Journal articles on the topic 'Security object'

To see the other types of publications on this topic, follow the link: Security object.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security object.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Helmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (September 1, 2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.

Full text
Abstract:
This research aims to: (1) Assess and evaluate the pattern containedsystem in the Securing of National Vital Objectsby Vital Object Security Directorate of Polda Kalimantan Selatan; and (2) Assess and evaluate the obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan. It can be concluded that: 1. The system pattern contained in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan not stated clearly and explicitly in the legislation pam obvitnas, but in the Presidential Decree No. 63 of 2004 on the Securing of National Vital Security Object there is described that pattern Sispamobvitnas, they are: (1) The main executor of the system Securing of National Vital Objek is obvitnas management authority, in this case the Police through Dirpamobvit; (2) Police are obliged to provide security assistance obvitnas; (3) priority preemptive and preventive activities; (4) in an integrated and simultaneous shared obvitnas managers implement security systems obvitnas; and (5) and against obvitnas is an organic part of or including the military, the security environment remain to be implemented, although the security environment outside Obvitnas or process interruption handling defense and security. 2. The obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan, they are: (1) Lack of quality personnel guard PT. Pertamina (Persero) BBM Terminal Banjarmasin due to lack of professional recruitment system; (2) Insufficient number of security officers compared to the vulnerability of the region; (3) Infrastructure security Obvit Of Polda Kalimantan Selatan are limited;(4) The lack of security coordination between Ditpamobvit Polda Kalimantan Selatan with regional security managers of the company, and the company's internal security guard at the Police Post.
APA, Harvard, Vancouver, ISO, and other styles
2

BAI, YUN, and YAN ZHANG. "ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY." International Journal of Pattern Recognition and Artificial Intelligence 18, no. 01 (February 2004): 3–17. http://dx.doi.org/10.1142/s0218001404003022.

Full text
Abstract:
In this paper, we propose a formal approach of Artificial Intelligence (AI) in securing object oriented database systems. We combine the specification of object oriented database with security policies and provide its formal syntax and semantics. The properties in the inheritance of authorizations in object oriented database system and reasoning about authorizations on data objects are also investigated in detail.
APA, Harvard, Vancouver, ISO, and other styles
3

Farid, Miftah, and Ajeng Ayu Adhisty. "STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION." Jurnal Pertahanan 5, no. 3 (December 2, 2019): 77. http://dx.doi.org/10.33172/jp.v5i3.589.

Full text
Abstract:
<p>In the current security concept, there are some changes to the current security object. This is due to the increasingly broad understanding of security objects. This study examines the emergence of cyber issues as a new threat to state security. Cyber actions in the virtual world are developing along with the rapid technology development. Moreover, the state policy on cyber issues is considered as a new threat to individual security. The development of that state security issue is being debated among the theoreticians of international security studies. The concept of securitization explains the phenomenon of cyber issues and receives the attention of many states. Securitization carried out by the United States on Cybercrime issues becomes the initial trigger in viewing cyber actions as a new threat to state security. The object of this paper is more focused on State policy in dealing with cyber threats. Afterward, state policy in facing the cyber threat is seen from the perspective of human security from UNDP. Therefore, there is a debate about the desired security object. State actions to reach state security are then considered as individual privacy security. So, international security now does not only focus on state objects but also on individual, environment, economy, and identity. Thus, every action taken in securing an object does not pose a threat to other security objects.</p><div><p class="Els-keywords">Keywords: Cybercrime, State Security, Human Security, Securitization</p></div>
APA, Harvard, Vancouver, ISO, and other styles
4

Thuraisingham, Bhavani, Ravi Sandhu, and T. C. Ting. "Security for object-oriented systems." ACM SIGPLAN OOPS Messenger 5, no. 2 (April 1994): 77–78. http://dx.doi.org/10.1145/260304.260325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kusumah, Angga, and Aryani Witasari. "Law Enforcement on Fiducian Security Objects Due to Withdrawal of Fiducia Security Objects." Law Development Journal 3, no. 1 (March 7, 2021): 38. http://dx.doi.org/10.30659/ldj.3.1.38-43.

Full text
Abstract:
The objectives of this study are: Knowing and analyzing Law Enforcement against Fiduciary Guarantee Objects Post-Constitutional Court Decision Number 18 / PUU-XVII / 2019. Knowing and analyzing the obstacles that occur in law enforcement on the object of fiduciary security. In this research, the approach method used is the sociological juridical approach. The research specification used in this research is descriptive analysis. Based on the research, it is concluded that law enforcement on the object of fiduciary guarantee after the Constitutional Court Decision Number 18 / PUU-XVII / 2019 is preventive that has been carried out including: reading of rights and obligations and signing signatures by each party, registration of Fiduciary Security at the Ministry of Law and Human Rights, insuring units and parties, and give warning 3 (three) times before securing Fiduciary Security goods. The repressions that have been carried out include administrative law enforcement, criminal law enforcement and civil law enforcement. Constraints that Occur in Law Enforcement of the Object of the Fiduciary Guarantee and the solution is insufficient evidence, the solution is to look for such evidence; If the collateral object has not been found, the investigator needs to carry out further investigation; The suspect is not present, runs away, does not have a permanent place of residence or his identity is not clear, the solution is to carry out further investigations. Responding to the facts above, it is necessary that the Fiduciary Security Law be more socialized to the public,
APA, Harvard, Vancouver, ISO, and other styles
6

Hama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (June 2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.

Full text
Abstract:
Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security approach. The Copenhagen School assumes that there is now a duality of security: state security and societal security. However, both the Welsh School and the human security school look at individuals as a sole referent object of security. This article critically reviews the traditional approaches of security, the Copenhagen School, the Welsh School, and the human security approach. This article finally argues that the Copenhagen School could successfully broaden the concept of security, and therefore, it is more convincing when compared to other schools.
APA, Harvard, Vancouver, ISO, and other styles
7

Ali Andre, Julfikar. "SISTEM SECURITY WEBCAM DENGAN MENGGUNAKAN MICROSOFT VISUAL BASIC (6.0)." Rabit : Jurnal Teknologi dan Sistem Informasi Univrab 1, no. 2 (July 10, 2016): 46–58. http://dx.doi.org/10.36341/rabit.v1i2.23.

Full text
Abstract:
Webcam (Web Camera) is a designation for real-time cameras (meaning the current situation) whose images can be accessed or viewed through the World Wide Web, instant messaging programs, or video call applications. During this time, the webcam application is only used to record and display objects, but has never been used for other applications such as security applications that are used to detect object movements. Webcams can not provide information about the motion of an object, passive or active objects. Therefore, research to improve the system to be able to detect motion from images captured from this webcam needs to be done.The motion detection system of an object works if the captured object has a changed position, and will automatically activate an alarm. The image processing method used in motion detection is the edge detection method, while for the motion detection process, the pixel position comparison process is used.
APA, Harvard, Vancouver, ISO, and other styles
8

Feng, Dan, Junjian Chen, Jingning Liu, and Zhikun Wang. "BLESS: Object level encryption security for object-based storage system." Mathematical and Computer Modelling 55, no. 1-2 (January 2012): 188–97. http://dx.doi.org/10.1016/j.mcm.2011.02.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Oleynik, P. P., and S. M. Salibekyan. "Model of security for object-oriented and object-attributed applications." Proceedings of the Institute for System Programming of the RAS 28, no. 3 (2016): 35–50. http://dx.doi.org/10.15514/ispras-2016-28(3)-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Olha, SONIUK. "CONCEPTUAL AND CATEGORICAL APPARATUS OF SECURITY SCIENCE." Foreign trade: economics, finance, law 117, no. 4 (September 10, 2021): 85–95. http://dx.doi.org/10.31617/zt.knute.2021(117)08.

Full text
Abstract:
Background. Security research in the field of entrepreneurial activity requires the coordination of legal, economic, managerial conceptual and categorical apparatus, necessitates the systematization of scientists’ approaches to the interpretation of basic concepts, in order to ensure effective protection. The aim of the article is to present the definition of «object of legal security of business», improving the conceptual and categorical apparatus of the science of security, the formation of theoretical foundations for business security. Materials and methods. The information base is the legislation of Ukraine, scientific research, conceptual apparatus of security science. The methodology is based on the use of general scientific and special methods. Results. We propose to distinguish the concept of «object of business security», «object of legal security of business», «subject of business security». The object of security of entrepreneurial activity, as a material category, is the enterprise itself in its various manifestations, aspects of activity. The object of business security is a set of protected legitimate interests of the enterprise (economic, informational, corporate), which are encroached upon. The classification of objects of legal security of business activity is given. Conclusion. Supporting the general position of scientists of the system approach, in this study the material (regulatory, declarative, abstract, ideal) and procedural (activity, procedural) concepts of security science are distinguished. In fact, we consider security as a material abstract phenomenon – an idealized state of security. We consider security from a procedural point of view – as an activity to achieve a state of security. Keywords: security of entrepreneurial activity, legal organization of security of entrepreneurial activity.
APA, Harvard, Vancouver, ISO, and other styles
11

Fairthorne, Belinda. "Security in CORBA distributed object systems." Information Security Technical Report 1, no. 2 (January 1996): 56–63. http://dx.doi.org/10.1016/s1363-4127(97)89357-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Matvejevs, Aleksandrs. "PUBLIC SECURITY – OBJECT OF POLICE PROTECTION." Administrative and Criminal Justice 1, no. 74 (June 30, 2016): 17. http://dx.doi.org/10.17770/acj.v1i74.2885.

Full text
Abstract:
The analysis of the notion ‘public security’ reveals its two parts: 1) conditions where there is no threat to an individual, society or state; 2) measures by the state that ensure these conditions and instills in people the sense of security. These elements to a certain extent determine the features and characterize public security as an object of police protection and as a definition of the notion. Public security is based on two elements: 1) public peace when there is peace, cooperation and confidence in safety in the public realm; 2) conditions of protects ability where the state (the police) continuously provides public security and is ready to render help and neutralize any threats. Thereby in the legal reality public security is police legal relations where the subjects are, on the one hand persons, society, state institutions that have a constant need of protection against crimes and other offences and, on the other hand, the state whose task is to ensure the protection stated in the legislation via competent institutions.
APA, Harvard, Vancouver, ISO, and other styles
13

Gasperoni, Franco. "Safety, security, and object-oriented programming." ACM SIGBED Review 3, no. 4 (October 2006): 15–26. http://dx.doi.org/10.1145/1183088.1183092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

SZWARC, Krzysztof. "SECURITY AS AN OBJECT OF MANAGEMENT." National Security Studies 10, no. 1 (November 7, 2016): 131–45. http://dx.doi.org/10.37055/sbn/129843.

Full text
Abstract:
Zapewnianie bezpieczeństwa narodowego to złożony proces, w którym kluczową rolę odgrywa państwo, jako szczególna organizacja oraz system działania. W artykule przedstawiono istotę procesu zarządzania bezpieczeństwem jako systemowego problemu, a także kryteriów oceny jego efektów, a także determinantów sprawności i skuteczności działania. Autor charakteryzuje zarządzanie kryzysowe oraz diagnozuje przyczyny obniżania efektywności tego systemu. Rozważania biorą pod uwagę przedmiot zarządzania określony również potrzebą bezpieczeństwa.
APA, Harvard, Vancouver, ISO, and other styles
15

Ravi, Anusha. "Abandoned Object Detection." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 4541–45. http://dx.doi.org/10.22214/ijraset.2021.36006.

Full text
Abstract:
In the current fast paced life, security has become an important aspect which cannot be ignored. One of the usually neglected but important division of security in public areas involves the unattended objects. Bombs and other harmful objects that are incendiary cause great harm. And in most of the cases such objects are left unattended for some time before causing harm. As such, unattended objects should be given importance and must be checked to ensure safety. This paper shows a method to identify unattended objects in public areas. This is done by comparing a fixed/initial background frame with frames after a fixed interval. If there is a change in the frames, then that refers to an attended object. No change observed, proves an unattended object which is highlighted by a box. This is done with the help of blob analysis. This paper does this with the help of MATLAB. MATLAB being a software accessible to wide range of people provides an easy process with moderate results. It uses a wide range of predefined functions and toolboxes to do this.
APA, Harvard, Vancouver, ISO, and other styles
16

Liao, W., C. Yang, M. Ying Yang, and B. Rosenhahn. "SECURITY EVENT RECOGNITION FOR VISUAL SURVEILLANCE." ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences IV-1/W1 (May 30, 2017): 19–26. http://dx.doi.org/10.5194/isprs-annals-iv-1-w1-19-2017.

Full text
Abstract:
With rapidly increasing deployment of surveillance cameras, the reliable methods for automatically analyzing the surveillance video and recognizing special events are demanded by different practical applications. This paper proposes a novel effective framework for security event analysis in surveillance videos. First, convolutional neural network (CNN) framework is used to detect objects of interest in the given videos. Second, the owners of the objects are recognized and monitored in real-time as well. If anyone moves any object, this person will be verified whether he/she is its owner. If not, this event will be further analyzed and distinguished between two different scenes: moving the object away or stealing it. To validate the proposed approach, a new video dataset consisting of various scenarios is constructed for more complex tasks. For comparison purpose, the experiments are also carried out on the benchmark databases related to the task on abandoned luggage detection. The experimental results show that the proposed approach outperforms the state-of-the-art methods and effective in recognizing complex security events.
APA, Harvard, Vancouver, ISO, and other styles
17

Meng, Zhichao, Man Zhang, and Hongxian Wang. "CNN with Pose Segmentation for Suspicious Object Detection in MMW Security Images." Sensors 20, no. 17 (September 2, 2020): 4974. http://dx.doi.org/10.3390/s20174974.

Full text
Abstract:
Millimeter-wave (MMW) imaging scanners can see through clothing to form a three-dimensional holographic image of the human body and suspicious objects, providing a harmless alternative for non-contacting searches in security check. Suspicious object detection in MMW images is challenging, since most of them are small, reflection-weak, shape, and reflection-diverse. Conventional detectors with artificial neural networks, like convolution neural network (CNN), usually take the problem of finding suspicious objects as an object recognition task, yielding difficulties in developing large-amount and complete sample sets of objects. In this paper, a new algorithm is developed using the human pose segmentation followed by the deep CNN detection. The algorithm is emphasized to learn the similarity with humans’ body clutter applied to training corresponding CNNs after the image segmentation base of the pose estimation. Moreover, the suspicious object recognition in the MMW image is converted to a binary classification task. Instead of recognizing all sorts of suspicious objects, the CNN detector determines whether the body part images present the abnormal patterns containing suspicious objects. The proposed algorithm that is based on CNN with the pose segmentation has concise configuration, but optimal performance in the suspicious object detection. Extensive experiments confirm the effectiveness and superiority of the proposal.
APA, Harvard, Vancouver, ISO, and other styles
18

Liu, Chenlu, Di Jiang, Weiyang Lin, and Luis Gomes. "Robot Grasping Based on Stacked Object Classification Network and Grasping Order Planning." Electronics 11, no. 5 (February 25, 2022): 706. http://dx.doi.org/10.3390/electronics11050706.

Full text
Abstract:
In this paper, the robot grasping for stacked objects is studied based on object detection and grasping order planning. Firstly, a novel stacked object classification network (SOCN) is proposed to realize stacked object recognition. The network takes into account the visible volume of the objects to further adjust its inverse density parameters, which makes the training process faster and smoother. At the same time, SOCN adopts the transformer architecture and has a self-attention mechanism for feature learning. Subsequently, a grasping order planning method is investigated, which depends on the security score and extracts the geometric relations and dependencies between stacked objects, it calculates the security score based on object relation, classification, and size. The proposed method is evaluated by using a depth camera and a UR-10 robot to complete grasping tasks. The results show that our method has high accuracy for stacked object classification, and the grasping order effectively and successfully executes safely.
APA, Harvard, Vancouver, ISO, and other styles
19

Кістол, Анастасія Анатоліївна. "SOCIAL SYSTEM AS AN OBJECT OF SECURITY." Economies' Horizons, no. 1(1) (April 28, 2015): 75–78. http://dx.doi.org/10.31499/2616-5236.1(1).2015.141214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Thuraisingham, Bhavani. "Integrating object-oriented technology and security technology." ACM SIGPLAN Notices 28, no. 10 (October 1993): 304. http://dx.doi.org/10.1145/167962.165909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Silverstone, Roger. "Television, ontological security and the transitional object." Media, Culture & Society 15, no. 4 (October 1993): 573–98. http://dx.doi.org/10.1177/016344393015004004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Thuraisingham, M. B. "Mandatory security in object-oriented database systems." ACM SIGPLAN Notices 24, no. 10 (October 1989): 203–10. http://dx.doi.org/10.1145/74878.74899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Sivanantham, S., N. Nitin Paul, and R. Suraj Iyer. "OBJECT TRACKING ALGORITHM IMPLEMENTATION FOR SECURITY APPLICATIONS." Far East Journal of Electronics and Communications 16, no. 1 (February 2, 2016): 1–13. http://dx.doi.org/10.17654/ec016010001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

KumarSaini, Dinesh. "Security Concerns of Object Oriented Software Architectures." International Journal of Computer Applications 40, no. 11 (December 29, 2012): 41–48. http://dx.doi.org/10.5120/5012-7334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Benantar, M., B. Blakley, and A. J. Nadalin. "Approach to object security in Distributed SOM." IBM Systems Journal 35, no. 2 (1996): 192–203. http://dx.doi.org/10.1147/sj.352.0192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Roy, O. M. "Security as an Object of Public Administration." Management Science 8, no. 1 (March 20, 2018): 52–61. http://dx.doi.org/10.26794/2304-022x-2018-8-1-52-61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ashby, Victoria, and Linda Schlipper. "Security standards for object data management systems." Computer Standards & Interfaces 13, no. 1-3 (October 1991): 297–302. http://dx.doi.org/10.1016/0920-5489(91)90037-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Suryani, Vera, Selo Sulistyo, and Widyawan Widyawan. "Trust-Based Privacy for Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (October 1, 2016): 2396. http://dx.doi.org/10.11591/ijece.v6i5.9678.

Full text
Abstract:
<p>Internet of Things or widely known as IOT makes smart objects become active participants in the communication process between objects and their environment. IoT services that utilize Internet connection require solutions to a new problem: security and privacy. Smart objects and machine-to-machine communications in IOT now become interesting research, including that related to security. Privacy, which is a safe condition in which object is free from interference from other objects, is one of the important aspects in IOT. Privacy can be implemented using various ways for examples by applying encryption algorithms, restrictions on access to data or users, as well as implementing rules or specific policy. Trustable object selection is one technique to improve privacy. The process of selecting a trustable object can be done based on past activities or trust history of the object, also by applying a threshold value to determine whether an object is "trusted" or not. Some researchers have studied this approach. In this study, the selection processes of trustable objects are calculated using Modified Ant Colony algorithm. The simulation was performed and resulted in declining graphic trend but stabilized in certain trust value.</p>
APA, Harvard, Vancouver, ISO, and other styles
29

Suryani, Vera, Selo Sulistyo, and Widyawan Widyawan. "Trust-Based Privacy for Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (October 1, 2016): 2396. http://dx.doi.org/10.11591/ijece.v6i5.pp2396-2402.

Full text
Abstract:
<p>Internet of Things or widely known as IOT makes smart objects become active participants in the communication process between objects and their environment. IoT services that utilize Internet connection require solutions to a new problem: security and privacy. Smart objects and machine-to-machine communications in IOT now become interesting research, including that related to security. Privacy, which is a safe condition in which object is free from interference from other objects, is one of the important aspects in IOT. Privacy can be implemented using various ways for examples by applying encryption algorithms, restrictions on access to data or users, as well as implementing rules or specific policy. Trustable object selection is one technique to improve privacy. The process of selecting a trustable object can be done based on past activities or trust history of the object, also by applying a threshold value to determine whether an object is "trusted" or not. Some researchers have studied this approach. In this study, the selection processes of trustable objects are calculated using Modified Ant Colony algorithm. The simulation was performed and resulted in declining graphic trend but stabilized in certain trust value.</p>
APA, Harvard, Vancouver, ISO, and other styles
30

Hu, Chang Ming, Jian Hua Yang, and Bin Qi Guo. "Comparative Study of the Housing Security Object Definition Methods." Applied Mechanics and Materials 501-504 (January 2014): 2593–600. http://dx.doi.org/10.4028/www.scientific.net/amm.501-504.2593.

Full text
Abstract:
Due to the complexity of the definition of the housing security object, the object recognition mostly depends on experience data, lacking theoretical support. The scientific method to define the income line of the housing security object is the key to ensure the appropriate level of housing security and the fairness of social welfare. This paper introduces several common methods to define the income line of housing security, and the main problem of these methods is not matched with the multi-level security system. For that, this paper introduces the method to define the income line of the housing security object based on income distribution function and the quantile theory, uses EViews to analyze house security object, and puts forward relevant suggestions for improving the management of the security object.
APA, Harvard, Vancouver, ISO, and other styles
31

Alodia, Delvina, and Endang Pandamdari. "PERLINDUNGAN HUKUM BAGI KREDITUR DALAM HAL DEBITOR MENYEWAKAN OBJEK JAMINAN FIDUSIA KEPADA PIHAK KE TIGA (ANALISIS KASUS PUTUSAN MAHKAMAH AGUNG NOMOR 1271 K/PDT/2016)." Jurnal Hukum Adigama 1, no. 1 (July 31, 2018): 1453. http://dx.doi.org/10.24912/adigama.v1i1.2218.

Full text
Abstract:
Fiduciaire Eigendomsoverdracht or as otherwise known as Fiduciary Transfer of Ownership or Fiduciary Security, is a type of security that has now been used by many people and cannot be denied its importance in the world of private law. In Fiduciary Security, the objects will which remain in control of the person or entity which provides a fiduciary security over the objects (Fiduciary Provider). That is why this security is used to give the fiduciary beneficiary a form of legal certainty and to secure repayment of certain debt. But in reality, there are still many problems concerning this such as the fiduciary beneficiary who doesn’t register the object at the Fiduciary Registration Office, the fiduciary provider doesn’t pay their debts or they may have rented or possibly sold the objects. In this situation, the fiduciary beneficiary faces an immense loss. This journal focuses on the problem where the fiduciary provider has rented the object to another party without the fiduciary beneficiary’s knowledge and what legal protection does the fiduciary beneficiary has concerning this situation. The research method this journal uses is a normative method with the usage of secondary data and qualitative analization. The results of this research is to give a picture of the preventive and repressive legal protection for the fiduciary beneficiary in regards to the fiduciary provider having sold the object without the fiduciary beneficiary’s knowledge.
APA, Harvard, Vancouver, ISO, and other styles
32

Weerasena, H. H., P. B. S. Bandara, J. R. B. Kulasekara, B. M. B. Dassanayake, U. A. A. Niroshika, and P. R. Wijenayake. "Dynamic Object Path Detection in a Network of Surveillance Cameras." Journal of Computer Science 1, no. 1 (October 7, 2013): 11–19. http://dx.doi.org/10.31357/jcs.v1i1.1104.

Full text
Abstract:
Today, automated camera surveillance systems play a major role in securing public and private premises to ensure security and to reduce crime by detecting behavioral changes of moving objects. The important goal of such a surveillance system is to reduce human intervention while at the same time, provide accurate detection of moving objects. Many researchers have attempted to automate different aspects of camera surveillance such as tracking humans, traffic controlling, ground surveillance, etc. However, a system that overcomes overall difficulties that arise in the task of object detection and object tracking has not been developed because of high variance in the problem domain. The proposed system tracks the path of a locked object through a network of cameras. In contrast to traditional methods where the operators have to switch the screens manually to find the target objects, the proposed technique, once locked to an object; automatically tracks it through a camera network and generates the path on a map. We propose to use stereo cameras to enhance the detection and tracking of objects in 3D space.
APA, Harvard, Vancouver, ISO, and other styles
33

Boichuk, V. Yu. "Generic, specific and direct object of a crime under the Article 330 of the Criminal Code of Ukraine." Bulletin of Kharkiv National University of Internal Affairs 83, no. 4 (December 28, 2018): 19–27. http://dx.doi.org/10.32631/v.2018.4.02.

Full text
Abstract:
The author has carried out the research of one of the mandatory elements of corpus delicti under the Art. 330 of the Criminal Code of Ukraine – its object. In the course of its analysis, the author has considered general classification of objects of a crime generally adopted in the doctrine of criminal law of Ukraine (depending on the degree of generalization of the social relations protected by the criminal law, which are the objects of various crimes) into general, generic, specific and direct ones. The concept and essence of general, generic, specific and direct objects of a crime under the Art. 330 of the Criminal Code of Ukraine, are determined on the basis of views on the object from the standpoint of the theory of social relations. It has been emphasized that general, generic, specific and direct objects of a crime under the Art. 330 of the Criminal Code of Ukraine constitute a system, that is, they are not just a simple set, but are in interdependence. The link element through which the system of objects of this crime is formed is defined as the general sphere of social activity, where the mentioned social relations arise, develop and operate, namely, the national security of Ukraine. Thus, all social relations, which are put under the protection of Section XIV of the Special Part of the Criminal Code of Ukraine, arise and function in general in order to safeguard the interests of Ukraine’s national security. Generic object of a crime under the Art. 330 of the Criminal Code of Ukraine, has been defined as social relations existing with regard to the security of state secrets and official information gathered in the course of operative and search, counter-intelligence activities, in the field of the country defense, as well as the security of the state border of Ukraine and military security in terms of providing draft call and mobilization. Accordingly, the specific object of this crime is more narrow range of specific social relations that are associated with ensuring the state of information security. It was formulated as social relations that exist with regard to the security of state secrets and official information gathered in the process of operative and search, counter-intelligence activities, in the field of the country defense. The direct object of a criminal act under the Art. 330 of the Criminal Code of Ukraine, was admitted as social relations that exist with regard to the security of official information gathered in the process of operative and search, counter-intelligence activities, in the field of the country defense. The author has revealed the systemic nature of interrelations between the generic, specific and the direct object of a crime, stipulated by the Art. 330 of the Criminal Code of Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
34

Makarenko, Sergey, and Gleb Smirnov. "Selection Method of Test Cyber Attacks that Ensure the Rational Completeness of the Penetration Testing of a Critical Information Infrastructure Object." Voprosy kiberbezopasnosti, no. 6(46) (2021): 12–25. http://dx.doi.org/10.21681/2311-3456-2021-6-12-25.

Full text
Abstract:
Relevance. Security issues of information systems in critical infrastructure objects become important now. However, current tasks of information security audit of critical infrastructure objects are mainly limited to checking them for compliance with requirements of standards and documents. With this approach to the audit, security of these objects from real attacks by hackers remains unclear. Therefore, objects are subjected to a testing procedure, namely, penetration testing, in order to objectively verify their security. An analysis of publications in this area shows that there is not mathematical approaches to selection of test cyber attacks for penetration testing set. The goals of the paper is to form the selection method of test cyber attacks that ensure the rational completeness of the security audit of a critical information infrastructure object. Research methods. Methods of probability theory and mathematical statistics, methods of graph theory and set theory are used in the paper to achieve the research goals. Results. The Select Method of test cyber attacks for security audit of a critical information infrastructure object with rational completeness is presented in the paper. This method formalizes the selection process in the form of a two-stage procedure. At the first stage, based on the topological model of the object testing, a set of testing paths is formed, and these paths are ordered by the degree of weight increase. The path weight is the efficiency/cost indicator that takes in account the test resource for realized of a test cyber attack, the vulnerability of an object element, and the level of damage caused to the element by this test cyber attack. At the second stage of the method, from an ordered set of test paths are selected of such, which would ensure the maximization of the whole absolute cost of the detected damage, within the limits on the resource making of test cyber attacks. It is using of this method in audit practice will allow us to justify the most effective test cyber attacks according to the “efficiency/cost” criterion, as well as to form test sets that will ensure the rational completeness of the audit of the critical infrastructure object.
APA, Harvard, Vancouver, ISO, and other styles
35

Anwar, Tasniem. "Unfolding the Past, Proving the Present: Social Media Evidence in Terrorism Finance Court Cases." International Political Sociology 14, no. 4 (March 20, 2020): 382–98. http://dx.doi.org/10.1093/ips/olaa006.

Full text
Abstract:
Abstract During terrorism trials, social media activities such as tweeting, Facebook posts, and WhatsApp conversations have become an essential part of the evidence presented. Amidst the complexity of prosecuting crimes with limited possibilities for criminal investigations and evidence collection, social media interactions can provide valuable information to reconstruct events that occurred there-and-then, to prosecute in the here-and-now. This paper follows social media objects as evidentiary objects in different court judgments to research how security practices and knowledge interact with legal practices in the court room. I build on the notion of the folding object as described by Bruno Latour and Amade M'charek to research the practices and arguments of the judges through which they unfold some of the histories, interpretations, and politics inside the object as reliable evidence. This concept allows for an in-depth examination of how histories are entangled in the presentation of an evidentiary object and how these references to histories are made (in)visible during legal discussions on security and terrorism. The paper therefore contributes to the field of critical security studies by focusing on how security practices are mediated in the everyday legal settings of domestic court rooms.
APA, Harvard, Vancouver, ISO, and other styles
36

Salman, Rahmi, Thorsten Schultze, and Ingolf Willms. "Performance Enhancement of UWB Material Characterization and Object Recognition for Security Robots." Journal of Electrical and Computer Engineering 2010 (2010): 1–6. http://dx.doi.org/10.1155/2010/314695.

Full text
Abstract:
By means of UWB Radar sensors the tasks of material characterisation and object recognition can be performed on the basis of a previous imaging of the whole environment. A UWB version of the microwave ellipsometry method is applied for estimating the permittivity of homogenous objects. The object recognition task is performed using bistatic sensor nodes on the basis of Radar measurements. The simulation-based performance evaluations show a very robust behavior due to suitable preprocessing of Radar data. The applications comprise the detection of fire sources, the detection of metallic object hidden under clothing, and the recognition of building structures.
APA, Harvard, Vancouver, ISO, and other styles
37

Radzievskyi, Rostyslav, Valerii Plisko, and Valentyn Bondarenko. "PROFESSIONAL TRAINING OF SECURITY GUARDS ON THE BASIS OF SYSTEM MODULAR PROJECT OF OBJECT PROTECTION." Science and Education 2020, no. 3 (March 2020): 109–17. http://dx.doi.org/10.24195/2414-4665-2020-3-16.

Full text
Abstract:
The article deals with the problematic issues of professional training of law enforcement officers who would be able to ensure reliable protection of objects and security of individuals. The analysis of security guards’ professional requirements and features of their official activity has been carried out. The method of training of security guards has been developed on the basis of systematization of knowledge, skills taking into account various modules, modular blocks in a single complex that gives the chance to the future security guard to master knowledge consistently and to provide the whole process algorithmization. On the basis of the created technique the model of security guards’ training is developed in general. The main training modules and their modular blocks are: acquisition of knowledge on the main areas of ensuring the overall organization of objects protection, which minimizes and eliminates the impact of other threats that may interfere with the normal functioning of the object; ability to provide a description of the object by external and internal characteristics; possession of a modern set of engineering and technical means of protection, including: fire-fighting modular unit, infrastructure unit, alarm system protection unit, access control and management systems, reliable modular unit, etc. The main stage of law enforcement personnel training is a formation of abilities to use protective modules in the conditions of external and internal interventions, threats etc. Actions of unauthorized entry on the object have been defined. A method of detecting factual intrusion (attempt) into the area of the protected object is provided. Examples of psychotic behavior of the offender are considered in the training process. The table shows the potential ability of the offender to act depending on the motivation level of emotional preparedness that correlates with his/her actions. The positive influence of the proposed innovations on the level of theoretical and practical training of future security guards has been revealed. The experiment confirmed the effectiveness of security guards training method based on the modular design system of object protection.
APA, Harvard, Vancouver, ISO, and other styles
38

Ren, Sheng, Jianqi Li, Tianyi Tu, Yibo Peng, and Jian Jiang. "Towards Efficient Video Detection Object Super-Resolution with Deep Fusion Network for Public Safety." Security and Communication Networks 2021 (May 22, 2021): 1–14. http://dx.doi.org/10.1155/2021/9999398.

Full text
Abstract:
Video surveillance plays an increasingly important role in public security and is a technical foundation for constructing safe and smart cities. The traditional video surveillance systems can only provide real-time monitoring or manually analyze cases by reviewing the surveillance video. So, it is difficult to use the data sampled from the surveillance video effectively. In this paper, we proposed an efficient video detection object super-resolution with a deep fusion network for public security. Firstly, we designed a super-resolution framework for video detection objects. By fusing object detection algorithms, video keyframe selection algorithms, and super-resolution reconstruction algorithms, we proposed a deep learning-based intelligent video detection object super-resolution (SR) method. Secondly, we designed a regression-based object detection algorithm and a key video frame selection algorithm. The object detection algorithm is used to assist police and security personnel to track suspicious objects in real time. The keyframe selection algorithm can select key information from a large amount of redundant information, which helps to improve the efficiency of video content analysis and reduce labor costs. Finally, we designed an asymmetric depth recursive back-projection network for super-resolution reconstruction. By combining the advantages of the pixel-based super-resolution algorithm and the feature space-based super-resolution algorithm, we improved the resolution and the visual perception clarity of the key objects. Extensive experimental evaluations show the efficiency and effectiveness of our method.
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Qi, and Guang Feng Zhang. "MMW Radiometric Image Feature Extraction for Security Inspection." Applied Mechanics and Materials 236-237 (November 2012): 999–1003. http://dx.doi.org/10.4028/www.scientific.net/amm.236-237.999.

Full text
Abstract:
Millimeter-wave (MMW) radiometric imaging system is widely used in the field of military and civil affairs. It can be used to detect concealed objects hidden under clothing. Based on MMW radiation imaging method and morphology theory, we presented a complex morphology filter to do the image pretreatment. Then used the Canny operator to extract features from concealed objects. The results show that the morphology algorithm can improve the quality of radiometric images. Meanwhile, Canny algorithm can detect the edges of object well.
APA, Harvard, Vancouver, ISO, and other styles
40

Shi, Yuxuan, Yue Fan, Siqi Xu, Yue Gao, and Ran Gao. "Object Detection by Attention-Guided Feature Fusion Network." Symmetry 14, no. 5 (April 26, 2022): 887. http://dx.doi.org/10.3390/sym14050887.

Full text
Abstract:
One of the most noticeable characteristics of security issues is the prevalence of “Security Asymmetry”. The safety of production and even the lives of workers can be jeopardized if risk factors aren’t detected in time. Today, object detection technology plays a vital role in actual operating conditions. For the sake of warning danger and ensuring the work security, we propose the Attention-guided Feature Fusion Network method and apply it to the Helmet Detection in this paper. AFFN method, which is capable of reliably detecting objects of a wider range of sizes, outperforms previous methods with an mAP value of 85.3% and achieves an excellent result in helmet detection with an mAP value of 62.4%. From objects of finite sizes to a wider range of sizes, the proposed method achieves “symmetry” in the sense of detection.
APA, Harvard, Vancouver, ISO, and other styles
41

Wiryadharma, Erick, and Moh Saleh. "Due to the Financing Company’s Capital as a Fidusian Recipient of Fidusian Security Objectives." International Journal of Multicultural and Multireligious Understanding 8, no. 7 (July 8, 2021): 19. http://dx.doi.org/10.18415/ijmmu.v8i7.2875.

Full text
Abstract:
The type of research used in this research is normative legal research. The transfer of ownership rights to the Fiduciary Collateral Objects is handed over in a constitutum possessorium, which means that the trustworthiness of the guaranteed property (the debtor's property) is transferred to the creditor, with physical control over the goods remaining with the debtor. Where it’s agreed that the owner of the object will surrender his/her right over the object to the Fiduciary. But with a promise that the owner of the object may still use it and then hold onto the object for the Fiduciary. So the status, the person who was originally the owner, is now a borrower. In this incident, there was no real surrender, but only based on an agreement.
APA, Harvard, Vancouver, ISO, and other styles
42

Romanovska, Y. A. "City as an Object of Socio-Economic Security." Problems of Economy 3, no. 41 (2019): 171–77. http://dx.doi.org/10.32983/2222-0712-2019-3-171-177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Thuraisingham, Bhavani, T. C. Ting, Peter Sell, Ravi Sandhu, and Thomas Keefe. "Integrating security technology and object-oriented technology (panel)." ACM SIGPLAN OOPS Messenger 5, no. 2 (April 1994): 59–61. http://dx.doi.org/10.1145/260304.260320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Weishi, Qunyu Xu, Huansheng Ning, Taosheng Wang, and Jing Li. "Foreign object debris surveillance network for runway security." Aircraft Engineering and Aerospace Technology 83, no. 4 (July 5, 2011): 229–34. http://dx.doi.org/10.1108/00022661111138648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Guinier, Daniel. "Object-oriented software for auditing information systems security." ACM SIGSAC Review 10, no. 4 (October 15, 1992): 22–30. http://dx.doi.org/10.1145/152399.152404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Alam, Mahtab. "Object oriented software security: goal questions metrics approach." International Journal of Information Technology 12, no. 1 (April 20, 2018): 175–79. http://dx.doi.org/10.1007/s41870-018-0189-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Varadharajan, Vijay, and Stewart Black. "Multilevel security in a distributed object-oriented system." Computers & Security 10, no. 1 (February 1991): 51–68. http://dx.doi.org/10.1016/0167-4048(91)90056-j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Yankovskaya, Yuliya, Tamara Datciuk, Lidiia Kondratieva, and Rashid Mangushev. "Structure, adaptability and security of an architectural object." E3S Web of Conferences 164 (2020): 05007. http://dx.doi.org/10.1051/e3sconf/202016405007.

Full text
Abstract:
The paper is devoted to the improvement of the modern methodological apparatus for describing and modeling the structure of architectural objects, which is focused on current trends in the design of buildings and structures with a certain degree of variability and adaptability to rapidly changing modern requirements of potential and real users and external environmental conditions (natural, man-made). In addition, the complexity and variability of the structure of architectural objects directly affect the increase in their operational characteristics, the improvement of security systems and the hierarchy of structures of spaces of different access levels. Another aspect of this problem is the creation of a scientific basis for the formation of a more flexible regulatory framework in architecture.
APA, Harvard, Vancouver, ISO, and other styles
49

PAVLIUTIN, Yu M. "ECONOMIC SECURITY AS AN OBJECT OF PUBLIC ADMINISTRATION." Law and Society 2, no. 6-2 (2020): 99–105. http://dx.doi.org/10.32842/2078-3736/2020.6.2.2.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Yanhai, and Yaoiwu Wang. "Behavior Analysis on the Security Object of the Public Rental Housing." Open Construction and Building Technology Journal 9, no. 1 (September 15, 2015): 233–37. http://dx.doi.org/10.2174/1874836801509010233.

Full text
Abstract:
With the establishment of the system of public rental housing supply, the vulnerable group would get great benefit in the promotion of social welfare, however, due to the existence of price gap and the imperfection of the public rental housing system, the game relationship formed between the management authority and the security object. Based on the definition to the security object in the public rental housing, the specific classification to the security object was analyzed at first, and then the motivation of the security object to obtain the unjust enrichment was discussed from the perspective of policy and the behavior. To stimulate the relationship and interaction between the management authority and the security object, a dynamic game model was presented in the context of basic hypothesis, the evolutionary strategy was summarized after the game process analysis. The possible paths to prevent from the behavior of free-riding of the security object was finally concluded.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography