Academic literature on the topic 'Object perimeter security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Object perimeter security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Object perimeter security"

1

Lakhno, Valeriy, Alexander Petrov, and Inna Nagorna. "Development of a support system for managing the cyber protection of an information object." Zeszyty Naukowe Wyższej Szkoły Humanitas Zarządzanie 18, no. 3 (September 29, 2017): 0. http://dx.doi.org/10.5604/01.3001.0010.6496.

Full text
Abstract:
The information is being discussed and its characteristics in the system of enterprise management. The model of operational management information and cyber security (CS) object forms a rational set of remedies based on morphological approach. Unlike existing solutions, the model prepared on the basis of intelligent decision support, a morphological matrix for each facility’s perimeters of information protection, and can generate a set of options for remedies which take into account the compatibility of software and hardware. The choice of the optimal option set for that perimeter protection of information, implements an objective function that maximizes the ratio of the sum “security information” to the total rate “cost.”
APA, Harvard, Vancouver, ISO, and other styles
2

Khaing, Kyi Kyi, Kyi Kyi Khaing, and Tin Tin Nwet. "Perimeter Intrusion Detective System using Arduino." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (November 1, 2019): 135–40. http://dx.doi.org/10.11591/aptikom.j.csit.154.

Full text
Abstract:
Perimeter intrusion detection systems are an integral part of most physical security systems. Perimeter fencing is widely used to isolate and protect public and private places such as airports, military bases, power stations and security related applications. Fence structures merely prevent a percentage of intrusions or postpone them. A higher level of security needed to monitor and investigate activities on or around the university. Perimeter Intrusion Detection System (PID) focusing on the fence intrusions. The system used major components as Arduino board, 8x8 LED display, ultrasonic sensor, 16x2 LCD display module and speaker. The unauthorized person who tries to intrude the university would be sensed, detected and alarm would generate a signal that an intruder was trying to enter the university. The sound level depended on the distance, the nearer the intruder and stronger would be the alarm signal. PID system displayed the distance of the object or personal found in its region on the LCD display. This system was very useful for security applications. Ultrasonic sensor would be searching if there was a motion in its range.
APA, Harvard, Vancouver, ISO, and other styles
3

Hemaanand, M., V. Sanjay Kumar, and R. Karthika. "Smart Surveillance System Using Computer Vision and Internet of Things." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 68–73. http://dx.doi.org/10.1166/jctn.2020.8631.

Full text
Abstract:
With the evolution of technology ensuring people for their safety and security all around the time constantly is a big challenge. We propose an advanced technique based on deep learning and artificial intelligence platform that can monitor the people, their homes and their surroundings providing them a quantifiable increase in security. We have surveillance cameras in our homes for video capture as well as security purposes. Our proposed technique is to detect and classify as well as inform the user if there is any breach in security of the classified object using the cameras by implementing deep learning techniques and the technology of internet of things. It can serve as a perimeter monitoring and intruder alert system in smart surveillance environment. This paper provides a well-defined structure for live stream data analysis. It overcomes the challenge of static closed circuit cameras television as it serves as a motion based tracking system and monitors events in real time to ensure activities are limited to specific persons within authorized areas. It has the advantage of creating multiple bounding boxes to track down the objects which could be any living or non-living thing based on the trained modules. The trespasser or intruder can be efficiently detected using the CCTV camera surveillance which is being supported by the real-time object classifier algorithm at the intermediate module. The proposed method is mainly supported by the real time object detection and classification which is implemented using Mobile Net and Single shot detector.
APA, Harvard, Vancouver, ISO, and other styles
4

Аль-Хафаджі, Ахмед Валід, Олександр Олександрович Соловйов, Дмитро Дмитрович Узун, and Вячеслав Сергійович Харченко. "МЕТОД АНАЛІЗУ РИЗИКІВ ДОСТУПУ ДО АКТИВІВ В СИСТЕМАХ ФІЗИЧНОГО ЗАХИСТУ." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 4 (December 25, 2019): 94–104. http://dx.doi.org/10.32620/reks.2019.4.11.

Full text
Abstract:
The subject of study in the article is asset access risk analysis methods inside a physical object. As an example, we consider the object of the physical security system of a scientific institution (as a block of a territorial element) with a hardware environment in the form of devices with low energy consumption and functioning in the Internet of things. The goal is to create a theoretical and mathematical model and method for analyzing the internal components of a security system and access to assets. The tasks set to cover the development of an approach to the analysis of the level of security, which is ensured by the established system of physical security and the formation of an approach to penetration to access assets. In solving the problems, methods were used such as spatial analysis of the physical distribution of system elements, the formation of route graphs, decomposition of blocks and physical protection algorithms, the study of a complete set of components and an individually oriented security element. The following results were obtained: an approach to the analysis of the security level of a physical object using basic parameters consisting of physical and information variables of existing multiple assets was developed, a mathematical model of the system components, block orientation of the perimeter of the object was built, a sequence of stages of penetration into a protected object using multiple routes was proposed. Conclusions: the scientific novelty of the results is as follows: the method of analyzing asset security through the use of environment variables and physical security controls of the facility, as well as the generation and evaluation of penetration routes to the facility to access critical assets, has been improved.
APA, Harvard, Vancouver, ISO, and other styles
5

Yuliana, Dina, and Wasjud Wasjud. "Evaluasi Pengamanan Penerbangan di Bandara Ahmad Yani - Semarang." WARTA ARDHIA 37, no. 2 (June 30, 2012): 177–85. http://dx.doi.org/10.25104/wa.v37i2.105.177-185.

Full text
Abstract:
Security is a fundamental factor that must be met by an airport in which to achieve such security, among which must be fulfilled bothin terms of both quantity and quality of personel anda flight safety equipment.Flight security evaluation at Ahmad Yani Airport - Hyderabad aims to determine the condition of safety Ahmad Yani Airport - Semarang associated with personnel, facilities and security procedures at airports.The observation result shows less sensitive walk trhough metal detector (WTMD) VIP room and a space in the SCP 2 is less adequate, there is still a lack of female officersfor inspection atthe X-Ray, use your check has not been consistent securitystickers, the laying of goods in X-Ray is stillthere that were stacked, the object of vital airport (such as: tower) is not guarded by security, control access to the entire perimeter, is not yet available Airport Security Program (ASP) and Airport Emergency plan (AEP) has not been updated.
APA, Harvard, Vancouver, ISO, and other styles
6

Juliansyah, Akbar, Ramlah Ramlah, and Dewi Nadiani. "Sistem Pendeteksi Gerak Menggunakan Sensor PIR dan Raspberry Pi." JTIM : Jurnal Teknologi Informasi dan Multimedia 2, no. 4 (February 6, 2021): 199–205. http://dx.doi.org/10.35746/jtim.v2i4.113.

Full text
Abstract:
Digital security and monitoring systems are entering a new era. Every industry is busy developing security systems according to their individual needs. What can be done is by providing a security perimeter around the assets to prevent unwanted things. There are currently many CCTV (Closed Circuit Television) based security systems; CCTV security systems also have less effective because they require more devices and large enough storage memory. Also, there are other solutions, namely systems that are built using PIR sensors and Raspberry Pi. The PIR sensor is used to detect infrared emissions from humans, so the target object is a human. The PIR sensor also receives heat radiation from humans, so when humans move, this sensor will receive changes in radiation emitted by humans. The purpose of this study is to simulate a solution to the problem of infrastructure design for the development of a physical asset security system using a Wireless Sensor Network and to find out how the security system works using a PIR sensor and Raspberry Pi Model B. The research method used is the Network Development Life Cycle (NDLC) approach. This study illustrates that the Raspberry Pi with hardware capabilities and Rasbian OS and the Python programming language support building a security system. The HC-SR501 PIR sensor can also detect moving objects from the right, left, and front. Email and SMS can be well integrated to produce reports according to the sensor's movement.
APA, Harvard, Vancouver, ISO, and other styles
7

Jevčák, Jaroslav, Miroslav Kelemen, Matej Antoško, Ladislav Choma, and Jaroslaw Kozuba. "Avigilon compact camera’s test for integrated safety system within airport security." Archives of Transport 55, no. 3 (September 30, 2020): 17–26. http://dx.doi.org/10.5604/01.3001.0014.4200.

Full text
Abstract:
The article presents an experimental exploration of the selected technical features of the Avigilon 2.0C-H4A-BO1-IR Compact Zoom Camera with IR Adaptive Illumination. The article describes the purpose, procedure, and results of the motion detection verification, as well as the identification of motion detection errors, using Avigilon's investigated camera, to the distance of guaranteed recognition capability in specific daylight conditions that determines video analysis. This article constitutes the first part of the internal research activity of the Department of Flight Preparation - pre-research, for the design of an integrated mobile airport security system. For safety reasons, the testing was performed near the airport and not at the airport. The test sample was obtained by using the Avigilon 2.0C-H4A-BO1-IR camera located 8 meters above the ground level in the direction of the selected perimeter of the "protected area" for the experiment. The movement in the space was made by people and the passage of motor vehicles at a distance that was less than the distance guaranteed by the camera's recognition capability in the specific daylight conditions. The movement of persons and motor vehicles was generally performed perpendicular to the position of the camera, left to right, and/or back. The speed of movement of people was, as a rule, an average walking speed of 1m/s, the motor vehicles ranging up to 40km /h. Identification of motion detection errors is important for corrections of the prepared information model of security risk assessment of a protected object based on the fuzzy logic to support the airport security management decisions, as well as for finding a technical solution to eliminate these camera vulnerabilities, or selecting and testing another camera for our mobile technology platform. The results advance our theoretical knowledge and have a praxeological significance for the creation of a technological demonstrator and subsequently a prototype of a smart mobile airport security system. Institutions responsible for the protection of state borders, the fight against illegal migration, smuggling of goods, etc. are also interested in mobile security solutions.
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Weijie, Feihong Yu, Shuaiqi Liu, Dongrui Xiao, Jie Hu, Fang Zhao, Weihao Lin, et al. "Real-Time Multi-Class Disturbance Detection for Φ-OTDR Based on YOLO Algorithm." Sensors 22, no. 5 (March 3, 2022): 1994. http://dx.doi.org/10.3390/s22051994.

Full text
Abstract:
This paper proposes a real-time multi-class disturbance detection algorithm based on YOLO for distributed fiber vibration sensing. The algorithm achieves real-time detection of event location and classification on external intrusions sensed by distributed optical fiber sensing system (DOFS) based on phase-sensitive optical time-domain reflectometry (Φ-OTDR). We conducted data collection under perimeter security scenarios and acquired five types of events with a total of 5787 samples. The data is used as a spatial–temporal sensing image in the training of our proposed YOLO-based model (You Only Look Once-based method). Our scheme uses the Darknet53 network to simplify the traditional two-step object detection into a one-step process, using one network structure for both event localization and classification, thus improving the detection speed to achieve real-time operation. Compared with the traditional Fast-RCNN (Fast Region-CNN) and Faster-RCNN (Faster Region-CNN) algorithms, our scheme can achieve 22.83 frames per second (FPS) while maintaining high accuracy (96.14%), which is 44.90 times faster than Fast-RCNN and 3.79 times faster than Faster-RCNN. It achieves real-time operation for locating and classifying intrusion events with continuously recorded sensing data. Experimental results have demonstrated that this scheme provides a solution to real-time, multi-class external intrusion events detection and classification for the Φ-OTDR-based DOFS in practical applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Vlasov, V. P., A. V. Bolotin, S. M. Sergeev, and A. A. Lunegova. "CAUSES OF DEFORMATION OF THE FOUNDATION STRUCTURES OF THE PASSENGER TERMINAL AIRPORT "SOKOL" (MAGADAN)." Construction and Geotechnics 11, no. 1 (December 15, 2020): 68–79. http://dx.doi.org/10.15593/2224-9826/2020.1.07.

Full text
Abstract:
The main purpose of the reconstruction of this airport is to ensure that the engineering infrastructure complies with the modern requirements of air transportation services and transport security. In our opinion, the list of objects of reconstruction, which now includes an apron, lighting equipment, two checkpoints, a system for lighting aircraft parking places, a water supply network, communications, heat, perimeter fencing, etc., must necessarily enter and passenger terminal. While it is not listed. The article deals with the problem of determining the reliability and future operational suitability of the base and foundations of the passenger terminal at the «Sokol Magadan Airport» with a service life of more than 50 years. In this regard, a brief description of the natural conditions of the territory of the specified object is given. The peculiarity of the construction area is its seismicity (up to 8 points), deep seasonal freezing and insular distribution of permafrost soils. The problem is due to the fact that this building, consisting of two independent blocks, each of which was erected in different years on different types of pile foundations, practically began to undergo deformations after their commissioning. These deformations are manifested and manifest now on the external and internal walls in the form of cracks of different sizes. An attempt to determine their causes was made during the construction of the second half of the building, but it coincided in time with the collapse of the USSR, and therefore was not brought to a logical end. The object was put into operation without correcting the existing errors in the foundation device and foundation structures, as well as the necessary strengthening measures in such cases. In the future, it was limited to periodic redecoration and decommissioning of the most dangerous premises for people to visit. The present paper assesses the very difficult natural conditions of the territory (climate, island degrading permafrost, seismic), where the «Sokol Airport» has been operating for more than half a century. During this time, many objects of its engineering infrastructure as a result of negative interaction with the environment have received noticeable physical and moral deterioration. These include the passenger terminal. In this regard, they almost all need modern modernization and reconstruction, especially since «Sokol Airport» has received international status of Federal significance. The article substantiates the need for a geotechnical survey of the base and foundations of a deformable building. The implementation of this work is due to the alleged reprofiling of the problem building under the cargo terminal. The results of the survey will be used in the design of a new passenger terminal.
APA, Harvard, Vancouver, ISO, and other styles
10

RYCHAGO, MIKHAIL E., and ANNA V. KHOROSHEVA. "Analytical methods for assessing the effectiveness of equipment by the ITSON complex of protected objects of the penal system of the Russian Federation." Vedomosti (Knowledge) of the Penal System 234, no. 11 (2021): 73–80. http://dx.doi.org/10.51522/2307-0382-2021-234-11-73-80.

Full text
Abstract:
The article considers the issues of obtaining analytical assessments of the effectiveness of the ITSON complexes existing at the penal system objects of protection. The methodological basis of the research was formed by the method of analysis of hierarchies as well as statistical and formal-logical methods. Based on the analysis of the literature, departmental orders and the processing of empirical data, features of functioning of the security systems of correctional institutions and similar facilities equipped with ITSON complexes, as well as issues of determining the quantitative indicators of the effectiveness of such systems, have been investigated. The models and methods of analytical evaluation of the equipment efficiency by the ITSON complex of the protected FPS objects have been studied. Calculated examples of defining the security of an object's perimeter security system based on the method of analyzing hierarchies are constructed, allowing their computer implementation using e-spreadsheets and special-purpose software. Conclusions are made about the importance of the practical application of the proposed methods and the developed algorithms in the practice of commissioning examinations of the ITSON complexes at the protected FPS objects. Key words: ITSON complex, security system, hierarchy analysis method, comparison criterion, priority vector, perimeter section, efficiency assessment.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Object perimeter security"

1

Колесник, Константин Васильевич, and Г. М. Виноградов. "Радиолучевые охранные средства с фазированными антенными решетками." Thesis, ИЦ "Политехпериодика", 2015. http://repository.kpi.kharkov.ua/handle/KhPI-Press/26946.

Full text
Abstract:
Представлен обзор результатов работ, связанных с исследованиями технических средств охраны объектов различного назначения, которые проводились с участием авторов в течение ряда лет. Одним из таких средств являются электромагнитные заборы. Предложено использовать в системах формирования электромагнитного поля заданной формы в качестве излучателей микрополосковые фазированные антенные решетки (ФАР). Показаны основные направления совершенствования радиолучевых охранных средств с ФАР.
APA, Harvard, Vancouver, ISO, and other styles
2

Michálek, Libor. "Komplexní zabezpečení objektů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-218836.

Full text
Abstract:
In my thesis I go about principles and methods of security systems, then I go about analysis of avalaible types of security systems (EPS, EZS and CCTV). I have written about their possibile use in design security building. I have described levels of project documentation and its different parts including process service of production a project documentation for security system. I used all knowledges in the end of my thesis, when I designed and integrated security system for a special building.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Object perimeter security"

1

Szustakowski, Mieczyslaw, Wieslaw M. Ciurapinski, Marek Zyczkowski, Norbert Palka, Mariusz Kastek, Rafal Dulski, Grzegorz Bieszczad, and Tomasz Sosnowski. "Multispectral system for perimeter protection of stationary and moving objects." In SPIE Europe Security + Defence, edited by David A. Huckridge and Reinhard R. Ebert. SPIE, 2009. http://dx.doi.org/10.1117/12.830051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ciurapiński, Wieslaw, Rafal Dulski, Mariusz Kastek, Mieczyslaw Szustakowski, Grzegorz Bieszczad, Marek Życzkowski, Piotr Trzaskawka, and Marek Piszczek. "Data fusion concept in multispectral system for perimeter protection of stationary and moving objects." In SPIE Europe Security + Defence, edited by David A. Huckridge and Reinhard R. Ebert. SPIE, 2009. http://dx.doi.org/10.1117/12.830395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography