Publikace UTB
Repozitář publikační činnosti UTB

The proposal of the software for the soft targets assessment

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title The proposal of the software for the soft targets assessment en
dc.contributor.author Ďuricová, Lucia
dc.contributor.author Hromada, Martin
dc.contributor.author Mrázek, Jan
dc.relation.ispartof Proceedings - 2017 International Conference on Soft Computing, Intelligent System and Information Technology: Building Intelligence Through IOT and Big Data, ICSIIT 2017
dc.identifier.isbn 978-1-4673-9899-2
dc.date.issued 2017
utb.relation.volume 2018-January
dc.citation.spage 90
dc.citation.epage 95
dc.event.title 5th International Conference on Soft Computing, Intelligent System and Information Technology, ICSIIT 2017
dc.event.location Petra Christian Univ
utb.event.state-en Informat dept
dc.event.sdate 2017-09-26
dc.event.edate 2017-09-29
dc.type conferenceObject
dc.language.iso en
dc.publisher Institute of Electrical and Electronics Engineers (IEEE)
dc.identifier.doi 10.1109/ICSIIT.2017.9
dc.relation.uri https://ieeexplore.ieee.org/abstract/document/8262549/
dc.subject security en
dc.subject soft targets en
dc.subject software solution en
dc.subject fuzzy logic en
dc.description.abstract The soft targets and crowded places are closely related with a risk of assaults. Between the experts are the soft targets known as objects with similar characteristics. Between characteristics of soft targets belong a considerable number of persons at the same time in the same area. In addition, this object has not implemented the adequate security and safety measures to the processes. This proposal of the analytical tool of the software solution was developed for assessing the current state of the objects. Between the objects are buildings or events. The main aim of the proposed methodology is to support operators in the decision-making process and improve security to the soft targets. This methodology is designed to evaluate the security situations of the soft targets. This methodology is based on the object's comparison and incident's characteristics. The main aim of this software is the analysis of the object's features, and according to these features, the software can define the security measures. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1007871
utb.identifier.obdid 43877211
utb.identifier.scopus 2-s2.0-85049250594
utb.identifier.wok 000428025400017
utb.source d-wok
dc.date.accessioned 2018-04-23T15:01:49Z
dc.date.available 2018-04-23T15:01:49Z
dc.description.sponsorship Internal Grant Agency of Tomas Bata University [IGA/FAI/2017/017]; Ministry of the Interior of the Czech Republic [VI20172019073, VI20172019054]
utb.contributor.internalauthor Ďuricová, Lucia
utb.contributor.internalauthor Hromada, Martin
utb.contributor.internalauthor Mrázek, Jan
utb.fulltext.affiliation Lucia Duricova, Martin Hromada and Jan Mrazek Faculty of Applied Informatics Tomas Bata University in Zlin Zlin, Czech Republic duricova@fai.utb.cz, hromada@fai.utb.cz, jmrazek@fai.utb.cz
utb.fulltext.dates -
utb.fulltext.references [1] L. Duricova, J. Mrazek, and M. Hromada, “The Proposal of Security and Safety Management System with Fuzzy Logic Support,” Proc. 6th Int. Defense and Homeland Security Simulation (DHSS) Workshop, held at 13th Int. Multidisciplinary Modeling and Simulation Multiconference (I3M), Larnaca (Cyprus), Sep 2016, pp. 10–14. [2] S. Crockett, S.B. Huang, K. Lee, and D. Liebling, “Protecting Soft Targets: A Case Study and Evaluation of High School Security,” Dec. 2005. [Online] Available: http://courses.cs.washington.edu/courses/csep590/05au/whitepaper_turnin/soft-targets-white-paper.pdf. [3] ISO/TC 262, Risk Management – Principles and Guidelines, ISO/IEC 31000:2009. [4] L.A. Zadeh, “Fuzzy Sets,” Information and Control, vol. 8, no. 3, pp. 338–353, Jun. 1965, doi: 10.1016/S0019-9958(65)90241-X. [5] T.S. Parsana and M.T. Patel, “A Case Study: A Process FMEA Tool to Enhance Quality and Efficiency of Manufacturing Industry,” Bonfring Int. J. Industrial Engineering and Management Science, vol. 4, no. 3, pp. 145–152, Aug. 2014. [6] C.K. Chae and J.W. Ko, “FTA-FMEA-Based Validity Verification Techniques for Safety Standards,” Korean J. Chemical Engineering, vol. 34, no. 3, pp. 619–627, Mar 2017, doi: 10.1007/s11814-016-0321-1.
utb.fulltext.sponsorship This project is realized as the research with a doctoral student, and it is the primary input for next research, which we will develop in next term. It was realized with the support of the university. This work was supported by Internal Grant Agency of Tomas Bata University under the project No. IGA/FAI/2017/017 and by the research project VI20172019073 "Identification and methods of protection of Czech soft targets against violent acts with elaboration of a warning system", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019 and by the research project VI20172019054 "An analytical software module for the real-time resilience evaluation from point of the converged security ", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019.
utb.wos.affiliation [Duricova, Lucia; Hromada, Martin; Mrazek, Jan] Tomas Bata Univ Zlin, Fac Appl Informat, Zlin, Czech Republic
utb.fulltext.projects IGA/FAI/2017/017
utb.fulltext.projects VI20172019073
utb.fulltext.projects VI20172019054
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam