|
[1]內政部警政署全球資訊網。上網日期:2016年6月6日,檢自https://www.npa.gov.tw/NPAGip/wSite/mp?mp=1。 [2]E. S. Kim and M. S. Kim, “Design and fabrication of security and home automa-tion system,” Proceedings of International Conference on Computational Science and Its Applications, Part III, pp. 31–37, 2006. [3]L. Yang, S. H. Yang, and F. Yao, “Safety and security of remote monitoring and control of intelligent home environments,” Proceedings of IEEE International Conference on Systems, Man and Cybernetics, pp.1149–1153, 2007. [4]J. A. Gutierrez, M. Naeve, E. Callaway, M. Bourgeois, V. Mitter, and B.Heile, “IEEE 802.15.4: A developing standard for low-power low-cost wireless person-al area networks,” IEEE Network, vol. 15, no. 5, pp. 12-19, Sept-Oct. 2001. [5]Y. P. Tsou, J. W. Hsieh, C. T. Lin, and C. Y. Chen, “Buliding a remote supervis- ory control network system for smart home applications,” IEEE International Conf. on System, Man and Cybernetics, pp. 1826-1830,Oct. 2006. [6]Y. Tajika, T. Saito K. Termoto, N. Oosaka, and M. Isshiki, “Networked home appliance system using bluetooth technology integrating appliance con-trol/monitoring with internet service,” IEEE Transactions on Consumer Elec-tronics, vol. 49, no. 4, pp. 1043-1048, Nov. 2003. [7]L. Ophir, “802.11 over coax – A hybrid coax – wireless home network using 802.11 technology,” Consumer Communications and Networking Conference, pp. 13-18, Jan. 2004. [8]J. See and S. Lee, “An integrated vision-based architecture for home security system,” IEEE Transactions on Consumer Electronics, vol.53, no.2, pp.489-498, May 2007. [9]Y. Zhao and Z. Ye, “A low cost GSM/GPRS based wireless home security sys-tem,” IEEE Trans. Automat. Control, vol. 54, no. 2, pp. 567–572, 2008. [10]M. H. Assaf, R. Mootoo, S. R. Das, E. M. Petriu, V. Groza, and S. Biswas, “Sensor based home automation and security system,” Instrumentation and Measurement Technology Conference (I2MTC), pp. 722-727, Aug. 2012. [11]S. Lee, K. Ha, and K. C. Lee, “A pyroelectric infrared sensor-based indoor loca-tion-aware system for the smart home,” IEEE Transactions on Consumer Elec-tronics, vol. 52, no. 4, pp. 1311–1317, Nov. 2006. [12]H. H. Kim, K. N. Ha, and S. Lee, “Resident location-recognition algorithm using a bayesian classifier in the PIR sensor-based indoor location-aware system,” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 39, no. 2, pp. 240-245, Feb. 2009. [13]D. Yang, W. Sheng, and R. Zeng, “Indoor human localization using PIR sensors and accessibility map,” Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), pp. 577-581, Oct. 2015. [14]M. Sahani, C. Nanda, A. K. Sahu, and B. Pattnaik, “Web-based online embedded door Access control and home security system based on face recognition,” Cir-cuit, Power and Computing Technologies (ICCPCT), pp.1-6, 2015. [15]D. Sunehra and A. Bano, “An intelligent surveillance with cloud storage for home security,” Annual IEEE India Conference (INDICON), pp.1-6, 2014. [16]B. Choudhury, T. S. Choudhury, A. Pramanik, W. Arif, and J. Mehedi, “Design and implementation of an SMS based home security system,” Electrical, Com-puter and Communication Technologies (ICECCT), pp.1-7, 2015. [17]Arduino Official website (2015). ArduinoYún .Retrieved August 15, 2016, from https://www.arduino.cc/en/Main/ArduinoBoardYun
|