Pub Date : 2020-10-23DOI: 10.1109/ECICE50847.2020.9301914
Wen Feng Lin
In this research, author probes rotating functionally graded material hollow cylinder with exponentially-varying profile and properties. There are different pressure and temperature apply on boundary surfaces of hollow cylinder. The issue is analyzed by using the radial displacement governing equation, and the solution is presented by Whittaker’s functions. Analytic solutions of deformation and stresses are proposed, and the influences of pressure and temperature with respect to stress distribution are probed. Numerical results for the analytic solutions are presented to demonstrate the responses of the applied conditions on proposed cylinder.
{"title":"Analysis of Thick-Wall Hollow Functionally Graded Material under Temperature and Pressure Loads","authors":"Wen Feng Lin","doi":"10.1109/ECICE50847.2020.9301914","DOIUrl":"https://doi.org/10.1109/ECICE50847.2020.9301914","url":null,"abstract":"In this research, author probes rotating functionally graded material hollow cylinder with exponentially-varying profile and properties. There are different pressure and temperature apply on boundary surfaces of hollow cylinder. The issue is analyzed by using the radial displacement governing equation, and the solution is presented by Whittaker’s functions. Analytic solutions of deformation and stresses are proposed, and the influences of pressure and temperature with respect to stress distribution are probed. Numerical results for the analytic solutions are presented to demonstrate the responses of the applied conditions on proposed cylinder.","PeriodicalId":130143,"journal":{"name":"2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128006930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-23DOI: 10.1109/ECICE50847.2020.9301949
Hui-fang Lin, Y. Hsieh
Energy-saving and faster manufacturing techniques are essential requirements for the ideal production of polyethylene terephthalate (PET) bottles. The establishment of accurate calculation skills strengthens a quality working environment for improving manufacturing technology. We applied the adaptive finite element method and calculated the time-dependent SST (shear stress transport), k-ω, k-ε and LES (large eddy simulation) models to predict the airflow field around the PET bottles in a heating box. The computation of the flow field was performed using software COMSOL 5.5 (COMSOL Inc., Palo Alto, CA). The experimental data are acquired to compare with simulation results in terms of calculation accuracy. Computational fluid dynamics (CFD) results showed that error for the velocity and pressure of the flow field at specific positions in the vicinity of the preform was satisfied. The error estimation on the main physical quantity helps calculate other physical quantities. The variation trend of y+ values near the bottle surface had an identical trend alongside the gird concentration trend during the adaptive computation process. This study reveals that the outcome of the adaptive computation method and its underlying theories satisfy the physical requirements in this case.
{"title":"Relations between y+ Value and Adaptive Computation Result for Manufacturing Bottles","authors":"Hui-fang Lin, Y. Hsieh","doi":"10.1109/ECICE50847.2020.9301949","DOIUrl":"https://doi.org/10.1109/ECICE50847.2020.9301949","url":null,"abstract":"Energy-saving and faster manufacturing techniques are essential requirements for the ideal production of polyethylene terephthalate (PET) bottles. The establishment of accurate calculation skills strengthens a quality working environment for improving manufacturing technology. We applied the adaptive finite element method and calculated the time-dependent SST (shear stress transport), k-ω, k-ε and LES (large eddy simulation) models to predict the airflow field around the PET bottles in a heating box. The computation of the flow field was performed using software COMSOL 5.5 (COMSOL Inc., Palo Alto, CA). The experimental data are acquired to compare with simulation results in terms of calculation accuracy. Computational fluid dynamics (CFD) results showed that error for the velocity and pressure of the flow field at specific positions in the vicinity of the preform was satisfied. The error estimation on the main physical quantity helps calculate other physical quantities. The variation trend of y+ values near the bottle surface had an identical trend alongside the gird concentration trend during the adaptive computation process. This study reveals that the outcome of the adaptive computation method and its underlying theories satisfy the physical requirements in this case.","PeriodicalId":130143,"journal":{"name":"2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134507080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-23DOI: 10.1109/ECICE50847.2020.9301942
Yi-Yun Chu, Kai Liu
More and more people cluster in major cities and thus causing urbanization challenges. In this scenario, many cities are employing technologies to lessen the impact on the environment and increase productivity and efficiency to cope with the high demand. Among which, smart transportation is essential in fulfilling the mobility in the urban areas and promising to meet the increasing demand of passengers. IoT application in a smart parking system has been facilitated in various ways. To achieve its full potential, we need to understand the associated issues and principals. Therefore, this paper focus on understanding the principals within IoT, the process for the layers to function in vehicle detection, and introducing different IoT sensors empowered by different technologies, including cloud computing, big data, RFID, and WSN, that facilitate the smart parking system. After assessing the potential use cases of the IoT in the vehicle presence detection of the smart parking system, this paper will identify and discuss the benefits and challenges along with the recommendation and consideration that serve as the manual to help the industries and the governmental institutions to select appropriate sensors according to different scenarios.
{"title":"IoT in Vehicle Presence Detection of Smart Parking System","authors":"Yi-Yun Chu, Kai Liu","doi":"10.1109/ECICE50847.2020.9301942","DOIUrl":"https://doi.org/10.1109/ECICE50847.2020.9301942","url":null,"abstract":"More and more people cluster in major cities and thus causing urbanization challenges. In this scenario, many cities are employing technologies to lessen the impact on the environment and increase productivity and efficiency to cope with the high demand. Among which, smart transportation is essential in fulfilling the mobility in the urban areas and promising to meet the increasing demand of passengers. IoT application in a smart parking system has been facilitated in various ways. To achieve its full potential, we need to understand the associated issues and principals. Therefore, this paper focus on understanding the principals within IoT, the process for the layers to function in vehicle detection, and introducing different IoT sensors empowered by different technologies, including cloud computing, big data, RFID, and WSN, that facilitate the smart parking system. After assessing the potential use cases of the IoT in the vehicle presence detection of the smart parking system, this paper will identify and discuss the benefits and challenges along with the recommendation and consideration that serve as the manual to help the industries and the governmental institutions to select appropriate sensors according to different scenarios.","PeriodicalId":130143,"journal":{"name":"2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129814821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-23DOI: 10.1109/ECICE50847.2020.9301930
Sung-Shiou Shen, Cen Jian, Shen-Ho Lin, Wei Chien
In modern life, it is a good choice to stay overnight in the hotels or Inns for a business or a short trip in a busy schedule. Today, most of the current hotel check-in and -out registration procedures still need to be completed by the counter service staff by contacting the hotel guest. However, the current registration procedure is not private for customers who put great importance on privacy and security. To protect customer privacy and personal information, contacting people should be reduced, and the transmission of customer personal data must be encrypted and avoided. For the business and security service of a high-level hotel to attract more customs, the best choice is to provide an electronic counter which provides customers with automatic check-in and out registration procedures. However, personal IDs resulting are required to successfully perform personal identification or authentication. Hence, this paper proposes a log-in system with automatic identification which detects the unique characteristics of the customer through the backend system verification and comparison. The system achieves the purpose of successful identification of individuals without carrying mobile devices and IDs and enables contactless check-in and -out registration procedure for assuring customer privacy and security.
{"title":"Travel Shop Service System with Identity Key","authors":"Sung-Shiou Shen, Cen Jian, Shen-Ho Lin, Wei Chien","doi":"10.1109/ECICE50847.2020.9301930","DOIUrl":"https://doi.org/10.1109/ECICE50847.2020.9301930","url":null,"abstract":"In modern life, it is a good choice to stay overnight in the hotels or Inns for a business or a short trip in a busy schedule. Today, most of the current hotel check-in and -out registration procedures still need to be completed by the counter service staff by contacting the hotel guest. However, the current registration procedure is not private for customers who put great importance on privacy and security. To protect customer privacy and personal information, contacting people should be reduced, and the transmission of customer personal data must be encrypted and avoided. For the business and security service of a high-level hotel to attract more customs, the best choice is to provide an electronic counter which provides customers with automatic check-in and out registration procedures. However, personal IDs resulting are required to successfully perform personal identification or authentication. Hence, this paper proposes a log-in system with automatic identification which detects the unique characteristics of the customer through the backend system verification and comparison. The system achieves the purpose of successful identification of individuals without carrying mobile devices and IDs and enables contactless check-in and -out registration procedure for assuring customer privacy and security.","PeriodicalId":130143,"journal":{"name":"2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115974313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-23DOI: 10.1109/ECICE50847.2020.9301923
Ching-Hsi Tseng, Yen-Pin Hsu, S. Yuan
We propose a weakly supervised object detection network based on eye-tracking data. A large number of training samples cannot be used due to the following problems: (1) the labels of training samples in object detection are not all pixel-level and (2) the cost of labeling is too high. Thus, we introduce a framework whose input combines images with only image-level labels and eye-tracking data. Based on the position given by the eye-tracking data, the framework has effective performance even in the case of incomplete sample annotation. Thus, we use an eye-tracker to collect the data on the most interesting area in the sample images and present the data in the fixations way. Then, the bounding boxes produced by the fixations data and the original image-level label become the input data of the object detection network. In this way, eye-tracking data helps us selecting the bounding boxes and providing detailed location information. Experiment results verify that the framework is effective with the support of eye-tracking data.
{"title":"Eye-tracking Data for Weakly Supervised Object Detection","authors":"Ching-Hsi Tseng, Yen-Pin Hsu, S. Yuan","doi":"10.1109/ECICE50847.2020.9301923","DOIUrl":"https://doi.org/10.1109/ECICE50847.2020.9301923","url":null,"abstract":"We propose a weakly supervised object detection network based on eye-tracking data. A large number of training samples cannot be used due to the following problems: (1) the labels of training samples in object detection are not all pixel-level and (2) the cost of labeling is too high. Thus, we introduce a framework whose input combines images with only image-level labels and eye-tracking data. Based on the position given by the eye-tracking data, the framework has effective performance even in the case of incomplete sample annotation. Thus, we use an eye-tracker to collect the data on the most interesting area in the sample images and present the data in the fixations way. Then, the bounding boxes produced by the fixations data and the original image-level label become the input data of the object detection network. In this way, eye-tracking data helps us selecting the bounding boxes and providing detailed location information. Experiment results verify that the framework is effective with the support of eye-tracking data.","PeriodicalId":130143,"journal":{"name":"2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116016713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-23DOI: 10.1109/ECICE50847.2020.9301947
Daniella Brovkina, Annika Kienzlen, O. Riedel
Simulation models are used during the entire life cycle of a factory. Because of a factory’s complexity, different simulation tools with different scope emerged over time. The holistic mapping requires coupled simulations that consider the factory from different perspectives. Each simulation requires a new tool and simulation model, which, up to now, has usually been created manually. This paper presents an analysis of existing approaches and data models for factory simulation description. These approaches allow data exchange between single simulation models, but do not provide dynamic coupling and model generation, and often cannot include all relevant information for the factory simulation. To achieve a continuous and comprehensive factory simulation, a concept for a metamodel for factory simulation description is outlined. Its goal is not only to describe a skeleton of the factory and provide simulation coupling and data exchange but also to provide a dynamic model generation.
{"title":"Comparative Analysis of Factory Simulation Description Models for Comprehensive Description of Model Design","authors":"Daniella Brovkina, Annika Kienzlen, O. Riedel","doi":"10.1109/ECICE50847.2020.9301947","DOIUrl":"https://doi.org/10.1109/ECICE50847.2020.9301947","url":null,"abstract":"Simulation models are used during the entire life cycle of a factory. Because of a factory’s complexity, different simulation tools with different scope emerged over time. The holistic mapping requires coupled simulations that consider the factory from different perspectives. Each simulation requires a new tool and simulation model, which, up to now, has usually been created manually. This paper presents an analysis of existing approaches and data models for factory simulation description. These approaches allow data exchange between single simulation models, but do not provide dynamic coupling and model generation, and often cannot include all relevant information for the factory simulation. To achieve a continuous and comprehensive factory simulation, a concept for a metamodel for factory simulation description is outlined. Its goal is not only to describe a skeleton of the factory and provide simulation coupling and data exchange but also to provide a dynamic model generation.","PeriodicalId":130143,"journal":{"name":"2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121510256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-23DOI: 10.1109/ECICE50847.2020.9301954
Zhi-Qi Liang, Min-Bin Chen, Cheng-Xuan Wu, Yingzhu Li, Song-Hua Lin
3D games have become popular in recent years. However, it is easy to produce a symptom when playing games, called 3D discomfort or motion sickness. The current explanations mostly focus on the authenticity of the game or the differences in the physiological level of the viewer. There is a rare discussion about whether the game causes human visual and brain discomfort which are caused by the 3D game production process. As many people feel uncomfortable with 3D games, the players gradually lose enthusiasm for the game. This study aims to understand motion sickness through the experiment and confirm that the field of view and viewing distance causes motion sickness through data collection. The experiment in this study has open and closed scenarios for psychological and physical tests. In the experiment, the players determine the most comfortable and uncomfortable vision and distance. The responses using a questionnaire are collected and analyzed in the online community. Based on the data, we test whether motion sickness occurs in different scenarios. The result helps prevent motion sickness in the game and allows players to enjoy the game. The result also provides basic data to prevent motion sickness in the game.
{"title":"Effect of Viewing Angle and Distance on Motion Sickness in 3D game","authors":"Zhi-Qi Liang, Min-Bin Chen, Cheng-Xuan Wu, Yingzhu Li, Song-Hua Lin","doi":"10.1109/ECICE50847.2020.9301954","DOIUrl":"https://doi.org/10.1109/ECICE50847.2020.9301954","url":null,"abstract":"3D games have become popular in recent years. However, it is easy to produce a symptom when playing games, called 3D discomfort or motion sickness. The current explanations mostly focus on the authenticity of the game or the differences in the physiological level of the viewer. There is a rare discussion about whether the game causes human visual and brain discomfort which are caused by the 3D game production process. As many people feel uncomfortable with 3D games, the players gradually lose enthusiasm for the game. This study aims to understand motion sickness through the experiment and confirm that the field of view and viewing distance causes motion sickness through data collection. The experiment in this study has open and closed scenarios for psychological and physical tests. In the experiment, the players determine the most comfortable and uncomfortable vision and distance. The responses using a questionnaire are collected and analyzed in the online community. Based on the data, we test whether motion sickness occurs in different scenarios. The result helps prevent motion sickness in the game and allows players to enjoy the game. The result also provides basic data to prevent motion sickness in the game.","PeriodicalId":130143,"journal":{"name":"2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127738072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-23DOI: 10.1109/ECICE50847.2020.9301944
Chih-ming Wu, Qin Tsai, Lin-Yan Li, Celia Xiao
In order to make the operation and maintenance phase of the utility tunnel more intelligent, this study is based on the building information modeling (BIM), 3D printing, IoT sensors, cloud computing and other technologies. The actual simulation of the utility tunnel in the operation stage. The results of the study learned that the use of the Internet of things and other technologies, will be able to more intelligent control of the use of the integrated management corridor, through cloud computing and other ways to reduce the advantages of cloud maintenance system set-up costs, increased efficiency in maintenance.
{"title":"Development and Application Scenario of Municipal Utility Tunnel Facility Management Based on BIM, 3D Printer and IoT","authors":"Chih-ming Wu, Qin Tsai, Lin-Yan Li, Celia Xiao","doi":"10.1109/ECICE50847.2020.9301944","DOIUrl":"https://doi.org/10.1109/ECICE50847.2020.9301944","url":null,"abstract":"In order to make the operation and maintenance phase of the utility tunnel more intelligent, this study is based on the building information modeling (BIM), 3D printing, IoT sensors, cloud computing and other technologies. The actual simulation of the utility tunnel in the operation stage. The results of the study learned that the use of the Internet of things and other technologies, will be able to more intelligent control of the use of the integrated management corridor, through cloud computing and other ways to reduce the advantages of cloud maintenance system set-up costs, increased efficiency in maintenance.","PeriodicalId":130143,"journal":{"name":"2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122221367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-23DOI: 10.1109/ECICE50847.2020.9301961
Rong-Guan Yeh
In this paper, a detrended fluctuation analysis (DFA) method is applied to assess the depth of anesthesia. General assessment of the depth of anesthesia (DoA) method is monitoring the cerebral cortex activity. The purpose of this study is to develop a new index which is different from the cerebral cortex activity monitoring index. Forty surgery patients (25 males + 15 females) were investigated. For every patient, the procedure is divided into three stages, before surgery 5 minute (stage A), during the surgery (stage B) and after the surgery 5 minute (stage C). The DFA values of each patient were calculated, and the mean ± standard deviation of DFA in 40 patients were calculated. Calculated results show that patients before surgery α, α1 and α2 values were 0.795 ± 0.188, 0.862 ± 0.165 and 0.839 ± 0.200, during surgery were 0.696 ± 0.353, 0.650 ± 0.107 and 0.690 ± 0.215, and after surgery were 0.803 ± 0.195, 0.871 ± 0.172 and 0.846 ± 0.209. The results have been shown significant differences (P < 0.05) in α and α2 values (including stages A and B, stages A and C) and none significant difference in α1 value (any two stages combination A, B and C). Therefore, the value of α and α2 have index effect in distinguish the physiological characteristics of patients before and after anesthesia.
{"title":"Detrended Fluctuation Analysis Used in Heart Rate Variability to Assess the Depth of Anesthesia","authors":"Rong-Guan Yeh","doi":"10.1109/ECICE50847.2020.9301961","DOIUrl":"https://doi.org/10.1109/ECICE50847.2020.9301961","url":null,"abstract":"In this paper, a detrended fluctuation analysis (DFA) method is applied to assess the depth of anesthesia. General assessment of the depth of anesthesia (DoA) method is monitoring the cerebral cortex activity. The purpose of this study is to develop a new index which is different from the cerebral cortex activity monitoring index. Forty surgery patients (25 males + 15 females) were investigated. For every patient, the procedure is divided into three stages, before surgery 5 minute (stage A), during the surgery (stage B) and after the surgery 5 minute (stage C). The DFA values of each patient were calculated, and the mean ± standard deviation of DFA in 40 patients were calculated. Calculated results show that patients before surgery α, α1 and α2 values were 0.795 ± 0.188, 0.862 ± 0.165 and 0.839 ± 0.200, during surgery were 0.696 ± 0.353, 0.650 ± 0.107 and 0.690 ± 0.215, and after surgery were 0.803 ± 0.195, 0.871 ± 0.172 and 0.846 ± 0.209. The results have been shown significant differences (P < 0.05) in α and α2 values (including stages A and B, stages A and C) and none significant difference in α1 value (any two stages combination A, B and C). Therefore, the value of α and α2 have index effect in distinguish the physiological characteristics of patients before and after anesthesia.","PeriodicalId":130143,"journal":{"name":"2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130757118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-23DOI: 10.1109/ECICE50847.2020.9301929
Yi-Chen Lee, Ching-Min Lee
This research combines Raspberry Pi with the Internet of Things and the foundations of artificial intelligence to develop a real-time smart home surveillance system to improve safety at home. With a remote control method, people may check the safety of their own home in real-time. The realized smart system is based on Raspberry Pi 4B that adopts the Internet of Things architecture and combines several sensors and devices for home security to set up a safer home environment. The main method is to connect the Raspberry Pi to a network sharer or computer with a fixed IP and then input it into a computer or mobile phone to achieve remote control. To provide home safety for the elderly or the challenged people, the proposed system combines a voice control module to improve the user convenience.
{"title":"Real-Time Smart Home Surveillance System of Based on Raspberry Pi","authors":"Yi-Chen Lee, Ching-Min Lee","doi":"10.1109/ECICE50847.2020.9301929","DOIUrl":"https://doi.org/10.1109/ECICE50847.2020.9301929","url":null,"abstract":"This research combines Raspberry Pi with the Internet of Things and the foundations of artificial intelligence to develop a real-time smart home surveillance system to improve safety at home. With a remote control method, people may check the safety of their own home in real-time. The realized smart system is based on Raspberry Pi 4B that adopts the Internet of Things architecture and combines several sensors and devices for home security to set up a safer home environment. The main method is to connect the Raspberry Pi to a network sharer or computer with a fixed IP and then input it into a computer or mobile phone to achieve remote control. To provide home safety for the elderly or the challenged people, the proposed system combines a voice control module to improve the user convenience.","PeriodicalId":130143,"journal":{"name":"2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE)","volume":"29 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117047280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}