PL EN
Wydawnictwo
WSGE
Wyższa Szkoła Gospodarki
Euroregionalnej
im. Alcide De Gasperi
BOOK CHAPTER (575-590)
Determination of the resultant deployment of active elemants of the region security system
 
More details
Hide details
 
 
KEYWORDS
ABSTRACT
The effectiveness of services responsible for domain security in the region is determined not only by the availability of the required forces and resources, but also by their location relative to the sources of threat and the protected entities. For this reason, the forces and resources that guarantee security in the region should be distributed in a manner that accounts for the current location of the protected entities and sources of threat to the operational security of those entities. Every entity faces various types of threats. Systems that minimize the impact of each threat should be developed to deliver a stable level of operational security in the entity. The security of an entity should be analyzed in view of various domains. This paper analyzes the concept of computer-aided determination of the optimal distribution of forces and resources that guarantee the operational security of entities in various domains. A method supporting the determination of optimal domain location was developed with the use of an expert application based on the AITECH Sphinx framework expert system. The optimal distribution of active elements protecting two entities against two types of threats was tested with the involvement of the developed application.
 
REFERENCES (18)
1.
Kołodziński E. (2009), Model Podstawowej Jednostki Organizacyjnej nSystemu Bezpieczeństwa Kraju, Czasopismo internetowe „Zagadnienia Inżynierii Bezpieczeństwa”,.
 
3.
Kołodziński E., Zapert P. (2011), System ekspertowy - analityka bezpieczeństwa regionu, XXV Międzynarodowa Konferencja NaukowoTechniczna EKOMILITARIS 2011 nt. Ochrona przed skutkami nadzwyczajnych zagrożeń, Praca zbiorowa pod redakcją gen. bryg. prof. dr. hab. inż. Zygmunta Mierczyka i płk. rez. dr. inż. Jarosława Wasilczuka, Zakopane, s. 288-303.
 
4.
The Apache Software Foundation (2011): Apache Maven Current version User Guide, Los Angeles, CA, The Apache Software Foundation.
 
5.
A Java API to interact with MATLAB Developer’s Guide,.
 
7.
Michalik K. (2006), PC-Shell Szkieletowy System Ekspertowy, Część 2, Podręcznik Inżyniera Wiedzy, Katowice, Aitech.
 
8.
Starosta B. (2006), Java Native Interface– łączenie Javy i C/C++, Software Developer’s Journal 8/2006, Warszawa, Software - Wydawnictwo Sp.z o.o..
 
9.
JBossTM The Professional Open Source Company (2006): The JBoss 4 Application Server J2EE Reference, Atlanta, Georgia, JBoss, Inc..
 
10.
SunMicrosystems, Inc. (2004): Java™RemoteMethodInvocation Specification, Santa Clara, California, Sun Microsystems, Inc..
 
11.
NASA World Wind Java SDK webpage,.
 
13.
Coté (2009): JAAS in action, http://www.jaasbook.com/ [2.06.2011].
 
14.
Goodarzi N. (2008), Develop JAAS Security on JBoss application serv23 Kołodziński E., 2002 er, http://www.javadev.org/files/J... [2.06.2011].
 
15.
Burke B., Monson-Haefel R. (2007), Enterprise Java Beans 3.0, Gliwice, Wydawnictwo Helion (oryg.: Enterprise JavaBeans 3.0, 5th Edition, Sebastopol, California 2006, O’Reilly Media, Inc.).2.
 
16.
Bauer C., King G. (2007), Java Persistence with Hibernate, Greenwich, Manning Publications Co.
 
17.
The MathWorks, Inc. (2002), Fuzzy Logic Toolbox For Use with MATLAB®, Natick, Massachusetts, The MathWorks, Inc.
 
18.
Kołodziński E. (2002), Symulacyjne metody badania systemów, Warszawa, Wydawnictwo naukowe PWN.
 
Journals System - logo
Scroll to top