Skip to main content

The Proposal of the Soft Targets Security

  • Conference paper
  • First Online:
Automation Control Theory Perspectives in Intelligent Systems (CSOC 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 466))

Included in the following conference series:

Abstract

The proposal of the soft targets security contains with technical and management solutions. Management solution is based on legislative safety and security and organization management requirements. Technical solution is based on technical requirements of applied products (for example: detectors, sensors etc.) and interconnection requirements. The aim of the article is the description of the basic functional processes, which will be applied to the software architecture. The proposed solution could connect a methods, technical components and management procedures into system. The methodology exploits a lot of inputs for supporting the operating staffs in relation to smart and quickly reaction. At the end the article proposes software solution, which is realized by fuzzy logic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Dernoncourt, F.: Introduction to Fuzzy Logic. Massachusetts Institute of Technology (2013)

    Google Scholar 

  2. Klir, G.J., Yuan, B.: Fuzzy sets and fuzzy logic. In: Theory and Application, p. 574. Prentice Hall, New Jersey (1995)

    Google Scholar 

  3. Prochazkova, L.D., Hromada, M.: The proposal system for the safety assessment of soft targets with focus on school facilities. In: Proceeding of 3rd CER Comparative, vol. 2, pp. 30–33. Sciemcee Publishing, London (2015)

    Google Scholar 

  4. Rosenberg, F.: Nice Solutions for Critical Facilities. Nidam, NICE (2014)

    Google Scholar 

  5. Takagi, T., Sugeno, M.: Fuzzy identification of systems and its application to modeling and control. IEEE Trans. Syst. Man Cybern. SMC-15(1), 116–132. IEEE (1985)

    Google Scholar 

  6. Valouch, J.: Aggregated coefficient for evaluation of effectiveness of alarm systems. Int. J. Circ. Syst. Signal Process. 9, 205–2010. Oregon (2015)

    Google Scholar 

  7. Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338–353 (1965)

    Article  MATH  Google Scholar 

Download references

Acknowledgments

This project is realized as the research with doctoral student and it is the basic input for next research, which we will develop in next term. It was realized with support of the university. This work was supported by Internal Grant Agency of Tomas Bata University under the project No. IGA/FAI/2016/012.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Lucia Duricova Prochazkova or Martin Hromada .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Duricova Prochazkova, L., Hromada, M. (2016). The Proposal of the Soft Targets Security. In: Silhavy, R., Senkerik, R., Oplatkova, Z.K., Silhavy, P., Prokopova, Z. (eds) Automation Control Theory Perspectives in Intelligent Systems. CSOC 2016. Advances in Intelligent Systems and Computing, vol 466. Springer, Cham. https://doi.org/10.1007/978-3-319-33389-2_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-33389-2_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-33387-8

  • Online ISBN: 978-3-319-33389-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics