Kontaktujte nás | Jazyk: čeština English
dc.title | The proposal of the software for the soft targets assessment | en |
dc.contributor.author | Ďuricová, Lucia | |
dc.contributor.author | Hromada, Martin | |
dc.contributor.author | Mrázek, Jan | |
dc.relation.ispartof | Proceedings - 2017 International Conference on Soft Computing, Intelligent System and Information Technology: Building Intelligence Through IOT and Big Data, ICSIIT 2017 | |
dc.identifier.isbn | 978-1-4673-9899-2 | |
dc.date.issued | 2017 | |
utb.relation.volume | 2018-January | |
dc.citation.spage | 90 | |
dc.citation.epage | 95 | |
dc.event.title | 5th International Conference on Soft Computing, Intelligent System and Information Technology, ICSIIT 2017 | |
dc.event.location | Petra Christian Univ | |
utb.event.state-en | Informat dept | |
dc.event.sdate | 2017-09-26 | |
dc.event.edate | 2017-09-29 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.identifier.doi | 10.1109/ICSIIT.2017.9 | |
dc.relation.uri | https://ieeexplore.ieee.org/abstract/document/8262549/ | |
dc.subject | security | en |
dc.subject | soft targets | en |
dc.subject | software solution | en |
dc.subject | fuzzy logic | en |
dc.description.abstract | The soft targets and crowded places are closely related with a risk of assaults. Between the experts are the soft targets known as objects with similar characteristics. Between characteristics of soft targets belong a considerable number of persons at the same time in the same area. In addition, this object has not implemented the adequate security and safety measures to the processes. This proposal of the analytical tool of the software solution was developed for assessing the current state of the objects. Between the objects are buildings or events. The main aim of the proposed methodology is to support operators in the decision-making process and improve security to the soft targets. This methodology is designed to evaluate the security situations of the soft targets. This methodology is based on the object's comparison and incident's characteristics. The main aim of this software is the analysis of the object's features, and according to these features, the software can define the security measures. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1007871 | |
utb.identifier.obdid | 43877211 | |
utb.identifier.scopus | 2-s2.0-85049250594 | |
utb.identifier.wok | 000428025400017 | |
utb.source | d-wok | |
dc.date.accessioned | 2018-04-23T15:01:49Z | |
dc.date.available | 2018-04-23T15:01:49Z | |
dc.description.sponsorship | Internal Grant Agency of Tomas Bata University [IGA/FAI/2017/017]; Ministry of the Interior of the Czech Republic [VI20172019073, VI20172019054] | |
utb.contributor.internalauthor | Ďuricová, Lucia | |
utb.contributor.internalauthor | Hromada, Martin | |
utb.contributor.internalauthor | Mrázek, Jan | |
utb.fulltext.affiliation | Lucia Duricova, Martin Hromada and Jan Mrazek Faculty of Applied Informatics Tomas Bata University in Zlin Zlin, Czech Republic [email protected], [email protected], [email protected] | |
utb.fulltext.dates | - | |
utb.fulltext.references | [1] L. Duricova, J. Mrazek, and M. Hromada, “The Proposal of Security and Safety Management System with Fuzzy Logic Support,” Proc. 6th Int. Defense and Homeland Security Simulation (DHSS) Workshop, held at 13th Int. Multidisciplinary Modeling and Simulation Multiconference (I3M), Larnaca (Cyprus), Sep 2016, pp. 10–14. [2] S. Crockett, S.B. Huang, K. Lee, and D. Liebling, “Protecting Soft Targets: A Case Study and Evaluation of High School Security,” Dec. 2005. [Online] Available: http://courses.cs.washington.edu/courses/csep590/05au/whitepaper_turnin/soft-targets-white-paper.pdf. [3] ISO/TC 262, Risk Management – Principles and Guidelines, ISO/IEC 31000:2009. [4] L.A. Zadeh, “Fuzzy Sets,” Information and Control, vol. 8, no. 3, pp. 338–353, Jun. 1965, doi: 10.1016/S0019-9958(65)90241-X. [5] T.S. Parsana and M.T. Patel, “A Case Study: A Process FMEA Tool to Enhance Quality and Efficiency of Manufacturing Industry,” Bonfring Int. J. Industrial Engineering and Management Science, vol. 4, no. 3, pp. 145–152, Aug. 2014. [6] C.K. Chae and J.W. Ko, “FTA-FMEA-Based Validity Verification Techniques for Safety Standards,” Korean J. Chemical Engineering, vol. 34, no. 3, pp. 619–627, Mar 2017, doi: 10.1007/s11814-016-0321-1. | |
utb.fulltext.sponsorship | This project is realized as the research with a doctoral student, and it is the primary input for next research, which we will develop in next term. It was realized with the support of the university. This work was supported by Internal Grant Agency of Tomas Bata University under the project No. IGA/FAI/2017/017 and by the research project VI20172019073 "Identification and methods of protection of Czech soft targets against violent acts with elaboration of a warning system", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019 and by the research project VI20172019054 "An analytical software module for the real-time resilience evaluation from point of the converged security ", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019. | |
utb.wos.affiliation | [Duricova, Lucia; Hromada, Martin; Mrazek, Jan] Tomas Bata Univ Zlin, Fac Appl Informat, Zlin, Czech Republic | |
utb.fulltext.projects | IGA/FAI/2017/017 | |
utb.fulltext.projects | VI20172019073 | |
utb.fulltext.projects | VI20172019054 |