Kontaktujte nás | Jazyk: čeština English
dc.title | Objective method for object security evaluation | en |
dc.contributor.author | Kovář, Stanislav | |
dc.contributor.author | Valouch, Jan | |
dc.contributor.author | Němec, Jan | |
dc.relation.ispartof | Proceedings - International Carnahan Conference on Security Technology | |
dc.identifier.issn | 1071-6572 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.identifier.isbn | 978-1-6654-9363-5 | |
dc.date.issued | 2022 | |
utb.relation.volume | 2022-September | |
dc.event.title | 2022 IEEE International Carnahan Conference on Security Technology, ICCST 2022 | |
dc.event.location | Valeč u Hrotovic | |
utb.event.state-en | Czech Republic | |
utb.event.state-cs | Česká republika | |
dc.event.sdate | 2022-09-07 | |
dc.event.edate | 2022-09-09 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
dc.identifier.doi | 10.1109/ICCST52959.2022.9896557 | |
dc.relation.uri | https://ieeexplore.ieee.org/document/9896557 | |
dc.relation.uri | https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9896557 | |
dc.subject | building protection | en |
dc.subject | I&HAS | en |
dc.subject | mesh | en |
dc.subject | protection method | en |
dc.description.abstract | The paper deals with designing a method for objectively determining the security level of buildings. Building security design is a crucial element that influences the final implementation. However, this process is highly subjective, as it depends on the experience of the designer, which may not agree with other experts. Therefore, the idea arose to design an objective method based on a mathematical model, the output of which will be a unique value. This article is conceived as a Proof-of-Concept and provides initial ideas and approaches that will lead to implementing an application with an implemented proposed method. © 2022 IEEE. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1011178 | |
utb.identifier.obdid | 43883690 | |
utb.identifier.scopus | 2-s2.0-85139852358 | |
utb.source | d-scopus | |
dc.date.accessioned | 2022-10-26T13:40:45Z | |
dc.date.available | 2022-10-26T13:40:45Z | |
dc.description.sponsorship | Technology Agency of the Czech Republic, TACR | |
utb.contributor.internalauthor | Kovář, Stanislav | |
utb.contributor.internalauthor | Valouch, Jan | |
utb.contributor.internalauthor | Němec, Jan | |
utb.fulltext.affiliation | Stanislav Kovar Faculty of Applied Informatics Tomas Bata University in Zlín Zlín, Czech Republic [email protected] Jan Valouch Faculty of Applied Informatics Tomas Bata University in Zlín Zlín, Czech Republic [email protected] Jan Nemec Faculty of Applied Informatics Tomas Bata University in Zlín Zlín, Czech Republic j2 [email protected] | |
utb.fulltext.dates | - | |
utb.fulltext.references | [1] Hart, J.; Hartova, V. 2018. Detection reliability for passive infrared detectors in intrusion and hold-up alarm systems and their ergonomics. [2] Łukasiak, J.; Rosiński, A. 2018. Reliability analysis of selected I&HAS structures. AUTOBUSY–Technika, Eksploatacja, Systemy Transportowe, 19(12), 537-540. [3] Rehak, D.; Hromada, M.; Lovecek, T. 2020. Personnel threats in the electric power critical infrastructure sector and their effect on dependent sectors: Overview in the Czech Republic. Safety science, 127, 104698. [4] Loveček, T. Vulnerability Assessment of Physical Protection System. [5] Paś, J. 2018. Teaching methodology of diagnosis process on the example of intrusion and hold-up alarm system. Journal of KONBiN, 46(1), 215-234. [6] Filipiak, M. 1996. Mesh generation. Edinburgh parallel computing centre, the University of Edinburgh, Edinburgh. [7] Bern, M.W.; Plassmann, P.E. 2000. Mesh Generation. Handbook of Computational Geometry. [8] Axis Communications AB. AXIS Site Designer. Available from: https://sitedesigner.axis.com. [9] Solomon, C.; Breckon, T. 2011. Fundamentals of digital image processing: a practical approach with examples in matlab. Wiley-Blackwell. [10] Yagawa, G.; Yamada, T. 1996. Free mesh method: A new meshless finite element method. Computational Mechanics, 18, 383-386. [11] Yagawa, G. 2011. Free Mesh Method: fundamental conception, algorithms and accuracy study. Proceedings of the Japan Academy. Series B, Physical and Biological Sciences, 87, 115 - 134. | |
utb.fulltext.sponsorship | This work was funded by the research project TH04010377, ”Development of methods of identification and protection of soft targets within transport infrastructure to increase their security and resistance to terrorist threats,” supported by the Technology Agency of the Czech Republic in the years 2019-2022 and the Internal Grant Agency of Tomas Bata University under project No. IGA/FAI/2022/004. | |
utb.scopus.affiliation | Tomas Bata University in Zlín Zlín, Faculty of Applied Informatics, Czech Republic | |
utb.fulltext.projects | TH04010377 | |
utb.fulltext.projects | IGA/FAI/2022/004 | |
utb.fulltext.faculty | Faculty of Applied Informatics | |
utb.fulltext.faculty | Faculty of Applied Informatics | |
utb.fulltext.faculty | Faculty of Applied Informatics | |
utb.fulltext.ou | - | |
utb.fulltext.ou | - | |
utb.fulltext.ou | - |