簡易檢索 / 詳目顯示

研究生: 張修偉
CHANG, Hsiu-Wei
論文名稱: 人臉辨識智慧門禁系統創新探討
Discussion on Innovation of Facial Recognition Intelligent Access Control System
指導教授: 蘇友珊
Su, Yu-Shan
學位類別: 碩士
Master
系所名稱: 工業教育學系
Department of Industrial Education
論文出版年: 2020
畢業學年度: 108
語文別: 中文
論文頁數: 131
中文關鍵詞: 人臉辨識物聯網智慧門禁
英文關鍵詞: Facial Recognition, Internet of Things, Intelligent access
DOI URL: http://doi.org/10.6345/NTNU202000943
論文種類: 學術論文
相關次數: 點閱:207下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 因為智慧安全防護逐漸受到市場的關注,加上物聯網技術日漸普及,配合生物特徵辨識中的人臉辨識發展速度下,本研究結合技術創新理論探討智慧門禁系統結合人臉辨識技術,歸納出五大構面與十八項準則,五大構面分別為人臉辨識技術、系統集成性、系統安全性、系統可靠性和系統易用性。
    本研究問卷發放對象為產業應用、學術研究和政府單位領域中,具備人臉辨識、智慧安防或系統開發專業相關背景之 22 位專家。利用多層次決策分析法探討人臉辨識智慧門禁系統創新架構中,構面之間與準則之間的重要排序性關係,藉由結論評估未來發展策略以利於智慧門禁的產業發展。
    本研究結果得知五大構面中以系統安全性為優先考量的重點屬性。五大構面底下準則之優先考量屬性分述如下: 一、人臉辨識技術構面下為正確辨識率。二、系統集成性構面下為數據集成。三、系統安全性構面下為隱私保護。四、系統可靠性構面下為平均無故障時間。五、系統易用性構面下為有效性。本研究結果可提供開發廠商或設計者研擬未來適合人臉辨識智慧門禁系統創新策略方向。

    Because smart security protection has gradually received market attention, coupled with the increasing popularity of Internet of Things technology, and the development speed of facial recognition in biometric recognition, this research combines the theory of technological innovation to explore smart access control systems combined with facial recognition technology, and summarizes five major Aspects and eighteen criteria, the five aspects are facial recognition technology, system integration, system security, system reliability and system ease of use.
    This research questionnaire is distributed to 22 experts with backgrounds in facial recognition, smart security, or system development in the fields of industrial applications, academic research, and government units. Use the multi-level decision analysis method to explore the important ordering relationship between the aspects and the criteria in the innovative architecture of the facial recognition smart access control system, and use the conclusion to evaluate future development strategies to facilitate the development of the smart access control industry.
    The results of this study have learned that the key attributes of the five dimensions that prioritize system security are considered. The priority attributes of the criteria under the five dimensions are as follows: 1. The correct recognition rate under the facial recognition technology dimension. 2. Data integration is under the system integration dimension. 3. Privacy protection under the system security aspect. 4. The system reliability is the mean time between failures. 5. The effectiveness of the system is under the aspect of ease of use. The results of this research can provide developers or designers with the direction of future innovation strategies for smart access control systems suitable for facial recognition.

    第一章 緒論 1 第一節 研究背景與動機 1 第二節 研究目的 5 第三節 研究流程 6 第二章 文獻探討 9 第一節 技術創新理論 9 第二節 物聯網發展趨勢 13 第三節 門禁訪問控制系統之變遷 27 第四節 建立人臉辨識智慧門禁系統之構面與準則 33 第三章 研究方法 57 第一節 研究對象 57 第二節 問卷內容設計 59 第三節 研究構面與準則 60 第四節 多層次決策分析法 64 第四章 資料結果分析 79 第一節 構面之量化分析 79 第二節 準則之量化分析 81 第五章 研究討論 95 第一節 主要研究發現 95 第二節 研究貢獻 97 第三節 研究限制 100 第四節 未來研究方向 101 第六章 結論與建議 103 第一節 研究結論 103 第二節 研究建議 105 參考文獻 107 附錄 123

    內政部建築研究所(2015)。智慧建築評估手冊(2016年版)。http://ib.tabc.org.tw/modules/filelist/index.php/download/get/30
    百度百科(2020)。門禁系統。取自https://baike.baidu.com/item/ACS
    沈舉三(2019)。系統整合:整什麼?合什麼?取自https://mic.iii.org.tw/industry.aspx?id=350&list=35
    柯景祥(2016)。談物聯網與其趨勢現況。取自http://www.syscom.com.tw/ePaper_New_Content.aspx?id=526&EPID=219&TableName=sgEPArticle
    訊連科技(2020)。訊連科技FaceMe® AI臉部辨識引擎NIST評比再創佳績準確度達99.7%,為台灣唯一入榜全球20強排行榜廠商。取自https://tw.cyberlink.com/twn/press_room/view_4587.html
    張志勇、陳正昌(2014)。物物相聯的龐大網路—物聯網。科學月刊,534。取自http://scimonth.blogspot.com/2014/05/blog-post_3117.html
    黃立克(2020)。性能測試中反映系統可靠性的三大指標:MTTF、MTTR、MTBF。取自https://read01.com/kz07z3n.html#.Xr0s4RMzY1I
    業界資訊(2018)。網絡系統集成主要可以分為哪幾類。取自https://kknews.cc/zh-tw/news/p9qp8j2.html
    廖家宜(2019)。提高門禁安全等級台積電、日月光紛導入人臉辨識。取自https://www.digitimes.com.tw/iot/article.asp?cat=158&id=0000561390_fp74s3dq8zbkqd17u7834
    蔡爾榮(2018)。談門禁系統智慧化的應用趨勢-嘉因資訊蔡爾榮總經理。取自http://www.ibtmag.com.tw/new_article.asp?ar_id=24827
    羅正漢(2018)。【人臉辨識用於公領域與私領域的例子越來越多】臺灣臉部辨識應用聚焦實體安防與簡化操作流程。取自https://www.ithome.com.tw/tech/121694
    幫尼資訊(2019)。門禁控制系統市場未來5年將達到121億美元。取自 https://toments.com/1654918/
    Abbas, M. S. (2016). Consistency analysis for judgment quantification in hierarchical decision model. Retrieved from https://pdxscholar.library.pdx.edu/open_access_etds/2699/
    Abbas, M. S., & Kocaoglu, D. F. (2016, September). Consistency thresholds for hierarchical decision model. Paper presented at the 2016 Portland International Conference on Management of Engineering and Technology (PICMET) (pp. 566-575). IEEE. Honolulu, USA. doi: 10.1109/PICMET.2016.7806838
    Abotah, R. (2014). Evaluation of energy policy instruments for the adoption of renewable energy: Case of wind energy in the Pacific Northwest US. Retrieved from https://pdxscholar.library.pdx.edu/open_access_etds/2128/
    Abotah, R., & Daim, T. U. (2017). Towards building a multi perspective policy development framework for transition into renewable energy. Sustainable Energy Technologies and Assessments, 21, 67-88.
    Al-Turjman, F. (2020). Intelligence and security in big 5G-oriented IoNT: An overview. Future Generation Computer Systems, 102, 357-368.
    Alsoubaie, F. (2019, August). Using the Hierarchical Decision Model (HDM) to Select a Sustainable Voice over Internet Protocol (VOIP) Provider. Paper presented at the 2019 Portland International Conference on Management of Engineering and Technology (PICMET) (pp. 1-9). IEEE. Portland, OR, USA. doi: 10.23919/PICMET.2019.8893927
    Alzahrani, S., Alzahrani, A., Dai, X., Hsu, W. C., & Tiwari, R. (2019, August). An Assessment of the Factors Influencing the Selection of the Best Carsharing Alternative in Portland Area Using Hierarchical Decision Modeling (HDM). Paper presented at the 2019 Portland International Conference on Management of Engineering and Technology (PICMET) (pp. 1-7). IEEE. Portland, OR, USA. doi: 10.23919/PICMET.2019.8893711
    Antosz, K., & Ratnayake, R. M. C. (2019). Spare parts’ criticality assessment and prioritization for enhancing manufacturing systems’ availability and reliability. Journal of Manufacturing Systems, 50, 212-225.
    Asin, A. L. I. C. I. A., & Gascon, D. A. V. I. D. (2012). 50 sensor applications for a smarter world. Libelium Comunicaciones Distribuidas, Tech. Rep, 589-594.
    Bagheri, M., Mitchelmore, S., Bamiatzi, V., & Nikolopoulos, K. (2019). Internationalization Orientation in SMEs: The Mediating Role of Technological Innovation. Journal of International Management, 25(1), 121-139.
    Balta-Ozkan, N., Amerighi, O., & Boteler, B. (2014). A comparison of consumer perceptions towards smart homes in the UK, Germany and Italy: reflections for policy and future research. Technology Analysis and Strategic Management, 26(10), 1176-1195.
    Balta-Ozkan, N., Davidson, R., Bicket, M., & Whitmarsh, L. (2013). The development of smart homes market in the UK. Energy, 60, 361-372.
    Barham, H., Giadedi, A., Gibson, E., Eljayar, A., & Daim, T. (2018). Evaluating firm’s readiness for big data adoption: a hierarchical decision model. In Proceedings of the International Annual Conference of the American Society for Engineering Management. (pp. 1-10). American Society for Engineering Management (ASEM).
    Barnett, L., Harvey, C., & Gatzidis, C. (2018). First Time User Experiences in mobile games: An evaluation of usability. Entertainment Computing, 27, 82-88.
    Bekhet, H. A., & Latif, N. W. A. (2018). The impact of technological innovation and governance institution quality on Malaysia's sustainable growth: Evidence from a dynamic relationship. Technology in Society, 54, 27-40.
    Bergek, A., Jacobsson, S., Carlsson, B., Lindmark, S., & Rickne, A. (2008). Analyzing the functional dynamics of technological innovation systems: A scheme of analysis. Research Policy, 37(3), 407-429.
    Bilal, M., Oyedele, L. O., Qadir, J., Munir, K., Ajayi, S. O., Akinade, O. O., . . . Pasha, M. (2016). Big Data in the construction industry: A review of present status, opportunities, and future trends. Advanced Engineering Informatics, 30(3), 500-521.
    Blaauw, F. J., Schenk, H. M., Jeronimus, B. F., van der Krieke, L., de Jonge, P., Aiello, M., & Emerencia, A. C. (2016). Let’s get Physiqual – An intuitive and generic method to combine sensor technology with ecological momentary assessments. Journal of Biomedical Informatics, 63, 141-149.
    Blackburn, M. R., Austin, M. A., & Coelho, M. (2018, April). Modeling and cross-domain dependability analysis of cyber-physical systems. Paper presented at the 2018 Annual IEEE International Systems Conference (SysCon) (pp. 1-8). IEEE.. BC, Canada. doi: 10.1109/SYSCON.2018.8369586
    Brachmann, S. (2015, May 10). Evolution of Technology: Bluetooth, the once and future king〔Web blog message〕. Retrieved from https://www.ipwatchdog.com/2015/05/10/evolution-of-technology-bluetooth-the-once-and-future-king/id=57473/
    Canton, J. (2015). Future smart: Managing the game-changing trends that will transform your world. Da Capo Press, Incorporated.
    Chan, L. (2013). Developing a strategic policy choice framework for technological innovation: case of chinese pharmaceuticals. Retrieved from https://pdxscholar.library.pdx.edu/open_access_etds/1041/
    Chen, H., Ho, J. C., & Kocaoglu, D. F. (2009). A Strategic Technology Planning Framework: A Case of Taiwan's Semiconductor Foundry Industry. IEEE Transactions on Engineering Management, 56(1), 4-15.
    Chen, H., & Kocaoglu, D. F. (2008). A sensitivity analysis algorithm for hierarchical decision models. European Journal of Operational Research, 185(1), 266-288.
    Child, J., Hsieh, L., Elbanna, S., Karmowska, J., Marinova, S., Puthusserry, P., . . . Zhang, Y. (2017). SME international business models: The role of context and experience. Journal of World Business, 52(5), 664-679.
    D’Angelo, G., Ferretti, S., & Marzolla, M. (2019). Fault tolerant adaptive parallel and distributed simulation through functional replication. Simulation Modelling Practice and Theory, 93, 192-207.
    Dargan, S., & Kumar, M. (2020). A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities. Expert Systems with Applications, 143, 113114.
    Ding, D., Cooper, R. A., Pasquina, P. F., & Fici-Pasquina, L. (2011). Sensor technology for smart homes. Maturitas, 69(2), 131-136.
    Divya, R. S., & Mathew, M. (2017, April). Survey on various door lock access control mechanisms. Paper presented at the 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1-3). IEEE. Kollam, India. doi: 10.1109/ICCPCT.2017.8074187
    Elkarmi, F., & Mustafa, I. (1993). Increasing the utilization of solar energy technologies (SET) in Jordan. Analytic hierarchy process. Energy Policy, 21(9), 978-984.
    Estep, J. (2017). Development of a technology transfer score for evaluating research proposals: Case study of demand response technologies in the Pacific Northwest. Retrieved from https://pdxscholar.library.pdx.edu/open_access_etds/3479/
    Ferrag, M. A., Babaghayou, M., & Yazici, M. A. (2020). Cyber security for fog-based smart grid SCADA systems: Solutions and challenges. Journal of Information Security and Applications, 52, 102500.
    Freeman, C. (1987). Technology, policy, and economic performance: lessons from Japan: Pinter Pub Ltd.
    Gerdes, S., Seitz, L., Selander, G., Mani, M., & Kumar, S. (2016). Use Cases for Authentication and Authorization in Constrained Environments (No. RFC 7744). Retrieved from https://datatracker.ietf.org/doc/rfc7744/
    Gerdsri, P., & Kocaoglu, D. F. (2008, July). HDM for developing national emerging technology strategy and policy supporting sustainable economy: A case study of nanotechnology for Thailand’s agriculture. Paper presented at the PICMET'08-2008 Portland International Conference on Management of Engineering & Technology (pp. 344-350). IEEE. Cape Town, South Africa. doi: 10.1109/PICMET.2008.4599640
    Gibson, E., & Daim, T. U. (2016, September). A measurement system for science and engineering research center performance evaluation. Paper presented at 2016 Portland International Conference on Management of Engineering and Technology (PICMET) (pp. 2782-2792). IEEE. Honolulu, USA. doi: 10.1109/PICMET.2016.7806624
    Gibson, E., Daim, T. U., & Dabic, M. (2019). Evaluating university industry collaborative research centers. Technological Forecasting and Social Change, 146, 181-202.
    Ham, Y., Han, K. K., Lin, J. J., & Golparvar-Fard, M. J. V. i. E. (2016). Visual monitoring of civil infrastructure systems via camera-equipped Unmanned Aerial Vehicles (UAVs): a review of related works. Visualization in Engineering, 4(1), 1.
    Haseeb, K., Bakar, K. A., Abdullah, A. H., & Darwish, T. (2017). Adaptive energy aware cluster-based routing protocol for wireless sensor networks. Wireless Networks, 23(6), 1953-1966.
    Hogaboam, L., & Daim, T. (2018). Technology adoption potential of medical devices: The case of wearable sensor products for pervasive care in neurosurgery and orthopedics. Health Policy and Technology, 7(4), 409-419.
    Hogan, M., Piccarreta, B., & Interagency International Cybersecurity Standardization Working Group. (2018). Interagency report on status of international cybersecurity standardization for the Internet of Things (IoT) (No. NIST Internal or Interagency Report (NISTIR) 8200 (Draft)). National Institute of Standards and Technology. Retrieved from https://csrc.nist.gov/publications/detail/nistir/8200/archive/2018-02-14
    Hong, A., Nam, C., & Kim, S. (2020). What will be the possible barriers to consumers’ adoption of smart home services? Telecommunications Policy, 44(2), 101867.
    Hsu, C.-L., & Lin, J. C.-C. (2016). An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives. Computers in Human Behavior, 62, 516-527.
    Ibrahim, R., & Zin, Z. M. (2011). Study of automated face recognition system for office door access control application. Paper presented at the 2011 IEEE 3rd International Conference on Communication Software and Networks (pp. 132-136). IEEE.. Xi'an, China. doi: 10.1109/ICCSN.2011.6014865
    IDC. (2019). Worldwide Smart Home Devices Forecast to Maintain Steady Growth Through 2023, Says IDC. Retrieved from https://www.idc.com/getdoc.jsp?containerId=prUS45540319
    Isaksson, R., Johansson, P., & Fischer, K. (2010). Detecting Supply Chain Innovation Potential for Sustainable Development. Journal of Business Ethics, 97(3), 425-442.
    Iskin, I., & Daim, T. U. (2016). An assessment model for energy efficiency program planning in electric utilities: Case of Northwest U.S. Sustainable Energy Technologies and Assessments, 15, 42-59.
    ITU. (2005). ITU Internet Reports 2005: The Internet of Things. Retrieved from https://www.itu.int/dms_pub/itu-s/opb/pol/S-POL-IR.IT-2005-SUM-PDF-E.pdf
    Jacobsson, S., & Bergek, A. (2011). Innovation system analyses and sustainability transitions: Contributions and suggestions for research. Environmental Innovation and Societal Transitions, 1(1), 41-57.
    Jacobsson, S., & Johnson, A. (2000). The diffusion of renewable energy technology: an analytical framework and key issues for research. Energy Policy, 28(9), 625-640.
    Jia, M., Komeily, A., Wang, Y., & Srinivasan, R. S. (2019). Adopting Internet of Things for the development of smart buildings: A review of enabling technologies and applications. Automation in Construction, 101, 111-126.
    Jia, M., & Srinivasan, R. S. (2015, December). Occupant behavior modeling for smart buildings: A critical review of data acquisition technologies and modeling methodologies. Paper presented at 2015 Winter Simulation Conference (WSC) (pp. 3345-3355). IEEE. CA, USA. doi: 10.1109/WSC.2015.7408496
    Kassem, A., El Murr, S., Jamous, G., Saad, E., & Geagea, M. (2016, July). A smart lock system using Wi-Fi security. Paper presented at the 2016 3rd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA) (pp. 222-225). IEEE. Beirut, Lebanon. doi: 10.1109/ACTEA.2016.7560143
    Kocaoglu, D. F. (1983). A participative approach to program evaluation. IEEE Transactions on Engineering Management, EM-30(3), 112-118.
    Lacerda, T. C., & von Wangenheim, C. G. (2018). Systematic literature review of usability capability/maturity models. Computer Standards & Interfaces, 55, 95-105.
    Lavoie, J. R. (2019). A Scoring Model to Assess Organizations' Technology Transfer Capabilities: the Case of a Power Utility in the Northwest USA. Retrieved from https://pdxscholar.library.pdx.edu/open_access_etds/4995/
    Lavoie, J. R., & Daim, T. (2020). Towards the assessment of technology transfer capabilities: An action research-enhanced HDM model. Technology in Society, 60, 101217.
    Lee, I. (2019). The Internet of Things for enterprises: An ecosystem, architecture, and IoT service business model. Internet of Things, 7, 100078.
    Lee, S. K., Mogi, G., & Kim, J. W. (2008). The competitiveness of Korea as a developer of hydrogen energy technology: The AHP approach. Energy Policy, 36(4), 1284-1291.
    Lee, S. M., Loguinov, A., Fleming, R. E., & Vulpe, C. D. (2015). Effects of strain and age on hepatic gene expression profiles in murine models of HFE-associated hereditary hemochromatosis. Genes and Nutrition, 10(1), 1-9.
    Lundvall, B. A. (1985). Product innovation and user-producer interaction. The Learning Economy and the Economics of Hope, 19, 19-60.
    Macaulay, T. (2017). Chapter 6 - Safety Requirements in the Internet of Things. In T. Macaulay (Ed.), RIoT Control (pp. 113-123). Boston: Morgan Kaufmann.
    Madaan, N., Ahad, M. A., & Sastry, S. M. (2018). Data integration in IoT ecosystem: Information linkage as a privacy threat. Computer Law & Security Review, 34(1), 125-133.
    Madhusudhan, M. (2015). Implementation of automated door unlocking and security system. International Journal of Computer Applications, 0975- 8887.
    Madrid-Guijarro, A., Garcia, D., & Van Auken, H. (2009). Barriers to innovation among spanish manufacturing SMEs. Journal of Small Business Management, 47(4), 465-488.
    Marino, F., Moiso, C., & Petracca, M. (2019). Automatic contract negotiation, service discovery and mutual authentication solutions: A survey on the enabling technologies of the forthcoming IoT ecosystems. Computer Networks, 148, 176-195.
    Mbarek, B., Ge, M., & Pitner, T. (2020). An Efficient Mutual Authentication Scheme for Internet of Things. Internet of Things, 9, 100160.
    Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. Retrieved from http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf
    Mocrii, D., Chen, Y., & Musilek, P. (2018). IoT-based smart homes: A review of system architecture, software, communications, privacy and security. Internet of Things, 1-2, 81-98.
    Motorola, I. (2007). Long Term Evolution (LTE):A Technical Overview. Retrieved from https://www.3g4g.co.uk/Lte/LTE_WP_0706_Motorola.pdf
    Mumpower, J. L., Stewart, T. R. J. T., & Reasoning. (1996). Expert judgement and expert disagreement. 2(2-3), 191-212.
    Musiolik, J., & Markard, J. (2011). Creating and shaping innovation systems: Formal networks in the innovation system for stationary fuel cells in Germany. Energy Policy, 39(4), 1909-1922.
    Musiolik, J., Markard, J., & Hekkert, M. (2012). Networks and network resources in technological innovation systems: Towards a conceptual framework for system building. Technological Forecasting and Social Change, 79(6), 1032-1048.
    Nedjah, N., Wyant, R. S., Mourelle, L. M., & Gupta, B. B. (2017). Efficient yet robust biometric iris matching on smart cards for data high security and privacy. Future Generation Computer Systems, 76, 18-32.
    Nehete, P. R., Chaudhari, J. P., Pachpande, S. R., & Rane, K. P. (2016). Literature survey on door lock security systems. International Journal of Computer Applications, 153(2), 13-18.
    Oksman, V., & Egan, J.. (2010). Applications of ITUT G. 9960, ITU-T G. 9961 transceivers for Smart Grid applications: Advanced metering infrastructure, energy management in the home and electric vehicles. ITU-T Technical Paper, 1-32. Retrieved from https://www.itu.int/pub/T-TUT-HOME-2010/en
    Omri, A. (2018). Entrepreneurship, sectoral outputs and environmental improvement: International evidence. Technological Forecasting and Social Change, 128, 46-55.
    Panetta, K. (2019). 5 Trends Appear on the Gartner Hype Cycle for Emerging Technologies, 2019. Retrieved from https://www.gartner.com/smarterwithgartner/5-trends-appear-on-the-gartner-hype-cycle-for-emerging-technologies-2019/
    Pereira, C. G., Lavoie, J. R., Garces, E., Basso, F., Dabić, M., Porto, G. S., & Daim, T. (2019). Forecasting of emerging therapeutic monoclonal antibodies patents based on a decision model. Technological Forecasting and Social Change, 139, 185-199.
    Phan, K. (2013). Innovation measurement: A decision framework to determine innovativeness of a company. Retrieved from https://core.ac.uk/download/pdf/37767873.pdf
    Pradnya, M., Nehete, R., & Rane, K. P. (2016). OTP based door lock security system. International Journal For Emerging Trends in Engineering and Management Research (IJETEMR), 2, 2.
    Ravidas, S., Lekidis, A., Paci, F., & Zannone, N. (2019). Access control in Internet-of-Things: A survey. Journal of Network and Computer Applications, 144, 79-101.
    Riel, A., Kreiner, C., Messnarz, R., & Much, A. (2018). An architectural approach to the integration of safety and security requirements in smart products and systems design. CIRP Annals, 67(1), 173-176.
    Rodríguez, G., Pérez, J., Cueva, S., & Torres, R. (2017). A framework for improving web accessibility and usability of Open Course Ware sites. Computers & Education, 109, 197-215.
    Saaty, T. L. (1977). A scaling method for priorities in hierarchical structures. Journal of mathematical psychology, 15(3), 234-281.
    Samangouei, P., Patel, V. M., & Chellappa, R. (2017). Facial attributes for active authentication on mobile devices. Image and Vision Computing, 58, 181-192.
    Sanchez del Rio, J., Moctezuma, D., Conde, C., Martin de Diego, I., & Cabello, E. (2016). Automated border control e-gates and facial recognition systems. Computers & Security, 62, 49-72.
    Sarkar, S. (2016). Internet of Things—robustness and reliability. Internet of Things (pp. 201-218). Morgan Kaufmann.
    Shafin, M. K., Kabir, K. L., Hasan, N., Mouri, I. J., Islam, S. T., Ansari, L., ... & Hossain, M. A. (2015, March). Development of an RFID based access control system in the context of Bangladesh. Paper presented at 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) (pp. 1-5). IEEE. Coimbatore, India. doi: 10.1109/ICIIECS.2015.7193024
    Shafin, M. K., Kabir, K. L., Hasan, N., Mouri, I. J., Islam, S. T., Ansari, L., ... & Hossain, M. A. (2015, March). Development of an RFID based access control system in the context of Bangladesh. Paper presented at 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) (pp. 1-5). IEEE. Coimbatore, India. doi: 10.1109/ICIIECS.2015.7193024
    Sheikh, N. J., Kim, K., & Kocaoglu, D. F. (2016). Use of hierarchical decision modeling to select target markets for a new personal healthcare device. Health Policy and Technology, 5(2), 99-112.
    Sheikh, N. J., Park, Y. J., & Kocaoglu, D. F. (2014, July). Assessment of solar photovoltaic technologies using multiple perspectives and hierarchical decision modeling: Manufacturers worldview. Paper presented at the Proceedings of PICMET '14 Conference: Portland International Center for Management of Engineering and Technology; Infrastructure and Service Integration. (pp. 491-497). IEEE. Kanazawa, Japan.
    Shrivastava, P. (1995). Environmental technologies and competitive advantage. Strategic Management Journal, 16(1 S), 183-200.
    Shuhaiber, A., & Mashal, I. (2019). Understanding users’ acceptance of smart homes. Technology in Society, 58, 101110.
    Silva, B. N., Khan, M., & Han, K. J. I. T. r. (2018). Internet of things: A comprehensive review of enabling technologies, architecture, and challenges. IETE Technical review, 35(2), 205-220.
    Singh, A., Payal, A., & Bharti, S. (2019). A walkthrough of the emerging IoT paradigm: Visualizing inside functionalities, key features, and open issues. Journal of Network and Computer Applications, 143, 111-151.
    Smith-Creasey, M., Albalooshi, F. A., & Rajarajan, M. (2018). Continuous face authentication scheme for mobile devices with tracking and liveness detection. Microprocessors and Microsystems, 63, 147-157.
    Sowjanya, G., & Nagaraju, S. (2016, August). Design and implementation of door access control and security system based on IOT. Paper presented at the 2016 International Conference on Inventive Computation Technologies (ICICT) (Vol. 2, pp. 1-4). IEEE. Coimbatore, India. doi: 10.1109/INVENTIVE.2016.7824850
    Stojmenovic, I., & Wen, S. (2014, September). The fog computing paradigm: Scenarios and security issues. Paper presented at the 2014 federated conference on computer science and information systems (pp. 1-8). IEEE. Warsaw, Poland. doi: 10.15439/2014F503
    Suurs, R. A. A., & Hekkert, M. P. (2009). Competition between first and second generation technologies: Lessons from the formation of a biofuels innovation system in the Netherlands. Energy, 34(5), 669-679.
    Taha, R. A., Choi, B. C., Chuengparsitporn, P., Cutar, A., Gu, Q., & Phan, K. (2007, August). Application of hierarchical decision modeling for selection of laptop. Paper presented at the PICMET'07-2007 Portland International Conference on Management of Engineering and Technology(pp. 1160-1175). IEEE. Portland, OR, USA. doi: 10.1109/PICMET.2007.4349440
    Thinmoo Technology Co., L. (2019). Face recognition intelligent cloud access control system. Retrieved from http://m.thinmoo.com/en/index.php/2019/11/07/%E4%BA%BA%E8%84%B8%E8%AF%86%E5%88%AB%E6%99%BA%E8%83%BD%E9%97%A8%E7%A6%81%E7%B3%BB%E7%BB%9F/
    Thomas, R. J., Anderson, N. A., Donaldson, S. G., & Behar, M. A. (2009). U.S. Patent No. 7,567,844. Washington, DC: U.S. Patent and Trademark Office. Retrieved from https://patents.google.com/patent/US7567844B2/en
    Tran, T., & Ha, Q. P. (2015). Dependable control systems with Internet of Things. ISA Transactions, 59, 303-313.
    Tran, T. A. (2013). Strategic evaluation of university knowledge and technology transfer effectiveness (Unpublished doctoral dissertation). Portland State University, USA.
    Van der Meulen, R. (2015). Gartner says 6.4 billion connected ‘things’ will be in use in 2016, up 30 percent from 2015. Retrieved from https://www.gartner.com/en/newsroom/press-releases/2015-11-10-gartner-says-6-billion-connected-things-will-be-in-use-in-2016-up-30-percent-from-2015
    Van Welie, M. J., Truffer, B., & Yap, X.-S. (2019). Towards sustainable urban basic services in low-income countries: A Technological Innovation System analysis of sanitation value chains in Nairobi. Environmental Innovation and Societal Transitions, 33, 196-214.
    Weber, K. M., & Truffer, B. (2017). Moving innovation systems research to the next level: Towards an integrative agenda. Oxford Review of Economic Policy, 33(1), 101-121.

    無法下載圖示 電子全文延後公開
    2025/08/12
    QR CODE