The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In present study the problem of an alarm systems optimization was presented and the stages of the multicriteria structured optimization method in cost-functional characteristics of the alarm system were also described. The method represents a combination of the proposed reflection and selection schemes in the genetic algorithm that solves the extreme combinatorics problem.
W aktualnych badaniach są tworzone metody szacowania ryzyka w strefowych systemach bezpieczeństwa. Odpowiednie oszacowania bazują na wnioskowaniu rozmytym w ujęciu ryzyka braku detekcji intruza w strefach bezpieczeństwa, w zbiorze stref systemu bezpieczeństwa.
This paper describes hardware implementations of crypto protocol elements for secured data communication in two wired networks of security system detectors. Those elements are basic to crypto protocol development for that type of network. In addition, hardware tools for the network controller and the network server that support this protocol were developed. These tools will allow us to test and debug...
The methods estimating vulnerability of perimeter security systems are developed in the current study. Appropriate estimations are based on the fuzzy inference methods of intruder undetection risks on security zones set in territory's perimeter.
This paper describes two algorithms for optimizing the design of distributed perimeter security systems. The first algorithm is a straightforward algorithm whose primary purpose is to help us formulate the problem formally. The second algorithm, is a genetic algorithm. Both algorithms were incorporated into a new module for our distributed security systems CAD software. Tests of the module show that...
This paper discusses the use of genetic algorithms (GA) in a perimeter security CAD system (PSCAD). In this paper we compare the performance of a PSCAD system that uses exhaustive search for optimization with one that uses a genetic algorithm.
In this paper, we proposed an efficient method of converting speech codec formats between GSM 06.20 and G.729. Unlike a classic tandem method, proposed method executes transformation of coding parameters without the use PCM that allows reducing computational complexity and coding delay.
This paper describes the design of a low-cost network controller that can be used to interface sensors to security systems. This controller can use either a two-wired network interface with reconfigurable structure or an open optical channel for data communication with the network server. This design reduces the cost of data communication channels between sensors and the controller.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.