+ All Categories
Home > Documents > [IEEE 2010 International Conference on Information and Communication Technology for the Muslim World...

[IEEE 2010 International Conference on Information and Communication Technology for the Muslim World...

Date post: 05-Dec-2016
Category:
Upload: viva
View: 213 times
Download: 0 times
Share this document with a friend
6
Implementation of Motion Detection On Early Warning System For Residential Security Based Multimedia Messaging Service (MMS Lia Rainingsihl , Arine ,Viva Arifin3 I Faculty of Science and Technology, State Islamic University Syarif Hidayatullah Jakarta 2 Faculty of Science and Technology, State Islamic University Syarif Hidayatullah Jakarta 3 Faculty of Science and Technology, State Islamic University Syarif Hidayatullah Jakarta Abstract - Latest situation leads people to be more careful for saving their security home environment (Residential Security). Residential security is one important thing in the security system. Residential security order can still be monitored by the owner of the house with developing of the security system to provide a notification when there is an undesirable condition. The system will be created using motion detection approach that can identify and monitor the environment movement of the entire room. The resulting of information of the environment movement will be recorded to the server and the catching of image will be forwarded to the user as an early notification (message), which this message will be sent by using MMS technology (Multimedia Messaging Service). The C # Programming language used to implement at the application and the supporting of technology are the framework Aforge as well as MMS Gateway. Testing process were performed using Nunit (Unit Testing) and Black Box. From this study, it can be concluded that the application of motion detection is able to inform the user that the movement occurred in the observed object, which equipped with a notification of MMS as well as have a more affordable cost. Ind Term - Motion Detection, Multimedia Messaging Service (MMS I. INTRODUCTION A t this time the security mechanism is one important thing, especially the security guard's house or the company to provide the safety condition for the occupant. In order for residential or home security can still be monitored by the owner of the house, the security system is needed that can provide a waing or notification when there is an undesirable thing/object around the environment of the observed place. Some approach can be used to detect the object, one kind of these is motion detection approach which observe the movement of object A. Formulation of Problem Problems that can be formulated in this thesis is how the motion detection is able to inform the moving in of the objects were observed for residential security systems. Bellow are the problem definitions : 1. The use of web cameras that will be observed at room number and a web camera position is adjusted with the state of residence, such as ont door, living room, and others as needed. 2. Storing video in shape .avi. 3. Mobile phone that can receive MMS with the specification that able to receive MMS B. System Development Method Method system development which writer used is SDLC method (System Development Life Cycle) linear model sequential or oſten called a Rapid Application Development (RAD). Stages are as follows : I) Analysis and Quick Design, in this step we do : a) Analysis of problem solving, that consist of analysis problem, analysis soſtware requirement and analysis hardware requirement b) Quick Design, for this design do the Designing Classes and designing interfaces 2) Construction, in this step we will create the specification that consist of : limitation implementation, implementation class and implementation of interface 3) Testing, in this step, we use 2 testing to prove our application, there are : NUnit and Black box 4) Implementation, the last step is implementation into the house residence. II. THEORITICAL BACKGROUNS A. Motion Detection Motion detection is an action of physical movement in a room that has been determined. The movement can be detected by color change of the object that being monitored. This movement can be used by tools that interact with the room or by other electronic means [1]. In the event of movement, the program will give an alarm or waing to users is an image that has been captured by web cameras which is connected to the computer that store and manage the images that have been captured to be viewed on another computer in one network.
Transcript
Page 1: [IEEE 2010 International Conference on Information and Communication Technology for the Muslim World 2010 (ICT4M) - Jakarta, Indonesia (2010.12.13-2010.12.14)] Proceeding of the 3rd

Implementation of Motion Detection On Early Warning System For Residential Security Based

Multimedia Messaging Service (MMS

Lia Rainingsihl , Arine ,Viva Arifin3

IFaculty of Science and Technology, State Islamic University Syarif Hidayatullah Jakarta

2Faculty of Science and Technology, State Islamic University Syarif Hidayatullah Jakarta

3Faculty of Science and Technology, State Islamic University Syarif Hidayatullah Jakarta

Abstract - Latest situation leads people to be more

careful for saving their security home environment

(Residential Security). Residential security is one important thing in the security system. Residential security order can still be monitored by the owner of the house with developing of the security system to provide a

notification when there is an undesirable condition. The system will be created using motion detection approach

that can identify and monitor the environment

movement of the entire room. The resulting of

information of the environment movement will be recorded to the server and the catching of image will be forwarded to the user as an early notification (message),

which this message will be sent by using MMS technology (Multimedia Messaging Service). The C # Programming language used to implement at the

application and the supporting of technology are the framework Aforge as well as MMS Gateway. Testing process were performed using Nunit (Unit Testing) and

Black Box. From this study, it can be concluded that the application of motion detection is able to inform the user that the movement occurred in the observed object, which equipped with a notification of MMS as well as

have a more affordable cost.

Index Term - Motion Detection, Multimedia Messaging Service (MMS

I. INTRODUCTION

At this time the security mechanism is one important thing, especially the security guard's

house or the company to provide the safety condition for the occupant. In order for residential or home security can still be monitored by the owner of the house, the security system is needed that can provide a warning or notification when there is an undesirable thing/object around the environment of the observed place. Some approach can be used to detect the object, one kind of these is motion detection approach which observe the movement of object

A. Formulation of Problem Problems that can be formulated in this thesis is

how the motion detection is able to inform the moving in of the objects were observed for residential security systems. Bellow are the problem definitions : 1. The use of web cameras that will be observed at

room number and a web camera position is

adjusted with the state of residence, such as front door, living room, and others as needed.

2. Storing video in shape .avi. 3. Mobile phone that can receive MMS with the

specification that able to receive MMS

B. System Development Method Method system development which writer used is

SDLC method (System Development Life Cycle) linear model sequential or often called a Rapid Application Development (RAD). Stages are as follows : I) Analysis and Quick Design, in this step we do :

a) Analysis of problem solving, that consist of

analysis problem, analysis software requirement and analysis hardware requirement

b) Quick Design, for this design do the Designing Classes and designing interfaces

2) Construction, in this step we will create the specification that consist of : limitation implementation, implementation class and implementation of interface

3) Testing, in this step, we use 2 testing to prove our application, there are : NUnit and Black box

4) Implementation, the last step is implementation into the house residence.

II. THEORITICAL BACKGROUNS

A. Motion Detection

Motion detection is an action of physical movement in a room that has been determined. The movement can be detected by color change of the object that being monitored. This movement can be used by tools that interact with the room or by other electronic means [1]. In the event of movement, the program will give an alarm or warning to users is an image that has been captured by web cameras which is connected to the computer that store and manage the images that have been captured to be viewed on another computer in one network.

Page 2: [IEEE 2010 International Conference on Information and Communication Technology for the Muslim World 2010 (ICT4M) - Jakarta, Indonesia (2010.12.13-2010.12.14)] Proceeding of the 3rd

B. Multimedia Messaging Service (MMS) MMS is a messaging service type that able to

integrate several kinds of media objects (text, image, sound, video) displayed simultaneously. The MMS delivery process mode is store and forward mode using a traffic channel. The MMS message stored in the MMSC (MMS Centre) and forwarded as SMS. With this MMS technology, we can enjoy with a colorful picture messaging, accompanied by voice and an explanation of text, so that the dynamic message[3]. At the figure 1 bellow show the architecture of MMS.

Picture 1. MMS Architecture [3]

The MMS Environment (MMSE) is a collection of particular elements in a single administrative

settings. The MMSE includes all services from the elements for the process of the delivery, storage and notification of a message. 1. The MMS working

The MMS is one of the applications developed on the 2.SG technology platforms. It used GPRS system to transmit the message. As previously explain the MMS message are sent in a "store and forward" mode which means that MMS was first stored in the Multimedia Message Service Centre (MMSC) and then notified (informed) to the recipient. The MMS messages is on the server or the MMSC will be stored in a certain time limit. If the recipient does not download the MMS messages that sent to him until the time limit expired, the message will be removed by the server directly. The MMS supports sending messages to the some media such as Images, Text and Audio.

2. MMS Gateway The MMS (Multimedia Messaging Service)

Gateway is a platform that provides a mechanism for External Application Users (EUA), which delivers and receives the MMS message from mobile devices (cell phones, PDA phone, etc.) via MMS Gateway's shortcode (for example 9221). Below is included a little illustration of the above explanation.

The MMS Gateway to allow the EUA to communicate with Telco MMSC (Telkomsel, Indosat, etc.) or the MMS platform to deliver and receive MMS messages easily. The MMS Gateway also provides the standard interfaces to the EVA at the implementation.

Some web applications have been widely used MMS such as registration and confirmation process, office applications, and CMS. The EVA communicate with MMS Gateway via the Internet using standard HTTP GET or HTTPS (for secure communication).

Telco MMSC will deliver a picture as MMS message to the MMS Gateway provider (in accordance with the telephonelhandy number that has been rented) by using a unique protocol. Then based on the keywords that have been written to the MMS, the MMS Gateway system will deliver the MMS message to the VRL which have been specified. The EVA may deliver the MMS reply message to the customer through the MMS gateway. And the VAE can determine the amount of costs (charging) will be charged to the customer

C. Surveillance Camera Surveillance camera or CCTV (Closed-Circuit

Television) has a camera that will transmit video images to a specific place. System security cameras are usually used for security or commercial reasons when people need it while you're in a dangerous environment/area. [6]

D. NET Framework Microsoft. NET Framework is a component that

can be added to the Microsoft Windows operating system or have been integrated into Windows (from Windows 2003 and the latest Windows versions). This framework provides a large number of program solutions to meet the common requirements of new programs, and manage execution of programs written specifically for this framework. . NET framework is the key of the main offering from Microsoft, which is intended to be used by most new applications created for the Windows platform. [7]

E. A forge Framework .NET Framework consists of two main

components, namely CLR (Common Language Runtime) and. NET Framework Class Library or often called BCL (Base Class Library).[3] 1. CLR (Common Language Library)

CLR is the main foundation of the framework. NET Framework. CLR is the component responsible for various aspects such as responsible untuj perform memory management, code execution, verify security code and various other system services.

2. BCL (Base Class Library) .NET Framework Class Library or often also called the BCL is a collection of reusable types that are embedded with highly integrated CLR. Nature-oriented class library of objects that will provide the types of functions managed code. This also can reduce the time required at the time of execution. With these properties, then the third­party components (third part) will be easily

Page 3: [IEEE 2010 International Conference on Information and Communication Technology for the Muslim World 2010 (ICT4M) - Jakarta, Indonesia (2010.12.13-2010.12.14)] Proceeding of the 3rd

applied to the application that created. The figure 2 bellow show the architecture of .Net Framwork.

ProyekAplikasl

Kodesumber I(#,VB.NET,J�,CHI

Compiler

,­'.1/

Resource

Reference

IC#, VB.NET, J#, CHI

: 2 ' Menghallikan "

Managed Assembly 1'.eKe atau '.dlll Metadata MSIL/ CIL

I , I \ :) ,

Metadata ILdan reference Oiload oleh CLR

.NfTFramework

Menggunakan Common Language Runtime ICLRI

---_I Clall Ubrary .NET

Security / Garbage Collection/ JlTComplier Framework

Menladl kode melln/nallve

Sistem Operasl

Figure 2 . . NET Framework Architecture[5]

F. Visual C# C # (pronounced "See-Sharp") is a object oriented modem programming language. The syntax C # programming languages similar with C family such as C, C++, and Java. C # combines the productivity and convenience in Visual Basic programming with the ability and flexibility in programming C++, and add new things that do not exist in the Java programming language. Anders Hejlbers main designer is from Microsoft, who built the Turbo Pascal programming language and has been instrumental in the development of Delphi and Borland Delphi. [8]

G. NUnit Nunit is a unit of the open source testing

framework of Microsoft.NET. NUnit provides the same functions with JUnit that able use Java programming language, and is one of the family xUnit. NUnit can record the time of execution of unit tests and report the performance of XML, CSV, XHTML with diagrams and history tracking. This means that these functions can facilitate developers to integrate and analyze performance metrics into the unit testing environment, to control and monitor the development of relation between algorhitmic complexit and resources on software systems.[9]

The four advantages using NUnit [1] are we can improve coding, faster to make the deadline (after making coding, can be directly tested using NUnit so that it can quickly complete the program because it

can directly do the repairing of code), fast during the debug, and quick at the correcting code.

H. Rapid Application Development (RAD) RAD Software development model used in

residential applications early detection. The author chose the RAD model is a model of a linear sequential software development process that emphasizes an extremely short development cycle. RAD process enables a development team to create "a complete functional system" within a very short period of time (approximately 60 to 90 days).[4]

RAD assumes the use of fourth generation techniques. In addition to create a software using third-generation programming language as conventional. In all cases, the tools used to facilitate the automatic construction of software. Also done re­use existing components (if possible), this means that making reuse component back if needed. Then continued to the testing and turnover. Since the RAD process emphasizes the re-usable, many components of the program has been tested. This reduces the overall time of testing. But the new components must be tested and the all interfaces must be fully trained. [4]

Figurure 3. Rapid Application Development (RAD) Cycle [10]

At the figure 3 above show the step of RAD model. At the analysis and quick design phase is to analyze and collect all the system requirements and perform rapid design system for early viewing. In the construction phase of designing as the detail designing of the class and interface design system. At the testing phase is to do the testing for the units and the overall system. The last phase namely the implementation phase is the implementation into the system.

III. RESEARCH METHODOLOGY

A. Materials and Equipment Research materials is a digital image (image

which was captured by a web camera). The equipment needed to supports this research and operates the application, this equipment is divided into two specification : a) Hardware requirements that we need are

Processor Pentium IV 3.0 Ghz, Harddisk 80 GB, DDR2 RAM 1 GB, Keyboard, Mouse, Web Camera, Cellular Phone (Mobile phone), the

Page 4: [IEEE 2010 International Conference on Information and Communication Technology for the Muslim World 2010 (ICT4M) - Jakarta, Indonesia (2010.12.13-2010.12.14)] Proceeding of the 3rd

mobile phone used as modem (GPRS and MMS features) and data Cable, it connects the computer to web camera.

b) Software req uirement 1. Operating System, the operating system that

used is Microsoft Windows XP Service pack 2. Application Program, the application

program is a software that will be used in the program-making is Microsoft Visual Studio 2008.

B. Research Methods The explanation bellow are the step of the RAD Model that used in our research method I. Analysis and Quick Design. a. Analysis,

This step also known as the plan designing phase, to determine set of business functions and data issues that will be supported by the system as well as as the range or system limitations. In detail, the author did in the analysis phase, that is : 1) Problem Analysis, in this step will analyze

the problem. 2) Software Requirement Analysis, after known

the problem next action is dicided the software requirement then hardware requirement

3) Hardware requirement Analysis b. Quick Design

At this phase will do the design of some part Class Design and Interface Design

2. Construction This phase also known as the creation or

development stages. In this stage will be done The limitation of the implementation, class implementation and implementation of interfaces 3. Testing

The Testing phase is a process of the program execution that aims to find errors. The testing conducted in this thesis consists of two parts : Nunit and Black Box

4. Implementation The implementation of the system has been developed to create a stay home security system.

IV. DISCUSSION

4.1. Analysis and Quick Design Some requirements that we analyze are describe bellow : A. Problem Analysis

The main problem of this topic is to implement motion detection to detect the object movement that store as picture image to the server and send by the MMS gateway as a warning to the user.

Motion detection approach compare the current image frame with previous image frame. The first web camera will capture images from a room that is being monitored. Then compare the colors contained in the

current frame with previous frame. If there is a different color, then the object is detected as a movement, then an alarm event will be called to process the video storage and delivery as MMS message. The frame will be locked and sign with a red box to the surrounding of object. The box will be numbered 1 through 9. The numbering according to the size of the box, the numbering starts with the largest box till the smallest. Numbering boxes based on the number of pixels that changed, the more pixels are changed then the box is getting bigger (the biggest box will be numbered 1 to the smallest). This numbering will facilitate the user to see a object movement.

The size of the MMS message is adjusted with the MMS standardization (adjusted as the type of mobile phone that will be used to send and receive MMS message). If the size of the image is too large, the mobile phone sender can not send MMS message, and the users can not download the MMS. Authors set the picture size is 320 x 240 pixels, which would produce less than 10kB MMS images.

Analysis of Threshold Value Threshold value is a value that can be defined by user. Threshold value will affect the movement that occur. If the threshold value is too high, then most likely will not be detected any movement, and if the threshold value is smaller, it will be detected as movement. At the figure 4 bellow is the flow fo motion detection process

Figure 4. Motion Detection Flowchart

Page 5: [IEEE 2010 International Conference on Information and Communication Technology for the Muslim World 2010 (ICT4M) - Jakarta, Indonesia (2010.12.13-2010.12.14)] Proceeding of the 3rd

The MMS gateway consists of several parts that must be filled by the user that are the GSM / GPRS Modem, MMS Server Settings, and MMS Message. In the GSM / GPRS Modem, the program will detect the modem that has been recognized by computer. For the MMS Server settings section, users are prompted to enter login, password, Access Point Name (APN), IP Gateway, and servers used by the MMS gateway modem operator. At the MMS message, the user will enter the destination number, subject, body, and From. For the Result information, the program will automatically notifY the success or failure of program for sending a MMS message as Report and Response.

When movement was detected, and the program had been kept in the videos form, then the program would take the last picture (MMS), then sent to the Telco MMSC according to Telco operators have been set into the MMS Server Settings section. Telco MMSC will deliver a picture (MMS) to the MMS gateway company's (according to the number that had been rented) by using a special protocol. And based on the keywords that have been written to the MMS, then MMS gateway system will deliver the MMS to a URL that has been determined. UAE may be led to an MMS reply message to the customer through the MMS Gateway.

B. Software Requirements Analysis Users will interact through a user interface that is

provided by the software, users enter the data required for program automatically. Images that have been captured will be sent to mobile phone users and will be stored in the form of video. The software will be built has two main features : 1. Detecting the object movement at the room with

motion detection. 2. Sending pictures that have been recorded using

the MMS gateway. And the functional software requirements are : a) The system can capture images from web

cameras. (There are at FormUtama Class, method Open Video Source )

b) The system should be able to detect any movement. (There are at Class MotionDetector, MotionDetector method).

c) The system can store files in the form of a video (.avi). (There are at Class FormUtama,SuatA VI method).

d) The system must be able to save the images to be sent to the phone user. (There are at Class FormUtama, SendMMS method).

e) The system can display the video (.avi). (There are at Class FormUtama, AmbilDataByTanggal method).

C. Analysis Requirement Hardware In this step dicide the specifications and Hardware

requirements, there are : CPU (Central Processing Unit) with minimum specification for the user are Pentium IV 2.4 Ghz Processor, 80 GS Hard Drive, 1

GB DDR RAM, Keyboard, Mouse, Web Camera, Cellular Phone, Mobile phones used by the user consists of two pieces, the mobile phone used as modem (GPRS and MMS features) and data Cable, it is the cable that connects your mobile phone with a computer. Minimum specifications adjusted data cable with mobile phones used as modems.

D. Quick Design After the analysis done, then do the design class. The design class show at the figure 5 bellow.

Formllama

"'Form

Feds

Vdh:ds

IMotiooOetectcr

MotionDetector @' Class

8 Fields

� arolTocISlripI/enult",,_C!cl � .rolTo:l�llpI'EIlun .. _Clc"-l

i>lnbID.I. � i>lnbID�.ByTa'"9l'1 .JJ blnOea,.C!ck

/ baeicgrouncfram .. . bbnapData : !It .. . bIobCounter : 610 .. . ealculater<'OOorL .. . eotnter: i"t

<iferencefier : ... � b!nlnsertClck � But.�\1 � carera).I:rm JJ (ajer�),I!rrr2 .lJ carera.AI3'mJ � carera.AI:rrrA .J careraJle\\fr.:rne � careraJle\\fr'.:rne2 � careraJle\\fr8YIe3 � carera}leflFrerne+ � coTlI!!raW,ndow.Clck � (arerolJ�ndO\\Q_Clck � careraW,ndo\\o.Clck � carerolMndOlvUlck � a".FI. � CcrnboD!";ke)O>lChonged

� dt.aG'O\'ie)'itCeIOid:. t [l�w�

F�lI\Itan.

i' F�lI\Itan'J'",Ct:.ng

� H�usG.IrhlI1'II'iS '" hOlilOTallShipVenultm.Oiel JJ flnl c("' ,:rt f !nsertOata � l;-nToo5�p�lru1lem_Chec"'dCh.nged

l' lHft ... d"sJlntCllc�.d

� ,",n�C.l!rd"I_D.I.5.'cto:I ,l. Cpen"iioSoutCf ,J, CpenYi:i!oSoutce2 � CpenYi7.0Source3 '" CllenYi:i!oSoutce4

5 ... :l-1I'iS(+ 1 ""load) � sell�xIon � si"npanS�:tPe-IJ"i!ll:anT((JIStliptienultem_o-edtdChanr-d .I l.b�t/Oll_Clck

..) ti'l'.trJicl .il tii.elZJI(l ..) tiT.tt�Ji(l .I Iir.erUict • l\:da�esut

'1d"fSealeFil:er : I... hei#: int

moveTowardsfil: .. . numbers!ltmaps .. . pixelateFilter : IF .. . pixeIsChanged : i1t proc:essingFil:erl .. . tlvesholdFil:er : .. . wiclh : int

8 Properties

_Level: do .. . '!fi MotionLeveICalc:u .. .

8 Methods

MotionDetector()

Proc:essFrdffOl() : ... RosetO : void

Figure 5. Design Class Diagram

4.2. Construction This part also known as the creation or

development stage. In this stage will do : a. Limitation of implementation b. Class Implementation c. Implementation of interface

4. 3. Testing Testing is a process of execution of the program

that aims to find errors. Testing conducted in this thesis consists of two parts : a. Unit-level testing using tools Nunit.

This testing act as level unit test of some functions, i.e. at the figure 6. It done the testing of

Page 6: [IEEE 2010 International Conference on Information and Communication Technology for the Muslim World 2010 (ICT4M) - Jakarta, Indonesia (2010.12.13-2010.12.14)] Proceeding of the 3rd

Motion Detector in Class Motion Detector that show passed result. It means the method is properly operate.

T�Re!Ib

[§. �Nl{APi� 2009{J9·1111:�· " Rill' Oebuo'

ItJ Te1trll!cetrdett4 R�; III ��i 1tem(�)dle6.ed;D ---

Red T sst Na"ne ProJ!(t £nor � iJ P4Ssed HuliUlt L fT.,! T<>UA"ti.nD<h"iof

Figure 6. Result of Unit Testing Method Motion Detector in Class MotionDetector

b. System-level testing using a black box approach. This testing to prove and test the application of motion deetction technique to detect of movement. The result show at the tabel 4.1 bellow.

Tb l 41Sft a e 0 ware T T bl estmg . a e

Pictures posted Received by Image Saved Videos by Personal User Picture Size

Computer (PC) (Cellular Phone)

2009-7 -13 22-56- 2009-7-13 22- 5.30 KB 2009-7-13 22-

14.jpg 56-14.jpg 56-15.avi

2009-7-13 22-56- 2009-7-13 22- 5.64 KB 2009-7-13 22-

19.jpg 56-19.jpg 56-20.avi

2009-7-13 22-56- 2009-7-13 22- 6.55 KB 2009-7-13 22-

24.jpg 56-24.jpg 56-25.avi

2009-7-13 22-56- 2009-7-13 22- 6.95 KB 2009-7-13 22-

29.jpg 56-29.jpg 56-30.avi

2009-7-13 22-56- 2009-7-13 22- 7.02 KB 2009-7-13 22-

34.jpg 56-34.jpg 56-35.avi

4.4. Implementation The final stage in the development of the RAD

system is the implementation, namely implementing the system has been developed for residential security systems.

V. CONCLUSION

Based on the description and discussion III

previous chapters, it can be concluded that : a) Based on testing with NUnit, this application can

be run in accordance with the objectives, analysis, and design that has been designed, so the application can support the early warning system for the residences.

b) The application of motion detection can inform the user of object movement that occurred in the observed object.

c) Based on the black box testing, this application system can be used as an early warning applications for houses, because it can

immediately notity the homeowner when there was object movement in the monitored room.

d) This application monitor the house/room which equipped with early warning and a more affordable cost.

VI. FUTURE WORK

Based on the conclusions that have been described above then several suggestions can be made for further development, these include : a) Personal Computer (PC) should be placed in a

room that is not known by someone else. b) The development of applications recommended

can access not only based network that can just accessed by a PC server but also a web-based applications (Internet) so that users can access these applications anytime and anywhere.

c) This application can not yet distinguish the object human is the homeowner or not. Recommended for developing includes the artificial intelligence that can identity a moving object is the owner of the dwelling house or other people.

d) If users want the applications can be directly "On" in case of power failure or blackout reduction, the application can be in the autorun settings.

VII. REFERENCES

[1] Kirillov Andrew. http ://www.codeproject.comiKBaudio­video/Motion_Detection. aspx.

[2] Pohan. R : Pengembangan Sistem Informasi Inventori Berbasis Jaringan Local Area Network (LAN) pada PT. Mitra Mega Semesta (DoctoRabbit). 2009 19. UrN Syarif Hidayatullah Jakarta.

[3] Wiley John Mobile Technologies and Services :SMS,EMS,MMS. 2003. ISBN 0-470-84876-6

[4] W. Gulo, Metodologi Penelitian, Grasindo (Gramedia Widiasarana Indonesia), Jakarta, 2002.

[5] http ://rachmans.com/image _ artikel.htm. 18 May 2009,

[6] http ://kkbsistemcctv.blogspot.comI2008/09/bebe rapa-pilihan-sistem-cctv-sistem.html.

[7] http://www.microsoft.cominet/overview.aspx. [8] http://www .ecmainternational. org/publications/fi

les/ECMAST/Ecma-334.pdf. [9] http://www.firebenchmarks.com/Modules/Conte

ntItems/Public/ContentItems -iew.aspx?RCICode=rci_001&viewRSS=I&view . Print=l.

[ 1 0] http://www.oware.com/S ubpages/radmethodo log y. htm.


Recommended