scholarly journals Features of Implementation of the System of Assessing the Security of Critically Important and Potentially Hazardous Objects Based on the Clements-Hofman Method

2019 ◽  
Vol 16 (4) ◽  
pp. 169
Author(s):  
I M Yannikov ◽  
M V Telegina

The paper assesses the existing approaches to the problem of assessing the security of hazardous facilities. It is proposed to carry out an assessment using the system of modeling and calculating the state of protection of hazardous objects developed on the basis of the Clements-Hoffman method, in which a set of threats, protection mechanisms and objects of protection are used to describe the system of protection with full overlap. This system can be used to calculate any type of protection of hazardous objects when entering data on any threats and appropriate means of protection. The paper provides a block diagram of the security system, a functional diagram, the main parameters and stages of development and testing.

2021 ◽  
Vol 351 ◽  
pp. 01010
Author(s):  
Janusz Musiał ◽  
Kostyantin Horiashchenko ◽  
Serhiy Horiashchenko ◽  
Mikołaj Szyca

The article is devoted to the study of the state of diagnosing the integrity of cables. The current state of diagnostics of problems of damage of cables is shown. Formulas for calculating several signals reflected from damage have been removed. To ensure the automation of the measurement process, based on the functional diagram of the automatic diagnostic device with measurement of distances to damage by the combined pulse-phase method, a block diagram of an automated distance meter to damage was developed, which allows measuring the investigated cable in automatic mode. This reduces the loss of time to perform measurement operations and ensure the required sequence of actions without the participation of the operator.


2020 ◽  
Vol 14 (1) ◽  
pp. 183-200
Author(s):  
Olena Illiashenko ◽  
Yevhenii Rudnichenko ◽  
Tetiana Momot ◽  
Nataliia Havlovska

Author(s):  
Lesley Ellis Miller

This article explores the surface and substance of elite dress in the baroque period by unpacking printed texts and images that reveal their political and economic significance in the courts of Europe. It does so by considering the nature and sources of garments and fabrics, continuity and change in their production and consumption in Spain and France, and the shaping of the modern fashion system—a system in which changes in textiles and trimmings were promoted seasonally by the state, textile manufacturers, and the nascent fashion press (Le Mercure galant) from the late seventeenth century onward. It thus underlines the local and global networks involved in the production and consumption of dress.


Author(s):  
Robert Gwardyński

The Police constitute a major element in the state security system. Their operation has both a national and local dimension. The Police have an impact on a local community’s security, ensuring the safety of people, their health, life, property, as well as maintaining public safety and order. This article aims to indicate the areas of the Police’s operation that result in an improvement of the residents’ safety and an increase in their sense of security.


2021 ◽  
Vol 16 (1) ◽  
pp. 47-60
Author(s):  
Michaela Šimonová ◽  

The arrival of information and communication technologies is nothing new. The number of people using these technologies and moving in cyberspace is growing, and therefore it is an important role of the state to respond sufficiently to such developments. A fundamental role of the state is to create a stable security system consisting of complex legislation as well as creation of a legislative environment capable of responding flexibly to the growing number of diverse incidents in cyberspace. Sufficient legal regulation consisting of unambiguous determination of competencies and tasks of individual subjects represents the basic pillar for the creation of a stable security system. The role of the state is also to maintain existing and create new partnerships with organizations that are able to provide relevant information and knowledge in the field of cyber security.


Sign in / Sign up

Export Citation Format

Share Document