Sistem Identifikasi Pergerakan Mencurigakan Peserta Ujian CBT Politeknik Caltex Riau Menggunakan IP Camera
Abstract
One surveillance system that is often used is CCTV. This CCTV will provide results in the form of video recordings which can then be accessed by wireless communication. In its use, CCTV must still be protected by human resources to give a warning. Then the use of CCTV becomes less efficient when used to oversee a room where the room rarely has movement. Because CCTV cannot detect or identify suspicious movements automatically. So we need a system that can identify movements (suspicious movements) automatically. In this case, the movement to be identified is the movement towards the Caltex Riau CBT Polytechnic exam participants. Monitoring cameras (monitors) which are also often done to oversee an area or object, one of which is the IP Camera. Based on these problems, this system will be developed using IP as an input image. Then the image will be carried out a feature extraction process. Then enter the classification process using the k-Nearest Neighbor algorithm to determine the label pattern of the examinees' movements. Based on tests that have been done using 502 data, the accuracy rate obtained is in the range of 98% - 98.4% with an average accuracy of 98.2% for the value of neighborliness = 3. With a system of 98.2% system accuracy can be used to identify suspicious movements of CBT Polytechnic Caltex Riau exam participants using IP cameras, where the movement conditions are not suspicious or suspicious movements.Published
Issue
Section
License
Copyright info for authors
1. Authors hold the copyright in any process, procedure, or article described in the work and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors retain publishing rights to re-use all or portion of the work in different work but can not granting third-party requests for reprinting and republishing the work.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.