2017
DOI: 10.1166/asl.2017.8770
|View full text |Cite
|
Sign up to set email alerts
|

Rule Based Reasoning Method for Safety Room by Means of Temperature Sensor and Motion Detector

Abstract: Theft and infiltration as well as robbery are an incident that should be anticipated. The security of the room is a main priority to prevent such occurrences. This paper will be explain how to the rule based reasoning method is part of the expert system that can be used in a security room systems by monitoring the temperature change in the room as well as detecting movement in the room by using the temperature sensor and motion detector. The output indicators is the buzzer sounds that will be activated when th… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Implementation of Information Technology can be seen from two sides from the point of view of management expansion expectations provided by Information Technology and from the point of view of the implementation and function in the daily operational activities. For example, data transaction security can use network security, while for the physical security of data storage in the room can use room safety sensors [21]. The use of information technology, especially in the web has made it easier in the promotion and spreading of information globally.…”
Section: Results and Analysis 31 E-commerce In The E-businessmentioning
confidence: 99%
“…Implementation of Information Technology can be seen from two sides from the point of view of management expansion expectations provided by Information Technology and from the point of view of the implementation and function in the daily operational activities. For example, data transaction security can use network security, while for the physical security of data storage in the room can use room safety sensors [21]. The use of information technology, especially in the web has made it easier in the promotion and spreading of information globally.…”
Section: Results and Analysis 31 E-commerce In The E-businessmentioning
confidence: 99%
“…Within the framework of this new system, the application of computational algorithms through the rule-based reasoning method will be applied to create a new framework for supply chain expert systems [27]. Rule based itself is formed from a knowledge base that will always develop according to needs which will be driven by an inference engine so as to produce useful information through the user interface [39], [40]. Likewise, the output in the system itself can be the input for the supply chain information system.…”
Section: The Combining Of Supply Chain and Expert Systemmentioning
confidence: 99%
“…This system still requires an administrator to deliver sales information, in the future it is expected that the system can be developed with the auto reply method so that this application can also automatically send information or answer questions from the consumer. Can be developed using rules in the rule based reasoning method [22], fuzzy logic model [23] or expert system solution [24], managed online with a simple routing system [25], and stored in the cloud database system [26].…”
Section: Recommendationsmentioning
confidence: 99%