智能家居外文翻译外文文献英文文献

合集下载

智能家居节能外文翻译文献编辑

智能家居节能外文翻译文献编辑

文献信息:文献标题:Energy conservation through smart homes in a smart city: A lesson for Singapore households(智能城市的智能家居节能:新加坡家庭的一课)国外作者:Abhishek Bhati,Michael Hansen,Ching Man Chan文献出处:《Energy Policy》,2017,104:230-239字数统计:英文3346单词,18633字符;中文5741汉字外文文献:Energy conservation through smart homes in a smart city:A lesson for Singapore householdsAbstract Energy saving is a hot topic due to the proliferation of climate changes and energy challenges globally. However, people's perception about using smart technology for energy saving is still in the concept stage. This means that people talk about environmental awareness readily, yet in reality, they accept to pay the given energy bill. Due to the availability of electricity and itsintegral role,modulating consumers' attitudes towardsenergysavingscan be a challenge. Notably, the gap in today's smart technology design in smart homes is the understanding of consumers' behaviour and the integration of this understanding into the smart technology. As part of the Paris Climate change agreement (2015), it is paramount for Singapore to introduce smart technologies targeted to reduce energy consumption. This paper focused on the perception of Singapore households on smart technology and its usage to save energy. Areas of current research include: (1)energyconsumptioninSingaporehouseholds, (2) public programs and policies in energy savings, (3) use of technology in energy savings, and (4) household perception of energy savings in smart homes. Furthermore, three casestudiesarereviewedinrelation to smart homes and smart technology, whilediscussing the maturity of existing solutions.Keywords:Energy conservation, Household perception, Smart homes, Singapore1.IntroductionClimate change is a global challenge. The change in the global climate system is directly caused by human activities, which is giving rise to the highest greenhouse gases (GHG) emissions in human history (Pachauri and Meyer, 2014). Studies have shown that GHG have attributed to extreme weather and changes to natural and human systems (Pachauri and Meyer, 2014). These climate changes include floods, droughts, and interrupted food production, which ultimately force people to migrate to safer areas. Extensive exposure to heat waves also affect people's health negatively, and may even spread diseases across multiple territories (Xu, 2015). According to Pachauri and Meyer (2014), electricity and heat production contributed to 25% of the highest proportion of total global GHG emission. This highlights the importance and urgency of sustainable energy consumption to reduce GHG emissions.In line with the Paris agreement under the United Nations Framework Convention on Climate Change (UNFCCC) in December 2015 (National Climate Change Secretariat, 2016a), Singapore has pledged to reduce 36% of GHG emissions from year 2005 by 2030. Even as a relatively small country, Singapore is also affected by climate change. Statistics show that Singapore's average temperature has risen from 26.6°C to 27.7 °C from year 1972 to 2014, with the rise in annualsea levels at between 1.2 and 1.7 mm from year 1975 to 2009 (National Climate Change Secretariat, 2016b). Besides making international commitment, Singapore has made conscious efforts to change internally to deal with climate change.Given the global environmental issues, there is a global trend and demand for energy saving and smart technology to increase the efficiency of energy consumption. According to the Energy Market Authority (EMA; 2015), households account for approximately 15% of electricity consumption in Singapore. Under the Energy Conservation Act (2012), the Mandatory Energy Labelling was introduced for registered goods in Singapore. This means that all electrical appliances (refrigerators,air conditioners, etc.) sold in Singapore must be energy labeled.The role of smart home technologies to increase energy efficiencies in households is becoming increasingly important. A survey has been conducted on the consumers' perception and awareness towards adapting new technologies, as wellas therole of thesetechnologiesin saving energy. According to Balta-Ozkan et al. (2014), a smart-home is a home equipped with connected devices, appliances and sensors that can communicate with each other, and can be controlled remotely. These functions provide consumers the flexibility of monitoring its electricity consumption and making lifestyle changes to save electricity. Moreover, Balta-Ozkan et al. (2013) noted that a smart home does not only provide benefits of efficient energy management, but also provides benefits such as improved lifestyle, security and safety. Smart metering, appliances and home automation devices are some of the many technologies that can be used to change electricity consumption patterns of households (Paetz, 2011).This article aims to find out the households' behaviors on energy consumptions; it also attempts to identify the benefits and obstacles on the implementation on smart home technologies, and how it should be done for it to be successful.2.Methods and aimsThere is a global trend and demand for smart technology to reduce energy consumption. According to Pachauri and Meyer (2014), electricity and heat production contributed to 25% of the highest proportion of total global GHG emission. This highlights the importance and urgency of sustainable energy consumption in order to reduce the emissions of GHG. Although the Singapore government has been promoting a lot of policies and programs about energy saving, there has been very few empirical studies on energy saving conducted in Singapore households. Many overseas studies have shown that households are very positive to the idea of saving energy through smart homes and are willing to invest in new technologies. However, those findings cannot be generalized to Singapore's context, as culture, infrastructure, eco-system, support from government and other factors might be different inSingapore. Therefore, there is a critical need to understand energy saving in Singapore households through smart homes.The current research will explore the perception of households on energy saving and give fair understanding about the acceptance of smart technologies in Singapore households. The research aims to achieve the following:A1: To evaluate success stories on saving energy in urban households through smart homesA2: To explore Singapore household perceptions on saving energy through smart homesA1 covers the research of three case studies that have implemented smart homes to save energy in urban cities. These success stories will provide better insights on how smart homes and how smart technologies can be used to save energy. The case studies have been selected based on their research with smart home technology and related energy savings. Moreover, they aligned with this papers sections covering policies, smart homes and consumer's perception of energy savings.A2 covers an online survey conducted to receive insights on energy consumption in Singapore households by looking at the effectiveness of government policies to save energy, usage of smart technologies in households, and households' perception about energy saving through smart homes Two hundred households were randomly selected for the study. A total of 131 valid responses were received via mail showing a 66% response rate. The questionnaire comprised of closed ended questions categorised under four sections: energy consumption in Singapore; public policy on energy saving in Singapore; use of technology in energy saving and household perceptions of energy saving.Since Singapore is one of the most developed countries in the world and its government is actively promoting policies and programs to save energy, it is predicted that Singapore households will have a positive perception towards energy saving and will see benefits of using smart technologies. This will directly address some of the environmental issues and reduce households' electricity bills.Case studies: Global success stories of energy savings in urban households.Case 1:Chinese consumer attitudes towards energy saving: The case of household electrical appliances in Chongqing.Key words: Government Policies, Energy efficiency, energy savingsMa et al. (2013) conducted a case-study which explored 246 consumer's attitudes towards energy savings through a questionnaire over a one-year period from 2009 to 2010. The survey was conducted in Chongqing, China and was conducted via face-to-face surveys due to previous experience of no or low feedback.The findings are based on a survey of questionnaires covering knowledge, awareness, and behavior patterns around saving energy. Results show a high level of knowledge among the respondents that energy is a challenge, but less knowledge about saving energy at home. Knowledge about government policies was clearer among the younger respondents and those with higher education level. Moreover, the results show a good level of awareness around energy pricing. This was matched up against the knowledge of which appliances consumed the most energy, and rightfully, the respondents consistently ranked airconditioners and refrigerators highest, whereas light bulbs and fans at the lowest. The study concluded that the willingness to save energy is high among the citizens, given that their comfort of living are not affected. It also show that general information about government policies and awareness about energy savings could be provided in a more informative manner with better results to build energy-saving behaviors among the citizens.In conclusion, the study showed that there was a general awareness about energy savings and government policies, though little understanding about energy savings. Nevertheless, participants were willing to save energy, yet they lacked the proper guidance and awareness about proper energy saving behavior.Case 2: Consumers' Perspective on Full-Scale Adoption of Smart Meters: A Case Study in Västerås, Sweden.Keywords: Smart meters, energy saving, electricity consumptionThis recent case study (Vassileva and Campillo, 2016) described a full-scale implementation of smart meters integrated with a smart grid in Västerås, Sweden. A survey was conducted to evaluate the consumer's perspective and feedbacks in regardsto energy savings and information given to the consumers around pricing and other information. Over the years, appliances have become more energy-efficient, but consumers tend to have more energy-consuming appliances than before, which results in a higher combined energy consumption.The survey was conducted online, which was considered to get the best feedback from the participants as they felt they had greater privacy. Questions included perceptions from consumers on smart meters and energy savings, but also covered their expectations of using smart meters, and if they find energy saving important. The survey is distinct between genders, age groups, and whether the consumers receive the energy bill by paper or electronic format. Findings show that consumers would have to learn how the usage of their appliances affect energy consumption, and therefore, learn to change their behavior patterns to use the appliances more efficiently. Higher energy efficiency was also indicated among consumers with smart meters over time.To sum up, this case study evaluated the energy consumers in a city with smart meters, and show that smart meters can provide detailed energy consumption information and possibility for consumers to choose between pricing plans. However, it was also revealed that in reality this has not been achieved yet, furthermore the higher level of energy savings through knowledge of smart meters and electricity price offerings has not been reached. Results show that there was not enough information provided by the smart meter data, thus consumers would not be able to understand or take action based on the data provided. This highlighted that consumers need to be better informed and educated in understanding appliance energy consumption. Concomitantly, energy providers must also provide adequate information around the energy consumption data.Case 3: Case Study of Smart Meter and In-home Display for Residential Behavior Change in Shanghai, China.Keywords: Smart meters, energy savings behaviorA case study conducted by Xu and colleagues (2015) has covered one of the national issues, which is the high energy consumption levels in Shanghai, one of the most densely populated urban cities in China. Energy saving behaviors in householdswere investigated through inhome displays and smart meters. The study claimed that one of the main contributors to high carbon emission is the building sector in China and there is a huge demand to reduce energy consumption in those buildings. Since households are part of the buildings, the case study has explored energy consumptions behavior of households through implementation of smart meters and in-home displays.In this case study, smart meters and in-home displays were installed in two newly-built apartment buildings. A total of 131 households participated in this study (76 without in-home display devices, 55 with the devices). There were additional sensors and devices installed to assist data gathering from smart meters and inhome displays. Data from smart meters were shown on in-home displays and transferred to back-end system via the internet. Raw energy data, statistical data, and background information data were stored in dedicated databases, so researchers could work on the respective data separately.In conclusion, this case study was successful as it showed that households' behavior towards saving energy positively changed due to installation of smart home technologies. This study is relevant to Singapore's context as it was conducted in a similar densely populated urban city.3.Survey findings and discussionIn the survey, 50% of the responses from households' have monthly energy bills ranging from SGD$100 to 200. While, 53% of the respondents believed that the price of their energy bill is “about right”, 31% believed that it is “too high”and 9% believed it is “far too high”. Respondents also indicated their awareness of which household appliances consume the most energy. Air-conditioners, washing-machines, and water heaters have scores that ranged from medium to high (in terms of energy consumption), with air-conditioners scoring the highest among all choices. It should be noted that Singapore is situated on the equator and experiences a hot and humid climate for most of the year. As a result, air conditioners may be used throughout the year. In addition, respondents mostly agreed on the fact that using energy efficientappliances would help them to save energy. This finding is consistent to Case Study 1, whereby households also recognized the particular appliances that consume most energy.With regards to the perceptions on using smart home meters, inhome displays, and relevant smart home devices, respondents indicated that they were less convinced that the technology was capable of helping them to save energy, in comparison to using energy efficient appliances directly. This might be due to the fact that the respondents have not 'visualized' the actual effect on the devices and technologies before. As in Case Study 3, households became more aware of their energy usage and saved their consumption when they had in-home smart meters and devices installed, as they allowed them to easily control their energy consumption patterns and behaviors to save energy.Next, respondents mostly agreed that the reduction of energy consumption could be encouraged by educating the public on environmental issues. Therefore, educating individuals earlier on would result in successful knowledge on environmental issues as well as linking it to how it could affect their lives, thereby resulting in appropriate energy consumption. As we could also observe in the Chongqing case study, lack of proper education and guidance could have a negative impact on households' energy savings visions.Government legislation on available market products is another aspect that survey respondents tend to accept and agree on its effectiveness. The ideas behind the legislations of Mandatory Energy Labelling Scheme and Minimum Energy Performance Standard do not only apply to Singapore's context. As observed in Case Study 1, the Chinese government have these policies implemented to raise energy efficiencies in households too.On the other hand, respondents in general were either not familiar or did not pay enough attention on relevant government policies. The Energy Efficiency Programme office provides a holistic energy efficiency plan across all sectors, which also include households. The office has a dedicated website that provides information and tips to households on easy-to-follow procedures for consumers. Nevertheless, it seemed thatthe respondents were not aware of this. The descriptive statistics indicated the Mandatory Energy Labelling Scheme draws the most familiarity as compared to other policies, and it maybe because whenever households are choosing which appliances to purchase, they could see the corresponding labels on each of the appliance. This legislation does not only exist in Singapore, but also in other major cities, like Chongqing that was mentioned in the case study.In conclusion, with the pledge of the government to the Paris agreement, its vision to tackle global warming and other climate issues are evident. As a result, they would further contemplate strategies and policies across all sectors including households to achieve its vision. Energy saving and efficiency certainly is one big aspect that they would research and tackle. They would continue to build on the existing National Policy Energy Framework. Smart home technologies could play a crucial role to have an impact on households' behaviors in energy consumptions, and to be taken into considerations by the government while they contemplate the relevant strategies and policies.In regards to the usage of technology in energy savings, responses from the survey indicated that smart technology in appliances could help saving electricity. This highlighted the awareness about energy savings, and the purchase decision may often reveal the consumer's plan for long term energy savings.The majority of the participants would invest in smart technology to save energy in their household. Smart technology and smart home devices will eventually be interconnected with health-sector platforms as well as to power plants and other utility providers. Such integration will host the risk of privacy and confidentiality over personal data (e.g., patient records in hospitals). Therefore, there is a big concern about security on smart technology (Popescul and Radu, 2016), and how to manage security risks to secure the privacy of personal data (Bugeja et al. 2016). This is considered a critical risk, as a hacker could take control over the smart home controller or appliances, like surveillance cameras. In the survey, this security risk was reflected from the concern of the participant.The survey also shows a focus on energy savings using smart technology,followed by an increase of security. (Note that security is part of comfort and safety in the home.) This is where surveillance comes in, in the forms of cameras and motion detectors. In the survey, energy savings and comfort are voted more favorably, followed by security as the least important among the three options.Finally, survey results show that 67 Singapore households either agree or strongly agree that “smart home”concept is associated with energy efficiency. Moreover, these households also perceived “convenience”as one of the important aspects of a smart home. Survey findings have highlighted that close to 52% of households are concerned about environmental issues, which was their main reason to save energy. On the other hand, close to 44% of respondents have associated energy saving with reduction of electricity bills.In summary, the findings are very much aligned with other studies in terms of household perceptions on saving energy through smart homes. Households (in particular, aspiring energy savers and monitor enthusiasts) in Singapore have shown concerns on environmental issues, and are willing to invest in smart home technologies to address them.4.Conclusion and policy implicationsMost people perceive electricity as a normal commodity which is readily available. Smart technology and smart homes will require the consumers to take action in order to control appliances and to save energy. Findings from the case studies show that the behavioral patterns of consumers may not change just to save energy. Even though an individual claimed to be concerned about the environment and energy-saving, it is evident that comfort and security play a bigger role in people's life. The present research showed a gap on the maturity and design of the technology as it does not take people's behaviors and perceptions as part of the smart home design functionality. Therefore, smart home technologies would not be efficient if it is not designed with artificial intelligence modules that allow the technology to seamlessly interact with consumers. Also, to achieve a successful smart home solution in Singapore, smart technology must be integrated into public services and utility sectors,such as smart grids and health sectors. For example, smart meters should detect behavioral patterns and proactively take action, so that consumers no longer have to actively turn on light if needed. Likewise, notifications through mobile gadgets or house consoles can provide advice for the best time to turn on certain appliances (e.g., washing machines). Lastly, the findings in this research showed that the maturity of the smart meters are still at its early phase, but projects like Singapore Smart Nation might be one of the leading projects to improve the technology and smart homes in the near future.中文译文:智能城市的智能家居节能:新加坡家庭的一课摘要由于全球气候变化和能源挑战的激增,节能成为了一个热门话题。

智能家居 外文翻译 外文文献 英文文献

智能家居 外文翻译 外文文献 英文文献

智能家居外文翻译外文文献英文文献Increasing an individual’s quality of life via their intelligent homeThe hypothesis of this project is: can an individual?s quality oflife be increased by integrating “intelligent technology” into their home environment. This hypothesis is very broad, and hence the researchers will investigate it with regard to various, potentiallyover-lapping, sub-sections of the population. In particular, the project will focus on sub-sections with health-care needs, because it is believed that these sub-sections will receive the greatest benefit from this enhanced approach to housing. Two research questions flow from this hypothesis: what are the health-care issues that could be improved via “intelligent housing”, and what are the technological iss ues needing to be solved to allow “intelligent housing” to be constructed? While a small number of initiatives exist, outside Canada, which claim to investigate this area, none has the global vision of this area. Work tends to be in small areas with only a limited idea of how theindividual pieces contribute towards a greater goal. This project has a very strong sense of what it is trying to attempt, and believes that without this global direction the other initiatives will fail to address the large important issues described within various parts of this proposal, and that with the correct global direction the sum of the parts will produce much greater rewards than the individual components.This new field has many parallels with the field of business process engineering, where many products fail due to only considering a sub-set of the issues, typically the technology subset. Successful projects and implementations only started flow when people started to realize that a holistic approach was essential. This holistic requirement also applies to the field of “smart housing”; if we genuinely want it to have benefit to the community rather than just technological interest. Having said this, much of the work outlined below is extremely important and contains a great deal of novelty within their individual topics.Health-Care and Supportive housing:To date, there has been little coordinated research on how “smart house” technologies can assist frail seniors in remaining at home,and/or reduce the costs experienced by their informal caregivers. Thus, the purpose of the proposed research is to determine the usefulness of a variety of residential technologies in helping seniors maintain their independence and in helping caregivers sustain their caring activities.The overall design of the research is to focus on two groups of seniors. The first is seniors who are being discharged from an acute care setting with the potential for reduced ability to remain independent. An example is seniors who have had hip replacement surgery. This group may benefit from technologies that would help them become adapted to their reduced mobility. The second is seniors who have a chronic health problem such as dementia and who are receiving assistancefrom an informal caregiver living at a distance. Informal caregivers living at a distance from the cared-for senior are at high risk of caregiver burnout. Monitoring the cared-for senior for health and safety is one of the important tasks done by such caregivers. Devices such as floor sensors (to determine whether the senior has fallen) and access controls to ensure safety from intruders or to indicate elopement by a senior with dementia could reduce caregiver time spent commuting to monitor the senior.For both samples, trials would consist of extended periods of residence within the …smart house?. Samples of seniors being discharged from acute care would be recruited from acute care hospitals. Samples of seniors being cared for by informal caregivers at a distance could be recruited through dementia diagnosis clinics or through request from caregivers for respite.Limited amounts of clinical and health service research has been conducted upon seniors (with complex health problems) in controlled environments such as that represented by the “smart house”. For example, it is known that night vision of theaged is poor but there is very little information regarding the optimum level of lighting after wakening or for night activities.Falling is a major issue for older persons; and it results in injuries, disabilities and additional health care costs. For those with dementing illnesses, safety is the key issue during performance of the activities of daily living (ADL). It is vital for us to be able to monitor wherepatients would fall during ADL. Patients and caregivers activities would be monitored and data will be collected in the following conditions.Projects would concentrate on sub-populations, with a view to collecting scientific data about their conditions and the impact of technology upon their life styles. For example:Persons with stable chronic disability following a stroke and their caregivers: to research optimum models, types and location of various sensors for such patients (these patients may have neglect, hemiplegia, aphasia and judgment problems); to research pattern of movements during the ambulation, use of wheel chairs or canes on various type of floor material; to research caregivers support through e-health technology; to monitor frequencies and location of the falls; to evaluate the value of smart appliances for stroke patients and caregivers; to evaluate information and communication technology set up for Tele-homecare; to evaluate technology interface for Tele-homecare staff and clients; to evaluate the most effective way of lighting the various part of the house; to modify or develop new technology to enhance comfort and convenience of stroke patients and caregivers; to evaluate the value of surveillance systems in assisting caregivers.Persons with Alzheimer?s disease and their caregivers: to evaluate the effect ofsmart house (unfamiliar environment) on their ability to conductself-care with and without prompting; to evaluate their ability to useunfamiliar equipment in the smart house; to evaluate and monitor persons with Alzheimer?s disease movement pattern;to evaluate and monitor falls or wandering; to evaluate the type and model of sensors to monitor patients; to evaluate the effect of wall color for patients and care givers; to evaluate the value of proper lighting.Technology - Ubiquitous Computing:The ubiquitous computing infrastructure is viewed as the backbone of the “intelligence” within the house. In common with all ubiquitous computing systems, the primary components with this system will be: the array of sensors, the communication infrastructure and the software control (based upon software agents) infrastructure. Again, it is considered essential that this topic is investigated holistically.Sensor design: The focus of research here will be development of(micro)-sensors and sensor arrays using smart materials, e.g. piezoelectric materials, magneto strictive materials and shape memory alloys (SMAs). In particular, SMAs are a class of smart materials that are attractive candidates for sensing and actuating applicationsprimarily because of their extraordinarily high work output/volume ratio compared to other smart materials. SMAs undergo a solid-solid phase transformation when subjected to an appropriate regime of mechanical and thermal load, resulting in a macroscopic change in dimensions and shape; this change is recoverable by reversing the thermo mechanical loadingand is known as a one-way shape memory effect. Due to this materialfeature, SMAs can be used as both a sensor and an actuator. A very recent development is an effort to incorporate SMAs inmicro-electromechanical systems (MEMS) so that these materials canbe used as integral parts of micro-sensors and actuators.MEMS are an area of activity where some of the technology is mature enough for possible commercial applications to emerge. Some examples are micro-chemical analyzers, humidity and pressure sensors, MEMS for flow control, synthetic jet actuators and optical MEMS (for the next generation internet). Incorporating SMAs in MEMS is a relatively new effort in the research community; to the best of our knowledge, only one group (Prof. Greg Carman, Mechanical Engineering, University of California, Los Angeles) has successfully demonstrated the dynamic properties of SMA-based MEMS. Here, the focus will be to harness the sensing and actuation capabilities of smart materials to design and fabricate useful and economically viable micro-sensors and actuators.Communications: Construction and use of an “intelligent house” offers extensive opportunities to analyze and verify the operation of wireless and wired home-based communication services. While some of these are already widely explored, many of the issues have receivedlittle or no attention. It is proposed to investigate the following issues:Measurement of channel statistics in a residential environment: knowledge of the indoor wireless channel statistics is critical for enabling the design of efficient transmitters and receivers, as well asdetermining appropriate levels of signal power, data transfer rates, modulation techniques, and error control codes for the wireless links. Interference, channel distortion, and spectral limitations that arises as a result of equipment for the disabled (wheelchairs, IV stands, monitoring equipment, etc.) is of particular interest.Design, analysis, and verification of enhanced antennas for indoor wirelesscommunications. Indoor wireless communications present the need for compact and rugged antennas. New antenna designs, optimized for desired data rates, frequency of operation, and spatial requirements, could be considered.Verification and analysis of operation of indoor wireless networks: wireless networking standards for home automation have recently been commercialized. Integration of one or more of these systems into the smart house would provide the opportunity to verify the operation of these systems, examine their limitations, and determine whether the standards are over-designed to meet typical requirements.Determination of effective communi cations wiring plans for “smart homes.”: there exist performance/cost tradeoffs regarding wired and wireless infrastructure. Measurement and analysis of various wireless network configurations will allow for determination of appropriate network designs.Consideration of coordinating indoor communication systems with larger-scale communication systems: indoor wireless networks are localto the vicinity of the residence. There exist broader-scale networks, such as the cellular telephone network, fixed wireless networks, and satellite-based communication networks. The viability and usefulness of compatibility between these services for the purposes of health-care monitoring, the tracking of dementia patients, etc needs to be considered.Software Agents and their Engineering: An embedded-agent can be considered the equivalent of supplying a friendly expert with a product. Embedded-agents for Intelligent Buildings pose a number of challenges both at the level of the design methodology as well as the resulting detailed implementation. Projects in this area will include: Architectures for large-scale agent systems for human inhabited environment: successful deployment of agent technology inresidential/extended care environments requires the design of new architectures for these systems. A suitable architecture should be simple and flexible to provide efficient agent operation in real time. At the same time, it should be hierarchical and rigid to allow enforcement of rules and restrictions ensuring safety of the inhabitants of the building system. These contradictory requirements have to be resolved by designing a new architecture that will be shared by all agents in the system.Robust Decision and Control Structures for Learning Agents: to achieve life-long learning abilities, the agents need to be equipped with powerful mechanisms for learning and adaptation. Isolated use ofsome traditional learning systems is not possible due to high-expected lifespan of these agents. We intend to develop hybrid learning systems combining several learning and representation techniques in an emergent fashion. Such systems will apply different approaches based on their own maturity and on the amount of change necessary to adapt to a newsituation or learn new behaviors. To cope with high levels of non-determinism (from such sources as interaction with unpredictable human users), robust behaviors will be designed and implemented capable of dealing with different types of uncertainty (e.g. probabilistic andfuzzy uncertainty) using advanced techniques for sensory and data fusion, and inference mechanisms based on techniques of computational intelligence.Automatic modeling of real-world objects, including individual householders: The problems here are: “the locating and extracting” of information essential forrepresentation of personality and habits of an individual; development of systems that “follow and adopt to” individual?s moodand behavior. The solutions, based on data mining and evolutionary techniques, will utilize: (1) clustering methods, classification tress and association discovery techniques for the classification andpartition of important relationships among different attributes for various features belonging to an individual, this is an essential element in finding behavioral patterns of an individual; and (2) neuro-fuzzy and rule-based systems with learning and adaptation capabilitiesused to develop models of an individual?s characteristics, this is essential for estimation and prediction of potential activities and forward planning.Investigation of framework characteristics for ubiquitous computing: Consider distributed and internet-based systems, which perhaps have the most in common with ubiquitous computing, here again, the largest impact is not from specific software engineering processes, but is fromavailable software frameworks or …toolkits?, which allow the rapid construction and deployment of many of the systems in these areas. Hence, it is proposed that the construction of the ubiquitous computinginfrastr ucture for the “smart house” should also be utilized as a software engineering study. Researchers would start by visiting the few genuine ubiquitous computing systems inexistence today, to try to build up an initial picture of the functionality of the framework. (This approach has obviously parallels with the approach of Gamma, Helm, Johnson and Vlissides deployed fortheir groundbreaking work on “design patterns”. Unfortunately, in comparison to their work, the sample size here will be extremely small, and hence, additional work will be required to produce reliable answers.) This initial framework will subsequently be used as the basis of the smart house?s software system. Undoubtedly, this initial framework will substantially evolve during the construction of the system, as the requirements of ubiquitous computing environment unfold. It is believed that such close involvement in the construction of a system is anecessary component in producing a truly useful and reliable artifact. By the end of the construction phase, it is expected to produce a stable framework, which can demonstrate that a large number of essential characteristics (or patterns) have been found for ubiquitous computing.Validation and Verification (V&V) issues for ubiquitous computing:it is hoped that the house will provide a test-bed for investigating validation and verification (V&V) issues for ubiquitous computing. The house will be used as an assessment vehicle to determine which, if any, V&V techniques, tools or approaches are useful within this environment. Further, it is planned to make this trial facility available to researchers worldwide to increase the use of this vehicle. In the long-term, it is expected that the facilities offered by this infrastructure will evolve into an i nternationally recognized “benchmarking” site for V&V activities in ubiquitous computing.Other technological areas:The project also plans to investigate a number of additional areas, such as lighting systems, security systems, heating, ventilation and air conditioning, etc. For example, with regard to energy efficiency, the project currently anticipates undertaking two studies:The Determination of the effectiveness of insulating shutters: Exterior insulating shutters over time are not effective because of sealing problems. Interior shutters are superior and could be used to help reduce heat losses. However, their movement and positioning needs appropriate control to prevent window breakage due to thermalshock. The initiation of an opening or closing cycle would be based on measured exterior light levels; current internal heating levels; current and expected use of the house by the current inhabitants, etc.A comparison of energy generation alternatives: The energy use patterns can easily be monitored by instrumenting each appliance. Natural gas and electricity are natural choices for the main energy supply. The conversion of the chemical energy in the fuel to heat space and warm water can be done by conventional means or by use of a total energy system such as a Volvo Penta system. With this system, the fuelis used to power a small internal combustion engine, which in turn drives a generator for electrical energy production. Waste heat from the coolant and the exhaust are used to heat water for domestic use and space heating. Excess electricity is fed back into the power grid or stored in batteries. At a future date, it is planned to substitute afuel cell for the total energy system allowing for a direct comparison of the performance of two advanced systems.Intelligent architecture: user interface design to elicit knowledge modelsMuch of the difficulty in architectural design is in integrating and making explicit the knowledge of the many converging disciplines (engineering, sociology, ergonomic sand psychology, to name a few), the building requirements from many view points, and to model the complex system interactions. The many roles of the architect simply compound this. This paper describes a system currently under development—a3Ddesign medium and intelligent analysis tool, to help elicit and make explicit these requirements. The building model is used to encapsulate information throughout the building lifecycle, from inception and master planning to construction and …lived-in? use. From the tight relationship between materialbehaviour of the model, function analysis and visual feedback, the aim is to help in the resolution of functional needs, so that the building meets not only the aims of the architect, but the needs of the inhabitants, users and environment.The Problem of Designing the Built Environment:It is often said that architecture is the mother of the arts sinceit embodies all the techniques of painting: line, colour, texture and tone, as well as those of sculpture: shape, volume, light and shadow, and the changing relative position of the viewer, andadds to these the way that people inhabit and move through its space to produce—at its best—a spectacle reminiscent of choreography or theatre. As with all the arts, architecture is subject to personal critical taste and yet architecture is also a public art, in that people are constrained to use it. In this it goes beyond the other arts and is called on to function, to modify the climate, provide shelter, and to subdivide and structure space into a pattern that somehow fits the needs of social groups or organizations and cultures. Whilst architecture may be commissioned in part as a cultural or aesthetic expression, it isalmost always required to fulfill a comprehensive programme of social and environmental needs.This requirement to function gives rise to three related problems that characterize the design and use of the built environment. The first depends on the difference between explicit knowledge—that of which we are at least conscious and may evenhave a scientific or principled understanding—and implicit knowledge, which, likeknowing your mother tongue, can be applied without thinking. The functional programmes buildings are required to fulfill are largely social, and are based on implicit rather than explicit bodies of knowledge. The knowledge we exploit when we use the built environment is almost entirely applied unconsciously. We don?t have to think about buildings or cities to use them; in fact, when we become aware of it the built environment is often held to have failed. Think of the need for yellow lines to help people find their way around the Barbican complexin the City of London, or the calls from tenants to …string up the architects? when housing estates turn out to be social disasters.The second is a problem of complexity. The problem is that buildings need to function in so many different ways. They are spatial and social, they function in terms of thermal environment, light and acoustics, they use energy and affect people?s health, they need to be constructed and are made of physical components that can degrade and need to be maintained. On top of all this they have an aesthetic and cultural role,as well as being financial investments and playing an important role in the economy. Almost all of these factors are interactive—decisions taken for structural reasons have impacts onenvironment or cost—but are often relatively independent in terms of the domains ofknowledge that need to be applied. This gives rise to a complex design problem in which everything knocks on to everything else, and in which no single person has a grasp of all the domains of knowledge required for its resolution. Even when the knowledge that needs to be applied is relatively explicit—as for instancein structural calculations, or thoseconcerning thermal performance—the complex interactive nature of buildings creates a situation in which it is only through a team approach that design can be carried out, with all that this entails for problems of information transfer and breakdowns in understanding.The third is the problem of …briefing?. It is a characteristic of building projects that buildings tend not to be something that people buy…off-the-shelf?. Often the functional programme is not even explicit at the outset. One might characterise the process that actually takes place by saying that the design and the brief …co-evolve?. As a project moves from inception to full specificationboth the requirements and the design become more and more concrete through an iterative process in which design of the physical form andthe requirements that it is expected to fulfill both develop at once. Feasible designs are evaluated according to what they provide, and designers try to develop a design that matches the client?s requirements. Eventually, it is to be hoped, the two meet with the textual description of what is required and the physical description of the building thatwill provide it more or less tying together as the brief becomes a part of the contractual documentation that theclient signs up to.These three problems compound themselves in a number of ways. Since many of the core objectives of a client organization rest on implicit knowledge—the need for abuilding to foster communication and innovation amongst its workersfor instance—it is all too easy for them to be lost to sight againstthe more explicitly stated requirements such as those concerned with cost, environmental performance or statutory regulations. The result is that some of the more important aspects of the functional programme can lose out to less important but better understood issues. This can be compounded by the approach that designers take in order to control them complexity of projects. All too often the temptation is to waituntil the general layoutof a building is …fixed? before calling in the domain experts. The result is that functional design has to resort to retrofitting toresolve problems caused by the strategic plan.The Intelligent Architecture project is investigating the use of a single unified digital model of the building to help resolve these problems by bringing greater intelligence to bear at the earliest …form generating? phase of the design process when the client?s requirements are still being specified and when both physical design and client expectations are most easily modified. The aim is to help narrow the gap between what clients hope to obtain and what they eventually receive from a building project.The strategy is simple. By capturing representations of the building as a physical and spatial system, and using these to bring domain knowledge to bear on a design at its earliest stages, it is hoped that some of the main conflicts that lead to sub- optimal designs can be avoided. By linking between textual schedules of requirements and the physical/spatial model it is intended to ease the reconciliation of the brief and the design, and help the two to co-evolve. By making available some of the latest …intelligent? techniques for model ling spatial systems in the built environment, it is hoped to help put more of the implicit knowledge on an equal footing with explicit knowledge, and by using graphical feedback about functional outcomes where explicit knowledge exists, to bring these within the realm of intuitive application by designers.The Workbench:In order to do this, Intelligent Architecture has developed Pangea. Pangea has been designed as a general-purpose environment forintelligent 3D modelling—it doesnot pre-suppose a particular way of working, a particular design solution, or even a particular application domain. Several features make this possible.Worlds can be constructed from 3D and 2D primitives (including blocks, spheres, irregular prisms and deformable surfaces), which can represent real-world physical objects, or encapsulate some kind of abstract behaviour. The 3D editor provides a direct and simple interface for manipulating objects—to position, reshape, rotate and rework. All objects, both physical and abstract, have an internal state (defined by attributes), and behaviour, rules and constraints (in terms of a high-level-language …script?). Attributes can be added dynamically, making it possible for objects to change in nature, in response to new knowledge about them, or to a changing environment. Scripts are triggered by events, so that objects can respond and interact, as in the built environment, molecular systems, or fabric falling into folds on an irregular surface.Dynamic linking allows Pangea?s functionality to be extended to include standard …off-the-peg? software tools — spreadsheets,statisticalanalysis applications, graphing packages and domain-specificanalysis software, such as finite element analysis for air- flow modelling. The …intelligent toolk it?includes neural networks [Koho89] [Wass89], genetic algorithms [Gold89] [Holl75] and other stochastic search techniques [KiDe95], together with a rule- based and fuzzy logic system [Zade84]. The intelligent tools are objects, just like the normal 3D primitives: they have 3D presence and can interact with other 3D objects. A natural consequence of this design is easy …hybridisability? of techniques, widely considered as vital to the success of intelligent techniques in solving realistically complex problems [GoKh95]. This infrastructure of primitive forms, intelligent techniques and high-level language makes it possible to build applications to deal with a broad range of problems, from the generation of architectural form, spatial optimisation, object recognition and clustering, and inducing rules and patterns from raw data.Embedding Intelligence:Many consider that there is an inevitable trade-off between computers as a pure design medium, and computers with intelligence, …as a thinking machine? [Rich94]. We propose here that it is possible to provide both these types of support, and allow the user to choose how best to use each, or not, according to the situation.It is essential that the creative role of the architect is preserved as he or she uses the work bench, that the architect as artist may draw。

智能家居外文参考文献

智能家居外文参考文献

智能家居外文参考文献参考文献:1. Chen, C., & Zhang, C. (2017). Artificial intelligence for smart home control: Opportunities and challenges. Journal of electronic science and technology, 15(1), 1-11.这篇文章综述了人工智能在智能家居控制方面的机会和挑战。

作者指出,随着人工智能技术的快速发展,智能家居系统可以通过机器学习和自然语言处理等技术来实现更智能化的控制。

然而,智能家居的复杂性和不确定性也带来了许多挑战,如用户隐私和安全性等问题。

文章还讨论了智能家居系统中的关键技术和未来发展方向。

2. Li, X., Xu, Y., & Xu, L. D. (2018). A review of intelligent home energy management systems: Issues and challenges from the perspectives of stakeholders. Renewable and Sustainable Energy Reviews, 82, 1123-1136.这篇综述文章从利益相关方的角度,对智能家居能源管理系统的问题和挑战进行了回顾。

作者指出,智能家居能源管理系统可以通过优化能源使用、提高能源效率和减少能源浪费来实现节能和环保。

然而,智能家居能源管理系统涉及到多个利益相关方,如用户、能源供应商和政府等,各方面的需求和利益可能存在冲突。

文章还讨论了如何解决这些问题和挑战的方法和策略。

3. Lu, C. T., & Liu, M. (2019). A survey on Internet of Things: Architecture, enabling technologies, security andprivacy, and applications. IEEE Internet of Things Journal, 7(5), 3612-3622.这篇综述文章回顾了物联网的架构、关键技术、安全和隐私以及应用领域。

写一份关于智能家居的英语作文

写一份关于智能家居的英语作文

写一份关于智能家居的英语作文英文回答:Smart Homes: Enhancing Modern Living.Smart homes are the wave of the future, offering unparalleled convenience, efficiency, and security. By integrating cutting-edge technology into the home environment, smart homes enable homeowners to automate tasks, monitor their property remotely, and create personalized experiences that enhance their daily lives.Benefits of Smart Homes:Convenience and Automation: Smart homes allow users to control devices and appliances remotely via voice commands, mobile apps, or smart home hubs. This eliminates the needfor manual operation, saving time and effort.Energy Efficiency: Smart thermostats, lighting systems,and appliances optimize energy consumption by adjusting settings based on occupancy, schedules, and environmental conditions.Enhanced Security: Smart security systems equippedwith motion sensors, cameras, and door locks provide real-time monitoring and alerts to deter intruders and protect residents.Personalized Experiences: Smart homes can adapt to individual preferences and routines. For example, they can create personalized lighting scenes, play favorite music,or adjust the temperature to suit each user's comfort level.Improved Health and Well-being: Smart devices cantrack sleep patterns, provide fitness updates, and monitor indoor air quality, promoting a healthier and more comfortable living environment.Components of a Smart Home:A smart home typically comprises various interconnectedcomponents:Smart Hub: A central controller that connects all other devices and allows remote access.Smart Devices: Includes smart lights, thermostats, appliances, sensors, and security systems.Voice Assistants: Enables voice control of devices and access to information.Mobile App: Provides a centralized interface for managing devices and settings.Cloud Services: Stores data, provides remote access, and enables integration with other smart home platforms.Future of Smart Homes:The smart home market is projected to continue expanding rapidly in the coming years. Advancements in artificial intelligence, IoT technology, and wirelessconnectivity will further enhance the capabilities of smart homes, leading to even greater convenience, efficiency, and personalization for homeowners.中文回答:智能家居,提升现代生活。

智能家具作文英文

智能家具作文英文

智能家具作文英文The world we live in today is rapidly evolving, with technology playing an increasingly central role in our daily lives. One of the most fascinating advancements in this technological revolution is the emergence of smart furniture. These innovative pieces of furniture are designed to seamlessly integrate with our connected homes, offering a range of features and functionalities that enhance our comfort, convenience, and overall quality of life.At the heart of smart furniture lies the concept of the Internet of Things (IoT). By incorporating various sensors, microprocessors, and wireless connectivity, these furnishings are able to communicate with other smart devices in the home, creating a seamless and integrated living experience. From adjustable lighting and temperature control to built-in entertainment systems and remote monitoring capabilities, smart furniture is redefining the way we interact with our personal spaces.One of the most prominent examples of smart furniture is the intelligent sofa. These high-tech couches are equipped with a rangeof features that cater to our modern lifestyle. With the touch of a button or a simple voice command, users can adjust the recline, lumbar support, and even the massage functions of the sofa, providing a truly personalized and comfortable seating experience. Some models even feature built-in charging stations for our smartphones and tablets, ensuring that our devices are always powered up and ready to use.Another innovative category of smart furniture is the smart table. These versatile pieces can serve as both functional workstations and entertainment hubs. Equipped with touchscreen surfaces, smart tables allow users to access a wide range of digital content, from web browsing and video streaming to interactive games and virtual collaboration tools. Some models even feature built-in wireless charging pads, enabling us to keep our devices powered up without the clutter of cords and cables.Smart beds are another remarkable example of the advancements in smart furniture. These intelligent mattresses and bed frames can monitor our sleep patterns, adjust the temperature and firmness based on our preferences, and even integrate with smart home systems to control lighting and ambient noise levels. By providing a more personalized and optimized sleeping experience, smart beds can help improve our overall health and well-being.Beyond the realm of living rooms and bedrooms, smart furniture is also making its way into other areas of the home. Smart desks, for instance, can automatically adjust their height to accommodate different users, promoting better posture and reducing the risk of musculoskeletal issues. Smart wardrobes, equipped with motion sensors and voice recognition, can help us keep track of our clothing inventory and even provide personalized fashion recommendations based on our preferences and the weather forecast.The benefits of smart furniture extend beyond just personal comfort and convenience. These innovative furnishings also have the potential to contribute to a more sustainable future. Many smart furniture pieces are designed with energy-efficient features, such as LED lighting and intelligent power management systems, which can help reduce our carbon footprint and lower our energy bills.Furthermore, some smart furniture manufacturers are incorporating eco-friendly materials and production processes into their designs, further enhancing the environmental friendliness of these products. By seamlessly integrating with home automation systems, smart furniture can also play a crucial role in optimizing energy usage throughout the home, contributing to a more efficient and sustainable living environment.As the technology behind smart furniture continues to evolve, wecan expect to see even more remarkable innovations in the years to come. Imagine a future where our furniture can anticipate our needs, adjust to our preferences, and even learn from our habits to provide a truly personalized and adaptive living experience. The possibilities are endless, and the impact of smart furniture on our daily lives is poised to be profound.In conclusion, the rise of smart furniture is a testament to the transformative power of technology. These innovative furnishings are not only enhancing our comfort and convenience but also paving the way for a more sustainable and connected future. As we continue to embrace the integration of technology into our homes, the role of smart furniture will only become more integral to our daily lives, shaping the way we live, work, and interact with our personal spaces.。

家居科技英语作文带翻译

家居科技英语作文带翻译

家居科技英语作文带翻译标题,The Impact of Smart Home Technology on Daily Life。

With the rapid development of technology, smart home technology has become increasingly prevalent in modern society. Smart home technology refers to the integration of various devices and appliances within a household, allowing for automated control and monitoring through the use of the internet. This essay explores the benefits and challenges associated with smart home technology and its impact ondaily life.智能家居科技对日常生活的影响。

随着技术的迅速发展,智能家居科技已经在现代社会中变得越来越普遍。

智能家居科技是指在家庭内集成各种设备和电器,通过互联网实现自动化控制和监控。

本文探讨了智能家居科技的优点和挑战,以及其对日常生活的影响。

In recent years, the adoption of smart home technologyhas grown significantly, driven by the increasingavailability of affordable devices and the desire for convenience and efficiency in daily life. One of the key benefits of smart home technology is its ability to enhance home security. With smart security cameras, motion sensors, and door locks, homeowners can remotely monitor their property and receive instant alerts in case of any suspicious activity. This not only provides peace of mind but also serves as a deterrent to potential intruders.近年来,智能家居技术的应用已经显著增加,这得益于价格逐渐变得实惠的设备的增加,以及人们对日常生活便利和效率的渴望。

智能型住宅安防报警系统外文文献及翻译

智能型住宅安防报警系统外文文献及翻译

Automatic fire alarm system based on MCUZhang Kun,Hu Shunbin College of Mechanical and Electrical Engineering Agricultural UniversityofHebeiBaoding,071001,ChinaE-mailaddress:********************** om Li Jinfang Baoding Baoling Transformer Co. Ltd. Tianwei Group Baoding, 071056,ChinaE-mailaddress:****************Abstract:The paper introduced an automatic warehouse fire a1arm system based on MCU. The system was mainly made up of ATmega16, temperature sensors, smoke sensors, and EX-1 auto dialed alarm module. In the system, temperature signals were transformed to serial data, and smoke signals were transformed to voltage signals. All the data were processed by MCU. When the surveillance system checked fire in warehouse, alarm signal was turn on, meanwhile the messages were transmitted to managers through EX-1. Application of the system was convenient to deal with fire in-time, efficiently by warehouse manager.Keywords: fire alarm transducer;smoke sensor system;ATmega16;temperature transducer;smoke sensorI. INTRODUCTIONAutomatic fire alarm control system has experienced a process from the simple to the complex and intelligence system increasingly in China. The characteristic is automatic fire detection and alarm technology has a great progress along with computing and detection technology development. At present, automatic fire alarm control system was used in bulk storage plant, shopping malls, high-level office buildings, hotels and other places. They were used in a number of collections focused on one area of intelligent alarm control method with higher levels of bus-type alarm control system, and in some residential areas and commercial buildings were installed by a single automatic fire alarm detection device. These alarm detection devices fail to report sometimes, or misinformation. Its reliability is not high because of using single sensor. Therefore, it is needed to develop a simple structure, low cost, high reliability, fast responding, automatic fire detection system.II. GENERAL PROJECT OF THE SYSTEMThe hardware block diagram shown in Figure 1, hardware by temperature sensors,smoke sensors, signal processing module, MCU modules and automatic alarm module. Non electrical quantity that is through the sensing element sensors (smoke sensors and temperature sensors) will be on-site temperature, smoke and other non-electrical signal into an electrical signal, as well as signals for signal processing to convert analog quantity to digital quantity. Finally, the sampled data were processed and compared with the limits by MCU system. This system can produce local and remote auto-alarm signals.Figure 1. Automatic fire alarm system structureⅢ. THE HARDWARE COMPONENTSA. ATmega16The system used by the U.S. Atmel’s micro controller ATmega16 micro controller. ATmega16 is based on the AVR RISC architecture to enhance low-power 8-bit CMOS micro controller. Because of its advanced instruction set and a single clock cycle instruction execution time, ATmega16 data throughput of up to 1 MIPS / MHz. Thereby mitigate the system in the power and the contradiction between the processing rate. ATmega16 has the following characteristics: 16K bytes in-system programmable Flash (with the ability to read and write at the same time, that is, RWW), 512 bytes EEPROM, 1K bytes SRAM, 32 general-purpose I / O port lines, 32 general-purpose working registers, for the JTAG boundary scan interface, support the on-chip debugging andprogramming, 3 has a more flexible mode of timer / counter (T / C), chip internal / external interrupts, programmable serial USART, there are initial conditions detector universal serial interface, 8-channel 10-bit with optional differential input stage programmable gain (TQFP package) of the ADC, with on-chip oscillator of programmable watchdog timer, an SPI serial port, as well as six can be selected by software power-saving mode.The chip is based on Atmel high-density nonvolatile memory technology production on-chip ISP Flash allows the program memory through the ISP serial interface or a general-purpose programmer for programming; you can also run on the AVR core among the bootstrap to program. Boot program can use any interface to download the application to the Flash memory area (Application Flash Memory). Application of Flash storage area is updated when the boot Flash area (Boot Flash Memory) program continues to run, RWW operation achieved. ATmega16 to become a powerful micro controller by 8-bit RISC CPU and the system programmable flash in a single chip, for many embedded control applications provides a flexible and cost-effective solution. ATmega16 has a set of programming and system development tools, including: C language compiler, macro assembler, program debugger / software emulator, emulators and evaluation boards.B. Temperature SensorTemperature sensor manufactured by DALLAS Semiconductor DS18B20-type single intelligence temperature sensor, its performance features include:1)This sensor have single-bus-specific technology, either through the serial port cable also through other I / O port lines and computer interfaces,without going through other conversion circuits Direct output measured temperature value (9-bit binary number, with sign bit).2) Temperature range is -55 ℃ ~ +125 ℃, measurement resolution of 0. 0625 ℃.3) Containing 64 as amended through the laser-read-only memory ROM.4) Fit a variety of SCM or system machine.5) Users can set separate ways each temperature upper and lower limit.6) Includes parasitic power.DS18B20 and the main chip connection diagram shown in Figure 2: DS18B20 number one pin grounded, then on the 3rd pin high and the 2nd pin then a 5. 1K of the pull-up resistor, at the same time received a single output signal of the PD0 pin. Pull-up is to pull the uncertainty signal through a resistor embedded in the high places, resistanceat the same time current-limited . Program from the DQ pin in high impedance state to ensure that the beginning, so that you can pull on the pull-up resistor to the high DQ. At the same time the main chip also can be an external site alarm buzzer.Figure 2. ds18b20 and the main chip connection diagram.C. Smoke Monitoring ModuleSmoke sensors choose HIS-07 ion smoke detectors when the flow through the inside and outside the ionization chamber ionization electron flow is unbalanced, collector charges current until the ionization balance. In a smoke-free or non-combustion, the collector being subject to the impact ionization current statistical fluctuation, the potential to maintain a balance. Ionization current have impact when the smoke into the ionization chamber, easily into the ionization chamber smoke outside than inside the ionization chamber of the affected, ionization current decline in and collector to re-charge until the new equilibrium potential, this potential change can be used to trigger the alarm circuit. Technical parameters such as Table 1.TABLE I.HIS-07 ION SMOKE SENSOR THCHNICAL DATASmoke signals are processed on the chip of choice is the Motorola company’s MC14468, MC14468 for DIP 16-pin package, contain oscillator, timer, latch, alarm control logic circuit, high input impedance comparator etc. When not detected smoke, MC14468 internal oscillator that oscillation cycle 1.67s. Each 1.67s cycle the internal power supply is provided to the work of the entire chip. It’s all kept det ect any smoke in addition to LED flashes, battery voltage alarm and smoke alarm. The oscillator oscillation period becomes 40ms when the MC14448 Once detection smoke, this time piezoelectric buzzer driving circuit to start oscillation, start to be able to output to maintain the high 160 ms after the cessation of 80ms.Continued during the detection of smoke cessation of changes, at this time if not detected smoke beeper will not be issued a warning sound.In figure 3, the MC14468 1 pin joint PD1 pin of SCM when the ion chamber of the ion current as the scene of smoke detection and change, voltage change generation a weak side-spread seized 15, by the MC14468 internal logic processing circuit processing, the smoke is detected by 1 pin-out high micro controller for processing. 13-pin then slide rheostat is set to facilitate detection sensitivity when the led flashes and the buzzer sounded a piercing sound of an audio alarm when the department has a fire alarm signal-based.In figure 3, the MC14468 1 pin joint PD1 pin of SCM when the ion chamber of the ion current as the scene of smoke detection and change, voltage change generation a weak side-spread seized 15, by the MC14468 internal logic processing circuit processing, the smoke is detected by 1 pin-out high micro controller for processing. 13-pin then slide rheostat is set to facilitate detection sensitivity when the led flashes and the buzzer sounded a piercing sound of an audio alarm when the department has a fire alarm signal-based.Figure 3.Smoke detection circuitD. Auto-dial alarm moduleDial-up alarm module choices are the EX-1 dial-up module is a DTMF signal receiving, storing, and sending as integration communications circuits. Module built-in micro controller and dial-up management process can provide users with a variety of signal input and output ports, in security alarm, signal acquisition, automatic control, remote communication and information transmission areas such as flexible application. 5 groups can have cell phone or group of seven local telephone numbers are stored, power-down is not lost; Telephone line status detection, automatic fault signal output ;Telephone / external switching two kinds of dial-up state control; Trigger time, nine times loop dial preset numbers; To work independently, independent dial-up, do not rely on telephone and other external devices.EX-1 wiring diagram shown in figure 4, The PD4 pin to connect the main chip HTO , the module began to dial alarm when PD4 output high level signal, PD5 connection ON / OFF pin input is high level signal to open the dial-up settings, the inputdoes not work when this pin become low, ERR pin connected to PD6 pin of MCU, PD6 output 1 begun to test whether the telephone line failure, READY pin connect MCU PD7 pin detection and alarm is completed, the alarm is end when PD7 pin is high .Figure 4. EX-1 wiring diagramIV. SOFIW AREDESIGNFigure 5. The main program flow chartBecause in the early stages of fires and the smoldering phase will produce a large number of aerosol particles and smoke particles .In the stage of incipient fire substances in the combustion process produces a lot of heat, so should make the smoke sensor and temperature sensor used in conjunction, first with the smoke sensor detects whether there is smoke generation, then the temperature sensor detects the temperature, temperature sensor alarm value is set to 50 degrees. When the smoke is detected R0 is 1, not smoke R0 is 0. Then test the temperature when the temperature reaches the value of seasonal early warning R1 is 1, the value of seasonal temperature not to reach an early warning R1 to 0, at this time compared to the R0 and R1 is equal to the main chip when the dial-up alarm, if not equal is not to alarm re-tested. This smoke sensor and temperature sensor used in conjunction with greatly improved the reliability of detection to prevent the omission of false positives, program flow diagram shown in Figure 5.V. CONCLUSIONBy the cooperation of using of temperature and smoke sensors, through detecting the temperature and smoke on-site, the automatic alarm system could find any fire in warehouse and send the message to managers of warehouse in the early time by the form of short messages. So its application could greatly reduce fire losses and enhanced the safe reliability of warehouse more than the former single equipment of fire alarm, and prevent failing of reporting and misinformation. The system has a high reliability, low price and high sensitivity.REFERENCES[1] Shunning Miao,Guangming Xiong,Yongping Li etc.Automatic Fire Alarm System Design and Research, Equipment Manufacturing Technology, 2006(2), P909.[2] Liang Ge, Qi Cong. Intelligent Analysis of office building fire.[3] Ti Zhou. Building Fire System Design, Yunnan Construction,2008(6).[4] Honeywell (Honeywel1)'s construction equipment Monitoring System, Intelligent Building and City Information, 2008(4).[5] Derek Clements-Croome, Intelligent buildings: design, management and operation, Thomas Telford Publishing, 2004.[6] Zhang Huazhong, Commanding System of Fire Automatic Alarm and Fire Control Linkage based on Internet, Computer Engineering, 2001.[7] ANSI, Radiant Energy-Sensing Fire Detectors for Automatic Fire Alarm Signaling, US: ANSI/FMRC FM3260-2004.基于单片机的火灾自动报警系统张坤,胡顺滨机电工程学院河北农业大学,保定,071001,中国的电子邮件地址:************************李锦芳保定宝灵变压器有限公司保定天威集团,071056,中国的电子邮件地址:****************摘要:本文介绍了基于单片机的自动仓库火灾自动报警系统。

互联网家装外文文献翻译

互联网家装外文文献翻译

互联网家装外文文献翻译The rapid development of the。

is not only changing our way of life。

but also transforming XXX nal enterprises。

which XXX with the。

to create new business models。

So far。

no industry-leading enterprise has emerged with absolute power。

us -based home n business models are still in the n stage。

and companies are still figuring out their business ns。

The home XXX due to the。

and all XXX.Keywords: home XXX。

business model.n:The。

has nized the way businesses operate。

impacting nal management concepts。

marketing strategies。

and management patterns。

This has led to a XXX。

leading to the XXX of commercial myths。

With the。

even small enterprises and individuals with good ideas XXX to the country and the world。

While the。

has a vast and beautiful outlook for the development of businesses。

it does not XXX.2 The Impact of the。

智能家居结论范文

智能家居结论范文

智能家居结论范文(中英文版)英文文档内容:Intelligent home technology has revolutionized the way we live, offering unparalleled convenience and comfort.With the integration of smart devices and automation, homeowners can now control various aspects of their living space from anywhere at any time.From adjusting the thermostat to locking the doors and monitoring security cameras, the possibilities are endless.The convenience offered by smart home technology is undeniable.With the ability to control appliances, lighting, and temperature remotely, homeowners can create the perfect environment for their needs.For example, one can adjust the temperature before arriving home or turn on the lights while away to give the illusion of being present.This not only adds a layer of security but also enhances energy efficiency.Moreover, smart home devices can be integrated to work together seamlessly, creating a cohesive ecosystem.For instance, a smart speaker can be linked to smart lights and thermostats, allowing for voice control and automation.This integration not only adds convenience but also promotes energy savings and sustainability.However, it is important to consider the potential drawbacks of smarthome technology.Privacy concerns arise as homeowners must share personal data with smart device manufacturers.Additionally, the reliance on internet connectivity means that smart homes are vulnerable to cyber threats.Despite these concerns, the benefits of smart home technology outweigh the drawbacks.The convenience, energy efficiency, and security it offers are transformative.As technology continues to advance, it is likely that smart homes will become even more sophisticated, making our lives easier and more comfortable.中文文档内容:智能家居技术已经改变了我们的生活方式,提供了前所未有的便利和舒适。

智能家居技术外文文献翻译

智能家居技术外文文献翻译

智能家居技术外文文献翻译
智能家居技术是当今快速发展的领域之一。

本文旨在介绍智能家居技术的外文文献。

以下是一些相关的外文文献摘要。

文献一
标题:智能家居系统中的场景识别和管理技术
作者:John Doe
摘要:本文介绍了智能家居系统中的场景识别和管理技术。

通过利用传感器数据和机器研究算法,系统可以自动识别居住者的活动场景,并根据不同场景自动调整各种参数,如温度、照明等。

这样的智能家居系统可以提供更加舒适和便捷的居住体验。

文献二
标题:智能家居技术对能源管理的影响
作者:Jane Smith
摘要:本文研究了智能家居技术对能源管理的影响。

通过智能调控家居设备的能源使用,智能家居系统可以节约能源并降低能源消耗。

研究结果表明,与传统家居相比,智能家居系统能够显著减少能源消耗,并对环境保护产生积极影响。

文献三
标题:智能家居技术对老年人健康的影响
作者:David Johnson
摘要:本文探讨了智能家居技术对老年人健康的影响。

通过智能健康监测设备和远程医疗服务,智能家居系统可以实时监测老年人的健康状况,并及时采取措施。

研究结果表明,智能家居技术可以改善老年人的生活质量,并减少潜在的健康风险。

结论
智能家居技术在诸多方面都能产生积极影响,如提升居住舒适度、节约能源、改善老年人健康等。

通过深入了解和研究智能家居
技术的相关文献,我们可以进一步推动智能家居技术的发展和应用。

基于GSM网络的智能家居系统设计外文文献及译稿正文

基于GSM网络的智能家居系统设计外文文献及译稿正文

The smart home control system solutionsPart 1Intelligent home network with the network technology and communication technology continues to evolve and requirements of people living continuously improve and achieve family intelligent remote control has become an inevitable trend. Ministry of Construction and Housing Industrialization Promotion Center proposed residential area to achieve the six intelligence requirements, including safety precautions implemented automated monitoring and management: on residential fires, toxic gas leak to implement automatic alarm; anti-theft alarm system should be installed such as infrared or microwave various types of alarm detector; system should be integrated with the computer security management system network; computer system burglar alarm system can be centrally managed and controlled. However, as wireless technology immature, operating expenses of higher malpractice, intelligent home controller and the external network of wireless communications technology as leading to a low degree of market acceptance of the important factors, the characteristics of GPRS system can be a good solution to the problem. GPRS network communication business Communication Company launched a data communication service, the GPRS network coverage area, unlimited transmission distance, communication cost is relatively low transfer rate faster. This article related to intelligent systems and GPRS technology family background, analysis of its basic characteristics and their basic functions to be achieved, and on this basis was proposed the overall intelligent control system solutions based on GPRS wireless communication service. At last, the core GPRS chip system software and hardware realization.Overall system architecture The popularity of network applications and the production of a variety of information appliances are made within the family visit on the Internet, no longer limited to a single PC, each family will be faced with how to transfer Internet data within the family and how the various appliances problems connecting, based on this, intelligent home networks come into being. Intelligent home network is the basic unit of information society. The future of the family, all kinds of appliances will form a home LAN and Internet access through the smart home controller. Intelligent home network market potential is considerable, several large manufacturers Intel, IBM, Microsoft and Sony are already involved in them.Intelligent home network that is in a home in a communications network, the various appliances connected together, to achieve all the intelligent home network appliances for remote access and control, and any request for information exchange, such as music, television or data. Intelligent home network architecture, including within the family network system, intelligent home controller and the intelligent home network and external Internet networks of data communications. Among them, the smart home smart home network controller is an integral part of the core to play the management, control and communications role with the external network. It is the management platform and home through the family life of the combination of the various subsystems of a system is to connect the family intelligence network inside and outside the physical interfaces, complete with external communication networks within the family, the data exchange between functions, but also for families equipment management and control.Smart home controller on the one hand the need for cabling to provide communication interface within the family, to collect information on household equipment, and processing, automatic control and regulation; other smart home controller as a home gateway, to provide for external network interfaces, connectivity within the family network and external Internet networks, so users can access the home network, internal network, to achieve monitoring and control. In addition, smart home controller should also be equipped with automatic alarm and other functions, that is, when found, such as alarm signal: it was a malicious intrusion, high temperature, etc., the controller can be dealt with immediately send alarm signals to the user.ARM embedded system design can be used to automatically run, processing of data, management and control through the RS485 bus, the control terminal. And the controller through the GPRS module to achieve the family system and the external network communications, so users can SMS and the Internet, etc. to achieve the family system, remote control, while the controller through the keyboard and display for the user interface, easy users to achieve local control. Control terminal for the SCM control system composed of a number of small control various home appliances, and by controlling the bus, the control system composed of these small networks, connected to the smart home controller, by the smart home controller.Specific smart home controller features include: Household equipment data collection: Collection of household equipment, including indoor temperature, lighting appliances, security doors and other equipment of the state data, processed by the controller feedback to the user.Local control: the user through the controller keyboard and display, for home monitoring equipment.Remote Control: Remote users can send text messages or via the Internet on the family system to control and query.Automatic alarm: when the controller detects high temperature, such as illegal intrusion or alarm signal, triggering indoor alarm in time and send alert messages by means of promptly notify the user.Temperature check: the user can check the room temperature by the controller. Security door password settings: local or remote user can modify the password security door; enter the correct password at the door before they can open the door.Infrared Appliance Control: receiving user commands via infrared transmitter control TV, air conditioning and other infrared controlled appliances.Other lamps and so on-off control: receiving user commands control the amount of lighting and other switching equipment.Smart home controller through GPRS module, to achieve the family system and the external network communication as a central part of the smart home system to solve the bottleneck before the key technology. GPRS (General Packet Radio Service) is short, the existing GSM system is to add a new GGSN (Gateway Support Node) and SGSN (Service Support Node) node developed a new packet data bearer services. GPRS with the existing GSM system the most fundamental difference is, GPRS is a packet switching system, particularly suitable for intermittent, sudden or frequent, small amounts of data transfer, but also to the occasional large data transfers. The main advantage of GPRS network transmissions are: always online, according to traffic accounting, quick log on, high-speed transmission, within a restricted range (transmission distance, terrain, weather, etc.), and data transmission reliability.Part 21. IntroductionThe booming Internet has broadened the traditional concept of smart consumer appliances. Originally, smart consumer appliances are just stand-alone devices that have the control program running by themselves. Due to hardware limitations, these appliances can only implement somesimple control algorithms that can at most achieve local optimal control effects. Nowadays more and more consumer appliances have the capabilities to benter connected by many kinds of communication media such as phone lines, utility lines, and wireless technology, and even can be connected to the Internet. This trend of development brings promising prospects to future home appliances that will not only let users maintain, monitor, and control appliances more easily and conveniently, but also will make the long-time expected remote-controlled home appliances feasible.A remote-controllable home appliance can be considered as a slave device to the remote controller that resides in far end and has powerful mainframe running advanced control algorithms. The appliance runs its own control program while at the same time can receive control commands, configuration parameters or even updated control algorithms from there mote controller to achieve optimal control effect in the global level. In order to meet this challenge, a new architecture for smart consumer appliances systems needs to be proposed.On the other hand, Hardware implementation of control systems will be one of important issues in the development of smart consumer electronics. For simple applications, such as smart toys, microwaves, and washing machines, simple control algorithms can be used and implemented on a single chip that may cost very little. However, for more complex problems, such as smart heating, ventilation, and air conditioning (WAC) for individual houses or office buildings, advanced control methods must be utilized and implemented with sophisticated hardware that would cost significantly more than the conventional controllers. For example, an intelligent PLC (programmable logic controller) for energy efficient and waving temperature control may cost several times more than a household air conditioning unit. This might be justified for some industrial applications but obviously not acceptable for average individual customers. Therefore, to make smart consumer electronics marketable for this type of applications, innovative approach for implementation must be established to reduce the cost to a level acceptable to average customers.In the following sections, the architecture of intelligent control systems for consumer appliances via Internet is briefly presented, and then a network-based memos-fuzzy implementation is described. 2. Architecture of Networked AppliancesFigure shows two versions of architecture for networked appliances. Both architectures can be seen composed of two different types of functional devices: home-based appliances, and remote controllers. The remote controllers in both architectures play the same role as: a) running advanced control algorithms and issue control commands; b) monitoring the running status of appliances.The difference between these two architectures is on the home side. In architecture (I), home appliances must first connect to Home Control System, which functions in part as a common gateway to the Internet for all appliances. This architecture is suitable for current implementation because networked appliance is still in its early stage of development; they are still lack of standard software and hardware interfaces to the Internet. Besides, the data exchange between home appliances and remote controller at current stage are limited, therefore the utility lines and phone lines are enough for transmitting simple control signals. Architecture (II) is the choice for future development while all home appliances have direct access to the Internet. In this case, large amounts of real-time data from home appliances can be fed back to remote controller as the control input through Internet, and control output, which could vary from simple control parameters or set values to updated algorithms, can also be downloaded to the corresponding appliances.The architectures proposed here have their origins in Distributed Control Systems (DCS), which is widely used in industrial automation and proved to be mature and reliable. From topologypoint of view, the networked appliances systems and DCS are similar, and those functional devices in networked appliances systems can also find their counterpart in DCS. But a significant difference lies in the fact that DCS uses proprietary communication protocols in a local area network for data exchange, thus it is not an open architecture that makes devices from different vendors very difficult, if it’s not impossible to be interconnected, while networked appliances systems rely on the Internet that uses TCP/IP, the de facto protocol for network communication, so any appliances that is TCP/IP compatible can be easily interconnected and communicate with other appliances that are already on the net.3. ConclusionThis paper presents architecture of the intelligent control systems for consumer appliances by applying the idea of Distributed Control Systems (DCS) to the home environment, and a network-based neuron-fuzzy implementation of this architecture. The basic idea of this implementation is to use simple and reliable in-system programmable devices for on-line field control execution with fuzzy logic, and communication networks and computers for off-line learning and optimization through neural networks. An ongoing research project in consumer electronics is to implement this architecture to the network- based intelligent control of smart heating and air-conditioning systems, which could lead to significant saving in energy and reduction in pollution.家庭智能控制系统解决方案第一部分随着网络技术和通信技术的智能家庭网络的不断发展和生活水平不断提高,实现家庭智能远程控制已成为必然趋势人的要求。

互联网智能设备中英文对照外文翻译文献

互联网智能设备中英文对照外文翻译文献

互联网智能设备中英文对照外文翻译文献(文档含英文原文和中文翻译)Mobile Malware and Smart Device Security:Trends, Challenges and SolutionsAbdullahi Arabo and Bernardi PranggonoThe Oxford Internet Institute (OII), Oxford University, Oxford, OX1 3JS, U.K. School of Engineering and Built Environment, Glasgow Caledonian University, Glasgow, G4 0BA, U.K.Abstract —This work is part of the research to study trends and challenges of cyber security to smart devices in smart homes. We have seen the development and demand for seamless interconnectivity of smart devices to provide various functionality and abilities to users. While these devices provide more features andfunctionality, they also introduce new risks and threats. Subsequently, current cyber security issues related to smart devices are discussed and analyzed. The paper begins with related background and motivation. We identified mobile malware as one of the main issue in the smart devices’ security. In the near future, mobile smart device users can expect to see a striking increase in malware and notable advancements in malware-related attacks, particularly on the Android platform as the user base has grown exponentially. We discuss and analyzed mobile malware in details and identified challenges and future trends in this area. Then we propose and discuss an integrated security solution for cyber security in smart devices to tackle the issue.Index — Botnet, cyber security, mobile malware, security framework, smart device securityI. INTRODUCTIONThe Internet is one of the most remarkable developments to have happened to mankind in the last 100 years. The development of ubiquitous computing makes things even more interesting as it has given us the possibility to utilise devices and technology in unusual ways. We have seen the development and demand for seamless interconnectivity of smart devices to provide various functionalities and abilities to users. But we also know the vulnerabilities that exist within this ecosystem. However, these vulnerabilities are normally considered for larger infrastructures and little attention has been paid to the cyber security threats from the usage and power of smart devices as a result of the Internet of Things (IoT) technologies. In the IoT vision, every physical object has a virtual component that can produce and consume services. Smart spaces are becoming interconnected with powerful smart devices (smartphones, tablets, etc.). On the other hand, we also have the backbone, the power grid that powers our nations. These two phenomena are coming at the same time. The increased usage of smart meters in our homes or businesses provides an avenue of connectivity as well as powerful home services or interconnected powerful smart devices. The example of the smart grid also provides the means of controlling and monitoring smart grid infrastructures via the use of portable smart devices.The vulnerability of the connected home and developments within the energy industry’s new wireless smart grid are exposed to the wrong people; it will inevitably lead to lights out for everyone. This will eventually uncover the multitude of interconnected smart devices in the IoT as a hotbed for cyber-attacks or robot networks (botnets) and a security nightmare for smart space users and possibly for national infrastructures as a whole.The latest research has reported that on average people own three internet-connected smart devices such as smartphones and tablets. Therefore, as a resultof the ubiquity of smart devices, and their evolution as computing platforms, as well as the powerful processors embedded in smart devices, has made them suitable objects for inclusion in a botnet. Botnets of mobile devices (also known as mobile botnets) are a group of compromised smart devices that are remotely controlled by bot-masters via command-and-control (C&C) channels. Mobile botnets have different characteristics in several aspects as compared to PC-based botnets, such as their C&C channels medium.PC-based botnets are seen as the most common platforms for security attacks, and mobile botnets are seen as less of a threat in comparison to their counterparts. This is so for different reasons, such as limited battery power, resource issues, and Internet access constraints, etc. Therefore, the efforts directed to both the manifestation of operating mobile botnets and corresponding research and development endeavours are not as wide as for PC-based botnets. However, this development could change with the recent surge in popularity and use of smart devices. Smart devices are now widely used by billions of users due to their enhanced computing ability, practicality and efficient Internet access, thanks to advancement in solid-state technologies.Moreover, smart devices typically contain a large amount of sensitive personal and corporate data and are often used in online payments and other sensitive transactions. The wide spread use of open-source smart device platforms such as Android and third-party applications made available to the public also provides more opportunities and attractions for malware creators. Therefore, for now and the near future smart devices will become one of the most lucrative targets for cybercriminals.The main focus of this paper is threefold: firstly to highlight the possible threats and vulnerability of smart devices, secondly to analyse the challenges involved in detecting mobile malware in smart devices and finally to propose a general security solution that will facilitate solving or addressing such threats. The rest of the paper is organized as follows. In section II we provide a detailed analysis of the security threats on smart devices and their links with cyber security. We have identified mobile malware as one of the main issues and we discuss it in more detail in Section III. Section IV provides our proposed security solution that will be able to deter the problems of mobile malware. The paper is concluded in section V.II. SECURITY THREATS ON SMART DEVICESThe weakest link in any IT security chain is the user. The human factor is the most challenging aspect of mobile device security. Home users generally assume that everything will work just as it should, relying on a device’s default settings without referring to complex technical manuals. Therefore service content providers and hardware vendors need to be aware of their responsibilities in maintaining network security and content management on the devices they provide. Service providers might also have the opportunity to provide add-on security services to complement theweaknesses of the devices.The issue of cyber security is much closer to the home environment than has been usually understood; hence, the problem of cyber security extends beyond computers it is also a threat to portable devices. Many electronic devices used at home are practically as powerful as a computer - from mobile phones, video consoles, game consoles and car navigation systems. While these devices are portable, provide more features and functionality, they also introduce new risks.These devices previously considered as secure can be an easy target for assailants. The information stored and managed within such devices and home networks forms part of an individual’s Critical Information Infrastructure (CII) [2] as identified by the POSTnote on cyber security in the UK. For example, an attacker may be able to compromise a smart device with a virus, to access the data on the device. Not only do these activities have implications for personal information, but they could also have serious consequences if corporate information were also stored on the smart device.The use of mobile devices in healthcare is also more common these days, such as in mobile-health. A typical example is having a health device connected to the home network, which is capable of transmitting data wirelessly to hospitals and other relevant parties. Most of the manufacturers of these devices do not put much effort in trying to make sure that the devices are secure. If these devices are compromised not only will the information and privacy of the user of the device be compromised, but the attacker can even change the settings of the devices, which could lead to harmful consequences. It has been shown that it is possible to hack into a pacemaker and read the details of data stored in the device such as names and medical data without having direct access to the devices simply by standing nearby [3].Therefore, it is also possible to reconfigure the parameters of the device. This is not only applicable to medical devices, but also to any devices that are used within the home network for any purpose.According to the Juniper Networks report [4], 76 percent of mobile users depend on their mobile devices to access their most sensitive personal information, such as online banking or personal medical information. This trend is even more noticeable with those who also use their personal mobile devices for business purposes. Nearly nine in ten (89 percent) business users report that they use their mobile device to access sensitive work-related information.Another more worrying impact is when cybercriminals use the vast resources of the network to turn it into a botnet and launch a cyber-attack on national critical infrastructures. There are some Android applications that when downloaded from a third party market (not the Android market) are capable of accessing the root functionality of devices (“rooted”) and turning them into botnet soldiers without theuser’s explicit consent.People could easily and unwittingly download malware to their smart devices or fa ll prey to “man-in-the-middle” attacks where cyber-criminals pose as a legitimate body, intercept and harvest sensitive information for malicious use. In 2011, there was a mix of Android applications removed from the Android Market because they contained malware. There were over 50 infected applications - these applications were copies of “legitimate” applications from legitimate publishers that were modified to include two root exploits and a rogue application downloader .The Juniper Networks Mobile Threat Centre (MTC) reported that in 2011 there was an unparalleled increase in mobile malware attacks, with a 155 percent increase from the previous year across all platforms [5]. It is also reported that Android malware experienced an increase of 3,325 percent in 2011. Notable in these findings is a significant number of malware samples obtained from third-party applications which do not enjoy the benefit or protection Google Play Store scanning techniques. Previously, an Android developer could post an application to the official Android Market and have it available immediately, without inspection or vetting to block pirated or malicious applications.This increase in malware is mainly due to the combination of Google Android’s dominant market share in smartphone (68.8 percent in 2012) and the lack of security control over the applications appearing in the various Android application markets. It was reported recently that Google Play store, which has more than 700,000 apps just passed 15 billion downloads. Security firm Fortinet estimated that money-stealing malware has increased exponentially in 2006-2011 as shown in Figure 1. Based on an estimation by Kaspersky Lab, cybercriminals who target smart devices like smartphones earn from $1,000 to $5,000 per day per person. Mobile phone hacking is also getting more attractive with the rise of the Near-Field Communication technology (NFC), which expands the use of smart devices as e-wallet or helps people to read product information.In December 2011 alone, Kaspersky Lab discovered more than 1,000 new Trojans targeting smartphones. That is more than all the smartphone viruses spotted during 2003-2010. This trend is continuing; in 2012, the number of cyber-attacks targeting mobile devices increased exponentially during the first quarter, as reported by security firm Trend Micro [6].Their report identified approximately 5,000 new malicious Android applications in just the first three months of the year, mainly due to the increase of the Android user base. The research also pointed out a marked escalation in the number of active advanced persistent threat (APT) campaigns currently being mounted against companies and governments. APT is a cyber-attack launched by a group ofsophisticated, determined, and coordinated attackers who systematically compromise the network of a specific target or entity for a prolonged period. Security researchers see APT in different ways, while some researchers regard APT as different type of attack; others just categorize it as a more organized botnet with more resources behind it.Malware developments that targets smart home devices have several known monetization factors. Most malwares are aimed at mobile pick pocketing (short message service (SMS) or call fraud) or the ability to charge premium bills via SMS or calls, as illustrated in Figure 2. Some malware are used as part of botnet creations. Malwares like DreamDroid (or DroidDream) [7] have integrated thousands of mobile devices into extensive botnets. Some of the malwares are developed to exploit vulnerabilities on either the operating systems (OS), installed applications, or just to create trouble to user information.Home devices and general consumer electronics are progressively becoming more advanced and are capable of connecting with other devices over a network. While it may sound unreal, devices such as TVs, digital picture frames, smart meters and e-readers are quite vulnerable and absolutely capable of causing problems on your network. The next few years will provide opportunities for various types of malware developers to explore unlikely methods of achieving their goals. Smartphones are not invulnerable and Macs can get malware, such as the CVE-2012-0507 vulnerability [8].Luigi Auriemma in [9] has uncovered a vulnerability in a Samsung D6000 high definition (HD) TV that caused it to get stuck in an endless loop of restarts. Auriemma's report followed another denial-of-service (DoS) vulnerability in Sony Bravia TVs uncovered by Gabriel Menezes Nunes [10] which stops users from changing the volume, channels or access any functions.In the 2012 first quarterly report from Trend Micro [11], it was pointed out that the large diffusion of mobile devices and the increase in awareness of the principal cyber threats have resulted in an increase in the interest of cybercrime in the mobile sector. Another significant interest is concentrated on the threat in terms of the rapid spread of botnets based on mobile devices, favored by the total almost absence of protection and the difficulty of tracing the agents composing the network. If these exploits are targeted by well-established hacker groups such as Anonymous, it will pose a bigger threat to organizations and smart environments that protect highly sensitive data, targeting companies and individuals for various political and financial reasons.III. MOBILE MALWAREOne of the major and most common problems in today’s Internet is malware. Among these malware, Botnets are considered as the biggest challenge. Botnets are used to send email spam, carry out distributed denial of services (DDoS) attacks, andfor hosting phishing and malware sites. Botnets are slowly moving towards smart devices since those devices are now basically everywhere, powerful enough to run a bot and offer additional gains for a bot-master such as financial gains as discussed earlier. With PC-based botnets, cybercriminals often use zombies within botnets to launch DDoS attacks. Even though there have been no major mobile DDoS incidents, with current trends we can expect to see this in the near future.Botnets are maintained by malicious actors commonly referred to as “bot-masters” that can access and manage the botnet remotely or via bot proxy servers as illustrated in Error!Reference source not found.. The bots are then programmed and instructed by the bot-master to perform a variety of cyber-attacks, including attacks involving the further distribution and installation of malware on other information systems.In PC-based botnets, botnet master controllers typically use http requests with normal port 80 to transmit and receive their messages. In mobile-based botnets, the bot-master also uses similar http techniques to distribute their commands but also exploits SMS, Bluetooth, etc. The bot-master exploits operating system and configuration vulnerabilities to compromise smart devices and to install the bot software.The first mobile malware, known as Cabir, was discovered in 2004 and was also known as the first mobile worm. The first mobile botnet was discovered around July 2009, when a security researcher found SymbOS.Yxes or SymbOS.Exy.C (aka Sexy Space) [12] targeting Symbian devices and using simple HTTP-based Command-and-Control (C&C).Later the same year, a security researcher discovered Ikee.B [13], which targets jailbroken iPhones using a similar mechanism to SymbOS.Yxes. Geinimi, which is considered to be the first Android botnet, was discovered in China in December 2010. Geinimi also implements similar HTTP-based C&C with the added feature of encrypted communications. Ge inimi steals the device’s international mobile equipment identity (IMEI), international mobile subscriber identity (IMSI), GPS coordinate, SMS, contact list, etc. and forwards it to the bot-master.Although advanced mobile botnets have not been observed in the main population of smartphones, we believe it is just a matter of time. As shown in [14], mobile botnets are obviously serious threats for both end users and cellular networks. Threats imposed by botnets will continue to increase. As more people use smart devices, it is essential to analyze and explore the mechanisms of mobile botnets and develop security solutions in regard to smart devices.The use of C&C for a mobile botnet stipulates additional challenges that differentiate it from well-known PC-based botnets. Some of these main challenges include, among others: computational power, seamless connectivity, inter-connectivitywith other secure platforms networks, portability and amount of stored sensitive data, and computational power. PC-based botnets also use an IRC-channel as the main C&C communication channel.The impact of SMS-based C&C, IP-based C&C, and Bluetooth-based C&C has been addressed in detail in [15], while P2P-based C&C mobile botnets are analyzed and discussed in [16].As a result of the abilities of smart devices in terms of placing i.e. calls, use of SMS and MMS amongst others, the burdens for mobile botnets are very interesting and challenging as it opens the door for easy financial gain for a bot-master. Additionally, since mobile phones interact with operators and other networks, attacks against the critical infrastructure are also possible.Hence, it is possible to launch sophisticated cyber-attacks on the mobile phone network that will be very hard to prevent.Detecting and preventing malware is not a trivial task as malware developers adopt and invent new strategies to infiltrate mobile devices. Malware developers employ advanced techniques such as obfuscation and encryption to camouflage the signs of malware and thereby undermine anti-malware software.Some of the main reasons why mobile malware are an attractive point for viruses and malware developers are:1.The ubiquity of smart devices such as smartphones in general.2.The increasing computational powers of smart devices. Whose they arebecoming virtually as powerful as desktop systems.3.The lack of awareness of the threats and the risk attached to smart devicesfrom the end-user’s perspective.4.The growing uses of jailbreak/rooted devices both on iOS and Androiddevices.5.Each smart device really is an expression of the owner. It provides ameans to track the user’s activity, hence serves as a single gateway to our digital identity and activities.6.Most of the widely used smart devices operate on an open platform suchas Android, which encourages developers and download of applications from both trusted applications markets and third party markets.IV. POTENTIAL SECURITY SOLUTIONSConsidering the above threats and challenges, a new security solution is essential for cyber security for smart devices in smart homes. More specifically, several keyresearch tasks are required: 1) investigate new secure system architecture for smart devices in smart homes; 2) re-evaluate and enhance security system architecture for smart devices in smart homes.Android OS has four layers: Linux kernel, libraries (+Android runtime), application solution and applications layers (see Figure 4). So, basically Android runtime is a kind of “glue” between the Linux kernel and the applications.Figure 4. Android OS layersThe main security features common to Android involve process and file system isolation; application or code signing; ROM, firmware, and factory restore; and kill switches.However, the main security issue with Android OS is it relies heavily to the end-user to decide whether an application is safe or not. Even though Google’s just adding one piece of the security layer by scanning an applications in the Google Play, the end users still needs to analyze and make the final decision themselves whether to continue with the installation or not. Until now, the end-users cannot rely on the operating system to protect themselves from malware.As part of Google’s marketing strategy to gain market share as big as possible by offering applications as many as possible, the Android application publishing process makes it easy for developers to develop Android applications, but also provides too much space for malicious application creators.Malicious applications have successfully infected Android market before, one example being a malware application called droid09 which allowed users to carry out banking transactions. The application needs the user to provide the bank’s details and tricks the user by masquerading a legitimate login of a bank website (phishing).Malware applications have become more sophisticated these days; they find new ways and techniques to enter the system by exploiting software vulnerabilities or by just tricking the users.End-user: It is always essential for the end-user to be aware of the security measures of their mobile device. End-users should be aware of at least the following measures:Install anti-virus and anti-malware solutions to protect the device againstmalware and viruses. Also ensure to turn on the automatic update. It is been shown that installing anti-virus and anti-malware is very effective to protect mobile devices from malicious applications [5, 6, 17].•Install a personal firewall to protect mobile device interfaces from direct attack and illegal access. The effectiveness of mobile firewalls to increase a mobile device’s security is shown in [18].Install only applications from trusted sources that have legitimate contact information and a website. As the current Android Market (Google Play) does not adopt a certification process for applications, it is up to the end-user to make sure he/she only installs trusted applications from trusted developers.Install only applications from the official and original developer (for example, if you are installing Instagram applications, make sure you download it from Instagram Inc.).Check the permissions carefully when the application is prompting you during the installation phase. For example, when you install a wallpaper application, do you think it really needs full Internet access?Ensure your OS and software's always up-to-date with the latest versions and security patches need to be installed.Install remote locate, track, lock, wipe, backup and restore software to retrieve, protect or restore a lost or stolen mobile device and the personal data on the device.Only install applications that have a high number of downloads and positive reviews.Never view sensitive data over public wireless networks which have no passwords or encryption.Should be alert to anomaly behaviours and activities in their devices.Should be careful when clicking links on social network sites. Malicious links on social networks can be a very effective method to spread malware.Participants tend to trust such networks and are thus willing to click on links that are on “friends’” social networking sites.Mobile Network Operators (MNOs): MNO also has responsibility to create a more secure environment for their customers. MNOs need to install anti-virus and anti-malware software to scan outgoing and incoming SMS and MMS to the mobile network, as many malwares use SMS/MMS to propagate and contact the bot-master. MNO should also build a global partnership with related agencies such as other MNOs to prevent mobile malware propagation by exchanging information, knowledge, database and expertise.Apps Developers: Developers also need to take care of the security measuresimplemented in their application. They should ensure that private data is not being sent via an unencrypted channel; the data must be sent through HTTPS or TLS networks.Developers should minimize the use of built-in permissions in their applications, for example do not ask for full Internet access permission, INTERNET, unless it is essential for your applications to work properly. Android has about 100 built-in permissions that control operations such as dialing the phone (CALL_PHONE), sending shot message (SEND_SMS), etc.In Android, there are three main “ security protection levels” for permission labels: a “normal” permission is granted to any application that requests it; a “dangerous” permission is only granted after user approval at install-time; and a “signature” permission is only granted to applications signed by the same developer key as the application defining the permission label.This “signature” protection level is integral in ensuring that third-party applications do not gain access affecting the Android’s trusted computing base (TCB)’s integrity.Furthermore, applications developers need only collect data which is essential and required for the application otherwise it will be tampered by the attackers. This is also useful to minimize repackaging attacks. Repackaging attacks are a very common approach, in which a malware developer downloads a legitimate application, modifies it to include malicious code and then republishes it to an application market or download site.It is shown that the repackaging technique is highly effective mainly because it is often difficult for end-users to tell the difference between a legitimate application and its malicious repackaged form. In fact, repackaging was the most prevalent type of social engineering attack used by Android malwaredevelopers in the first two quarters of 2011 [17]. One of the characteristics of Android malware is typically it is specifically developed for a speci fic group of users. It is very unlikely for an Android user from Russia to be infected by Chinese malware for example. Android malware is typically created by cybercriminals with users in specific countries as their target, which is usually their own compatriot. Market Store: The store needs to vet and rigorously screen new mobile applications before they can be put in the market. Google (Google Play) recently made a significant improvement in their security by screening new applications before they were put in the market. Applications store providers also should consider certification for each application before it can be published in the marketplace. The effectiveness of such certification process is shown in [19]. Applications should be rigorously reviewed to ensure that applications are safe from malicious codes, reliable, perform as expected, and are also free of explicit and offensive material.。

智能家居室内感应定位系统中英文对照外文翻译文献

智能家居室内感应定位系统中英文对照外文翻译文献

智能家居室内感应定位系统中英文对照外文翻译文献(文档含英文原文和中文翻译)A Pyroelectric Infrared Sensor-based Indoor Location-AwareSystem for the Smart HomeSuk Lee, Member, IEEE, Kyoung Nam Ha, Kyung Chang Lee, Member, IEEE Abstract —Smart home is expected to offer various intelligent services by recognizing residents along with their life style and feelings. One of the key issues for realizing the smart home is how to detect the locations of residents. Currently, the research effort is focused on two approaches: terminal-based and non-terminal-based methods. The terminal -based method employs a type of device that should be carried by the resident while the non-terminal-based method requires no such device. This paper presents a novel non-terminal-based approach usingan array of pyroelectric infrared sensors (PIR sensors) that can detect residents. The feasibility of the system is evaluated experimentally on a test bedIndex Terms— smart home, location-based service, pyroelectric infrared sensor (PIR sensor), location-recognition algorithmI. INTRODUCTIONThere is a growing interest in smart home as a way to offer a convenient, comfortable, and safe residential environment [1], [2]. In general, the smart home aims to offer appropriate intelligent services to actively assist i n the resident’s life such as housework, amusement, rest, and sleep. Hence, in order to enhance the resident’s convenience and safety, devices such as home appliances, multimedia appliances, and internet appliances should be connected via a home network system, as shown in Fig. 1, and they should be controlled or monitored remotely using a television (TV) or personal digital assistant (PDA) [3], [4].Fig. 1. Architecture of the home network system for smart home Especially, attention has been focused on location-based services as a way to offer high-quality intelligent services, while considering human factors such as pattern of living, health, and feelings of a resident [5]-[7]. That is, if the smart home can recognize the resident’s pattern of living o r health, then home appliances should be able to anticipate the resident’s needs and offer appropriate intelligent service more actively. For example, in a passive service environment, the resident controls the operation of the HVAC (heating, ventilating, and air conditioning) system, while the smart home would control the temperature and humidity of a room according to the resident’s condition. Various indoor location-aware systems have beendeveloped to recognize the resident’s location in the smart home or smart office. In general, indoor location-aware systems have been classified into three types according to the measurement technology: triangulation, scene analysis, and proximity methods [8]. The triangulation method uses multiple distances from multiple known points. Examples include Active Badges [9], Active Bats [10], and Easy Living [11], which use infrared sensors, ultrasonic sensors, and vision sensors, respectively. The scene analysis method examines a view from a particular vantage point. Representative examples of the scene analysis method are MotionStar [12], which uses a DC magnetic tracker, and RADAR [13], which uses IEEE 802.11 wireless local area network (LAN). Finally, the proximity method measures nearness to a known set of points. An example of the proximity method is Smart Floor [14], which uses pressure sensors. Alternatively, indoor location-aware systems can be classified according to the need for a terminal that should be carried by the resident. Terminal-based methods, such as Active Bats, do not recognize the resident’s location directly, but perceive the location of a device carried by the resident, such as an infrared transceiver or radio frequency identification (RFID) tag. Therefore, it is impossible to recognize the resident’s location if he or she is not carrying the device. In contrast, non-terminal methods such as Easy Living and Smart Floor can find the resident’s location without such devices. However, Easy Living can be regarded to invade the resident’s privacy while the Smart Floor has difficulty with extendibility and maintenance. This paper presents a non-terminal based location-aware system that uses an array of pyroelectric infrared (PIR) sensors [15], [16]. The PIR sensors on the ceiling detect the presence of a resident and are laid out so that detection areas of adjacent sensors overlap. By combining the outputs of multiple PIR sensors, the system is able to locate a resident with a reasonable degree of accuracy. This system has inherent advantage of non-terminal based methods while avoiding privacy and extendibility, maintenance issues. In order to demonstrate its efficacy, an experimental test bed has been constructed, and the proposed system has been evaluated experimentally under various experimental conditions. This paper is organized into four sections, including this introduction. Section II presents the architecture of the PIR sensor-based indoor location-aware system (PILAS), and the location-recognition algorithm. Section III describes a resident-detection method using PIR sensors, and evaluates the performance of the system under various conditions using an experimental test bed. Finally, a summary and the conclusions are presented in Section IV.II. ARCHITECTURE OF THE PIR SENSOR-BASED INDOORLOCATION-AWARE SYSTEMA. Framework of the smart homeGiven the indoor environment of the smart home, an indoor location-aware system must satisfy the following requirements. First, the location-aware system should be implemented at a relatively low cost because many sensors have to be installed in rooms of different sizes to detect the resident in the smart home. Second, sensor installation must be flexible because the shape of each room is different and there are obstacles such as home appliances and furniture, which prevent the normal operation of sensors. The third requirement is that the sensors for the location-aware system have to be robust to noise, and should not be affected by their surroundings. This is because the smart home can make use of various wireless communication methods such as wireless LAN or radio-frequency (RF) systems, which produce electromagnetic noise, or there may be significant changes in light or temperature that can affect sensor performance. Finally, it is desirable that the system’s accuracy is adjustable according to room types.Among many systems that satisfy the requirement, the PIR sensor-based system has not attracted much attention even though the system has several advantages. The PIR sensors,which have been used to turn on a light when it detects human movement, are less expensive than many other sensors. In addition, because PIR sensors detect the infrared wavelengthemitted from humans between 9.4~10.4 μm, they are reasonably robust to their surroundings, in terms of temperature, humidity, and electromagnetic noise. Moreover, it ispossible to control the location accuracy of the system by adjusting the sensing radius of a PIR sensor, and PIR sensors are easily installed on the ceiling, where they are not affected by the structure of a room or any obstacles.Figure 2 shows the framework for the PILAS in a smart home that offers location-based intelligent services to a resident. Within this framework, various devices are connected via a home network system, including PIR sensors, room terminals, a smart home server, and home appliances. Here, each room is regarded as a cell, and the appropriate number of PIR sensors is installed on the ceiling of each cell to provide sufficient location accuracy for the location-based services. Each PIR sensor attempts to detect the resident at a constant period, and transmits its sensing information to a room terminal via the home network system.Fig. 2. Framework of smart home for the PILAS.Consequently, the room terminal recognizes the resident’s l ocation by integrating the sensor information received from all of the sensors belonging to one cell, and transmits the resident’s location to the smart home server that controls the home appliances to offer location-based intelligent services to the resident.Within this framework, the smart home server has the following functions. 1) The virtual map generator makes a virtual map of the smart home (generating a virtual map), and writes the location information of the resident, which is received from a room terminal, on the virtual map (writing the resident’s location). Then, it makes a moving trajectory of the resident by connecting the successive locations of the resident (tracking the resident’s movement). 2) The home appliance controller transmits control commands to home appliances via the home network system to provide intelligent services to the resident. 3) The moving pattern predictor saves the current movement trajectory of the resident, the current action of home appliances, and parameters reflecting the current home environment such as the time, temperature, humidity, and illumination. After storing sufficient information, it may be possible to offer human-oriented intelligent services in which the home appliances spontaneously provide services to satisfy human needs. For example, if the smart home server “knows” that the resident normally wakes up at 7:00 A.M. and takes a shower, it may be possible to turn on the lamps and some music. In addition, the temperature of the shower water can be set automatically for the resident.B. Location-recognition algorithmIn order to determine the location of a resident within a room, an array of PIR sensors are used as shown in Fig. 3. In the figure, the sensing area of each PIR sensor is shown as a circle, and the sensing areas of two or more sensors overlap. Consequently, when a resident enters one of the sensing areas, the system decides whether he/she belongs to any sensing area by integrating the sensing information collected from all of the PIR sensors in the room. For example, when a resident enters the sensing area B, sensors a and b output ‘ON’ signals, while sensor c outputs ‘OFF’ signal. After collecting outputs, the algorithm can infer that the resident belongs to the sensing area B. According to the number of sensors and the arrangement of the sensors signaling ‘ON’, the resident’s location is deter-mined in the following manner. First, if only one sensor outputs ‘ON’ signal, the resident is regarded to be at the center of the sensing area of the corre sponding sensor. If the outputs of two adjacent sensors are ‘ON’, the resident’s location is assumed to be at the point midway between the two sensors. Finally, if three or more sensors signal ‘ON’, the resident is located at the centroid of the centers of the corresponding sensors. For example, it is assumed that the resident is located at point 1 in the figure when only sensor a signals ‘ON’, while the resident is located at point 2 when sensors a and b both output ‘ON’ signals.The location accuracy of this system can be defined the maximum distance between the estimated points and the resident. For example, when a resident enters sensing area A, the resident is assumed to be at point 1. On the assumption that a resident can be represented by a point and the radius of the sensing area of a PIR sensor is 1 m, we know that the location accuracy is 1 m because the maximum error occurs when the resident is on the boundary of sensing area A. Alternatively, when the resident is in sensing area B, the resident is assumed to be at point 2, and the maximum location error occurs when the resident is actually at point 3. In this case, the error is 3 / 2 m which is the distance between points 2 and 3. Therefore, the location accuracy of the total system shown in Fig. 3 can be regarded as 1 m, which is the maximum value of the location accuracy of each area. Since the number of sensors and the size of their sensing areas determine the location accuracy of the PILAS, it is necessary to arrange the PIR sensors properly to guarantee the specified system accuracy.Fig. 3. The location-recognition algorithm for PIR sensors.In order to determine the resident’s location precisely and increase the accuracy of the system, it is desirable to have more sensing areas with given number of sensors and to have sensing areas of similar size. Fig. 4 shows some examples of sensor arrangements and sensing areas. Fig. 4(a) and 4(b) show the arrangements with nine sensors that produce 40 and 21 sensing areas, respectively. The arrangement in Fig. 4(a) is better than Fig. 4(b) in terms if the number of sensing areas. However, the arrangement in Fig. 4(a) has some areas where a resident can not be detected and lower location accuracy than that in Fig. 4(b). Fig. 4(c) shows an arrangement with twelve sensors that five 28 sensing areas without any blind spots.Fig. 4. Location accuracy according to the sensor arrangement of PIRsensors. (a) 40 sensing areas. (b) 21 sensing areas. (c) 28 sensing areaswith twelve sensors.When PIR sensors are installed around the edge of a room, as shown in Fig. 4(c), it sometimes may give awkward results. One example is shown in Fig. 5. Fig. 5(a) shows the path of a resident. If we mark the estimated points by using the sensor location or the midpoint of adjacent sensors, it will be a zigzagging patterns as shown in Fig. 5(b). In order to alleviate this, we may regard the sensors on the edges to be located a little inwards, which give the result shown in Fig. 5(c).Fig. 5. The effect of compensating for the center point of the outer sensors.(a) Resident’s movement. (b) Before compensating for the outer sensors. (c)After compensating for the outer sensors.III. PERFORMANCE EVALUATION OF THE PILASA. Resident-detection method using PIR sensorsSince the PILAS recognizes the resident’s location by combining outputs from all the sensors belonging to one cell, determining whether a single sensor is ‘ON’ or ‘OFF’ directly influences location accuracy. In general, because the ‘ON/OFF’ values can be determined by co mparing a predefined threshold and the digitized sensor output acquired by sampling the analog signal from a PIR sensor, it is necessary to choose an appropriate signal level for the threshold. For example, Smart Floor, which is another non-terminal method, can recognize a resident’s location exactly by comparing the appropriate threshold and a sensor value, because a pressure sensor outputs a constant voltage based on the resident’s weight when he remains at a specific point. However, because a PIR sensor measures the variation in the infrared signal produced by a moving human body, its output is in analog form, as shown in Fig. 6. That is, as the variation in the infraredradiation from a resident increases when a resident enters a sensing area, the PIR sensor outputs an increasing voltage. Conversely, the voltage decreases as the resident leave the sensing area. If the resident does not move within the sensing area, the variation in the infrared radiation does not exist and the PIR sensor outputs zero voltage. Therefore, it is very difficult to deter-mine when a resident is staying resident within a specific sensing area using only the voltage or current threshold of a PIR sensor.Fig. 6. Signal output of PIR sensor.In order to guarantee the location accuracy of the system, the resident-detection method must meet several requirements. First, if no resident is present within a sensing area, the PIR sensor should not output ‘ON’ signal. That is, the PIR sensor must not malfunction by other disturbances such as a moving pet, temperature change and sunlight. Second, it should be possible to precisely determine the point in time when a resident enters and leaves a sensing area. That is, in spite of variations in sensor characteristics, resident’s speed and heig ht, it should be possible to determine the time point exactly. Finally, because the output voltage of a PIR sensor does not exceed the threshold voltage when the resident does not move within a sensing area, it is necessary to know if a resident stays within the sensing area.In order to satisfy these requirements, this paper introduces the following implementation method for the resident detection method for PIR sensors. First, in order to eliminate PIR sensor malfunctioning due to pets or temperature changes, a Fresnel lens, which allows human infrared waveforms to pass through it while rejecting other waveforms, is installed in front of the PIR sensors. Second, when the output of a PIR sensor exceeds the positive threshold voltage, and this state is maintained for several predefined sampling intervals, that the resident has entered a sensing area. Here, the threshold must be sufficient for the method to distinguish variation in the resident’s infrared from an environmental infrared signal caused by pets o r temperature change. Moreover, when the sensor’s output falls below a negative threshold voltage and this status is maintained for several sampling intervals, it is assumed that the resident has left the sensing area. Finally, when the output voltage remains between the two threshold voltages, for example when the resident is not moving inside the sensing area, the output of the corresponding PIR sensor is changed from ‘ON’ to ‘OFF’. At this time, if other sensors installed near this sensor do notoutput ‘ON’ signal, the method regards the resident as remaining within the corresponding sensing area.B. Performance evaluation using an experimental test bedIn order to verify the feasibility of the PILAS, an experimental test bed was implemented. Since the intelligent location-based service in the smart home does not require very high location accuracy, we designed the system to have a location accuracy of 0.5 m. Figure 7 shows the experimental test bed in a room measuring 4 ×4 ×2.5 m (width ×length ×height). In the experiment, twelve PIR sensors were fixed on the ceiling, using the arrangement shown in Fig. 4(c). An Atmel AT89C51CC001 microcontroller [17] was used for signal processing and judging ‘ON/OFF’, and a Nippon Ceramic RE431B PIR sensor [18] and N L-11 Fresnel lens were used. Especially, a horn was installed on each PIR sensor to limit the sensing area to the circle with 2 m diameter. Fig. 8 shows the experimental results with the horn. In the figure, the RE431B sensor outputs the signal shown in (a) when a resident passes through the sensing circle, while it outputs the irregular signal shown in (b) when the resident moves within the circle. Finally, no signal is detected when the resident moves outside the circle, as shown in (c). From these experimental results, we verified that the PIR sensor detects residents within the sensing area only. In addition, in order to judge whether the signal is ‘ON’ or ‘OFF’, it is necessary to choose a threshold for the RE431B sensor that considers external environmental disturbance. Initially, several experiments were performed to determine the threshold with respect to the internal temperature change caused by a air conditioner or heater and other disturbances, such as wind or sunshine. Based on these experimental results, when the threshold of the RE431B sensor was ±0.4 V, external environmental temperature change did not affect its performance at detecting the resident. In addition, we verified that pets did not affect the sensing performance with the same threshold.Fig. 7. Experimental test bed for the PILAS.Fig. 8. Ensuring the exact sensing range with a horn.Next, in order to determine the resident’s location using the information received from PIR sensors, a PC-based locationrecognition algorithm was implemented, as shown in Fig. 9. Here, a PC collects data from the PIR sensors every 10 msec using an NI 6025E data acquisition (DAQ) board [19]. In the figure, the line in the left window was drawn using a mouse to show the path of the resident graphically, while that in the window on the right is the estimated movement trajectory of the resident drawn by connecting the resident’s locations acquired using the DAQ board.Finally, in order to verify the efficacy of the system, three experiments were performed with residents between 160 and 180 cm tall, moving at speeds between 1.5 and 2.5 km/h. Figure 9 shows the trajectory of a resident moving along a Tshaped path. The trajectory made by connecting the resi-dent’s locations recognized by the PILAS, shown on th e right, was similar to the target path shown on the left. We know that the maximum location error is about 30 cm without compensating for the outer sensors. Fig. 10 shows the trajectory when the resident follows an H-shaped path. In this experiment, the location accuracy was similar to that in Fig. 9. We verified that the system could locate a resident with accuracy of 0.5 m, even if three or more sensors were activated. Figure 11 shows the trajectory of a resident moving along a square path. In this case, the location error is the largest, and the trajectory is not a straight line. We note that serious location errors occurred at each point marked by A due to the inaccurate judgment of the outer sensors. Nevertheless, the location error is still smaller than 0.5 m when moving in the square path. Here, the compensation method for outer sensors, which was explained in Fig. 5, reduces the location error at each point A. When the resident moves in a straight line, as shown in Fig. 12(a), the location error is relatively large without using the compensation method, as shown in Fig. 12(b). However, after applying the compensation method, we verified that the detection results for the areas in the small circles are enhanced by roughly about 30%.IV. SUMMARY AND CONCLUSIONSThis paper presents a PIR sensor-based indoor location aware system that estimates the resident’s location for location-based intelligent services in the smart home. This paper introduces the framework of smart home for the location-aware system, and a location-recognition algorithm that integrates the information collected from PIR sensors. In addition, this paper presents a resident-detection method. Finally, an experiment is implemented to evaluate the efficacy of the PILAS.Based on several experiments conducted under various conditions, we verified that the PILAS can estimates resident’s location sufficiently well. Moreover, because the location accuracy of the system is less than 0.5 m without any terminal for location recognition, the system can be very practical. Furthermore, it should be possible to enhance the location accuracy of the system by increasing the number of sensing areas, by equalizing the sensing areas based on the sensor arrangement, or by compensating for the centers of outer sensors.Since the location accuracy of this system differs according to the sensor arrangement, it is necessary to determine the optimal sensor arrangement that offers the greatest location accuracy. In order to enhance the location accuracy, it is also necessary to enhance the method of processing the PIR sensors using more advanced techniques such as probabilistic theories and soft computing. Finally, the proposed PILA system should be extended to deal with a room occupied by more than one residents.基于热释电红外传感器的智能家居室内感应定位系统Suk Lee,电机及电子学工程师联合会会员Kyoung Nam Ha, Kyung Chang Lee,电机及电子学工程师联合会会员摘要——智能家居,是一种可以通过识别具有不同生活习惯和感觉的住户来提供各种不同的智能服务。

智能家居英语作文80词带翻译

智能家居英语作文80词带翻译

智能家居英语作文80词带翻译Smart home is a residential platform, which uses generic cabling technology, network communication technology, security technology, automatic control technology, and audio and video technology to integrate facilities related to home life, build an efficient management system for residential facilities and family agenda, improve the safety, convenience, comfort, and artistry of the home, and achieve an environment-friendly and energy-saving living environment.智能家居是以住宅为平台,利用综合布线技术、网络通信技术、安全防范技术、自动控制技术、音视频技术将家居生活有关的设施集成,构建高效的住宅设施与家庭日程事务的管理系统,提升家居安全性、便利性、舒适性、艺术性,并实现环保节能的居住环境。

Smart home is a residential facility management system that can be centrally managed and intelligently controlled based on the integrated wiring technology, network communication technology, security protection technology, automatic control technology, and audio and video technology, so as to improve the safety, convenience, comfort, and artistry of the home and realize an environment-friendly and energy-saving living environment In other words, smart home is not a single product. Instead, it connects all products in the home into an organic system through technical means, and the owner can control the system anytime and anywhere智能家居是以住宅为平台,利用综合布线技术、网络通信技术、安全防范技术、自动控制技术、音视频技术,将家居生活相关的设备集成起来,构建可集中管理、智能控制的住宅设施管理系统,从而提升家居的安全性、便利性、舒适性、艺术性,并实现环保节能的居住环境.换句话说,智能家居并不是一个单一的产品,而是通过技术手段将家中所有的产品连接成一个有机的系统,主人可随时随地控制该系统.Smart home is the embodiment of IoT under the influence of the Internet. Smart home connects all kinds of equipment in the home (such as audio and video equipment, lighting system, curtain control, air conditioning control, security system, digital cinema system, video server, shadow cabinet system, network appliances, etc.) through the Internet of Things technology to provide home appliance control, lighting control, telephone remote control, indoor and outdoor remote control, anti-theft alarm, environmental monitoring, HV AC control Infrared forwarding, programmable timing control and other functions and means. Compared with ordinary homes, smart homes not only have traditional residential functions, but also have the functions of building, network communication, information appliances, and equipment automation, providing all-round information interaction functions, and even saving money for various energy costs智能家居是在互联网影响之下物联化的体现。

智能家居英文作文

智能家居英文作文

智能家居英文作文英文:Smart home is a concept that has gained popularity in recent years. It refers to the use of technology to make homes more convenient, comfortable, and efficient. There are many different types of smart home devices that can be used to achieve this goal.One of the most common types of smart home devices is the smart thermostat. This device can be programmed to adjust the temperature in your home based on your schedule and preferences. For example, you can set it to turn down the heat when you leave for work in the morning and turn it back up when you return home in the evening.Another popular smart home device is the smart lighting system. This system allows you to control the lights in your home from your smartphone or other device. You can turn lights on and off, dim them, and even change theircolor. This can be especially useful for creating different moods in different rooms of your home.Smart home security systems are also becoming more popular. These systems can include things like smart locks, security cameras, and motion sensors. You can monitor your home from your smartphone and receive alerts if anything unusual happens.Finally, smart appliances are another type of smart home device that can be very useful. These appliances can include things like smart refrigerators, ovens, and washing machines. They can be programmed to adjust their settings based on your preferences and can even be controlled from your smartphone.Overall, smart home technology can make our lives easier and more convenient. By automating certain tasks and allowing us to control our homes from our smartphones, we can save time and energy and enjoy a more comfortable and efficient living space.中文:智能家居是近年来越来越流行的概念。

一篇外文文献和翻译(智能家居方面)++

一篇外文文献和翻译(智能家居方面)++

原文题目:Detecting Individual Activities from Video in a SmartHome译文题目:在智能家居中从视频中检测个人活动摘要——论文阐述了在智能家居环境中个人活动的检测。

我们的系统是基于一个强大的视频跟踪器,创建和使用一个广角摄像头跟踪目标。

该系统采了对用输入目标位置,大小和方向的翻译。

对每一个目标进行翻译,产生活动分类,如“走”,“站立”,“坐”,“吃饭”,或“睡眠”。

贝叶斯分类器和支持向量机(SVMs)相比,获取和识别到先前定义的单个活动。

这些方法在记录的数据集上被评估。

然后提出一种新型的混合分类器。

此分类器结合了生成的贝叶斯方法和区别性支持向量机。

贝叶斯方法用于检测先前地看不见的活动,而支持向量机在识别获取活动类别的例子上被展示了能提供搞的区别力。

记录的数据集的混合分类器评估结果表明,当识别系统看不见的活动时,生成和区别性的分类相结合方法的优于单独的方法。

一,引言本文介绍了一种用于检测在智能家居环境下的个人活动的系统。

目的是检测预定义的和看不见的活动。

提出的系统是基于使用一个广角摄像头创建和跟踪移动目标的可视化的跟踪过程。

提取目标位置,大小和方向,作为每个目标的活动识别输入。

本文的两个贡献:首先,贝叶斯分类器和支持向量机(SVMs)相比,从视觉目标属性中获取和识别基本的个人的活动(“走”,“站立”,“会议”,“吃饭”,“睡觉”)。

在数据集中这两种方法都被测试和评估,记录在智能家居环境的实验室样机。

其次,为识别预先看不到的活动提出了一种新型的混合分类器。

贝叶斯方法用于创建一个有依据的数据模型。

关于这个模型的概率确定与否,可以归结预定义的活动种类。

如果是,支持向量机是用来确定获取活动种类。

如果不是这样,一个错误检测或一个新的活动类(所获取到的)被识别。

该混合分类器在记录数据集中已经进行了测定和评估。

二,方法在下面,我们提出从视频检测活动的方法。

首先,我们对智能家居环境和强大视频跟踪系统进行了简要描述。

智能家居(英文)【范本模板】

智能家居(英文)【范本模板】

The smart home of the Internet of things1.AbstractSmart home is a house as a platform, the use of integrated wiring technology,network communication technology, smart home system design scheme of safety technology,automatic control technology, audio and video technology to integrate the household life related facilities,schedule to build efficient residential facilities and family affairs management system,improve home security,convenience,comfort,artistry,and realize environmental protection and energy saving living environment. Smart home is under the influence of the Internet content embodiment. Smart home in the home through the Internet of things technology with the equipment (such as audio and video equipment,lighting, curtain control,air—conditioning control, security systems, digital cinema system area,network household appliance and etc。

室内与家具设计毕业论文中英文对照资料外文翻译文献

室内与家具设计毕业论文中英文对照资料外文翻译文献

中英文对照资料外文翻译文献Transforming Interior Spaces: Enriching SubjectiveExperiences Through Design ResearchTiiu PoldmaSchool of Industrial Design, University of MontrealC.P. 6128, succursale Centre-ville, Montreal, Quebec H3T 1B9, CANADAAbstractThis article explores tacit knowledge of lived experience and how this form of knowledge relates to design research. It investigates how interior designers interpretuser lived experiences when creating designed environments. The article argues thatuser experience is the basis of a form of knowledge that is useful for designers. The theoretical framework proposed in the article examines the nature of user experienceand how it can be utilized in the design process. The study of lived experiences iscontextualized within aesthetic, subjective, and functional aspects of the interiordesign process, which requires users to express their meanings and needs. A casestudy is described to illustrate the various stages of this process.Keywords: design research; experiential knowledge; tacit knowledge; dynamicprocess; pragmatic philosophy; interior spaces1. IntroductionIn our everyday lives, we live in spaces that are active, changing, and dynamic. When designers create interior spatial designs for various types of uses and experiences,they consider both the aesthetic qualities of a space and how people experienceexperiences are interactions and sensations within the spaces. However, people’ssubjective. These are experiences people have in the moment of living, bothconsciously and unconsciously, in interaction with the space and others in the space.This involves a form of knowing that is “implicit, naturalistic, ecological cognition of as opposed to “deliberate, formal, thinking and knowledge” everyday existence” (Storkerson, 2010, Section 1, para. 2). This article explores these implicit forms ofknowing and considers what design possibilities may emerge from them. Documenting these forms of knowing requires an understanding of how designsreflect aesthetic and functional ends while taking into account the direct experiences users have (Poldma & Thompson, 2009). This requires an understanding of how-world impact their subjective meaning-making everyday experiences of the users’ life(Shusterman, 1997; Vaikla-Poldma, 2003; White, 1998).The theoretical framework proposed here links experiential knowledge to the direct interaction of users within an environment and recognizes the dynamic nature of that link. Experiences of the life-world are taken as a basis for designing environments that actually work for their intended use.The proposed theoretical framework builds on philosophical ideas about the nature of lived experiences and subjective meanings, and relates it to the process by which users accept or reject a space. These ideas are explored using the example of a research project done in a residential long-term care institution. The research clarifies how the exchanges between the design researcher and the participants contribute to changes in the space.2. Designing Interior Space2.1. Current ResearchCurrently, when researchers study the design of interior space, they tend to be concerned with either the causal relationship between people and their environment or the interactions between material properties and the space being designed. Often, environment-behavior theories form the basis of design inquiry. Such inquiry seeks to understand the relationship between people and their environment using evidence that codifies the relationship (Dickinson & Marsden, 2009; Poldma & Thompson, 2009; Zeisel, 2006). In this form of design inquiry, design researchers d emonstrate how appropriately designed space can add value to living well in an institution, how safety and security can add to productivity in working environments, or how evidence-based knowledge of environment-behavior relationships can inform the design process. Examples of this type of research include the use of questionnaire-based s tatisticalactivities (Botti-Salitsky, 2009; data to glean how the environment affects people’sDickenson & Marsden, 2009). This type of research is usually framed in a positivist mode, which seeks objective knowledge (Guba & Lincoln, 1994). Studying human behavior in terms of causal relationships involves verification or falsification of a priori hypotheses. A limitation of this approach is that, as Guba and Lincoln have stated, “[h]uman b ehaviour, unlike that of physical objects, cannot be understoodwithout reference to the meanings and purposes attached by human actors to their activities” (Guba & Lincoln, 1994, p. 106).It is these meanings and purposes that tacit forms of knowledge contain. Such meanings and purposes are usually studied through narratives and conversations between designers and users (Creswell, 1998; Merriam & Associates, 2002; Vaikla-Poldma, 2003).2.2. The Role of Lived ExperiencePeople develop meanings attached to objects and environments, be these art objects, personal things, or other people in their lives (Bachelard, 1969; Csikszentmihalyi & Rochberg-Halton, 1981). These meanings arise through interactions that occur within spaces s uch as homes, offices, or recreational places; the meanings in turn affect perceptions and subsequent interactions (Poldma, 1999, 2008; Vaikla-Poldma, 2003). Design of interior spaces needs to take the above meaning-making process into account. When designing interior space, the designer (or architect) works directly with clients and users to take an existing (or imagined) interior space and transform it.A variety of knowledges come into play in this process. The role of the technical aspects of the space, such as air quality and material properties, is well recognized in design, but how the tacit aspects shape the design process is less understood.In practice, the tacit aspects o f experience within spaces a nd between people often shape how the design evolves. Multiple experiences and contexts act together to transform empty spaces into aesthetically functional interior places (Vaikla-Poldma, 2003). These experiences are both internal and external to the user, in that the persons who use the space attach meaning to the space where they live and contribute socially through the interrelations they have with others (Malnar & Vodvarka, 1992; Poldma, 2009).2.3. Conversation and Meaning MakingDesigned spaces, whether real or virtual, trigger various experiences. When designing interior spaces, we are preoccupied with both tangible and intangible aspects. We are preoccupied with its volume and physical characteristics; we are also preoccupied with how the space forms a backdrop for a complex set of interrelationships among people, objects, contexts, and lived experiences. Moreover, these interrelationships evolve over time (Malnar & Vodvarka, 1992; Mitchell, 1993).Designing interior spaces also requires an understanding of what happens when the spatial experiences people have are grounded in their real, lived experiences that areboth subjective and social. These experiences happen simultaneously with changing physical conditions, such as lighting, and changing time-space relations, such as whenIn these we work at home, live and work in multiple contexts, or “live a t work.” contemporary ways of living and working, the physical space is a backdrop for changing activities, not bounded by any particular states of being or any particular ways of knowing (Ainley, 1998; Ardener, 1981).Spaces are designed after investigating multiple issues including user needs, building contexts, space requirements, appropriate materials, colour and lighting, furnishings, social needs, cultural setting, and then combining it all aesthetically to create the interior space. The space is expected to support the activities and human engagements about to take place there.Designers engage in conversations with clients and users at various stages of the design process, in part to make sense of the information gathered and then to make decisions and generate ideas for the design of the space. Aesthetic and functional design decisions are made on the spot by designers engaged with stakeholders as they define how the space should be occupied and for what purposes (Poldma, 2009; Vaikla-Poldma, 2003). There is a service relationship that develops between the designers and users as they participate together in both design and production processes (Nelson & Stolterman, 2003).2.4. Static and Dynamic SpacesInterior space has long been documented theoretically in terms of physical attributes such as objects, walls, lighting, and color (Malnar & Vodvarka, 1992). Students learn about interior space as an architectural entity grounded in physical attributes that are static and exist as independent features (Poldma & Wesolkowska, 2005). Consequently interior spaces a re often reduced to their physical attributes, material and surface decoration, producing static spaces where an office is an office, a restaurant is a restaurant.In practice, however, spaces are required to be used in a flexible manner where multiple activities can occur in the same place. Designers are often called upon to design spaces for dynamic lived situations, not static ones. This calls for a more dynamic concept of space.3. Proposed Theoretical Framework3.1. Beyond Causal ExplanationsHistorically, theories about interior space have considered human-environment relationships in causal terms (Hall, 1969; Lang, Burnette, Moleski, &Vachon, 1974; Malnar & Vodvarka, 1992). Influences include B. F. Skinner (1971), whose idea of behavior modification through positive reinforcement is applied to designing interiors often when specific design elements such as form and material are chosen.When human and environment relationships are seen as causal in nature, knowledge claims are assembled from measurements o f those relationships. The knowledge claims, when regarded as true, guide subsequent design thinking. This appears to be part of a dominant discourse of design, known as evidence-based design. However, a limitation of this approach is that it is based entirely on what is called a priori knowledge (Amin & Cohendet, 2004; O’Brien, 2006), overlooking the subjective experiences arising within the interior space.Environment-behavior theory explains human-environment relationships as causal and these relationships are situated within essentially static physical interior attributes. It reckons, people feel well or poorly due to lighting, environment systems, color, or other physical space attributes, such as floors, ceilings, their finishes, and relatedand their objects in the space. These interior attributes “act u pon the user” appropriation (or otherwise) of the space (Dickinson & Marsden, 2009; Zeisel, 2006). Therefore, according to this theory, changing these surface treatments should “improve” the interior situation.Causal explanations do not always take into account subjective experiences. Interior spaces are locations of both aesthetic values and social constructions. Subjective experiences, affected by role, status, gender, and such other individual-level factors, also guide interactions in interior environments (Belenky, Clinchy, Goldberger, & Tarule, 1997; Code, 1991). For example, women navigate spaces differently from men. Similarly, cultural differences impose different social rules and hierarchies that influence social constructions of space and place (Ainley, 1998; Ardener, 1981; Rose, 2001; Rothschild, 1999; Spain, 1992). People also attach meanings to objects and the spaces they live in.Therefore, in the proposed theoretical framework, subjective experiences and meanings are considered salient elements. These are not captured usually (nor authentically) using empirical positivist modes of research.3.2. Beyond Static AttributesUntil recently, and in an effort to legitimize the profession, interior designers havegenerally tended to be more concerned with building professional practices, ethicalconduct, and solving problems of a pragmatic nature (Abercrombie, 1990;Hildebrandt, 2000; Malnar & Vodvarka, 1992). When professional designers askclients and the users of the spaces what they need, how they live, and observe theirsituations, they try to understand how people live and work, how they engage in socialand personal activities to be able to provide supportive and appropriately designedspaces. The spaces they design are by their very nature dynamic in that they integratepeople within changing circumstances.While some people live in the global 24x7 information communities, others carve outlives on the fringes just to survive. Different people can experience the same space ashostile or friendly, as virtual or physical, or as a place for personal or social needs. Itis difficult to reduce these experiences to codified statistical numbers, as differentsubjective voices account for different ways of living, working, or playing in differentcultures and societies.Accordingly, in the proposed theoretical framework, spaces are not characterizedentirely through static attributes. Spaces are seen as dynamic contexts and products ofsocial interactions.3.3. Beyond Codified Information-reduced-to-information,” which refers to aThere has been a c riticism of “knowledgelimited vision of knowledge:1.the vision of knowledge as a simple stock resulting from the accumulation ofinformation in a linear process;2.the hypothesis that any form of knowledge can be made codifiable;3.the vision that knowledge is limited to individuals;4.the idea that knowledge is limited to something that people “possess” (Am& Cohendet, 2004, p. 17)By contrast, knowledge derived through experience and tacit understanding would bebased on what is experienced in real time. This form of knowledge situates designthinking within the context of use, such as the ways in which people actuallyappropriate spaces. Forms of tacit knowledge such as lived experiences run up againstevidence-based positivist research norms (Storkerson, 2010).In the proposed theoretical framework, a more extended notion of knowledge isadopted. In this extended notion, knowledge relevant to design is not limited tocodifiable information alone, but also includes the effect of comparing and combining subjective experiences in real time. This notion of knowledge will allow the designerto consider a wider variety of inputs while designing interior spaces, such as perceptions, experiences, and conversations.3.4. Emerging Paradigms of SpacePeople are finding themselves living and working very differently than even 5-10years ago. In this technologically and digitally enhanced world, objects are transitory, spaces c an be virtual or physical, while communication and interactions are variedand changing constantly, all affecting social and political norms (Abrahamson, Meehan, & Samuel, 1998; Dent, 1998; Dholakia & Zwick, 2003; Margolin & Buchanan, 2000). Spaces are no longer designed for one specific use, nor as the determinant of a particular set of activities. As Poldma and Wesolkowska (2005) statein their comparison of the old and new paradigms of living/working:[T]he subject perceives place as a primary mode of identification against “others” such as the environment, people or work processes. People worked in the office, livedat home and enjoyed leisure time in the movie theatre. In the new paradigms of livingand working, both experiences a nd tasks overlap one another constantly. . . . lived experiences overlap and intersect the boundaries of space and place/time. Realities are defined in practice and practice is defined in space, one that can be local or global, imagined or actual, and which often cuts across boundaries physical/virtual. (Poldma& Wesolkowska, 2005, p. 56)In this type of paradigm, the process of designing spaces needs to work with a widerset of inputs. Interior design approaches n eed to “consider all the senses, a nd howthese simultaneously experience visual space and respond to sensory cues while engaged in social human contact” (Poldma & Wesolkowska, 2005, p. 57). The user becomes a key organic part of the design process. Their activities define the space.In the age of mobile communication, we have thus moved from spatialized time, where the nature of the activities was predominantly governed by the structuring logicof the place (one reads in a library, one studies in a classroom, one eats in a restaurant, etc.) totemporalized space, where the nature of the activities of its inhabitants definethe place (a restaurant becomes a playground, a coffee house becomes an electronic mall, a train becomes a work station, etc.). (Dholakia & Zwick, 2003, pp. 11-12)People’s activities and experiences are increasingly defining what spaces are and how spaces evolve in response to changing activities and experiences. Design researchersneed an approach that allows them to harness users’ subjective experiences towards the creation of new spatial forms.The proposed theoretical framework responds to this requirement. It opens up thedesign process to the subjective and experiential inputs of the various users and stakeholders, based on their perceptions. This process of sharing becomes part andparcel of the process of transformation of the space during its use.This theoretical framework can be illustrated using a case study example to show howresearch informs design and how design informs research, both driven by users’ experiences.4. Case Study: Interior Design for an Elder Care InstitutionAn elder care institution was designed for a particular aging population. The designwas created using the best practices and knowledge sources a vailable, having beenrenovated about 2 years prior to this study. However, something was not working,because t he head nurse of the dementia unit called me and told me about how theresidents were being brought to the space and were trying to leave it, thereby rejectingthe space in that unit that had been designed for them. Both the head nurse and thestaff were perplexed. While the space was beautiful, clean, and appeared to suit itsintended purpose, something was not working. When the staff tried to bring theresidents to the designated room for specific activities, they promptly began to leave,even though many were wheelchair bound. I was asked to investigate the reasons whyand I promptly set out to create a research project to answer why the users wererejecting the seemingly beautiful and functional space designed for them.Using evidence-based procedures that were theoretically supported by a constructivistparadigm (Guba & Lincoln, 1994; Rose, 2001), the team of researchers p roceededwith a three-phase study. In the first phase, existing physical conditions were recordedand the perception of staff and volunteers were collected. Particular attention was paidto the users--elderly residents with dementia. The unit programs, activities, and familysocial situations were also assessed. Dialogues were arranged with all the stakeholdersand users.Using a combination of observation and visual qualitative data, the issues wererecorded, verified, and analyzed. The data consisted of the physical characteristics andspatial elements, as well as the observations and narratives from the conversations the researchers had with various stakeholders, including users, volunteers, nursing staff,and families of the residents.The data were documented and analyzed using interpretive analytic methods that provide trustworthiness through triangulation (Clandinin & Connelly, 2000; Creswell, 1998; Rose, 2001). This included an analysis of the observations of the physical space, responses from stakeholders, and activities within the spaces.Epistemologically both the research and design processes are considered to be constructivist in essence (Creswell, 1998; Vaikla-Poldma, 2003). The design researchers sought to understand user perceptions, dynamic social activities, and the spatial capacity to support these different activities, and identified the multiple contexts that were revealed (Poldma, 2006).The issues raised by the users included a lack of social space for family members to meet, poor ventilation and lighting affecting the visibility and comfort within the space, and an inability to sense the space due to poor color choice for the older residents, who did not “see” the space as a place where they would want to be. The corridors felt like an “abyss” and the space itself was cold and institutional in feel. Another interesting issue emerging from the stakeholders was their diverse perceptions both of the use of the space and of the activities that might unfold. The perspectives varied widely depending on whether one was a resident, volunteer, doctor, nurse, or caregiver.In the second phase of the study, and once recommendations have been made and accepted b y the stakeholders, minor design revisions were proposed and then some renovations were carried out. The recommendations included adjustments in lightingand spatial zoning to rectify the problems identified as leading to the rejection of spaces by the residents. New spaces were created to incorporate social program activities, based on the recommendations by both researchers and care-givers working together.The third phase of the study consisted of re-evaluating the success of the changes andthe responses of all the stakeholders were documented. Overall, the changes improved responses and social activities that satisfied the nursing staff, residents, and familiesalike (Poldma, 2006). Families were delighted that they were able to socialize withability totheir loved ones, while the staff noticed improvements in the residents’ navigate the spaces with reduced dependence on the staff for their daily activities. Inall the three phases of the study, conversations and dialogues contributed to the movement of the study from evaluation to implementation of changes a nd again to evaluation of the ideas to improve the space.ReferencesAbercrombie, S. (1990). A philosophy of interior design. New York: Harper & Row. Abrahamson, V., Meehan, M., & Samuel, L. (1998). The future ain't what it used to be. New York: Riverhead/Penguin.Ainley, R. (Ed.). (1998). New frontiers of space, bodies and gender. London: Routledge.Amin, A., & Cohendet, P. (2004). Architectures of knowledge: Firms, capabilities and communities. Oxford, UK: Oxford University Press.Ardener, S. (Ed.). (1981). Women and space: Ground rules and social maps. New York: St Martin's.Bachelard, G. (1969). T he poetics of space. Boston: Beacon.Belenky, M. F., Clinchy, B. M., Goldberger, N. R., & Tarule, J. M. (1997). Women's ways of knowing: The development of self, voice and mind. New York: Basic. Botti-Salitsky, R. M. (2009). Programming and research skills and techniques for interior designers. New York: Fairchild.Clandinin, D. J., & Connelly, F. M. (2000). Narrative inquiry: Experience and story in qualitative research. San Francisco: Jossey-Bass.将内部空间:通过设计研究,丰富主观经验狄儿波德玛工业设计学院,蒙特利尔大学C 6128,succursale中心城,蒙特利尔,魁北克H3T 1B9,加拿大摘要本文探讨的生活经验的隐性知识和在这种形式知识中涉及的设计研究。

智能型住宅安防报警系统外文文献及翻译

智能型住宅安防报警系统外文文献及翻译

Automatic fire alarm system based on MCUZhang Kun,Hu Shunbin College of Mechanical and Electrical Engineering Agricultural UniversityofHebeiBaoding,071001,ChinaE-mailaddress:********************** om Li Jinfang Baoding Baoling Transformer Co. Ltd. Tianwei Group Baoding, 071056,ChinaE-mailaddress:****************Abstract:The paper introduced an automatic warehouse fire a1arm system based on MCU. The system was mainly made up of ATmega16, temperature sensors, smoke sensors, and EX-1 auto dialed alarm module. In the system, temperature signals were transformed to serial data, and smoke signals were transformed to voltage signals. All the data were processed by MCU. When the surveillance system checked fire in warehouse, alarm signal was turn on, meanwhile the messages were transmitted to managers through EX-1. Application of the system was convenient to deal with fire in-time, efficiently by warehouse manager.Keywords: fire alarm transducer;smoke sensor system;ATmega16;temperature transducer;smoke sensorI. INTRODUCTIONAutomatic fire alarm control system has experienced a process from the simple to the complex and intelligence system increasingly in China. The characteristic is automatic fire detection and alarm technology has a great progress along with computing and detection technology development. At present, automatic fire alarm control system was used in bulk storage plant, shopping malls, high-level office buildings, hotels and other places. They were used in a number of collections focused on one area of intelligent alarm control method with higher levels of bus-type alarm control system, and in some residential areas and commercial buildings were installed by a single automatic fire alarm detection device. These alarm detection devices fail to report sometimes, or misinformation. Its reliability is not high because of using single sensor. Therefore, it is needed to develop a simple structure, low cost, high reliability, fast responding, automatic fire detection system.II. GENERAL PROJECT OF THE SYSTEMThe hardware block diagram shown in Figure 1, hardware by temperature sensors,smoke sensors, signal processing module, MCU modules and automatic alarm module. Non electrical quantity that is through the sensing element sensors (smoke sensors and temperature sensors) will be on-site temperature, smoke and other non-electrical signal into an electrical signal, as well as signals for signal processing to convert analog quantity to digital quantity. Finally, the sampled data were processed and compared with the limits by MCU system. This system can produce local and remote auto-alarm signals.Figure 1. Automatic fire alarm system structureⅢ. THE HARDWARE COMPONENTSA. ATmega16The system used by the U.S. Atmel’s micro controller ATmega16 micro controller. ATmega16 is based on the AVR RISC architecture to enhance low-power 8-bit CMOS micro controller. Because of its advanced instruction set and a single clock cycle instruction execution time, ATmega16 data throughput of up to 1 MIPS / MHz. Thereby mitigate the system in the power and the contradiction between the processing rate. ATmega16 has the following characteristics: 16K bytes in-system programmable Flash (with the ability to read and write at the same time, that is, RWW), 512 bytes EEPROM, 1K bytes SRAM, 32 general-purpose I / O port lines, 32 general-purpose working registers, for the JTAG boundary scan interface, support the on-chip debugging andprogramming, 3 has a more flexible mode of timer / counter (T / C), chip internal / external interrupts, programmable serial USART, there are initial conditions detector universal serial interface, 8-channel 10-bit with optional differential input stage programmable gain (TQFP package) of the ADC, with on-chip oscillator of programmable watchdog timer, an SPI serial port, as well as six can be selected by software power-saving mode.The chip is based on Atmel high-density nonvolatile memory technology production on-chip ISP Flash allows the program memory through the ISP serial interface or a general-purpose programmer for programming; you can also run on the AVR core among the bootstrap to program. Boot program can use any interface to download the application to the Flash memory area (Application Flash Memory). Application of Flash storage area is updated when the boot Flash area (Boot Flash Memory) program continues to run, RWW operation achieved. ATmega16 to become a powerful micro controller by 8-bit RISC CPU and the system programmable flash in a single chip, for many embedded control applications provides a flexible and cost-effective solution. ATmega16 has a set of programming and system development tools, including: C language compiler, macro assembler, program debugger / software emulator, emulators and evaluation boards.B. Temperature SensorTemperature sensor manufactured by DALLAS Semiconductor DS18B20-type single intelligence temperature sensor, its performance features include:1)This sensor have single-bus-specific technology, either through the serial port cable also through other I / O port lines and computer interfaces,without going through other conversion circuits Direct output measured temperature value (9-bit binary number, with sign bit).2) Temperature range is -55 ℃ ~ +125 ℃, measurement resolution of 0. 0625 ℃.3) Containing 64 as amended through the laser-read-only memory ROM.4) Fit a variety of SCM or system machine.5) Users can set separate ways each temperature upper and lower limit.6) Includes parasitic power.DS18B20 and the main chip connection diagram shown in Figure 2: DS18B20 number one pin grounded, then on the 3rd pin high and the 2nd pin then a 5. 1K of the pull-up resistor, at the same time received a single output signal of the PD0 pin. Pull-up is to pull the uncertainty signal through a resistor embedded in the high places, resistanceat the same time current-limited . Program from the DQ pin in high impedance state to ensure that the beginning, so that you can pull on the pull-up resistor to the high DQ. At the same time the main chip also can be an external site alarm buzzer.Figure 2. ds18b20 and the main chip connection diagram.C. Smoke Monitoring ModuleSmoke sensors choose HIS-07 ion smoke detectors when the flow through the inside and outside the ionization chamber ionization electron flow is unbalanced, collector charges current until the ionization balance. In a smoke-free or non-combustion, the collector being subject to the impact ionization current statistical fluctuation, the potential to maintain a balance. Ionization current have impact when the smoke into the ionization chamber, easily into the ionization chamber smoke outside than inside the ionization chamber of the affected, ionization current decline in and collector to re-charge until the new equilibrium potential, this potential change can be used to trigger the alarm circuit. Technical parameters such as Table 1.TABLE I.HIS-07 ION SMOKE SENSOR THCHNICAL DATASmoke signals are processed on the chip of choice is the Motorola company’s MC14468, MC14468 for DIP 16-pin package, contain oscillator, timer, latch, alarm control logic circuit, high input impedance comparator etc. When not detected smoke, MC14468 internal oscillator that oscillation cycle 1.67s. Each 1.67s cycle the internal power supply is provided to the work of the entire chip. It’s all kept det ect any smoke in addition to LED flashes, battery voltage alarm and smoke alarm. The oscillator oscillation period becomes 40ms when the MC14448 Once detection smoke, this time piezoelectric buzzer driving circuit to start oscillation, start to be able to output to maintain the high 160 ms after the cessation of 80ms.Continued during the detection of smoke cessation of changes, at this time if not detected smoke beeper will not be issued a warning sound.In figure 3, the MC14468 1 pin joint PD1 pin of SCM when the ion chamber of the ion current as the scene of smoke detection and change, voltage change generation a weak side-spread seized 15, by the MC14468 internal logic processing circuit processing, the smoke is detected by 1 pin-out high micro controller for processing. 13-pin then slide rheostat is set to facilitate detection sensitivity when the led flashes and the buzzer sounded a piercing sound of an audio alarm when the department has a fire alarm signal-based.In figure 3, the MC14468 1 pin joint PD1 pin of SCM when the ion chamber of the ion current as the scene of smoke detection and change, voltage change generation a weak side-spread seized 15, by the MC14468 internal logic processing circuit processing, the smoke is detected by 1 pin-out high micro controller for processing. 13-pin then slide rheostat is set to facilitate detection sensitivity when the led flashes and the buzzer sounded a piercing sound of an audio alarm when the department has a fire alarm signal-based.Figure 3.Smoke detection circuitD. Auto-dial alarm moduleDial-up alarm module choices are the EX-1 dial-up module is a DTMF signal receiving, storing, and sending as integration communications circuits. Module built-in micro controller and dial-up management process can provide users with a variety of signal input and output ports, in security alarm, signal acquisition, automatic control, remote communication and information transmission areas such as flexible application. 5 groups can have cell phone or group of seven local telephone numbers are stored, power-down is not lost; Telephone line status detection, automatic fault signal output ;Telephone / external switching two kinds of dial-up state control; Trigger time, nine times loop dial preset numbers; To work independently, independent dial-up, do not rely on telephone and other external devices.EX-1 wiring diagram shown in figure 4, The PD4 pin to connect the main chip HTO , the module began to dial alarm when PD4 output high level signal, PD5 connection ON / OFF pin input is high level signal to open the dial-up settings, the inputdoes not work when this pin become low, ERR pin connected to PD6 pin of MCU, PD6 output 1 begun to test whether the telephone line failure, READY pin connect MCU PD7 pin detection and alarm is completed, the alarm is end when PD7 pin is high .Figure 4. EX-1 wiring diagramIV. SOFIW AREDESIGNFigure 5. The main program flow chartBecause in the early stages of fires and the smoldering phase will produce a large number of aerosol particles and smoke particles .In the stage of incipient fire substances in the combustion process produces a lot of heat, so should make the smoke sensor and temperature sensor used in conjunction, first with the smoke sensor detects whether there is smoke generation, then the temperature sensor detects the temperature, temperature sensor alarm value is set to 50 degrees. When the smoke is detected R0 is 1, not smoke R0 is 0. Then test the temperature when the temperature reaches the value of seasonal early warning R1 is 1, the value of seasonal temperature not to reach an early warning R1 to 0, at this time compared to the R0 and R1 is equal to the main chip when the dial-up alarm, if not equal is not to alarm re-tested. This smoke sensor and temperature sensor used in conjunction with greatly improved the reliability of detection to prevent the omission of false positives, program flow diagram shown in Figure 5.V. CONCLUSIONBy the cooperation of using of temperature and smoke sensors, through detecting the temperature and smoke on-site, the automatic alarm system could find any fire in warehouse and send the message to managers of warehouse in the early time by the form of short messages. So its application could greatly reduce fire losses and enhanced the safe reliability of warehouse more than the former single equipment of fire alarm, and prevent failing of reporting and misinformation. The system has a high reliability, low price and high sensitivity.REFERENCES[1] Shunning Miao,Guangming Xiong,Yongping Li etc.Automatic Fire Alarm System Design and Research, Equipment Manufacturing Technology, 2006(2), P909.[2] Liang Ge, Qi Cong. Intelligent Analysis of office building fire.[3] Ti Zhou. Building Fire System Design, Yunnan Construction,2008(6).[4] Honeywell (Honeywel1)'s construction equipment Monitoring System, Intelligent Building and City Information, 2008(4).[5] Derek Clements-Croome, Intelligent buildings: design, management and operation, Thomas Telford Publishing, 2004.[6] Zhang Huazhong, Commanding System of Fire Automatic Alarm and Fire Control Linkage based on Internet, Computer Engineering, 2001.[7] ANSI, Radiant Energy-Sensing Fire Detectors for Automatic Fire Alarm Signaling, US: ANSI/FMRC FM3260-2004.基于单片机的火灾自动报警系统张坤,胡顺滨机电工程学院河北农业大学,保定,071001,中国的电子邮件地址:************************李锦芳保定宝灵变压器有限公司保定天威集团,071056,中国的电子邮件地址:****************摘要:本文介绍了基于单片机的自动仓库火灾自动报警系统。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Increasing an individual’s quality of life via their intelligent home The hypothesis of this project is: can an individual’s quality of life be increased by integrating “intelligent technology” into their home environment. This hypothesis is very broad, and hence the researchers will investigate it with regard to various, potentially over-lapping, sub-sections of the population. In particular, the project will focus on sub-sections with health-care needs, because it is believed that these sub-sections will receive the greatest benefit from this enhanced approach to housing. Two research questions flow from this hypothesis: what are the health-care issues that could be improved via “intelligent housing”, and what are the technological issues needing to be so lved to allow “intelligent housing” to be constructed? While a small number of initiatives exist, outside Canada, which claim to investigate this area, none has the global vision of this area. Work tends to be in small areas with only a limited idea of how the individual pieces contribute towards a greater goal. This project has a very strong sense of what it is trying to attempt, and believes that without this global direction the other initiatives will fail to address the large important issues described within various parts of this proposal, and that with the correct global direction the sum of the parts will produce much greater rewards than the individual components. This new field has many parallels with the field of business process engineering, where many products fail due to only considering a sub-set of the issues, typically the technology subset. Successful projects and implementations only started flow when people started to realize that a holistic approach was essential. This holistic requirement also applies to the field of “smart housing”; if we genuinely want it to have benefit to the community rather than just technological interest. Having said this, much of the work outlined below is extremely important and contains a great deal of novelty within their individual topics.Health-Care and Supportive housing:To date, there has been little coordinated research on how “smart house” technologies can assist frail seniors in remaining at home, and/or reduce the costs experienced by their informal caregivers. Thus, the purpose of the proposed research is to determine the usefulness of a variety of residential technologies in helpingseniors maintain their independence and in helping caregivers sustain their caring activities.The overall design of the research is to focus on two groups of seniors. The first is seniors who are being discharged from an acute care setting with the potential for reduced ability to remain independent. An example is seniors who have had hip replacement surgery. This group may benefit from technologies that would help them become adapted to their reduced mobility. The second is seniors who have a chronic health problem such as dementia and who are receiving assistance from an informal caregiver living at a distance. Informal caregivers living at a distance from the cared-for senior are at high risk of caregiver burnout. Monitoring the cared-for senior for health and safety is one of the important tasks done by such caregivers. Devices such as floor sensors (to determine whether the senior has fallen) and access controls to ensure safety from intruders or to indicate elopement by a senior with dementia could reduce caregiver time spent commuting to monitor the senior.For both samples, trials would consist of extended periods of residence within the ‘smart house’. Samples of seniors being discharged from acute care would be recruited from acute care hospitals. Samples of seniors being cared for by informal caregivers at a distance could be recruited through dementia diagnosis clinics or through request from caregivers for respite.Limited amounts of clinical and health service research has been conducted upon seniors (with complex health problems) in controlled environments such as that represented by the “smart house”. For ex ample, it is known that night vision of the aged is poor but there is very little information regarding the optimum level of lighting after wakening or for night activities. Falling is a major issue for older persons; and it results in injuries, disabilities and additional health care costs. For those with dementing illnesses, safety is the key issue during performance of the activities of daily living (ADL). It is vital for us to be able to monitor where patients would fall during ADL. Patients and caregivers activities would be monitored and data will be collected in the following conditions.Projects would concentrate on sub-populations, with a view to collecting scientific data about their conditions and the impact of technology upon their lifestyles. For example:Persons with stable chronic disability following a stroke and their caregivers: to research optimum models, types and location of various sensors for such patients (these patients may have neglect, hemiplegia, aphasia and judgment problems); to research pattern of movements during the ambulation, use of wheel chairs or canes on various type of floor material; to research caregivers support through e-health technology; to monitor frequencies and location of the falls; to evaluate the value of smart appliances for stroke patients and caregivers; to evaluate information and communication technology set up for Tele-homecare; to evaluate technology interface for Tele-homecare staff and clients; to evaluate the most effective way of lighting the various part of the house; to modify or develop new technology to enhance comfort and convenience of stroke patients and caregivers; to evaluate the value of surveillance systems in assisting caregivers.Persons with Alzheimer’s disease and their caregivers: t o evaluate the effect of smart house (unfamiliar environment) on their ability to conduct self-care with and without prompting; to evaluate their ability to use unfamiliar equipment in the smart house; to evaluate and monitor persons with Alzheimer’s disea se movement pattern; to evaluate and monitor falls or wandering; to evaluate the type and model of sensors to monitor patients; to evaluate the effect of wall color for patients and care givers; to evaluate the value of proper lighting.Technology - Ubiquitous Computing:The ubiquitous computing infrastructure is viewed as the backbone of the “intelligence” within the house. In common with all ubiquitous computing systems, the primary components with this system will be: the array of sensors, the communication infrastructure and the software control (based upon software agents) infrastructure. Again, it is considered essential that this topic is investigated holistically.Sensor design: The focus of research here will be development of (micro)-sensors and sensor arrays using smart materials, e.g. piezoelectric materials, magneto strictive materials and shape memory alloys (SMAs). In particular, SMAs are a class of smart materials that are attractive candidates for sensing and actuatingapplications primarily because of their extraordinarily high work output/volume ratio compared to other smart materials. SMAs undergo a solid-solid phase transformation when subjected to an appropriate regime of mechanical and thermal load, resulting in a macroscopic change in dimensions and shape; this change is recoverable by reversing the thermo mechanical loading and is known as a one-way shape memory effect. Due to this material feature, SMAs can be used as both a sensor and an actuator.A very recent development is an effort to incorporate SMAs in micro-electromechanical systems (MEMS) so that these materials can be used as integral parts of micro-sensors and actuators.MEMS are an area of activity where some of the technology is mature enough for possible commercial applications to emerge. Some examples are micro-chemical analyzers, humidity and pressure sensors, MEMS for flow control, synthetic jet actuators and optical MEMS (for the next generation internet). Incorporating SMAs in MEMS is a relatively new effort in the research community; to the best of our knowledge, only one group (Prof. Greg Carman, Mechanical Engineering, University of California, Los Angeles) has successfully demonstrated the dynamic properties of SMA-based MEMS. Here, the focus will be to harness the sensing and actuation capabilities of smart materials to design and fabricate useful and economically viable micro-sensors and actuators.Communications: Construction and use of an “intelligent house” offers extensive opportunities to analyze and verify the operation of wireless and wired home-based communication services. While some of these are already widely explored, many of the issues have received little or no attention. It is proposed to investigate the following issues:Measurement of channel statistics in a residential environment: knowledge of the indoor wireless channel statistics is critical for enabling the design of efficient transmitters and receivers, as well as determining appropriate levels of signal power, data transfer rates, modulation techniques, and error control codes for the wireless links. Interference, channel distortion, and spectral limitations that arises as a result of equipment for the disabled (wheelchairs, IV stands, monitoring equipment, etc.) is of particular interest.Design, analysis, and verification of enhanced antennas for indoor wireless communications. Indoor wireless communications present the need for compact and rugged antennas. New antenna designs, optimized for desired data rates, frequency of operation, and spatial requirements, could be considered.Verification and analysis of operation of indoor wireless networks: wireless networking standards for home automation have recently been commercialized. Integration of one or more of these systems into the smart house would provide the opportunity to verify the operation of these systems, examine their limitations, and determine whether the standards are over-designed to meet typical requirements.Determination of effective communications wiring plans for “smart homes.”: there exist performance/cost tradeoffs regarding wired and wireless infrastructure. Measurement and analysis of various wireless network configurations will allow for determination of appropriate network designs.Consideration of coordinating indoor communication systems with larger-scale communication systems: indoor wireless networks are local to the vicinity of the residence. There exist broader-scale networks, such as the cellular telephone network, fixed wireless networks, and satellite-based communication networks. The viability and usefulness of compatibility between these services for the purposes of health-care monitoring, the tracking of dementia patients, etc needs to be considered.Software Agents and their Engineering: An embedded-agent can be considered the equivalent of supplying a friendly expert with a product. Embedded-agents for Intelligent Buildings pose a number of challenges both at the level of the design methodology as well as the resulting detailed implementation. Projects in this area will include:Architectures for large-scale agent systems for human inhabited environment: successful deployment of agent technology in residential/extended care environments requires the design of new architectures for these systems. A suitable architecture should be simple and flexible to provide efficient agent operation in real time. At the same time, it should be hierarchical and rigid to allow enforcement of rules and restrictions ensuring safety of the inhabitants of the building system. These contradictory requirements have to be resolved by designing a new architecture thatwill be shared by all agents in the system.Robust Decision and Control Structures for Learning Agents: to achieve life-long learning abilities, the agents need to be equipped with powerful mechanisms for learning and adaptation. Isolated use of some traditional learning systems is not possible due to high-expected lifespan of these agents. We intend to develop hybrid learning systems combining several learning and representation techniques in an emergent fashion. Such systems will apply different approaches based on their own maturity and on the amount of change necessary to adapt to a new situation or learn new behaviors. To cope with high levels of non-determinism (from such sources as interaction with unpredictable human users), robust behaviors will be designed and implemented capable of dealing with different types of uncertainty (e.g. probabilistic and fuzzy uncertainty) using advanced techniques for sensory and data fusion, and inference mechanisms based on techniques of computational intelligence.Automatic modeling of real-world objects, including individual householders: The problems here are: “the locating and extracting” of information essential fo r representation of personality and habits of an individual; development of systems that “follow and adopt to” individual’s mood and behavior. The solutions, based on data mining and evolutionary techniques, will utilize: (1) clustering methods, classification tress and association discovery techniques for the classification and partition of important relationships among different attributes for various features belonging to an individual, this is an essential element in finding behavioral patterns of an individual; and (2) neuro-fuzzy and rule-based systems with learning and adaptation capabilities used to develop models of an individual’s characteristics, this is essential for estimation and prediction of potential activities and forward planning.Investigation of framework characteristics for ubiquitous computing: Consider distributed and internet-based systems, which perhaps have the most in common with ubiquitous computing, here again, the largest impact is not from specific software engineering process es, but is from available software frameworks or ‘toolkits’, which allow the rapid construction and deployment of many of the systems in these areas. Hence, it is proposed that the construction of the ubiquitous computing infrastructure for the “smart house” should also be utilized as a software engineering study.Researchers would start by visiting the few genuine ubiquitous computing systems in existence today, to try to build up an initial picture of the functionality of the framework. (This approach has obviously parallels with the approach of Gamma, Helm, Johnson and Vlissides deployed for their groundbreaking work on “design patterns”. Unfortunately, in comparison to their work, the sample size here will be extremely small, and hence, additional work will be required to produce reliable answers.) This initial framework will subsequently be used as the basis of the smart house’s software system. Undoubtedly, this initial framework will substantially evolve during the construction of the system, as the requirements of ubiquitous computing environment unfold. It is believed that such close involvement in the construction of a system is a necessary component in producing a truly useful and reliable artifact. By the end of the construction phase, it is expected to produce a stable framework, which can demonstrate that a large number of essential characteristics (or patterns) have been found for ubiquitous computing.Validation and Verification (V&V) issues for ubiquitous computing: it is hoped that the house will provide a test-bed for investigating validation and verification (V&V) issues for ubiquitous computing. The house will be used as an assessment vehicle to determine which, if any, V&V techniques, tools or approaches are useful within this environment. Further, it is planned to make this trial facility available to researchers worldwide to increase the use of this vehicle. In the long-term, it is expected that the facilities offered by this infrastructure will evolve into an internationally recognized “benchmarking” site for V&V activities in ubiquitous computing.Other technological areas:The project also plans to investigate a number of additional areas, such as lighting systems, security systems, heating, ventilation and air conditioning, etc. For example, with regard to energy efficiency, the project currently anticipates undertaking two studies:The Determination of the effectiveness of insulating shutters: Exterior insulating shutters over time are not effective because of sealing problems. Interior shutters are superior and could be used to help reduce heat losses. However, their movement andpositioning needs appropriate control to prevent window breakage due to thermal shock. The initiation of an opening or closing cycle would be based on measured exterior light levels; current internal heating levels; current and expected use of the house by the current inhabitants, etc.A comparison of energy generation alternatives: The energy use patterns can easily be monitored by instrumenting each appliance. Natural gas and electricity are natural choices for the main energy supply. The conversion of the chemical energy in the fuel to heat space and warm water can be done by conventional means or by use of a total energy system such as a V olvo Penta system. With this system, the fuel is used to power a small internal combustion engine, which in turn drives a generator for electrical energy production. Waste heat from the coolant and the exhaust are used to heat water for domestic use and space heating. Excess electricity is fed back into the power grid or stored in batteries. At a future date, it is planned to substitute a fuel cell for the total energy system allowing for a direct comparison of the performance of two advanced systems.Intelligent architecture: user interface design to elicit knowledge modelsMuch of the difficulty in architectural design is in integrating and making explicit the knowledge of the many converging disciplines (engineering, sociology, ergonomic sand psychology, to name a few), the building requirements from many view points, and to model the complex system interactions. The many roles of the architect simply compound this. This paper describes a system currently under development—a 3Ddesign medium and intelligent analysis tool, to help elicit and make explicit these requirements. The building model is used to encapsulate information throughout the building lifecycle, from inception and master planning to construction and ‘lived-in’ use. From the tight relationship between material behaviour of the model, function analysis and visual feedback, the aim is to help in the resolution of functional needs, so that the building meets not only the aims of the architect, but the needs of the inhabitants, users and environment.The Problem of Designing the Built Environment:It is often said that architecture is the mother of the arts since it embodies all the techniques of painting: line, colour, texture and tone, as well as those of sculpture:shape, volume, light and shadow, and the changing relative position of the viewer, and adds to these the way that people inhabit and move through its space to produce—at its best—a spectacle reminiscent of choreography or theatre. As with all the arts, architecture is subject to personal critical taste and yet architecture is also a public art, in that people are constrained to use it. In this it goes beyond the other arts and is called on to function, to modify the climate, provide shelter, and to subdivide and structure space into a pattern that somehow fits the needs of social groups or organizations and cultures. Whilst architecture may be commissioned in part as a cultural or aesthetic expression, it is almost always required to fulfill a comprehensive programme of social and environmental needs.This requirement to function gives rise to three related problems that characterize the design and use of the built environment. The first depends on the difference between explicit knowledge—that of which we are at least conscious and may even have a scientific or principled understanding—and implicit knowledge, which, like knowing your mother tongue, can be applied without thinking. The functional programmes buildings are required to fulfill are largely social, and are based on implicit rather than explicit bodies of knowledge. The knowledge we exploit when we use the built environment is almost entirely applied unconsciously. We don’t have to think about buildings or cities to use them; in fact, when we become aware of it the built environment is often held to have failed. Think of the need for yellow lines to help people find their way around the Barbican complex in the City of London, or the calls from tenants to ‘string up the architects’ when housing estates turn out to be social disasters.The second is a problem of complexity. The problem is that buildings need to function in so many different ways. They are spatial and social, they function in terms of thermal environment, light and acoustics, they use energy and affect people’s health, they need to be constructed and are made of physical components that can degrade and need to be maintained. On top of all this they have an aesthetic and cultural role, as well as being financial investments and playing an important role in the economy. Almost all of these factors are interactive—decisions taken for structural reasons have impacts onenvironment or cost—but are often relatively independent in terms of the domains of knowledge that need to be applied. This gives rise to a complex design problem in which everything knocks on to everything else, and in which no single person has a grasp of all the domains of knowledge required for its resolution. Even when the knowledge that needs to be applied is relatively explicit—as for instance in structural calculations, or thoseconcerning thermal performance—the complex interactive nature of buildings creates a situation in which it is only through a team approach that design can be carried out, with all that this entails for problems of information transfer and breakdowns in understanding.The third is the problem of ‘briefing’. It is a characteristic of building projects that buildings tend not to be something that people buy ‘off-the-shelf’. Often the functional programme is not even explicit at the outset. One might characterise the process that actually takes place by saying that the design and the brief ‘co-evolve’. As a project moves from inception to full s pecification both the requirements and the design become more and more concrete through an iterative process in which design of the physical form and the requirements that it is expected to fulfill both develop at once. Feasible designs are evaluated according to what they provide, and designers try to develop a design that matches the client’s requirements. Eventually, it is to be hoped, the two meet with the textual description of what is required and the physical description of the building that will provide it more or less tying together as the brief becomes a part of the contractual documentation that theclient signs up to.These three problems compound themselves in a number of ways. Since many of the core objectives of a client organization rest on implicit knowledge—the need for a building to foster communication and innovation amongst its workers for instance—it is all too easy for them to be lost to sight against the more explicitly stated requirements such as those concerned with cost, environmental performance or statutory regulations. The result is that some of the more important aspects of the functional programme can lose out to less important but better understood issues. Thiscan be compounded by the approach that designers take in order to control them complexity of projects. All too often the temptation is to wait until the general layout of a building is ‘fixed’ before calling in the domain experts. The result is that functional design has to resort to retrofitting to resolve problems caused by the strategic plan.The Intelligent Architecture project is investigating the use of a single unified digital model of the building to help resolve these problems by bringing greater intelligence to bear at the earliest ‘form generating’ phase of the design process when the client’s requirements are still being specified and when both physical design and client expectations are most easily modified. The aim is to help narrow the gap between what clients hope to obtain and what they eventually receive from a building project.The strategy is simple. By capturing representations of the building as a physical and spatial system, and using these to bring domain knowledge to bear on a design at its earliest stages, it is hoped that some of the main conflicts that lead to sub- optimal designs can be avoided. By linking between textual schedules of requirements and the physical/spatial model it is intended to ease the reconciliation of the brief and the design, and help the two to co-evolve. By making available some of the latest ‘intelligent’ techniques for modelling spatial systems in the built environment, it is hoped to help put more of the implicit knowledge on an equal footing with explicit knowledge, and by using graphical feedback about functional outcomes where explicit knowledge exists, to bring these within the realm of intuitive application by designers.The Workbench:In order to do this, Intelligent Architecture has developed Pangea. Pangea has been designed as a general-purpose environment for intelligent 3D modelling—it does not pre-suppose a particular way of working, a particular design solution, or even a particular application domain. Several features make this possible.Worlds can be constructed from 3D and 2D primitives (including blocks, spheres, irregular prisms and deformable surfaces), which can represent real-world physical objects, or encapsulate some kind of abstract behaviour. The 3D editor provides adirect and simple interface for manipulating objects—to position, reshape, rotate and rework. All objects, both physical and abstract, have an internal state (defined by attributes), and behaviour, rules and constraints (in terms of a high-level-language ‘script’). Attributes can be added dynamically, making it possible for objects to change in nature, in response to new knowledge about them, or to a changing environment. Scripts are triggered by events, so that objects can respond and interact, as in the built environment, molecular systems, or fabric falling into folds on an irregular surface.Dynamic linking allows Pangea’s functionality to be extended to include standard ‘off-the-peg’ software tools —spreadsheets, statistical analysis applications, graphing packages and domain-specific analysis software, such as finite element analysis for air- flow modelling. The ‘intelligent toolkit’ includes neural networks [Koho89] [Wass89], genetic algorithms [Gold89] [Holl75] and other stochastic search techniques [KiDe95], together with a rule- based and fuzzy logic system [Zade84]. The intelligent tools are objects, just like the normal 3D primitives: they have 3D presence and can interact with other 3D objects. A natural consequence of this design is easy ‘hybridisability’ of techniques, widely considered as vital to the success of intelligent techniques in solving realistically complex problems [GoKh95]. This infrastructure of primitive forms, intelligent techniques and high-level language makes it possible to build applications to deal with a broad range of problems, from the generation of architectural form, spatial optimisation, object recognition and clustering, and inducing rules and patterns from raw data.Embedding Intelligence:Many consider that there is an inevitable trade-off between computers as a pure design medium, and computers with intelligence, ‘as a thinking machine’ [Rich94]. We propose here that it is possible to provide both these types of support, and allow the user to choose how best to use each, or not, according to the situation.It is essential that the creative role of the architect is preserved as he or she uses the work bench, that the architect as artist may draw manipulate the world as seen。

相关文档
最新文档