Kontaktujte nás | Jazyk: čeština English
dc.title | The proposal of security and safety management system with fuzzy logic support | en |
dc.contributor.author | Ďuricová, Lucia | |
dc.contributor.author | Hromada, Martin | |
dc.contributor.author | Mrázek, Jan | |
dc.relation.ispartof | 6th International Defense and Homeland Security Simulation Workshop, DHSS 2016 | |
dc.identifier.isbn | 9788897999713 | |
dc.date.issued | 2016 | |
dc.citation.spage | 10 | |
dc.citation.epage | 14 | |
dc.event.title | 6th International Defense and Homeland Security Simulation Workshop, DHSS 2016 | |
dc.event.location | Larnaca | |
utb.event.state-en | Cyprus | |
utb.event.state-cs | Kypr | |
dc.event.sdate | 2016-09-26 | |
dc.event.edate | 2016-09-28 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Dime University of Genoa | |
dc.subject | Object security | en |
dc.subject | Safety | en |
dc.subject | Soft targets | en |
dc.subject | Solution | en |
dc.description.abstract | This paper presents the implementation of the fuzzy logic into the security and safety solution in the soft targets. The primary structure of safety and security tool is described in the first part. This tool has been implemented into specific object; for example, for object without security and safety solution (soft targets). In the next part, the primary rules for the use of fuzzy logic are defined. The aim of this paper is to define the primary layout for software which could help operators with decision-making process. The article also proposes and describes the solution for system application of security requirements by understanding the soft targets threats. The system solution is different for each organization and object; however, the main structure is the same. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1006841 | |
utb.identifier.obdid | 43875736 | |
utb.identifier.scopus | 2-s2.0-85001022206 | |
utb.source | d-scopus | |
dc.date.accessioned | 2017-02-28T15:11:32Z | |
dc.date.available | 2017-02-28T15:11:32Z | |
utb.contributor.internalauthor | Ďuricová, Lucia | |
utb.contributor.internalauthor | Hromada, Martin | |
utb.contributor.internalauthor | Mrázek, Jan | |
utb.fulltext.affiliation | Lucia Duricova(a), Martin Hromada(b), Jan Mrazek(c) (a),(b),(c)Tomas Bata University in Zlin (a) duricova@fai.utb.cz, (b) hromada@fai.utb.cz (c) jmrazek@fai.utb.cz | |
utb.fulltext.dates | - | |
utb.fulltext.references | Bishop, C.M., 2006. Pattern recognition machine learning, Springer. British Standard BS OHSAS 18001/2007, Occupational Health and Safety Management SystemsRequirements. Driankov, D. Hellendoom, H. Reinfrank, M., 1993. An introduction to fuzzy control, Springer Verlag. Duricova, L. Hromada, M. Mrazek, J., 2016. Security and Safety Requirements for Soft Targets in Czech Republic, SECURWARE 2016 The Tenth International Conference on Emerging Security Information, Systems and Technologies, IARIA, pp. 271-275, ISBN: 978-1-61208-493-0. Duricova, L. Hromada, M. Mrazek, J., 2016. Security and Safety Processes in Czech Republic Universities, SECURWARE 2016 The Tenth International Conference on Emerging Security Information, Systems and Technologies, IARIA, pp. 105-110, ISBN: 978-1-61208-493-0. Duricova, P. L. Hromada, M. The Proposal of the Soft Targets Security. Advences in Intelligent Systems and Computing, Automation Control Theory Perspectives in Intelligent Systems. Proceedings of the 5th Computer Science On-line Conference 2016 (CSOC2016), Vol3, Springer, pp.: 337-345. ISSN 2194-5357, ISBN 978-3-319-33387-8, DOI 10.1007/978-3-319-33389-2. Duricova, P.L., Hromada, M., 2015. The proposal system for the safety assessment of soft targets with focus on school facilities. Proceeding of 3rd CER Comperative, vol. 2, pp. 30-33. Sciemcee Publishing, London. Fennely, L. Perry, M. “ The Handbook for School Safety and Security,” 1st ed., Elsevier, 2014, ISBN: 978-0-12800568-2. ISO/IEC 27001:2013, Information TechnologySecurity Techniques- Information Security Management Systems – Requirements. Jura, P., 2004. Some remarks on mathematical models, WSEAS Transactions on information science and application, 1 (5), 1426-1429. Klir, G. J., Yuan, B., 1995. Sets and fuzzy logic In: Theory and application, Prentice Hall, New Jersey. Rohan, 2016, If than rules. In: http://www.rohan.sdsu.edu/doc/matlab/toolbox/fuzzy/fuzzytu5.html Ross, T. J. “Fuzzy logic with engineering applications” 3rd Edition, John Wiley & Sons, Ltd. 2010, ISBN: 978-0-470-74376-8. Rosenberg, F., 2014. Nice solution for critical facilities, Nidam, Nice. Sennewald, Ch. Baillie, C. “Effective Security Management,” 6th ed.,Amsterdam: Elsevier, 2016, ISBN: 9780-12-802774-5. Takagi, T., Sugeno, M. 1985. Fuzzy Identification of Systems and Its Application to Modeling and Control. IEEE Trans. on System, Man, and Cybernetics, 15 (1), 116–132. Zadeh, L. A., 1965. Fuzzy Sets. In: Information and Control, vol. 8, 338–353. | |
utb.fulltext.sponsorship | This project is realized as the research with doctoral student and it is the basic input for further research which we will develop in next term. This work was supported by Internal Grant Agency of Tomas Bata University under the project No. IGA/FAI/2016/012. | |
utb.fulltext.projects | IGA/FAI/2016/012 |