The Proposal of the Soft Targets Security

  • Lucia Duricova ProchazkovaEmail author
  • Martin HromadaEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 466)


The proposal of the soft targets security contains with technical and management solutions. Management solution is based on legislative safety and security and organization management requirements. Technical solution is based on technical requirements of applied products (for example: detectors, sensors etc.) and interconnection requirements. The aim of the article is the description of the basic functional processes, which will be applied to the software architecture. The proposed solution could connect a methods, technical components and management procedures into system. The methodology exploits a lot of inputs for supporting the operating staffs in relation to smart and quickly reaction. At the end the article proposes software solution, which is realized by fuzzy logic.


Security System Soft targets Safety Security 



This project is realized as the research with doctoral student and it is the basic input for next research, which we will develop in next term. It was realized with support of the university. This work was supported by Internal Grant Agency of Tomas Bata University under the project No. IGA/FAI/2016/012.


  1. 1.
    Dernoncourt, F.: Introduction to Fuzzy Logic. Massachusetts Institute of Technology (2013)Google Scholar
  2. 2.
    Klir, G.J., Yuan, B.: Fuzzy sets and fuzzy logic. In: Theory and Application, p. 574. Prentice Hall, New Jersey (1995)Google Scholar
  3. 3.
    Prochazkova, L.D., Hromada, M.: The proposal system for the safety assessment of soft targets with focus on school facilities. In: Proceeding of 3rd CER Comparative, vol. 2, pp. 30–33. Sciemcee Publishing, London (2015)Google Scholar
  4. 4.
    Rosenberg, F.: Nice Solutions for Critical Facilities. Nidam, NICE (2014)Google Scholar
  5. 5.
    Takagi, T., Sugeno, M.: Fuzzy identification of systems and its application to modeling and control. IEEE Trans. Syst. Man Cybern. SMC-15(1), 116–132. IEEE (1985)CrossRefGoogle Scholar
  6. 6.
    Valouch, J.: Aggregated coefficient for evaluation of effectiveness of alarm systems. Int. J. Circ. Syst. Signal Process. 9, 205–2010. Oregon (2015)Google Scholar
  7. 7.
    Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338–353 (1965)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (, which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Authors and Affiliations

  1. 1.Faculty of Applied InformaticsTomas Bata Univerzity in ZlinZlinCzech Republic

Personalised recommendations