Publikace UTB
Repozitář publikační činnosti UTB

Soft targets – Possibilities of their identification

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Soft targets – Possibilities of their identification en
dc.contributor.author Lapková, Dora
dc.contributor.author Kotek, Lukáš
dc.contributor.author Králík, Lukáš
dc.relation.ispartof Annals of DAAAM and Proceedings of the International DAAAM Symposium
dc.identifier.issn 1726-9679 Scopus Sources, Sherpa/RoMEO, JCR
dc.date.issued 2018
utb.relation.volume 29
utb.relation.issue 1
dc.citation.spage 0369
dc.citation.epage 0377
dc.event.title 29th International DAAAM Symposium on Intelligent Manufacturing and Automation, DAAAM 2018
dc.event.location Zadar
utb.event.state-en Croatia
utb.event.state-cs Chorvatsko
dc.event.sdate 2018-10-24
dc.event.edate 2018-10-27
dc.type conferenceObject
dc.language.iso en
dc.publisher Danube Adria Association for Automation and Manufacturing, DAAAM
dc.identifier.doi 10.2507/29th.daaam.proceedings.053
dc.subject criteria en
dc.subject definition en
dc.subject identification en
dc.subject method en
dc.subject soft target en
dc.description.abstract This article is focused on the Soft targets and especially on the possibilities of their identification. The terrorist attacks are one of the biggest security problems in the modern world. The armed forces try to solve this situation and to stop these attacks. However, the solving of this security problem is not only in the competence of the armed forces. The police and the army have many advantages, but it is impossible that these people will always be everywhere. The goal of this article is to present our method of identification of the Soft targets. In the following sections, we will write about the definition of the Soft targets, their characteristics and the statistics of the terrorist attacks in 2017. The main section is about our new method of the identification of the Soft targets. During our experiment, we used several mathematical methods of classification (Scoring method, Fuller’s method, Saaty’s method). The interesting section is about future research, because we present only initial study in this article and we have ambitions to create a classification of the Soft targets and to describe possibilities of their protection – with focus on behavior analysis and profiling. © 2018, Danube Adria Association for Automation and Manufacturing, DAAAM. All rights reserved. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1008467
utb.identifier.obdid 43878944
utb.identifier.scopus 2-s2.0-85060087465
utb.source d-scopus
dc.date.accessioned 2019-07-08T11:59:49Z
dc.date.available 2019-07-08T11:59:49Z
dc.rights Attribution-NonCommercial 4.0 International
dc.rights.uri https://creativecommons.org/licenses/by-nc/4.0/
dc.rights.access openAccess
utb.contributor.internalauthor Lapková, Dora
utb.contributor.internalauthor Kotek, Lukáš
utb.contributor.internalauthor Králík, Lukáš
utb.fulltext.affiliation Dora Lapkova, Lukas Kotek, Lukas Kralik Tomas Bata University in Zlín, Zlín, Czech Republic
utb.fulltext.dates -
utb.scopus.affiliation Tomas Bata University in Zlín, Zlín, Czech Republic
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam

Attribution-NonCommercial 4.0 International Kromě případů, kde je uvedeno jinak, licence tohoto záznamu je Attribution-NonCommercial 4.0 International