Udc 621.384.325:629.7.052:620.179.13 Conception of Interconnecting Security System for Trunk Pipelines against Intended Threats

نویسندگان

  • B. N. Epifantsev
  • A. A. Shelupanov
چکیده

In the article there is the information about growth of unauthorized works on trunk pipelines and about corresponding economic losses as the result of the works. The structure of interconnecting security system for mentioned objects is offered. The interconnecting security system includes optical, vibroacoustic and seismic data acquisition channels and provides decision making algorithm for these channels analysis. An approach to estimate basic parameters of the system is justified. The approach is based on minimization of amount of expenditures for security object and minimization of losses from not prevented unauthorized works on trunk pipelines.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pakistan Extremist Groups’ Security Threats against Islamic Revolution

Abstract In the wake of the 1979 Islamic Revolution in Iran and the ensuing dominance of political Islam discourse and its impact on Pakistani society, the ground was prepared for the spread of Wahhabism and anti-Shiism in that country due to the failure of the Islamabad government to manage the reactive conduct of extremist Salafist groups as well as its engagement in internal dis...

متن کامل

A Novel Trusted Computing Model for Network Security Authentication

Abstract—Network information poses great threats from malicious attacks due to the openness and virtuality of network structure. Traditional methods to ensure information security may fail when both integrity and source authentication for information are required. Based on the security of data broadcast channel, a novel Trusted Computing Model (TCM) of network security authentication is propose...

متن کامل

راههای تامین امنیت غذایی و جایگاه آن در پدافند غیر عامل

Background: This paper aims to examine the association between food security and passive defense and the position of food security in this context. Given the role of healthy manpower in the development of a country and the importance of healthy food and nutrition in human health as the core center of development and the main confronting factor with foreign threats, in this paper, we first discu...

متن کامل

Security-Based Co-Expansion Planning of Gas and Electricity Networks Considering Demand Response

Coordinated expansion planning of power plants has always attracted the attention of power industry planners to arrive at the optimal mix that assures adequacy of energy supply. Here, we model the coordinates for expansion of electricity and gas networks while considering technical constraints, in order to minimize the total cost of investment and operation of electricity and gas networks for a...

متن کامل

Security Threats on National Defense ICT based on IoT

In this paper, we drew new security threats on IoT (Internet of Thing) based modern battlefield (Network centric battlefield). DoD is focusing its attention on the development of unmanned combat systems to prepare for future war. The IoT technology provides networking service to connect each other unmanned combat system. IoT has the security vulnerabilities of each element of the technology its...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011