Kontaktujte nás | Jazyk: čeština English
dc.title | Soft targets – Possibilities of their identification | en |
dc.contributor.author | Lapková, Dora | |
dc.contributor.author | Kotek, Lukáš | |
dc.contributor.author | Králík, Lukáš | |
dc.relation.ispartof | Annals of DAAAM and Proceedings of the International DAAAM Symposium | |
dc.identifier.issn | 1726-9679 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.date.issued | 2018 | |
utb.relation.volume | 29 | |
utb.relation.issue | 1 | |
dc.citation.spage | 0369 | |
dc.citation.epage | 0377 | |
dc.event.title | 29th International DAAAM Symposium on Intelligent Manufacturing and Automation, DAAAM 2018 | |
dc.event.location | Zadar | |
utb.event.state-en | Croatia | |
utb.event.state-cs | Chorvatsko | |
dc.event.sdate | 2018-10-24 | |
dc.event.edate | 2018-10-27 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Danube Adria Association for Automation and Manufacturing, DAAAM | |
dc.identifier.doi | 10.2507/29th.daaam.proceedings.053 | |
dc.subject | criteria | en |
dc.subject | definition | en |
dc.subject | identification | en |
dc.subject | method | en |
dc.subject | soft target | en |
dc.description.abstract | This article is focused on the Soft targets and especially on the possibilities of their identification. The terrorist attacks are one of the biggest security problems in the modern world. The armed forces try to solve this situation and to stop these attacks. However, the solving of this security problem is not only in the competence of the armed forces. The police and the army have many advantages, but it is impossible that these people will always be everywhere. The goal of this article is to present our method of identification of the Soft targets. In the following sections, we will write about the definition of the Soft targets, their characteristics and the statistics of the terrorist attacks in 2017. The main section is about our new method of the identification of the Soft targets. During our experiment, we used several mathematical methods of classification (Scoring method, Fuller’s method, Saaty’s method). The interesting section is about future research, because we present only initial study in this article and we have ambitions to create a classification of the Soft targets and to describe possibilities of their protection – with focus on behavior analysis and profiling. © 2018, Danube Adria Association for Automation and Manufacturing, DAAAM. All rights reserved. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1008467 | |
utb.identifier.obdid | 43878944 | |
utb.identifier.scopus | 2-s2.0-85060087465 | |
utb.source | d-scopus | |
dc.date.accessioned | 2019-07-08T11:59:49Z | |
dc.date.available | 2019-07-08T11:59:49Z | |
dc.rights | Attribution-NonCommercial 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc/4.0/ | |
dc.rights.access | openAccess | |
utb.contributor.internalauthor | Lapková, Dora | |
utb.contributor.internalauthor | Kotek, Lukáš | |
utb.contributor.internalauthor | Králík, Lukáš | |
utb.fulltext.affiliation | Dora Lapkova, Lukas Kotek, Lukas Kralik Tomas Bata University in Zlín, Zlín, Czech Republic | |
utb.fulltext.dates | - | |
utb.scopus.affiliation | Tomas Bata University in Zlín, Zlín, Czech Republic |