2+ Based Image Visual Capture Method and Email Notifications
The problem in this research is the use of technology on digitalization devices and integrated in one device module designed, namely an intruder detection prototype using visual methods controlled by Banana Pi $\mathrm{M}2+$ equipped with a webcam, Python programming language, and information output in the form of email notifications making this prototype has been equipped with security and surveillance systems. The proposed research method is an openCV-based image processing method whose output produces a visual display. This prototype has several features including image capture in monitoring remotely. The result of this research is that when the prototype gets a visual intruder or a person's face in a room then this prototype will use the face detection feature and then analyzed by the system. If the captured face is not a face stored in the system then the photo will send information in the form of an E-mail to the owner / user that has been detected an intruder. The delivery and reception time of E-mail notifications ranges from 3–5 seconds so that this prototype successfully works and the concept of the Internet of Things runs as long as the device is facilitated by a stable internet and sufficient power to monitor the coverage area of the monitor.