TBU Publications
Repository of TBU Publications

The proposal of the analytical tool for the soft targets assessment

DSpace Repository

Show simple item record

dc.title The proposal of the analytical tool for the soft targets assessment en
dc.contributor.author Ďuricová, Lucia
dc.contributor.author Hromada, Martin
dc.relation.ispartof ICMT 2017 - 6th International Conference on Military Technologies
dc.identifier.isbn 9781538619889
dc.date.issued 2017
dc.citation.spage 387
dc.citation.epage 391
dc.event.title 6th International Conference on Military Technologies, ICMT 2017
dc.event.sdate 2017-05-31
dc.event.edate 2017-06-02
dc.type conferenceObject
dc.language.iso en
dc.publisher Institute of Electrical and Electronics Engineers Inc.
dc.identifier.doi 10.1109/MILTECHS.2017.7988790
dc.relation.uri http://ieeexplore.ieee.org/abstract/document/7988790/
dc.subject analytical tool en
dc.subject safety en
dc.subject security en
dc.subject soft targets en
dc.description.abstract Soft targets and crowded places are closely related with a risk of attacks or negative incidents, which can cause the loss of human live or interests protected by law. Soft targets are specified as the objects (building or event) with a large number of visitors in a closed place at the same time and simultaneously without integrated the special security and safety measures into the management processes. For example, cinemas, schools, theaters or shopping centers can be identified as such. It is necessary to apply a system's approach based on a lot of kinds of analyzes and currently a lot of kinds of the solutions. This paper focusses on the proposal of software, which can analyze and after categorize these objects. Finally, the proposed software solution can involve the decision-making process in a critical situation. © 2017 IEEE. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1007515
utb.identifier.obdid 43877096
utb.identifier.scopus 2-s2.0-85029348351
utb.source d-scopus
dc.date.accessioned 2017-10-16T14:43:41Z
dc.date.available 2017-10-16T14:43:41Z
utb.contributor.internalauthor Ďuricová, Lucia
utb.contributor.internalauthor Hromada, Martin
utb.fulltext.affiliation Lucia Ďuricová * , Martin Hromada † * Tomas Bata University in Zlin, Nad Stranemi 4511, Zlin, 76005, duricova@fai.utb.cz † Tomas Bata University in Zlin, Nad Stranemi 4511, Zlin, 76005, hromada@fai.utb.cz
utb.fulltext.dates -
utb.fulltext.references [1] Bishop, C. M., “Pattern Recognition and Machine Learning,” Springer, 2006. [2] de Gusmão, Ana Paula Henriques, Lúcio Camara e Silva, Maisa Mendonça Silva, Thiago Poleto, and Costa, Ana Paula Cabral Seixas, “Information Security Risk Analysis Model using Fuzzy Decision Theory,” International Journal of Information Management 36, pp. 25-34, 2016. [3] Driankov, D. Hellendoorn, H. Reinfrank, M., “An Introduction to Fuzzy Control,” pp. 316, Springer Verlag, 1993. [4] Duricova L., Hromada M., Mrazek J., “ The Analytical Software Support for Evaluation to a Security and Safety Situation in the Soft targets, European Safety and Reliability Conference ESREL 2017, CRC Press: Safety and Reliability – Theory and Application, 2017. [5] Duricova L., Mrazek J., Hromada M., “The Proposal of Security and Safety Management System with Fuzzy Logic Support,” The XIII International Multidisciplinary Modelling & Simulation Multi-Conference (I3M konference) The6TH I International Defense and Homeland Security Simulation Workshop, DHSS 2016, September 26-28, 2016, pp. 31-34, ISBN: 978-88- 97999-79- 9. [6] Duricova Prochazkova, L. and M. Hromada, “ The Proposal of the Soft Targets Security,” Advances in Intelligent Systems and Computing. Vol. 466, Springer, 2016. [7] Hromada, M. and L. Ludek, "Conceptual Design of the Resilience Evaluation System of Critical Infrastructure Elements and Networks in Selected Areas in Czech Republic," IEEE International Conference on Technologies for Homeland Security, pp: 353-358, HST 2012. [8] Jura, P., “Some remarks on mathematical models,” WSEAS Transactions on Information Science and Application, vol. 1, Issue 5, pp. 1426–1429. WSEAS, 2004. [9] Klir, G. J. Yuan, B., “Fuzzy Sets and Fuzzy logic,” Theory and Application. Prentice Hall, pp. 574, New Jersey ,1995. [10] Muaafa, M. and J. E. Ramirez-Marquez, "Engineering Management Models for Urban Security," IEEE Transactions on Engineering Management, Vol. 64, pp.:39-41, 2016. [11] Valouch, J., "Aggregated Coefficients for Evaluation of Effectiveness of Alarm Systems," International Journal of Circuits, Systems and Signal Processing 9, pp:205-210, 2015.
utb.fulltext.sponsorship This project is realized as the research with a doctoral student, and it is the primary input for next research, which we will develop in next term. It was realized with the support of the university. This work was supported by Internal Grant Agency of Tomas Bata University under the project No. IGA/FAI/2017/017 and by the research project VI20172019073 "Identification and methods of protection of Czech soft targets against violent acts with elaboration of a warning system", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019 and by the research project VI20172019054 "An analytical software module for the real-time resilience evaluation from point of the converged security ", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019.
utb.scopus.affiliation Tomas Bata University in Zlin, Nad Stranemi 4511, Zlin, Czech Republic
Find Full text

Files in this item

Show simple item record