To see the other types of publications on this topic, follow the link: Object perimeter security.

Journal articles on the topic 'Object perimeter security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 25 journal articles for your research on the topic 'Object perimeter security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lakhno, Valeriy, Alexander Petrov, and Inna Nagorna. "Development of a support system for managing the cyber protection of an information object." Zeszyty Naukowe Wyższej Szkoły Humanitas Zarządzanie 18, no. 3 (September 29, 2017): 0. http://dx.doi.org/10.5604/01.3001.0010.6496.

Full text
Abstract:
The information is being discussed and its characteristics in the system of enterprise management. The model of operational management information and cyber security (CS) object forms a rational set of remedies based on morphological approach. Unlike existing solutions, the model prepared on the basis of intelligent decision support, a morphological matrix for each facility’s perimeters of information protection, and can generate a set of options for remedies which take into account the compatibility of software and hardware. The choice of the optimal option set for that perimeter protection of information, implements an objective function that maximizes the ratio of the sum “security information” to the total rate “cost.”
APA, Harvard, Vancouver, ISO, and other styles
2

Khaing, Kyi Kyi, Kyi Kyi Khaing, and Tin Tin Nwet. "Perimeter Intrusion Detective System using Arduino." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (November 1, 2019): 135–40. http://dx.doi.org/10.11591/aptikom.j.csit.154.

Full text
Abstract:
Perimeter intrusion detection systems are an integral part of most physical security systems. Perimeter fencing is widely used to isolate and protect public and private places such as airports, military bases, power stations and security related applications. Fence structures merely prevent a percentage of intrusions or postpone them. A higher level of security needed to monitor and investigate activities on or around the university. Perimeter Intrusion Detection System (PID) focusing on the fence intrusions. The system used major components as Arduino board, 8x8 LED display, ultrasonic sensor, 16x2 LCD display module and speaker. The unauthorized person who tries to intrude the university would be sensed, detected and alarm would generate a signal that an intruder was trying to enter the university. The sound level depended on the distance, the nearer the intruder and stronger would be the alarm signal. PID system displayed the distance of the object or personal found in its region on the LCD display. This system was very useful for security applications. Ultrasonic sensor would be searching if there was a motion in its range.
APA, Harvard, Vancouver, ISO, and other styles
3

Hemaanand, M., V. Sanjay Kumar, and R. Karthika. "Smart Surveillance System Using Computer Vision and Internet of Things." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 68–73. http://dx.doi.org/10.1166/jctn.2020.8631.

Full text
Abstract:
With the evolution of technology ensuring people for their safety and security all around the time constantly is a big challenge. We propose an advanced technique based on deep learning and artificial intelligence platform that can monitor the people, their homes and their surroundings providing them a quantifiable increase in security. We have surveillance cameras in our homes for video capture as well as security purposes. Our proposed technique is to detect and classify as well as inform the user if there is any breach in security of the classified object using the cameras by implementing deep learning techniques and the technology of internet of things. It can serve as a perimeter monitoring and intruder alert system in smart surveillance environment. This paper provides a well-defined structure for live stream data analysis. It overcomes the challenge of static closed circuit cameras television as it serves as a motion based tracking system and monitors events in real time to ensure activities are limited to specific persons within authorized areas. It has the advantage of creating multiple bounding boxes to track down the objects which could be any living or non-living thing based on the trained modules. The trespasser or intruder can be efficiently detected using the CCTV camera surveillance which is being supported by the real-time object classifier algorithm at the intermediate module. The proposed method is mainly supported by the real time object detection and classification which is implemented using Mobile Net and Single shot detector.
APA, Harvard, Vancouver, ISO, and other styles
4

Аль-Хафаджі, Ахмед Валід, Олександр Олександрович Соловйов, Дмитро Дмитрович Узун, and Вячеслав Сергійович Харченко. "МЕТОД АНАЛІЗУ РИЗИКІВ ДОСТУПУ ДО АКТИВІВ В СИСТЕМАХ ФІЗИЧНОГО ЗАХИСТУ." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 4 (December 25, 2019): 94–104. http://dx.doi.org/10.32620/reks.2019.4.11.

Full text
Abstract:
The subject of study in the article is asset access risk analysis methods inside a physical object. As an example, we consider the object of the physical security system of a scientific institution (as a block of a territorial element) with a hardware environment in the form of devices with low energy consumption and functioning in the Internet of things. The goal is to create a theoretical and mathematical model and method for analyzing the internal components of a security system and access to assets. The tasks set to cover the development of an approach to the analysis of the level of security, which is ensured by the established system of physical security and the formation of an approach to penetration to access assets. In solving the problems, methods were used such as spatial analysis of the physical distribution of system elements, the formation of route graphs, decomposition of blocks and physical protection algorithms, the study of a complete set of components and an individually oriented security element. The following results were obtained: an approach to the analysis of the security level of a physical object using basic parameters consisting of physical and information variables of existing multiple assets was developed, a mathematical model of the system components, block orientation of the perimeter of the object was built, a sequence of stages of penetration into a protected object using multiple routes was proposed. Conclusions: the scientific novelty of the results is as follows: the method of analyzing asset security through the use of environment variables and physical security controls of the facility, as well as the generation and evaluation of penetration routes to the facility to access critical assets, has been improved.
APA, Harvard, Vancouver, ISO, and other styles
5

Yuliana, Dina, and Wasjud Wasjud. "Evaluasi Pengamanan Penerbangan di Bandara Ahmad Yani - Semarang." WARTA ARDHIA 37, no. 2 (June 30, 2012): 177–85. http://dx.doi.org/10.25104/wa.v37i2.105.177-185.

Full text
Abstract:
Security is a fundamental factor that must be met by an airport in which to achieve such security, among which must be fulfilled bothin terms of both quantity and quality of personel anda flight safety equipment.Flight security evaluation at Ahmad Yani Airport - Hyderabad aims to determine the condition of safety Ahmad Yani Airport - Semarang associated with personnel, facilities and security procedures at airports.The observation result shows less sensitive walk trhough metal detector (WTMD) VIP room and a space in the SCP 2 is less adequate, there is still a lack of female officersfor inspection atthe X-Ray, use your check has not been consistent securitystickers, the laying of goods in X-Ray is stillthere that were stacked, the object of vital airport (such as: tower) is not guarded by security, control access to the entire perimeter, is not yet available Airport Security Program (ASP) and Airport Emergency plan (AEP) has not been updated.
APA, Harvard, Vancouver, ISO, and other styles
6

Juliansyah, Akbar, Ramlah Ramlah, and Dewi Nadiani. "Sistem Pendeteksi Gerak Menggunakan Sensor PIR dan Raspberry Pi." JTIM : Jurnal Teknologi Informasi dan Multimedia 2, no. 4 (February 6, 2021): 199–205. http://dx.doi.org/10.35746/jtim.v2i4.113.

Full text
Abstract:
Digital security and monitoring systems are entering a new era. Every industry is busy developing security systems according to their individual needs. What can be done is by providing a security perimeter around the assets to prevent unwanted things. There are currently many CCTV (Closed Circuit Television) based security systems; CCTV security systems also have less effective because they require more devices and large enough storage memory. Also, there are other solutions, namely systems that are built using PIR sensors and Raspberry Pi. The PIR sensor is used to detect infrared emissions from humans, so the target object is a human. The PIR sensor also receives heat radiation from humans, so when humans move, this sensor will receive changes in radiation emitted by humans. The purpose of this study is to simulate a solution to the problem of infrastructure design for the development of a physical asset security system using a Wireless Sensor Network and to find out how the security system works using a PIR sensor and Raspberry Pi Model B. The research method used is the Network Development Life Cycle (NDLC) approach. This study illustrates that the Raspberry Pi with hardware capabilities and Rasbian OS and the Python programming language support building a security system. The HC-SR501 PIR sensor can also detect moving objects from the right, left, and front. Email and SMS can be well integrated to produce reports according to the sensor's movement.
APA, Harvard, Vancouver, ISO, and other styles
7

Jevčák, Jaroslav, Miroslav Kelemen, Matej Antoško, Ladislav Choma, and Jaroslaw Kozuba. "Avigilon compact camera’s test for integrated safety system within airport security." Archives of Transport 55, no. 3 (September 30, 2020): 17–26. http://dx.doi.org/10.5604/01.3001.0014.4200.

Full text
Abstract:
The article presents an experimental exploration of the selected technical features of the Avigilon 2.0C-H4A-BO1-IR Compact Zoom Camera with IR Adaptive Illumination. The article describes the purpose, procedure, and results of the motion detection verification, as well as the identification of motion detection errors, using Avigilon's investigated camera, to the distance of guaranteed recognition capability in specific daylight conditions that determines video analysis. This article constitutes the first part of the internal research activity of the Department of Flight Preparation - pre-research, for the design of an integrated mobile airport security system. For safety reasons, the testing was performed near the airport and not at the airport. The test sample was obtained by using the Avigilon 2.0C-H4A-BO1-IR camera located 8 meters above the ground level in the direction of the selected perimeter of the "protected area" for the experiment. The movement in the space was made by people and the passage of motor vehicles at a distance that was less than the distance guaranteed by the camera's recognition capability in the specific daylight conditions. The movement of persons and motor vehicles was generally performed perpendicular to the position of the camera, left to right, and/or back. The speed of movement of people was, as a rule, an average walking speed of 1m/s, the motor vehicles ranging up to 40km /h. Identification of motion detection errors is important for corrections of the prepared information model of security risk assessment of a protected object based on the fuzzy logic to support the airport security management decisions, as well as for finding a technical solution to eliminate these camera vulnerabilities, or selecting and testing another camera for our mobile technology platform. The results advance our theoretical knowledge and have a praxeological significance for the creation of a technological demonstrator and subsequently a prototype of a smart mobile airport security system. Institutions responsible for the protection of state borders, the fight against illegal migration, smuggling of goods, etc. are also interested in mobile security solutions.
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Weijie, Feihong Yu, Shuaiqi Liu, Dongrui Xiao, Jie Hu, Fang Zhao, Weihao Lin, et al. "Real-Time Multi-Class Disturbance Detection for Φ-OTDR Based on YOLO Algorithm." Sensors 22, no. 5 (March 3, 2022): 1994. http://dx.doi.org/10.3390/s22051994.

Full text
Abstract:
This paper proposes a real-time multi-class disturbance detection algorithm based on YOLO for distributed fiber vibration sensing. The algorithm achieves real-time detection of event location and classification on external intrusions sensed by distributed optical fiber sensing system (DOFS) based on phase-sensitive optical time-domain reflectometry (Φ-OTDR). We conducted data collection under perimeter security scenarios and acquired five types of events with a total of 5787 samples. The data is used as a spatial–temporal sensing image in the training of our proposed YOLO-based model (You Only Look Once-based method). Our scheme uses the Darknet53 network to simplify the traditional two-step object detection into a one-step process, using one network structure for both event localization and classification, thus improving the detection speed to achieve real-time operation. Compared with the traditional Fast-RCNN (Fast Region-CNN) and Faster-RCNN (Faster Region-CNN) algorithms, our scheme can achieve 22.83 frames per second (FPS) while maintaining high accuracy (96.14%), which is 44.90 times faster than Fast-RCNN and 3.79 times faster than Faster-RCNN. It achieves real-time operation for locating and classifying intrusion events with continuously recorded sensing data. Experimental results have demonstrated that this scheme provides a solution to real-time, multi-class external intrusion events detection and classification for the Φ-OTDR-based DOFS in practical applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Vlasov, V. P., A. V. Bolotin, S. M. Sergeev, and A. A. Lunegova. "CAUSES OF DEFORMATION OF THE FOUNDATION STRUCTURES OF THE PASSENGER TERMINAL AIRPORT "SOKOL" (MAGADAN)." Construction and Geotechnics 11, no. 1 (December 15, 2020): 68–79. http://dx.doi.org/10.15593/2224-9826/2020.1.07.

Full text
Abstract:
The main purpose of the reconstruction of this airport is to ensure that the engineering infrastructure complies with the modern requirements of air transportation services and transport security. In our opinion, the list of objects of reconstruction, which now includes an apron, lighting equipment, two checkpoints, a system for lighting aircraft parking places, a water supply network, communications, heat, perimeter fencing, etc., must necessarily enter and passenger terminal. While it is not listed. The article deals with the problem of determining the reliability and future operational suitability of the base and foundations of the passenger terminal at the «Sokol Magadan Airport» with a service life of more than 50 years. In this regard, a brief description of the natural conditions of the territory of the specified object is given. The peculiarity of the construction area is its seismicity (up to 8 points), deep seasonal freezing and insular distribution of permafrost soils. The problem is due to the fact that this building, consisting of two independent blocks, each of which was erected in different years on different types of pile foundations, practically began to undergo deformations after their commissioning. These deformations are manifested and manifest now on the external and internal walls in the form of cracks of different sizes. An attempt to determine their causes was made during the construction of the second half of the building, but it coincided in time with the collapse of the USSR, and therefore was not brought to a logical end. The object was put into operation without correcting the existing errors in the foundation device and foundation structures, as well as the necessary strengthening measures in such cases. In the future, it was limited to periodic redecoration and decommissioning of the most dangerous premises for people to visit. The present paper assesses the very difficult natural conditions of the territory (climate, island degrading permafrost, seismic), where the «Sokol Airport» has been operating for more than half a century. During this time, many objects of its engineering infrastructure as a result of negative interaction with the environment have received noticeable physical and moral deterioration. These include the passenger terminal. In this regard, they almost all need modern modernization and reconstruction, especially since «Sokol Airport» has received international status of Federal significance. The article substantiates the need for a geotechnical survey of the base and foundations of a deformable building. The implementation of this work is due to the alleged reprofiling of the problem building under the cargo terminal. The results of the survey will be used in the design of a new passenger terminal.
APA, Harvard, Vancouver, ISO, and other styles
10

RYCHAGO, MIKHAIL E., and ANNA V. KHOROSHEVA. "Analytical methods for assessing the effectiveness of equipment by the ITSON complex of protected objects of the penal system of the Russian Federation." Vedomosti (Knowledge) of the Penal System 234, no. 11 (2021): 73–80. http://dx.doi.org/10.51522/2307-0382-2021-234-11-73-80.

Full text
Abstract:
The article considers the issues of obtaining analytical assessments of the effectiveness of the ITSON complexes existing at the penal system objects of protection. The methodological basis of the research was formed by the method of analysis of hierarchies as well as statistical and formal-logical methods. Based on the analysis of the literature, departmental orders and the processing of empirical data, features of functioning of the security systems of correctional institutions and similar facilities equipped with ITSON complexes, as well as issues of determining the quantitative indicators of the effectiveness of such systems, have been investigated. The models and methods of analytical evaluation of the equipment efficiency by the ITSON complex of the protected FPS objects have been studied. Calculated examples of defining the security of an object's perimeter security system based on the method of analyzing hierarchies are constructed, allowing their computer implementation using e-spreadsheets and special-purpose software. Conclusions are made about the importance of the practical application of the proposed methods and the developed algorithms in the practice of commissioning examinations of the ITSON complexes at the protected FPS objects. Key words: ITSON complex, security system, hierarchy analysis method, comparison criterion, priority vector, perimeter section, efficiency assessment.
APA, Harvard, Vancouver, ISO, and other styles
11

Utin, L. L., A. V. Pavlovsky, A. A. Olkhovik, and A. V. Makatserchyk. "Analysis results of experimental operation of the protection complex of long perimeters VM 8018." Doklady BGUIR 19, no. 3 (June 2, 2021): 96–103. http://dx.doi.org/10.35596/1729-7648-2021-19-3-96-103.

Full text
Abstract:
In recent years, technical means of perimeter security are becoming more widespread, which is due to their increasing efficiency of protection from unauthorized access by intruders to protected facilities. The high competition of manufacturers of such means has led to the emergence of a variety of technical solutions for detection means (hereinafter referred to as DT) operating on different physical principles and designed to solve specific problems. The main purpose of the DT is to ensure the detection of the facts of intruders' penetration through the guarded obstacle. Considering that the methods of intruders' penetration are varied (destruction of fences, climbing over the fence, digging under the fence, etc.), the creation of an effective security system using only one type of DT is a problematic task. At the same time, the autonomous use of many types of DT leads to the fact that there will be a large number of technical means in the duty room, which increase not only the time and financial costs for their maintenance, but also increase the requirements for the competence of the duty personnel. Research Institute of Electronic Computers has developed the complex VM 8018, designed to automate the process of protecting extended perimeters of objects for various purposes, including sections of the state border, perimeters and premises of outposts, extendedperimeters of industrial and military facilities, as well as controlling executive devices (electric drives for gates and gates, lighting etc.), video surveillance.
APA, Harvard, Vancouver, ISO, and other styles
12

Kraus, Jakub, Petr Fajčík, Peter Vittek, and Tomáš Duša. "The use of Wireless Sensor Network for increasing airport security." MAD - Magazine of Aviation Development 1, no. 6 (November 15, 2013): 4. http://dx.doi.org/10.14311/mad.2013.06.01.

Full text
Abstract:
<span style="line-height: 115%; font-family: 'Times New Roman','serif'; font-size: 9pt; mso-fareast-font-family: Calibri; mso-ansi-language: EN-GB; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-theme-font: minor-latin;" lang="EN-GB">This article focuses on the use of wireless sensor networks for airport security, respectively using sensor networks as a replacement or add-on to existing security measures. The article describes the sensor network and its possible application to various airport objects and financial analysis of the perimeter security with wireless sensor network.<strong> </strong></span>
APA, Harvard, Vancouver, ISO, and other styles
13

KOMMEY, BENJAMIN, SETH KOTEY, ERIC TUTU, and DANIEL OPOKU. "PRIVATE SECURITY SURVEILLANCE SYSTEM." Journal of Engineering Studies and Research 27, no. 2 (October 10, 2021): 39–50. http://dx.doi.org/10.29081/jesr.v27i2.271.

Full text
Abstract:
Security is an essential need for man. Without the sense of security, daily human activities will be greatly affected. Most people go to great lengths to ensure there is a presence of security in their environment, often employing dedicated personnel to keep watch over them and their property. This paper proposes a design of a microcontroller based electronic security system which helps to detect possible intruders to a home. This security system is designed to reduce the need of having personnel stationed as security guards over a home. It has the primary unit called the Area Watch Unit (AWU) consisting of a motion detection unit that effectively detects motion around specified perimeters which is then followed by a computer vision to identify and classify what caused the motion. A facial recognition algorithm is run on the face extracted from the image captured after the object that caused the motion is identified and classified as human. Access is then granted to the individual if the results from the facial recognition is positive otherwise a message is sent to the owner of the home indicating a possible intruder is present. There is also a Final Recovery Unit (FRU) which sends a message to the owner of the home and sounds an alarm whiles flashing lights in the event that the Area Watch Unit (AWU) is by-passed without authority.
APA, Harvard, Vancouver, ISO, and other styles
14

Morozov, A. A., O. S. Sushkova, I. A. Kershner, and A. F. Polupanov. "Development of a Method of Terahertz Intelligent Video Surveillance Based on the Semantic Fusion of Terahertz and 3D Video Images." Information Technology and Nanotechnology, no. 2391 (2019): 134–43. http://dx.doi.org/10.18287/1613-0073-2019-2391-134-143.

Full text
Abstract:
The terahertz video surveillance opens up new unique opportunities in the field of security in public places, as it allows to detect and thus to prevent usage of hidden weapons and other dangerous items. Although the first generation of terahertz video surveillance systems has already been created and is available on the security systems market, it has not yet found wide application. The main reason for this is in that the existing methods for analyzing terahertz images are not capable of providing hidden and fully-automatic recognition of weapons and other dangerous objects and can only be used under the control of a specially trained operator. As a result, the terahertz video surveillance appears to be more expensive and less efficient in comparison with the standard approach based on the organizing security perimeters and manual inspection of the visitors. In the paper, the problem of the development of a method of automatic analysis of the terahertz video images is considered. As a basis for this method, it is proposed to use the semantic fusion of video images obtained using different physical principles, the idea of which is in that the semantic content of one video image is used to control the processing and analysis of another video image. For example, the information about 3D coordinates of the body, arms, and legs of a person can be used for analysis and proper interpretation of color areas observed on a terahertz video image. Special means of the object-oriented logic programming are developed for the implementation of the semantic fusion of the video data, including special built-in classes of the Actor Prolog logic language for acquisition, processing, and analysis of video data in the visible, infrared, and terahertz ranges as well as 3D video data.
APA, Harvard, Vancouver, ISO, and other styles
15

DIACHKOV, Dmytro. "STRATEGIC DIRECTIONS OF INFORMATION SECURITY MANAGEMENT OF AGRO-FOOD ENTERPRISES." Ukrainian Journal of Applied Economics 4, no. 4 (October 30, 2019): 70–78. http://dx.doi.org/10.36887/2415-8453-2019-4-8.

Full text
Abstract:
The purpose of the article was to study the strategic directions of information security management of agricultural enterprises. Research methods. The tasks set out in the article were implemented using the methods of systematization and generalization, analysis and synthesis, dialectical approach. The results of the study. In the research course the main elements of the formation and implementation of the information strategy of agrarian entities were identified. Stakeholders in the formation and implementation of the information security strategy of the agricultural enterprise were identified. The main nine types of information strategies were described. There are: prevention strategy, containment strategy, surveillance strategy, detection strategy, response strategy, distraction strategy, perimeter protection strategy, compartmentalization strategy, layering strategy. On the basis of generalization of information security strategies of the agro-food enterprises the key directions of its formation and realization were determined. A logical outline of the forming process an information security strategy was constructed, which should be closely related to the main business goals of the enterprise and its corporate strategy. The current trends and best practices of information security development of the enterprise were considered. Conclusions. The research made it possible to determine the essence of information strategy of agricultural enterprises as a structured and interconnected set of weighted actions aimed at long-term protection of enterprise information objects. Practical value. The proposed process of forming the information strategy of agricultural edu-cation will allow agricultural enterprises to choose the optimal information strategy, which will be interdependent with the general strategy and will allow to form the necessary set of software, technical, hardware and organizational tools for the protection of information resources. Prospects for further research include the development of a methodology for determining the information security strategy of agrarian enterprise. Keywords: agricultural enterprise, agro-food sector, element, information security, strategic direction, information security strategy, digitalization.
APA, Harvard, Vancouver, ISO, and other styles
16

Jiang, Wei. "A Machine Vision Anomaly Detection System to Industry 4.0 Based on Variational Fuzzy Autoencoder." Computational Intelligence and Neuroscience 2022 (March 16, 2022): 1–10. http://dx.doi.org/10.1155/2022/1945507.

Full text
Abstract:
From a technological point of view, Industry 4.0 evolves and operates in a smart environment in which the real and virtual worlds come together through smart cyber-physical systems. These devices that control each other autonomously activate innovative functions that enhance the production process. However, the industrial environment in which the most modern digital automation and information technologies are integrated is an ideal target for large-scale targeted cyberattacks. Implementing an integrated and effective security strategy in the Industrial 4.0 ecosystem presupposes a vertical inspection process at regular intervals to address any new threats and vulnerabilities throughout the production line. This view should be accompanied by the deep conviction of all stakeholders that all systems of modern industrial infrastructure are a potential target of cyberattacks and that the slightest rearrangement of mechatronic systems can lead to generalized losses. Accordingly, given that there is no panacea in designing a security strategy that fully ensures the infrastructure in question, advanced high-level solutions should be adopted, effectively implementing security perimeters without direct dependence on human resources. One of the most important methods of active cybersecurity in Industry 4.0 is the detection of anomalies, i.e., the identification of objects, observations, events, or behaviors that do not conform to the expected pattern of a process. The theme of this work is the identification of defects in the production line resulting from cyberattacks with advanced machine vision methods. An original variational fuzzy autoencoder (VFA) methodology is proposed. Using fuzzy entropy and Euclidean fuzzy similarity measurement maximizes the possibility of using nonlinear transformation through deterministic functions, thus creating an entirely realistic vision system. The final finding is that the proposed system can evaluate and categorize anomalies in a highly complex environment with significant accuracy.
APA, Harvard, Vancouver, ISO, and other styles
17

Валід, Аль-Хафаджі Ахмед, Юрій Леонідович Поночовний, Вячеслав Сергійович Харченко, and Дмитро Дмитрович Узун. "ДОСЛІДЖЕННЯ МАРКОВСЬКОЇ МОДЕЛІ ГОТОВНОСТІ СИСТЕМИ ФІЗИЧНОГО ЗАХИСТУ З ДЕГРАДАЦІЄЮ ВНАСЛІДОК AТАК І АПАРАТНИХ ВІДМОВ." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 1 (January 28, 2020): 37–43. http://dx.doi.org/10.32620/reks.2020.1.04.

Full text
Abstract:
The Markov availability model of a physical security system is investigated. The actuality of research caused by the need to protect the physical security systems not only from physical failures, but also from cyber-attackers. When constructing the model, it is assumed that the properties of stationary, ordinariness and absence of aftereffects of event flows in the system, the low probability of failure of the software component and cloud services. It also takes into account the fact that acts of vandalism occur on objects of the first zone that are outside the perimeter. The typical algorithm of construction of the Markov model based on determination of sets of states and mechanisms of interaction is used. The evaluation of the functioning of the multi-zone system was carried out taking into account three degrees of degradation from the normal state to the states of simultaneous failure of all three zones. The top state of S1 corresponds to the normal state of the system without failures. The states S2, S3, S4 correspond to the states of the first level of degradation of the system, in which hardware failure occurred in one of the zones. The states S5, S6, S7 correspond to the states of the second level of degradation of the system, in which there were hardware failures in two zones. Condition S8 corresponds to the state of complete failure of all three zones of the system. To evaluate the availability functions, the Markov model was calculated and investigated for different sets of input data. The following parameters were chosen: hardware failure rate due to unintentional physical and design defects; the intensity of recovery of hardware after failure and the degree of "aggression" of the attackers, which depends on external factors. The results of the simulation conclude that the parameters of failure rates and recovery are affected by the availability values of the different degradation levels and the relationship between them. It is determined that with increasing input parameters - the failure rate of hardware and the coefficient of "aggression" of intruders, the stationary availability coefficients of all levels of degradation decrease.
APA, Harvard, Vancouver, ISO, and other styles
18

Dorokhov, Alexander Fedorovich, Shamil Gasanguseinovich Magomedov, Georgiy Aleksandrovich Popov, Mikhail Fedorovich Rudenko, and Valeriy Fedorovich Shurshev. "BUILDING RISK MODELS FOR DESCRIBING SECURITY FUNCTIONS ON PROTECTING OUTER PERIMETERS OF THE ORGANIZATION." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics, July 25, 2017, 31–39. http://dx.doi.org/10.24143/2072-9502-2017-3-31-39.

Full text
Abstract:
The paper considers the problem of estimating the costs and losses associated with the degree of protection of the external perimeters of the object of protection against possible unauthorized actions, based on the construction of a mathematical model. Two main components related to the protection of objects have been identified: security service based on the activities of security groups; technical protection service based on the use of modern technical means of protection. The authors have obtained the relations for the average costs and losses associated with each of these services, as well as for the likelihood that the violator will be able to overcome the external perimeter of the object, despite attempts to counteract these services. New characteristics of the protection system have been introduced - indicators of reliability and qualifications of the security officer, which are taken into account in the assessment process. The possibility of using heuristic conclusions in the analysis of weakly structured characteristics, such as many of the probabilities associated with security actions, has been demonstrated. The obtained relationships can be used for setting and solving the problem of minimizing losses associated with providing security activity at the protection object to prevent malicious acts.
APA, Harvard, Vancouver, ISO, and other styles
19

Тишин, П. М., А. В. Гончаров, and К. О. Куширець. "РОЗРОБКА ТА ДОСЛІДЖЕННЯ МУЛЬТИАГЕНТНОЇ СИСТЕМИ ДЛЯ ОХОРОНИ ОБ’ЄКТА." Automation of technological and business processes 9, no. 4 (February 5, 2018). http://dx.doi.org/10.15673/atbp.v10i4.825.

Full text
Abstract:
The article describes a multi-agent system based on the OWL ontology, taking into account the FIPA standards for the object security system. The given data on the work of intellectual agents and communication between them, as well as proposals for solving the tasks assigned. The proposed concept allows to significantly reduce the amount of electricity consumed during the operation of the object tracking system at a certain perimeter for the purpose of object protection. The range of tasks to be solved is not limited only to the implementation of the multi-agent system, among other things, such algorithms as constructing the proposed route of the object's movement, selecting a camera for tracking the object, diagnosing the system for errors are realized. Due to the peculiarities of the interaction of intelligent agents, this system is subject to simple expansion in the event of an increase in the surveillance area or an increase in the number of sensors in a certain territory. Structurally, the security system consists of a control center with a control system, where an operator sits observing the perimeter around the protected object; a set of microcomputers monitoring a certain sector of the protected area using sensors (main and auxiliary); two rotary cameras providing a visual inspection of the surroundings of the facility. An effective communication algorithm and a set of rules for agents allows you to capture the maximum number of objects using the shared resources of agents of two cameras. To prevent the failure of the elements of the security system, a monitoring system is provided, which in turn is controlled by an intelligent agent that interacts with the sensor agents and the decision support agent. In the future, the results of the study can be used to improve the protection of objects.
APA, Harvard, Vancouver, ISO, and other styles
20

Maryukhnenko, V. S., D. S. Kireev, and V. M. Orlovskiy. "Security multi-position radar systems: model, topology, structure." Electromagnetic Waves and Electronic Systems, 2021. http://dx.doi.org/10.18127/j15604128-202101-04.

Full text
Abstract:
In accordance with the general ideas about the relevance, methods and means of protecting important protected objects, as well as the principles of constructing single and multi-position radar systems (radar), the features of radar perimeter protection are considered, with the presentation of it as a large hierarchical system of interconnected, united by a common purpose of functioning controlled subsystems. The measured radar parameters, advantages and disadvantages of security radars, as well as the advantages of multi-position radars over single-position ones are noted. The elements of a mathematical model of a multi-position radar are presented, for which: decomposition of technical protection as a large system; the features of the matrix-vector description of the parameters of the generated and received radar signals of a multi-position radar are considered; analyzed the topology of the security radar as a single object with the protected space; the concept of abstract protected elements is introduced and their relationship with the measure of the protected space in the general case of dimensions longer than three is determined. On the basis of the analysis, the requirements for the structure and placement of the security radar are formulated, which are interdependent on the dimension of the protected area, the topology of the security perimeter, the composition, structure, tactical and technical features of the security radar and tactical, technical, operational, environmental and economic quality indicators. The features of the formation of the structure and placement of single- and multi-position security radars under various initial conditions and requirements, as well as approaches to calculating the coordinates of the placement of their elements on the ground are shown.
APA, Harvard, Vancouver, ISO, and other styles
21

Magomedov, Shamil Gasanguseinovich. "CLASSIFICATION OF ACCESS BOUNDARIES AND RELATED FACTORS OF INFLUENCE IN THE ACCESS CONTROL SYSTEM." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics, January 25, 2018, 62–70. http://dx.doi.org/10.24143/2072-9502-2018-1-62-70.

Full text
Abstract:
The paper focuses on the formation of general schemes describing access to protected information or other resources, and, thereby, the boundaries of countering real and potential threats to these resources. Three main access environments are considered: information, physical and electromagnetic. For the first two, as for the most important, the main access points are highlighted. Nine boundaries are distinguished for the information environment, and seven boundaries for the physical environment. Dedicated boundaries encompass both the external perimeter of the protection object and the internal zone of the object, as well as the data carriers. On the basis of the analysis of the content of the allocated access boundaries, a list of information security functions that are needed at each access boundary and in the protection system as a whole has been formed. This list includes more than thirty basic functions and technological procedures. The presence of this list is one of the foundations for the formation of an integrated information security system that provides multi-level safety of protected information resources.
APA, Harvard, Vancouver, ISO, and other styles
22

"Technology for Ensuring Economic Security of an Enterprise." International Journal of Innovative Technology and Exploring Engineering 9, no. 3 (January 10, 2020): 3383–86. http://dx.doi.org/10.35940/ijitee.c8072.019320.

Full text
Abstract:
The measures are taken by the enterprise management in order to reduce the risks of damage, ensure the efficient use of available resources, and ensure its stable functioning are necessary conditions for the sustainable development of production. The purpose of the research is to assess the existing system of ensuring economic security of the enterprise (ESE) of mechanical engineering on the example of a separate business unit and determine directions to increase its effectiveness. The object of research is the business units of GAZ Group (PJSC “GAZ”), which are part of the management perimeter of the Automobile Components Division of GAZ Group. The subject of research is the system of economic security, and methods of controlling at the industrial enterprise. Research methods — method of comparisons and analogies, method of economic analysis. A practical significance of the work lies in the possibility of using the research results to improve controlling as a tool for effective management of industrial division development enterprise. These studies allow to draw conclusions about the efficiency of technologies used to ensure the economic security of the enterprise on the example of a separate business unit of GAZ Group.
APA, Harvard, Vancouver, ISO, and other styles
23

Heško, František, Martin Fiľko, Jozef Novotňák, and Patrik Kašper. "Perimeter Protection of the Areas of Interest." Acta Avionica Journal, December 23, 2021, 31–44. http://dx.doi.org/10.35116/aa.2021.0014.

Full text
Abstract:
This article analyses the history and current state in the area of outdoor protection. In the first part of the article, the sensory systems, which have been used for many years are described. Attention is paid to the sensors using conventional principles of the detection of the objects. New modern sensory systems together with their principles used for the protection of the outdoor environment are also described. Other problem is that older sensory systems of spatial protection were focused on the security of properties and buildings without expecting any change position in the time. The article analyzes also new possibilities of protecting of the outdoor perimeter even in the situations when the borders of the areas of interest are only temporary or mobile. And as UAV systems have been used massively and often involve modern multisensory systems, the last part of the article describes current sensors, which have been currently used to detect the UAV systems and to to protect the area of interest.
APA, Harvard, Vancouver, ISO, and other styles
24

Schmidt, Fabian, Arne Dröge-Rothaar, and Andreas Rienow. "Development of a Web GIS for small-scale detection and analysis of COVID-19 (SARS-CoV-2) cases based on volunteered geographic information for the city of Cologne, Germany, in July/August 2020." International Journal of Health Geographics 20, no. 1 (August 28, 2021). http://dx.doi.org/10.1186/s12942-021-00290-0.

Full text
Abstract:
Abstract Background Various applications have been developed worldwide to contain and to combat the coronavirus disease-19 (COVID-19) pandemic. In this context, spatial information is always of great significance. The aim of this study is to describe the development of a Web GIS based on open source products for the collection and analysis of COVID-19 cases and its feasibility in terms of technical implementation and data protection. Methods With the help of this Web GIS, data on this issue were collected voluntarily from the Cologne area. Using house perimeters as a data basis, it was possible to check, in conjunction with the Official Topographic Cartographic Information System object type catalog, whether buildings with certain functions, for example residential building with trade and services, have been visited more frequently by infected persons than other types of buildings. In this context, data protection and ethical and legal issues were considered. Results The results of this study show that the development of a Web GIS for the generation and evaluation of volunteered geographic information (VGI) with the help of open source software is possible. Furthermore, there are numerous data protection and ethical and legal aspects to consider, which not only affect VGI per se but also affect IT security. Conclusions From a data protection perspective, more attention needs to be paid to the intervention and post-processing of data. In addition, official data must always be used as a reference for the actual spatial consideration of the number of infections. However, VGI provides added value at a small-scale level, so that valid information can also be reliably derived in the context of health issues. The creation of guidelines for the consideration of data protection, ethical aspects, and legal requirements in the context of VGI-based applications must also be considered. Trial registration The article does not report the results of a health care intervention for human participants
APA, Harvard, Vancouver, ISO, and other styles
25

Macken, Marian. "And Then We Moved In." M/C Journal 10, no. 4 (August 1, 2007). http://dx.doi.org/10.5204/mcj.2687.

Full text
Abstract:
Working drawings are produced, when a house is designed, to envisage an imagined building. They are a tangible representation of an object that has no tangible existence. These working drawings act as a manual for constructing the house; they represent that which is to be built. The house comes into being, therefore, via this set of drawings. This is known as documentation. However, these drawings record the house at an ideal moment in time; they capture the house in stasis. They do not represent the future life of the house, the changes and traces the inhabitants make upon a space, nor do they document the path of the person, the arc of their actions, within the space of the house. Other types of documentation of the house allow these elements to be included. Documentation that is produced after-the-event, that interprets ‘the existing’, is absent from discourses on documentation; the realm of post factum documentation is a less examined form of documentation. This paper investigates post factum documentation of the house, and the alternative ways of making, producing and, therefore, thinking about, the house that it offers. This acknowledges the body in the space of architecture, and the inhabitation of space, and as a dynamic process. This then leads to the potential of the‘model of an action’ representing the motion and temporality inherent within the house. Architecture may then be seen as that which encloses the inhabitant. The word ‘document’ refers to a record or evidence of events. It implies a chronological sequence: the document comes after-the-event, that is, it is post factum. Within architecture, however, the use of the word documentation, predominantly, refers to working drawings that are made to ‘get to’ a building, drawings being the dominant representation within architecture. Robin Evans calls this notion, of architecture being brought into existence through drawing, the principle of reversed directionality (Evans 1997, 1989). Although it may be said that these types of drawings document the idea, or document the imagined reality of the building, their main emphasis, and reading, is in getting to something. In this case, the term documentation is used, not due to the documents’ placement within a process, of coming after the subject-object, but in referring to the drawings’ role. Other architectural drawings do exist that are a record of what is seen, but these are not the dominant drawing practice within architecture. Documentation within architecture regards the act of drawing as that process upon which the object is wholly dependent for its coming into existence. Drawing is defined as the pre-eminent methodology for generation of the building; drawings are considered the necessary initial step towards the creation of the 1:1 scale object. During the designing phase, the drawings are primary, setting out an intention. Drawings, therefore, are regarded as having a prescriptive endpoint rather than being part of an open-ended improvisation. Drawings, in getting to a building, draw out something, the act of drawing searches for and uncovers the latent design, drawing it into existence. They are seen as getting to the core of the design. Drawings display a technique of making and are influenced by their medium. Models, in getting to a building, may be described in the same way. The act of modelling, of making manifest two-dimensional sketches into a three-dimensional object, operates similarly in possessing a certain power in assisting the design process to unfurl. Drawing, as recording, alters the object. This act of drawing is used to resolve, and to edit, by excluding and omitting, as much as by including, within its page. Models similarly made after-the-fact are interpretive and consciously aware of their intentions. In encapsulating the subject-object, the model as documentation is equally drawing out meaning. This type of documentation is not neutral, but rather involves interpretation and reflection through representational editing. Working drawings record the house at an ideal moment in time: at the moment the builders leave the site and the owners unlock the front door. These drawings capture the house in stasis. There is often the notion that until the owners of a new house move in, the house has been empty, unlived in. But the life of the house cannot be fixed to any one starting point; rather it has different phases of life from conception to ruin. With working drawings being the dominant representation of the house, they exclude much; both the life of the house before this act of inhabitation, and the life that occurs after it. The transformations that occur at each phase of construction are never shown in a set of working drawings. When a house is built, it separates itself from the space it resides within: the domain of the house is marked off from the rest of the site. The house has a skin of a periphery, that inherently creates an outside and an inside (Kreiser 88). As construction continues, there is a freedom in the structure which closes down; potential becomes prescriptive as choices are made and embodied in material. The undesignedness of the site, that exists before the house is planned, becomes lost once the surveyors’ pegs are in place (Wakely 92). Next, the skeletal frame of open volumes becomes roofed, and then becomes walled, and walking through the frame becomes walking through doorways. One day an interior is created. The interior and exterior of the house are now two different things, and the house has definite edges (Casey 290). At some point, the house becomes lockable, its security assured through this act of sealing. It is this moment that working drawings capture. Photographs comprise the usual documentation of houses once they are built, and yet they show no lived-in-ness, no palimpsest of occupancy. They do not observe the changes and traces the inhabitants make upon a space, nor do they document the path of the person, the arc of their actions, within the space of the house. American architects and artists Elizabeth Diller and Ricardo Scofidio have written of these traces of the everyday that punctuate floor and wall surfaces: the intersecting rings left by coffee glasses on a tabletop, the dust under a bed that becomes its plan analog when the bed is moved, the swing etched into the floor by a sagging door. (Diller & Scofidio 99) It is these marks, these traces, that are omitted from the conventional documentation of a built house. To examine an alternative way of documenting, and to redress these omissions, a redefinition of the house is needed. A space can be delineated by its form, its edges, or it can be defined by the actions that are performed, and the connections between people that occur, within it. To define the house by what it encapsulates, rather than being seen as an object in space, allows a different type of documentation to be employed. By defining a space as that which accommodates actions, rooms may be delineated by the reach of a person, carved out by the actions of a person, as though they are leaving a trace as they move, a windscreen wiper of living, through the repetition of an act. Reverse directional documentation does not directly show the actions that take place within a house; we must infer these from the rooms’ fittings and fixtures, and the names on the plan. In a similar way, Italo Calvino, in Invisible Cities, defines a city by the relationships between its inhabitants, rather than by its buildings: in Ersilia, to establish the relationships that sustain the city’s life, the inhabitants stretch strings from the corners of the houses, white or black or grey or black-and-white according to whether they mark a relationship of blood, of trade, authority, agency. When the strings become so numerous that you can no longer pass among them, the inhabitants leave: the houses are dismantled; only the strings and their supports remain … Thus, when travelling in the territory of Ersilia, you come upon the ruins of the abandoned cities without the walls which do not last, without the bones of the dead which the wind rolls away: spiderwebs of intricate relationships seeking a form. (Calvino 62) By defining architecture by that which it encapsulates, form or materiality may be given to the ‘spiderwebs of intricate relationships’. Modelling the actions that are performed in the space of architecture, therefore, models the architecture. This is referred to as a model of an action. In examining the model of an action, the possibilities of post factum documentation of the house may be seen. The Shinkenchiku competition The Plan-Less House (2006), explored these ideas of representing a house without using the conventional plan to do so. A suggested alternative was to map the use of the house by its inhabitants, similar to the idea of the model of an action. The house could be described by a technique of scanning: those areas that came into contact with the body would be mapped. Therefore, the representation of the house is not connected with spatial division, that is, by marking the location of walls, but rather with its use by its inhabitants. The work of Diller and Scofidio and Allan Wexler and others explores this realm. One inquiry they share is the modelling of the body in the space of architecture: to them, the body is inseparable from the conception of space. By looking at their work, and that of others, three different ways of representing this inhabitation of space are seen. These are: to represent the objects involved in a particular action, or patterns of movement, that occurs in the space, in a way that highlights the action; to document the action itself; or to document the result of the action. These can all be defined as the model of an action. The first way, the examination of the body in a space via an action’s objects, is explored by American artist Allan Wexler, who defines architecture as ‘choreography without a choreographer, structuring its inhabitant’s movements’ (Galfetti 22). In his project ‘Crate House’ (1981), Wexler examines the notion of the body in a space via an action’s objects. He divided the house into its basic activities: bedroom, bathroom, kitchen and living room. Each of these is then defined by their artefacts, contained in their own crate on wheels, which is rolled out when needed. At any point in time, the entire house becomes the activity due to its crate: when a room such as the kitchen is needed, that crate is rolled in through one of the door openings. When the occupant is tired, the entire house becomes a bedroom, and when the occupant is hungry, it becomes a kitchen … I view each crate as if it is a diorama in a natural history museum — the pillow, the spoon, the flashlight, the pot, the nail, the salt. We lose sight of everyday things. These things I isolate, making them sculpture: their use being theatre. (Galfetti 42–6) The work of Andrea Zittel explores similar ideas. ‘A–Z Comfort Unit’ (1994), is made up of five segments, the centrepiece being a couch/bed, which is surrounded by four ancillary units on castors. These offer a library, kitchen, home office and vanity unit. The structure allows the lodger never to need to leave the cocoon-like bed, as all desires are an arm’s reach away. The ritual of eating a meal is examined in Wexler’s ‘Scaffold Furniture’ (1988). This project isolates the components of the dining table without the structure of the table. Instead, the chair, plate, cup, glass, napkin, knife, fork, spoon and lamp are suspended by scaffolding. Their connection, rather than being that of objects sharing a tabletop, is seen to be the (absent) hand that uses them during a meal; the act of eating is highlighted. In these examples, the actions performed within a space are represented by the objects involved in the action. A second way of representing the patterns of movement within a space is to represent the action itself. The Japanese tea ceremony breaks the act of drinking into many parts, separating and dissecting the whole as a way of then reassembling it as though it is one continuous action. Wexler likens this to an Eadweard Muybridge film of a human in motion (Galfetti 31). This one action is then housed in a particular building, so that when devoid of people, the action itself still has a presence. Another way of documenting the inhabitation of architecture, by drawing the actions within the space, is time and motion studies, such as those of Rene W.P. Leanhardt (Diller & Scofidio 40–1). In one series of photographs, lights were attached to a housewife’s wrists, to demonstrate the difference in time and effort required in the preparation of a dinner prepared entirely from scratch in ninety minutes, and a pre-cooked, pre-packaged dinner of the same dish, which took only twelve minutes. These studies are lines of light, recorded as line drawings on a photograph of the kitchen. They record the movement of the person in the room of the action they perform, but they also draw the kitchen in a way conventional documentation does not. A recent example of the documentation of an action was undertaken by Asymptote and the students at Columbia University Graduate School of Architecture in their exhibition at the Venice Biennale of Architecture in 2000. A gymnast moving through the interior space of the pavilion was recorded using a process of digitisation and augmentation. Using modelling procedures, the spatial information was then reconstructed to become a full-scale architectural re-enactment of the gymnast’s trajectory through the room (Feireiss 40). This is similar to a recent performance by Australian contemporary dance company Chunky Move, called ‘Glow’. Infra-red video tracking took a picture of the dancer twenty-five times a second. This was used to generate shapes and images based on the movements of a solo dancer, which were projected onto the floor and the dancer herself. In the past, when the company has used DVDs or videos, the dancer has had to match what they were doing to the projection. This shifts the technology to following the dancer (Bibby 3). A third way of representing the inhabitation of architecture is to document the result of an action. Raoul Bunschoten writes of the marks of a knife being the manifestation of the act of cutting, as an analogy: incisions imply the use of a cutting tool. Together, cuts and cutting tool embrace a special condition. The actual movement of the incision is fleeting, the cut or mark stays behind, the knife moves on, creating an apparent discontinuity … The space of the cut is a reminder of the knife, its shape and its movements: the preparation, the swoop through the air, the cutting, withdrawal, the moving away. These movements remain implicitly connected with the cut as its imaginary cause, as a mnemonic programme about a hand holding a knife, incising a surface, severing skin. (Bunschoten 40) As a method of documenting actions, the paintings of Jackson Pollack can be seen as a manifestation of an act. In the late 1940s, Pollack began to drip paint onto a canvas laid flat on the floor; his tools were sticks and old caked brushes. This process clarified his work, allowing him to walk around it and work from all four sides. Robert Hughes describes it as ‘painting “from the hip” … swinging paintstick in flourishes and frisks that required an almost dancelike movement of the body’ (Hughes 154). These paintings made manifest Pollack’s gestures. As his arm swung in space, the dripping paint followed that arc, to be preserved on a flat plane as pictorial space (Hughes 262). Wexler, in another study, recorded the manifestation of an action. He placed a chair in a one-room building. It was attached to lengths of timber that extended outdoors through slots in the walls of the building. As the chair moved inside the building, its projections carved grooves in the ground outside. As the chair moved in a particular pattern, deeper grooves were created: ‘Eventually, the occupant of the chair has no choice in his movement; the architecture moves him.’ (Galfetti 14) The pattern of movement creates a result, which in turn influences the movement. By redefining architecture by what it encapsulates rather than by the enclosure itself, allows architecture to be documented by the post factum model of an action that occurs in that space. This leads to the exploration of architecture, formed by the body within it, since the documentation and representation of architecture starts to affect the reading of architecture. Architecture may then be seen as that which encloses the inhabitant. The documentation of the body and the space it makes concerns the work of the Hungarian architect Imre Makovecz. His exploration is of the body and the space it makes. Makovecz, and a circle of like-minded architects and artists, embarked on a series of experiments analysing the patterns of human motion and subsequently set up a competition based around the search for a minimum existential space. This consisted of mapping human motion in certain spatial conditions and situations. Small light bulbs were attached to points on the limbs and joints and photographed, creating a series of curves and forms. This led to a competition called ‘Minimal Space’ (1971–2), in which architects, artists and designers were invited to consider a minimal space for containing the human body, a new notion of personal containment. Makovecz’s own response took the form of a bell-like capsule composed of a double shell expressing its presence and location in both time and space (Heathcote 120). Vito Acconci, an artist turned architect by virtue of his installation work, explored this notion of enclosure in his work (Feireiss 38). In 1980 Acconci began his series of ‘self-erecting architectures’, vehicles or instruments involving one or more viewers whose operation erected simple buildings (Acconci & Linker 114). In his project ‘Instant House’ (1980), a set of walls lies flat on the floor, forming an open cruciform shape. By sitting in the swing in the centre of this configuration, the visitor activates an apparatus of cables and pulleys causing walls to rise and form a box-like house. It is a work that explores the idea of enclosing, of a space being something that has to be constructed, in the same way for example one builds up meaning (Reed 247–8). This documentation of architecture directly references the inhabitation of architecture. The post factum model of architecture is closely linked to the body in space and the actions it performs. Examining the actions and movement patterns within a space allows the inhabitation process to be seen as a dynamic process. David Owen describes the biological process of ‘ecopoiesis’: the process of a system making a home for itself. He describes the building and its occupants jointly as the new system, in a system of shaping and reshaping themselves until there is a tolerable fit (Brand 164). The definition of architecture as being that which encloses us, interests Edward S. Casey: in standing in my home, I stand here and yet feel surrounded (sheltered, challenged, drawn out, etc.) by the building’s boundaries over there. A person in this situation is not simply in time or simply in space but experiences an event in all its engaging and unpredictable power. In Derrida’s words, ‘this outside engages us in the very thing we are’, and we find ourselves subjected to architecture rather than being the controlling subject that plans or owns, uses or enjoys it; in short architecture ‘comprehends us’. (Casey 314) This shift in relationship between the inhabitant and architecture shifts the documentation and reading of the exhibition of architecture. Casey’s notion of architecture comprehending the inhabitant opens the possibility for an alternate exhibition of architecture, the documentation of that which is beyond the inhabitant’s direction. Conventional documentation shows a quiescence to the house. Rather than attempting to capture the flurry — the palimpsest of occupancy — within the house, it is presented as stilled, inert and dormant. In representing the house this way, a lull is provided, fostering a steadiness of gaze: a pause is created, within which to examine the house. However, the house is then seen as object, rather than that which encapsulates motion and temporality. Defining, and thus documenting, the space of architecture by its actions, extends the perimeter of architecture. No longer is the house bounded by its doors and walls, but rather by the extent of its patterns of movement. Post factum documentation allows this altering of the definition of architecture, as it includes the notion of the model of an action. By appropriating, clarifying and reshaping situations that are relevant to the investigation of post factum documentation, the notion of the inhabitation of the house as a definition of architecture may be examined. This further examines the relationship between architectural representation, the architectural image, and the image of architecture. References Acconci, V., and K. Linker. Vito Acconci. New York: Rizzoli, 1994. Bibby, P. “Dancer in the Dark Is Light Years Ahead.” Sydney Morning Herald 22 March 2007: 3. Brand, S. How Buildings Learn: What Happens after They’re Built. London: Phoenix Illustrated, 1997. Bunschoten, R. “Cutting the Horizon: Two Theses on Architecture.” Forum (Nov. 1992): 40–9. Calvino, I. Invisible Cities. London: Picador, 1979. Casey, E.S. The Fate of Place. California: U of California P, 1998. Diller, E., and R. Scofidio. Flesh: Architectural Probes. New York: Princeton Architectural Press, 1994. Evans, R. Translations from Drawing to Building and Other Essays. Cambridge, Mass.: MIT Press, 1997. ———. “Architectural Projection.” Eds. E. Blau and E. Kaufman. Architecture and Its Image: Four Centuries of Architectural Representation: Works from the Collection of the Canadian Center for Architecture. Exhibition catalogue. Cambridge, Mass.: MIT Press, 1989. 19–35. Feireiss, K., ed. The Art of Architecture Exhibitions. Rotterdam: Netherlands Architecture Institute, 2001. Galfetti, G.G., ed. Allan Wexler. Barcelona: GG Portfolio, 1998. Glanville, R. “An Irregular Dodekahedron and a Lemon Yellow Citroen.” In L. van Schaik, ed., The Practice of Practice: Research in the Medium of Design. Melbourne: RMIT University Press, 2003. 258–265. Heathcote, E. Imre Mackovecz: The Wings of the Soul. West Sussex: Academy Editions, 1997. Hughes, R. The Shock of the New: Art and the Century of Change. London: British Broadcasting Corporation, 1980. Kreiser, C. “On the Loss of (Dark) Inside Space.” Daidalos 36 (June 1990): 88–99. Reed, C. ed. Not at Home: The Suppression of Domesticity in Modern Art and Architecture. London: Thames & Hudson, 1996. “Shinkenchiku Competition 2006: The Plan-Less House.” The Japan Architect 64 (Winter 2007): 7–12. Small, D. Paper John. USA: Farrar, Straus and Giroux, 1987. Wakely, M. Dream Home. Crows Nest, NSW: Allen & Unwin. 2003. Citation reference for this article MLA Style Macken, Marian. "And Then We Moved In: Post Factum Documentation of the House." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/04-macken.php>. APA Style Macken, M. (Aug. 2007) "And Then We Moved In: Post Factum Documentation of the House," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/04-macken.php>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography