Udc 621.384.325:629.7.052:620.179.13 Conception of Interconnecting Security System for Trunk Pipelines against Intended Threats
نویسندگان
چکیده
In the article there is the information about growth of unauthorized works on trunk pipelines and about corresponding economic losses as the result of the works. The structure of interconnecting security system for mentioned objects is offered. The interconnecting security system includes optical, vibroacoustic and seismic data acquisition channels and provides decision making algorithm for these channels analysis. An approach to estimate basic parameters of the system is justified. The approach is based on minimization of amount of expenditures for security object and minimization of losses from not prevented unauthorized works on trunk pipelines.
منابع مشابه
Pakistan Extremist Groups’ Security Threats against Islamic Revolution
Abstract In the wake of the 1979 Islamic Revolution in Iran and the ensuing dominance of political Islam discourse and its impact on Pakistani society, the ground was prepared for the spread of Wahhabism and anti-Shiism in that country due to the failure of the Islamabad government to manage the reactive conduct of extremist Salafist groups as well as its engagement in internal dis...
متن کاملA Novel Trusted Computing Model for Network Security Authentication
Abstract—Network information poses great threats from malicious attacks due to the openness and virtuality of network structure. Traditional methods to ensure information security may fail when both integrity and source authentication for information are required. Based on the security of data broadcast channel, a novel Trusted Computing Model (TCM) of network security authentication is propose...
متن کاملراههای تامین امنیت غذایی و جایگاه آن در پدافند غیر عامل
Background: This paper aims to examine the association between food security and passive defense and the position of food security in this context. Given the role of healthy manpower in the development of a country and the importance of healthy food and nutrition in human health as the core center of development and the main confronting factor with foreign threats, in this paper, we first discu...
متن کاملSecurity-Based Co-Expansion Planning of Gas and Electricity Networks Considering Demand Response
Coordinated expansion planning of power plants has always attracted the attention of power industry planners to arrive at the optimal mix that assures adequacy of energy supply. Here, we model the coordinates for expansion of electricity and gas networks while considering technical constraints, in order to minimize the total cost of investment and operation of electricity and gas networks for a...
متن کاملSecurity Threats on National Defense ICT based on IoT
In this paper, we drew new security threats on IoT (Internet of Thing) based modern battlefield (Network centric battlefield). DoD is focusing its attention on the development of unmanned combat systems to prepare for future war. The IoT technology provides networking service to connect each other unmanned combat system. IoT has the security vulnerabilities of each element of the technology its...
متن کامل