[1]Jun Hou, Chengdong Wu, Zhongjia Yuan, Jiyuan Tan, Qiaoqiao Wang and Yun Zhou, “Research of Intelligent Home Security Surveillance System Based on ZigBee,” Proc. International Symposium on Intelligent Information Technology Application Workshops, Shanghai, pp. 554-557, 2008.
[2]Xiangjun Zhu, Shaodong Ying and Le Ling, “Multimedia Sensor Networks Design for Smart Home Surveillance,” Proc. Chinese Control and Decision Conference, Yantai, Shandong, pp. 431-435, 2008.
[3]L. Lo Presti and M. L. Cascia, “Real-Time Object Detection in Embedded Video Surveillance Systems,” Proc. 9th International Workshop on Image Analysis for Multimedia Interactive Services, Klagenfurt, pp. 151-154, 2008.
[4]B. Mrazovac, M. Z. Bjelica, D. Kukolj, S. Vukosavljev, B. M. Todorovic and D. Samardzija, “System and Method for Passive Surveillance in Indoor Environments Based on Principal Components of the Signal Strength Variation,” Proc. International Conference on Wireless Communications in unusual and Confined Areas (ICWCUCA), Clermont Ferrand, pp. 1-6, 2012.
[5]S. Fleck and W. Strasser, “Smart Camera Based Monitoring System and Its Application to Assisted Living,” Proceedings of the IEEE, vol. 96, no. 10, pp. 1698-1714, Oct. 2008.
[6]Wen-Tsuen Chen, Po-Yu Chen, Wei-Shun Lee and Chi-Fu Huang, “Design and Implementation of a Real Time Video Surveillance System with Wireless Sensor Networks,” Proc. IEEE Vehicular Technology Conference, Singapore, pp. 218-222, 2008.
[7]Mikko Nieminen, Tomi Raty and Mikko Lindholm, “Multi-Sensor Logical Decision Making in the Single Location Surveillance Point System,” Proc. 4th International Conference on Systems, France, pp. 86-90, 2009.
[8]Y. G. Kim, H. K. Kim, S. G. Lee and K. D. Lee, “Ubiquitous Home Security Robot Based on Sensor Network,” Proc. International Conference on Intelligent Agent Technology , Hong Kong, pp. 700-704, 2006.
[9]Guifang Qiao, Guangming Song, Yali Wang, Jun Zhang and Weiguo Wang, “Autonomous Network Repairing of a Home Security System Using Modular Self-Reconfigurable Robots,” IEEE Transactions on Consumer Electronics, vol. 59, no. 3, pp. 562-570, Aug. 2013.
[10]Ying-Wen Bai, Li-Sih Shen and Zong-Han Li, “Design and Implementation of an Embedded Surveillance System by Use of Multiple Ultrasonic Sensors,” Proc. 28th International Conference on Consumer Electronics (ICCE), Las Vegas, Nevada, USA, pp. 501-502, 2010.
[11]Yang Cao, Huijie Zhao, Na Li and Hong Wei, “Land-Cover Classification by Airborne LIDAR Data Fused with Aerial Optical Images,” Proc. International Workshop on Multi-Platform/Multi-Sensor Remote Sensing and Mapping (M2RSM), Xiamen, pp. 1-6, 2011.
[12]B. Kamgar-Parsi, W. Lawson and B. Kamgar-Parsi, “Toward Development of a Face Recognition System for Watchlist Surveillance,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, no. 10, pp. 1925-1937, Oct. 2011.
[13]Hai-Wen Zhao, Hong Yue and He-Gao Cai, “Design of a Distributed Ultrasonic Detecting System Based on Multiprocessor for Autonomous Mobile Robot,” Proc. International Conference on Circuits, Systems, Signal and Telecommunications, Gold Coast, Australia, pp. 59-64, 2007.
[14]Ying-Wen Bai, Zi-LI Xie and Zong-Han Li, “Design and Implementation of a Home Embedded Surveillance System with Ultra-low Alert Power,” IEEE Transactions on Consumer Electronics, vol. 51, no. 1, pp. 153-159, Feb. 2011.
[15]Francesco Alonge, Marco Brancifortem and Francesco Motta, “A Novel Method of Distance Measurement Based on Pulse Position Modulation and Synchronization of Chaotic Signals Using Ultrasonic Radar Systems,” IEEE Transactions on Instrumentation and Measurement, vol. 58, no. 2, pp. 318-329, Feb. 2009.
[16]Shraga Shoval and Johann Borenstein, “Using Coded Signals to Benefit from Ultrasonic Sensor Crosstalk in Mobile Robot Obstacle Avoidance,” Proc. International Conference on Robotics and Automation, Seoul, Korea, vol. 3, pp. 2879-2884, 2001,.
[17]Hannes Elmer and Herbert Schweinzer, “High Resolution Ultrasonic Distance Measurement in Air Using Coded Signals,” Proc. 19th IEEE Instrumentation and Measurement Technology Conference, Anchorage, AK, USA, vol. 2, pp. 1565-1570, 2002.
[18]邱文勝,「到達時間與到達角度之量測及聲源反算之研究」,碩士論文,成功大學,台南,2007。[19]古一喬,「超音波之水底通訊」,碩士論文,中華大學,新竹,2011。[20]Rodrigo Pereira Barretto da Costa-Felix and Joao Carlos Machado, “P1G-9 Stepped Sine Versus Coded Pulse As Excitation Signals for Ultrasonic Transducer Calibration in a Non-Linear Propagation Field,” Proc. IEEE Ultrasonics Symposium, Vancouver, BC, pp. 1398-1401, 2006.
[21]F. J. Alvarez, J. Urena, A. Hernandez, A. Jimenez, C. De Marziani, J. M. Villadangos and M. C. Perez, “Detecting Ultrasonic Signals in a Turbulent Atmosphere Performance of Different Codes,” Proc. IEEE International Symposium on Intelligent Signal Processing, Alcala de Henares, pp. 1-6, 2007.
[22]Gin-Der Wu and Chin-Teng Lin, ”A Recurrent Neural Fuzzy Network for Word Boundary Detection in Variable Noise-level Environments,” IEEE Transactions on Systems, Man, and Cybernetics, PartB: Cybernetics, vol. 31, no. 1, pp. 84-97, Feb. 2001.
[23]I. V. Druzhinin, A. A. Mynzhasova and E. A. Sinelnikov, “Design and Implementation of a Hardware-software Module for Testing Real-time Systems,” Proc. 34th International Convention MIPRO, Opatija, Croatia, pp. 1689-1692, 2011.
[24]B. T. Swapna, Atilla Eryilmaz and N. B. Shroff, “Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting,” IEEE Transactions on Information Theory, vol. 59, no. 10, pp. 6328-6341, Oct. 2010.
[25]Frank Melandso and Svein Jacobsen, “Single-transducer Ultrasonic Continuous-wave System for Transmitting Coded Sequences,” Proc. IEEE International Ultrasonics Symposium (IUS), Orlando, FL, pp. 1664-1668, 2011.
[26]Cao Lina, Guo Yinjing, Lu Wenhong, Yao Mingyuan, Wang Zhengjie and Sun Hongyu, “Ultrasonic Imaging Detective System Based on Spread Spectrum Technology,” Proc. International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, pp. 6449-6451, 2007.
[27]Wu Xing-Hui and Zhou Yu-Ping, “Analysis of Data Encryption Algorithm Based on WEB,” Proc. 2nd International Conference on Computer Engineering and Technology (ICCET), Chengdu, vol. 7, pp. 673-677, 2010.
[28]Huaixiang Wang, Deyu Dang and Shi Min, “The Analysis of the Security Strategy of Embedded Mobile Database,” Proc. 3th IEEE International Conference on Computer Science and Information Technology, Chengdu, vol. 6, pp. 476-478, 2010.
[29]Jinjie Gu and Yuzhu Cheng, “Research on Security Protection Mechanisms of Digital Content,” Proc. 3th IEEE International Conference on Computer Science and Information Technology, Chengdu, vol. 1, pp. 155-158, 2010.
[30]王俊傑,「多輸入多輸出正交分頻多工系統中基於編碼可靠度混合重傳機制及適應性調變編碼之聯合設計」,碩士論文,國立交通大學,新竹,2006。[31]Ing-Ray Chen and Yating Wang, “Reliability Analysis of Wireless Sensor Networks with Distributed Code Attestation,” IEEE Communications Letters, vol. 16, no. 10, pp.1640-1643, Oct. 2012.
[32]B. G. Kelly and A. B. Wagner, “Reliability in Source Coding With Side Information,” IEEE Transactions on Information Theory, vol. 58, no. 8, pp. 5086-5111, Aug. 2012.
[33]Wang Zhaohui, Zhou Shengli, Catipovic Josko and Willett Peter, “Asynchronous Multiuser Reception for OFDM in Underwater Acoustic Communications,” IEEE Transactions on Wireless Communications, vol. 12, no. 3, pp. 1050-1061, Mar. 2013.
[34]Chuan Li, D. A. Hutchins and R. J. Green, “Short-Range Ultrasonic Digital Communications in Air,” IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control, vol. 55, no. 4, pp. 908-918, Apr. 2008.
[35]S. N. Diggavi, A. R. Calderbank, S. Dusad and N. Al-Dhahir, “Diversity Embedded Space-Time Codes,” IEEE Transactions on Information Theory, vol. 54, no. 1, pp. 33-50, Jan. 2008.
[36]P. Reviriego and J. A. Maestro, “Study of the Effects of Multibit Error Correction Codes on the Reliability of Memories in the Presence of MBUs,” IEEE Transactions on Device and Materials Reliability, vol. 9, no. 1, pp. 31-39, Mar. 2009.
[37]M. Y. Agyekum and S. M. Nowick, “Error-Correcting Unordered Codes and Hardware Support for Robust Asynchronous Global Communication,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 31, no. 1, pp. 75-88, Jan. 2012.
[38]R. Friedman, A. Mostefaoui, S. Rajsbaum and M. Raynal, “Asynchronous Agreement and Its Relation with Error-Correcting Codes,” IEEE Transactions on Computers, vol. 56, no. 7, pp.865-875, July 2007.
[39]C. Desset, B. Macq and L. Vandendorpe, “Computing the Word-, Symbol-, and Bit-Error Rates for Block Error-Correcting Codes,” IEEE Transactions on Communications, vol. 52, no. 6, pp. 910-921, June 2004.
[40]邱茂清,「低密度同位檢查碼的低複雜度疊代解碼演算法之介紹」,碩士論文,國立中正大學,嘉義,2010。
[41]林德政,「安全即時通訊系統設計與實作」,碩士論文,國立交通大學,新竹,2011。[42]林子閔,「超音波與感測器整合於導盲手杖定位之應用」,碩士論文,國立台灣科技大學,台北,2009。[43]林宗欽,「可設定距離之車用雷達警示系統」,碩士論文,高雄應用科技大學,高雄,2011。[44]鄭智鴻,「遠距離監視系統:人物的偵測與追蹤」,碩士論文,國立暨南大學,南投,2006。[45]黃敏峰,「人臉追蹤法應用於監控系統之研究」,碩士論文,國立成功大學,台南,2003。[46]沈里斯,「以多數決投票機制提升多重感測器可靠度之嵌入式監視系統」,碩士論文,輔仁大學,新北市,2009。[47]李宗翰,「利用PIR感應模組和超音波模組偵測入侵者之嵌入式監視系統之設計與建構」,碩士論文,輔仁大學,新北市,2010。[48]謝子立,「使用太陽能板設計與實現一低警戒功耗家庭嵌入式監視系統」,碩士論文,輔仁大學,新北市,2011。[49]General Purpose Single Biopolar Timers, IC NE555 datasheet, http://pdf.datasheetcatalog.com/datasheet/stmicroelectronics/2182.pdf, 1998.
[50]Micro Power PIR Motion Detector IC, http://www.e-ele.net/DataSheet/BISS0001.pdf, 2005.
[51]Product of Microchip, CMOS microcontroller pic16f887 datasheet, http://ww1.microchip.com/downloads/en/DeviceDoc/41291D.pdf, 2006.
[52]長高科技,LINUX核心開發與實務-Intel Xscale PXA270,長高科技圖書,2006。
[53]陳後守、邱茂清、王忠炫、吳昭明,錯誤更正碼 Error-Correcting Codes,2007。
[54]William Stallings 著、蕭裕弘 譯,資料與電腦通訊,滄海出版社,台中市,1999。
[55]C. L. Phillips, J. M. Parr and E. A. Riskin, Signals, Systems, and Transforms, Pearson/Prentice Hall, Upper Saddle River, NJ, 2008.