Publikace UTB
Repozitář publikační činnosti UTB

The proposal of security and safety management system with fuzzy logic support

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title The proposal of security and safety management system with fuzzy logic support en
dc.contributor.author Ďuricová, Lucia
dc.contributor.author Hromada, Martin
dc.contributor.author Mrázek, Jan
dc.relation.ispartof 6th International Defense and Homeland Security Simulation Workshop, DHSS 2016
dc.identifier.isbn 9788897999713
dc.date.issued 2016
dc.citation.spage 10
dc.citation.epage 14
dc.event.title 6th International Defense and Homeland Security Simulation Workshop, DHSS 2016
dc.event.location Larnaca
utb.event.state-en Cyprus
utb.event.state-cs Kypr
dc.event.sdate 2016-09-26
dc.event.edate 2016-09-28
dc.type conferenceObject
dc.language.iso en
dc.publisher Dime University of Genoa
dc.subject Object security en
dc.subject Safety en
dc.subject Soft targets en
dc.subject Solution en
dc.description.abstract This paper presents the implementation of the fuzzy logic into the security and safety solution in the soft targets. The primary structure of safety and security tool is described in the first part. This tool has been implemented into specific object; for example, for object without security and safety solution (soft targets). In the next part, the primary rules for the use of fuzzy logic are defined. The aim of this paper is to define the primary layout for software which could help operators with decision-making process. The article also proposes and describes the solution for system application of security requirements by understanding the soft targets threats. The system solution is different for each organization and object; however, the main structure is the same. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1006841
utb.identifier.obdid 43875736
utb.identifier.scopus 2-s2.0-85001022206
utb.source d-scopus
dc.date.accessioned 2017-02-28T15:11:32Z
dc.date.available 2017-02-28T15:11:32Z
utb.contributor.internalauthor Ďuricová, Lucia
utb.contributor.internalauthor Hromada, Martin
utb.contributor.internalauthor Mrázek, Jan
utb.fulltext.affiliation Lucia Duricova(a), Martin Hromada(b), Jan Mrazek(c) (a),(b),(c)Tomas Bata University in Zlin (a) duricova@fai.utb.cz, (b) hromada@fai.utb.cz (c) jmrazek@fai.utb.cz
utb.fulltext.dates -
utb.fulltext.references Bishop, C.M., 2006. Pattern recognition machine learning, Springer. British Standard BS OHSAS 18001/2007, Occupational Health and Safety Management SystemsRequirements. Driankov, D. Hellendoom, H. Reinfrank, M., 1993. An introduction to fuzzy control, Springer Verlag. Duricova, L. Hromada, M. Mrazek, J., 2016. Security and Safety Requirements for Soft Targets in Czech Republic, SECURWARE 2016 The Tenth International Conference on Emerging Security Information, Systems and Technologies, IARIA, pp. 271-275, ISBN: 978-1-61208-493-0. Duricova, L. Hromada, M. Mrazek, J., 2016. Security and Safety Processes in Czech Republic Universities, SECURWARE 2016 The Tenth International Conference on Emerging Security Information, Systems and Technologies, IARIA, pp. 105-110, ISBN: 978-1-61208-493-0. Duricova, P. L. Hromada, M. The Proposal of the Soft Targets Security. Advences in Intelligent Systems and Computing, Automation Control Theory Perspectives in Intelligent Systems. Proceedings of the 5th Computer Science On-line Conference 2016 (CSOC2016), Vol3, Springer, pp.: 337-345. ISSN 2194-5357, ISBN 978-3-319-33387-8, DOI 10.1007/978-3-319-33389-2. Duricova, P.L., Hromada, M., 2015. The proposal system for the safety assessment of soft targets with focus on school facilities. Proceeding of 3rd CER Comperative, vol. 2, pp. 30-33. Sciemcee Publishing, London. Fennely, L. Perry, M. “ The Handbook for School Safety and Security,” 1st ed., Elsevier, 2014, ISBN: 978-0-12800568-2. ISO/IEC 27001:2013, Information TechnologySecurity Techniques- Information Security Management Systems – Requirements. Jura, P., 2004. Some remarks on mathematical models, WSEAS Transactions on information science and application, 1 (5), 1426-1429. Klir, G. J., Yuan, B., 1995. Sets and fuzzy logic In: Theory and application, Prentice Hall, New Jersey. Rohan, 2016, If than rules. In: http://www.rohan.sdsu.edu/doc/matlab/toolbox/fuzzy/fuzzytu5.html Ross, T. J. “Fuzzy logic with engineering applications” 3rd Edition, John Wiley & Sons, Ltd. 2010, ISBN: 978-0-470-74376-8. Rosenberg, F., 2014. Nice solution for critical facilities, Nidam, Nice. Sennewald, Ch. Baillie, C. “Effective Security Management,” 6th ed.,Amsterdam: Elsevier, 2016, ISBN: 9780-12-802774-5. Takagi, T., Sugeno, M. 1985. Fuzzy Identification of Systems and Its Application to Modeling and Control. IEEE Trans. on System, Man, and Cybernetics, 15 (1), 116–132. Zadeh, L. A., 1965. Fuzzy Sets. In: Information and Control, vol. 8, 338–353.
utb.fulltext.sponsorship This project is realized as the research with doctoral student and it is the basic input for further research which we will develop in next term. This work was supported by Internal Grant Agency of Tomas Bata University under the project No. IGA/FAI/2016/012.
utb.fulltext.projects IGA/FAI/2016/012
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam