- R. Girasa, “AI as a Disruptive Technology,” in Artificial Intelligence as a Disruptive Technology, Palgrave Macmillan, Cham, 2020, pp. 3–21
- Kemendagri, Penegakan Protokol Kesehatan Untuk Pengendalian Penyebaran Corona Virus Disease 2019. Indonesia: Kementerian Dalam Negeri Republik Indonesia, 2020, pp. 1–5
- F. D. Adhinata, M. Ikhsan, and W. Wahyono, “People counter on CCTV video using histogram of oriented gradient and Kalman filter methods,” Jurnal Teknologi dan Sistem Komputer, vol. 8, no. 3, pp. 222–227, 2020, doi: 10.14710/jtsiskom.2020.13660
- D. Y. Setiawan, H. Fitriyah, and I. Arwani, “Sistem Penghitung Jumlah Orang Melewati Pintu Menggunakan Metode Background Subtraction Berbasis Raspberry Pi,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 3, no. 2, pp. 2105–2113, 2019
- A. K. Mahamad, S. Saon, H. Hashim, M. A. Ahmadon, and S. Yamaguchi, “Cloud-based people counter,” Bulletin Electrical Engineering and Informatics, vol. 9, no. 1, pp. 284–291, 2020, doi: 10.11591/eei.v9i1.1849
- T. Parthornratt, N. Burapanonte, and W. Gunjarueg, “People identification and counting system using raspberry Pi (AU-PiCC: Raspberry Pi customer counter),” in International Conference on Electronics, Information, and Communication (ICEIC), Da Nang, Vietman, Jan. 2016 doi: 10.1109/ELINFOCOM.2016.7563020
- T. Y. Chen, C. H. Chen, D. J. Wang, and Y. L. Kuo, “A people counting system based on face-detection,” in 4th International Conference on Genetic and Evolutionary Computing (ICGEC), Dec. 2010, pp. 699–702, doi: 10.1109/ICGEC.2010.178
- D. W. Nugraha, Y. Anshori, and N. K. Candriasih, “Rancang Bangun Sistem Penghitung Jumlah Pengunjung Perpustakaan Menggunakan Metode Haar like Features (Studi Kasus Pada Perpustakaan Universitas Tadulako),” ScientiCO : Computer Science and Informatics Journal., vol. 1, no. 1, p. 57, 2019, doi: 10.22487/j26204118.2018.v1.i1.11902
- W. Liu et al., “SSD: Single shot multibox detector,” Lecturer Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence Lecture Notes in Bioinformatics), vol. 9905 LNCS, pp. 21–37, 2016, doi: 10.1007/978-3-319-46448-0_2
- J. C. Nascimento, A. J. Abrantes, and J. S. Marques, “Algorithm for centroid-based tracking of moving objects,” in International Conference on Acoustics, Speech and Signal Processing (ICASSP), August. 1999, vol. 6, no. 1, pp. 3305–3308, doi: 10.1109/icassp.1999.757548
- A. A. Suzen, B. Duman, and B. Sen, “Benchmark Analysis of Jetson TX2, Jetson Nano and Raspberry PI using Deep-CNN,” in 2nd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Jun. 2020, pp. 3–7, doi: 10.1109/HORA49412.2020.9152915
- J. A. Kim, J. Y. Sung, and S. H. Park, “Comparison of Faster-RCNN, YOLO, and SSD for Real-Time Vehicle Type Recognition,” in International Conference on Consumer Electronics (ICCE), Sep. 2020, pp. 8–11, doi: 10.1109/ICCE-Asia49877.2020.9277040
- E. Cengil, A. Çinar, and Z. Güler, “A GPU-based convolutional neural network approach for image classification,” in International Artificial Intelligence and Data Processing Symposium (IDAP), Sep. 2017, doi: 10.1109/IDAP.2017.8090194
- A. G. Howard et al., “MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications,” in International Conference on Learning Representations, April. 2017, pp. 1–9, [Online]. Available: http://arxiv.org/abs/1704.04861
- D. Sinha and M. El-Sharkawy, “Thin MobileNet: An Enhanced MobileNet Architecture,” in 10th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), Oct. 2019, pp. 0280–0285, doi: 10.1109/UEMCON47517.2019.8993089
- H.-T. Kim, Gyu-yeong; Kim, Jae-Ho; Park, Jang-Sik ; Yu, Yun-Sik ; Kim, “Vehicle Tracking using Euclidean Distance,” Journal Korea Institute Electronic Communication Sciences, vol. 7, no. 6, pp. 1293–1299, 2012, doi : https://doi.org/10.13067/JKIECS.2012.7.6.1293
- S. N. Jyothi and K. V. Vardhan, “Design and implementation of real time security surveillance system using IoT,” in International Conference on Communication and Electronics Systems (ICCES), Oct. 2016, doi: 10.1109/CESYS.2016.7890003
- D. Bader, “Schedule,” readthedocs.io, 2020. https://schedule.readthedocs.io/en/stable/ (accessed May 12, 2021)
- Y. Li, H. Huang, Q. Xie, L. Yao, and Q. Chen, “Research on a surface defect detection algorithm based on MobileNet-SSD,” Applied Sciences Journal, vol. 8, no. 9, 2018, doi: 10.3390/app8091678
- David L. DiLaura, An Introduction to The IES Lighting Handbook 10 th. Forgotten Books, 2017
- N. N. Putri, “Aplikasi Pendeteksi Objek bergerak pada Image Sequence Dengan Metode Background Substraction,” Jurnal Teknologi Rekayasa., vol. 21, no. 3, pp. 162–172, 2016
- R. D. Ramadhani, A. N. A. Thohari, and N. A. Nugraha, “Sistem Keamanan Ruangan Berbasis Internet of Things Menggunakan Single Board Computer,” Jurnal Nasional Informatika dan Teknologi Jaringan, vol. 1, no. 2, pp. 0–5, 2020, doi: https://doi.org/10.30743/infotekjar.v4i2.2338
- E. Rohadi et al., “Internet of Things: CCTV Monitoring by Using Raspberry Pi,” in the first International Conference on Applied Science and Technology (iCAST), 2018, pp. 454–457, doi: 10.1109/iCAST1.2018.8751612
Last update:
No citation recorded.
Last update: 2025-07-10 20:56:39
No citation recorded.
Copyright (c) 2022 Afandi Nur Aziz Thohari, Aisyatul Karima, Angga Wahyu Wibowo, Kuwat Santoso

This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Starting from 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
- their article is original, written by the mentioned author(s),
- has never been published before,
- does not contain statements that violate the law, and
- does not violate the rights of others, is subject to copyright held exclusively by the author(s), is free from the rights of third parties, and the necessary written permission to quote from other sources has been obtained by the author(s).
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
- Copyright and other proprietary rights related to the article, such as patents,
- The right to use the substance of the article in its own future works, including lectures and books,
- The right to reproduce the article for its own purposes,
- The right to archive all versions of the article in any repository, and
- The right to enter into separate additional contractual arrangements for the non-exclusive distribution of published versions of the article (for example, posting them to institutional repositories or publishing them in a book), acknowledging its initial publication in this journal (Jurnal Teknologi dan Sistem Komputer).
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. JTSiskom will not be held responsible for anything arising because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.