Configuration of Integrated Security System

被引:1
|
作者
Levin, Mark Sh. [1 ]
Leus, Andrey V. [2 ]
机构
[1] Russian Acad Sci, Inst Inform Transmiss Problems, Moscow, Russia
[2] State Univ, Moscow Inst Phys & Techn, Dolgoprudnyi, Russia
关键词
D O I
10.1109/INDIN.2009.5195786
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on modular hierarchical design of configuration for an integrated security system. Hierarchical morphological design approach is used to search for Pareto-effective design solutions. An applied example involves the following: hierarchical (tree-like) model of the security system, design alternatives for system components/parts, criteria for the selection of the design alternatives, solving process as selection of the design alternatives and their synthesis into composite decisions as Pareto-effective solutions. System improvement/reconfiguration and multistage design are considered as well.
引用
收藏
页码:101 / +
页数:2
相关论文
共 50 条
  • [41] Optimal configuration for integrated energy system considering multiple uncertainties
    Zhou F.
    Chen L.
    Zhao J.
    Wang W.
    Kongzhi Lilun Yu Yingyong/Control Theory and Applications, 2024, 41 (03): : 533 - 542
  • [42] A Method of Integrated Modular Avionics System Configuration Data Management
    Xu, Wen
    Xiong, Zhiyong
    Gong, Cheng
    2015 IEEE/AIAA 34TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2015,
  • [43] A New PV System Configuration Based on Submodule Integrated Converters
    Khan, Omair
    Xiao, Weidong
    El Moursi, Mohamed Shawky
    IEEE TRANSACTIONS ON POWER ELECTRONICS, 2017, 32 (05) : 3278 - 3284
  • [44] Capacity Configuration of Integrated Energy System Considering Equipment Inertia
    Li, Yuxuan
    Zhang, Junli
    Wu, Xiao
    Shen, Jiong
    Lee, Kwang Y.
    IFAC PAPERSONLINE, 2020, 53 (02): : 13088 - 13093
  • [45] ICATS: An integrated configuration and tracking system for technology development experiments
    Natarajan, S
    Paithane, M
    Miller, A
    Canpolat, N
    Rottman, T
    Scott, M
    FLEXIBLE AUTOMATION AND INTELLIGENT MANUFACTURING, 1998, 1998, : 407 - 416
  • [46] A METHOD OF INTEGRATED MODULAR AVIONICS SYSTEM CONFIGURATION DATA MANAGEMENT
    Xu, Wen
    Xiong, Zhiyong
    Gong, Cheng
    2015 IEEE/AIAA 34TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2015,
  • [47] RATIONALE FOR INDICATOR QUALITY OF INTEGRATED INFORMATION SECURITY SYSTEM
    Stashevskiy, Z. P.
    Gricyuk, Yu. I.
    VISNYK NTUU KPI SERIIA-RADIOTEKHNIKA RADIOAPARATOBUDUVANNIA, 2014, (56): : 137 - 143
  • [48] AN ENSEMBLE INTEGRATED SECURITY SYSTEM WITH CROSS BREED ALGORITHM
    Mundru, Suresh
    Meena, K.
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2020, 21 (01): : 11 - 15
  • [49] A novel architecture for an integrated enterprise network security system
    Thanudas B.
    Sreelal S.
    Cyril Raj V.
    Purnesh Sairam A.
    Gajmoti V.
    Joshi P.
    International Journal of Security and Networks, 2019, 14 (01): : 47 - 60
  • [50] Security region model for regional integrated energy system
    Liu L.
    Wang D.
    Jia H.
    Li S.
    Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2019, 39 (08): : 63 - 71