scholarly journals Analysis results of experimental operation of the protection complex of long perimeters VM 8018

Doklady BGUIR ◽  
2021 ◽  
Vol 19 (3) ◽  
pp. 96-103
Author(s):  
L. L. Utin ◽  
A. V. Pavlovsky ◽  
A. A. Olkhovik ◽  
A. V. Makatserchyk

In recent years, technical means of perimeter security are becoming more widespread, which is due to their increasing efficiency of protection from unauthorized access by intruders to protected facilities. The high competition  of  manufacturers  of  such  means  has  led  to  the  emergence  of  a  variety  of  technical  solutions  for detection means (hereinafter referred to as DT) operating on different physical principles and designed to solve specific problems. The main purpose of the DT is to ensure the detection of the facts of intruders' penetration through  the  guarded  obstacle.  Considering  that  the  methods  of  intruders'  penetration  are  varied  (destruction of fences, climbing over the fence, digging under the fence, etc.), the creation of an effective security system using only one type of DT is a problematic task. At the same time, the autonomous use of many types of DT leads to the fact that there will be a large number of technical means in the duty room, which increase not only the  time  and  financial  costs  for  their  maintenance,  but  also  increase  the  requirements  for  the  competence  of the duty personnel. Research Institute of Electronic Computers has developed the complex VM 8018, designed to automate the process of protecting extended perimeters of objects for various purposes, including sections of the state border, perimeters and premises of outposts, extendedperimeters of industrial and military facilities, as well as controlling executive devices (electric drives for gates and gates, lighting etc.), video surveillance.

2020 ◽  
pp. 69-73
Author(s):  
S.G. Birjukov ◽  
O.I. Kovalenko ◽  
A.A. Orlov

The approach to creating standard means for reproducing units of volumetric activity of radon and thoron and flux density of radon from the soil surface is described based on the physical principles of reproducing these units of quantities and using as technical means for reproducing bubblers with a radioactive solution of radium salt, reference capacities of known volume, emanation chambers for generation of a toron, a gamma spectrometer with a semiconductor detector from highly pure germanium and radon radiometers. Reproduction consists in the physical realization of units in accordance with their definition as applied to the formation of radon and thoron in the radioactive rows of radium and thorium. The proposed approach will allow to determine the structural, structural and other technical solutions of standard measuring instruments, as well as specific techniques and methods of working with them. The creation of standard tools and technologies for reproducing units of volumetric activity of radon and thoron and the density of radon flux from the soil surface will ensure the unity and reliability of measurements in the field of ionizing radiation, traceability of units and bringing the characteristics of national standards in line with world achievements.


2013 ◽  
Vol 411-414 ◽  
pp. 1505-1509
Author(s):  
Long Chen ◽  
Shuan Chen ◽  
Yu Qing He ◽  
Jian Guo Wei ◽  
Jian Wu Dang

In this paper, we proposed a mobile security system based on IP camera network video surveillance by improving the traditional monitoring methods. This system includes three parts: Android mobile client, cloud server, IP camera monitoring terminals. By setting IP cameras at 24 fps but only sending one frame each second, we can infer the situation by analyzing of the single image and reduce the amount of data transmission. User can check the live scenes and send control commands to monitoring terminal or receive the push information from the server to freely give alarm signal to users anytime, anywhere. And users can also select any regions or any specific objects to monitor, the server will real-time monitor each scene according to the specific requirements by using the algorithms of image contrast and depth estimation. The experiment results show that the system can greatly improve the accuracy of the alarm.


2020 ◽  
Author(s):  
Aleksey Burkov

The book investigates the issues related to improving the efficiency of technical operation of ship electric drives, developed their classification. Identified ship's drives, having low reliability, designed and implemented technical solutions to increase their reliability. The appropriateness of the integrated assessment within the tasks of a mathematical and physical modeling. Developed and implemented mathematical and physical models for studies of electric drives. The proposed method, an algorithmic software, and made payments of contactors for work in the proposed technical solutions. Designed for those who specializiruetsya in the field of the theory and practice of ship electric drives. Useful for the learning process in the system of higher Maritime education.


2020 ◽  
pp. 3-5
Author(s):  
Anzor Babunashvili ◽  
Nona Kukhianidze

Security systems are the guarantee of stable functioning of the organization, company, office, industry, housing and other types of buildings. For entire security, complex control devices are set on the building which has to be protected, like fire and burglar alarms, video-audio controls and access systems. Intelligent Security Management System is built on Atmel’s microcontrollers. This allows the system to be flexible and to modify it easily if needed. The reliability of the security system depends on its uniqueness. This given security system is easily modified and hence its reliability is high. The system can be easily integrated into a variety of external modules, which can further increase the factor of reliability. It’s also easy to adopt it to various security management systems. Many of the security and video surveillance systems allow to control the situation of the object from a large distance. From any point of the planet, we can track and manage the security system modes and make easy changes in them, which enable adequate reaction.Digital complexes of video surveillance are one of the variants of defense organization. The main areas of their use are the most important objects and large areas where buildings are located far from each other.


Author(s):  
Miloš Milovanovic ◽  
Miroslav Minovic ◽  
Dejan Simic ◽  
Dušan Starcevic

E-government can provide citizen with better and/or more convenient services as oppose to traditional government services. Using electronic approach in completing a procurement process opens up a lot of issues regarding security. Transparent nature of the process at hand is requiring a sophisticated security system. Unauthorized access or different intrusion types are presenting a legitimate threat. On the other hand, developing such system in a developing country as Serbia bears many difficulties. Some of them are legal obstacles, technical weaknesses, as well as human resistance towards change. The focus of this chapter lies on methods used to overcome those difficulties as well as provide a strong security system that will guarantee the protection of sensitive data.


Sign in / Sign up

Export Citation Format

Share Document