Fig 6 - uploaded by Roberto Cusani
Content may be subject to copyright.
Scheme of the radio communication subsystem  

Scheme of the radio communication subsystem  

Source publication
Article
Full-text available
A high safety and security level of a complex system is very difficult to be reached, guaranteed and managed if the system is characterized by a peculiar complexity and physical extension, due to the elevate number of parameters to be checked and controlled. The use of human resources needs an elevate number of personnel members that could not only...

Citations

... Air navigation services represent a very delicate mission for the security of air transport. This mission is made through integrated systems [1][2][3][4]that represent a critical infrastructure whose access, both from the physical and logical point of view, must be accurately checked and controlled. In fact, any unauthorized intrusion inside the control system could generate catastrophic consequences. ...
... An example of anomalous physical access is represented by the use of the same entrance badge in two different sites at the same time or in a too restricted time with respect to the physical distance of the two considered sites. It is therefore clear that is very important to have an early warning system [3] that signals any anomalous access to the security personnel to activate all the necessary security procedures to prevent any attack to the air navigation system. ...
Conference Paper
Early warning systems are fundamental instruments for the management of critical situations since they are able to signal in advance any anomaly with respect to ordinary situations. The purpose of this paper is to present an early warning system, based on artificial neural networks, for the prevention and control of unauthorized accesses to the air navigation services infrastructure in Italy.
... These systems are very useful since they allow managing security in a very efficient way, reducing the need of human resources. Most of them implement an access control system1234. In particular, a huge number of research efforts were directed to speaker recognition problem56789101112131415. ...
Article
Full-text available
The aim of this paper is to show the accuracy and time results of a text independent automatic speaker recognition (ASR) system, based on Mel-Frequency Cepstrum Coefficients (MFCC) and Gaussian Mixture Models (GMM), in order to develop a security control access gate. 450 speakers were randomly extracted from the Voxforge.org audio database, their utterances have been improved using spectral subtraction, then MFCC were extracted and these coefficients were statistically analyzed by GMM in order to build each profile. For each speaker two different speech files were used: the first one to build the profile database, the second one to test the system performance. The accuracy achieved by the proposed approach is greater than 96% and the time spent for a single test run, implemented in Matlab language, is about 2 seconds on a common PC.
... For this reason it has been necessary to design an automatic port areas access control system123 capable of managing, as a component of an integrated security system, the passengers and goods flows without reducing the security standards but capable of reducing the access time relative to the older used system. In fact the designed system is capable of reaching opening time of the entrance bar and ticket printing that are lesser than 5 seconds. ...
Conference Paper
Full-text available
The security of a port is strongly dependent on the use of integrated access control technology systems. Any weakness of the integrated access control system involves a weakness of the port. For this reason it is necessary to design and realize highly integrated, efficient and reliable access control systems. The authors illustrate the work made to design and realize the integrated access control system of the most important commercial and tourist ports of Italy.
... Thanks to the continuous technology development it is possible to realize new varieties of devices, sensors and other powerful instruments which allow to implement advanced safety/security systems that show all their power when they are properly integrated in higher level systems [1] [2] [3]. ...
... Thanks to the continuous technology development it is possible to realize new varieties of devices, sensors and other powerful instruments which allow to implement advanced safety/security systems that show all their power when they are properly integrated in higher level systems123. The integrated safety/security systems allows the personnel to check directly each zone of the protected building or infrastructure and to be immediately informed if a dangerous event takes place. ...
Article
Full-text available
The realization of security wired network is very critical when the network itself must be installed in an environment full of restrictions and constrains such as historical palaces, characterized by unique architectural features. The purpose of this paper is to illustrate an advanced installation design technique of security wired network based on genetic algorithm optimisation that is capable of ensuring high performances of the network itself and significant reduction of the costs. The same technique can be extended to safety system such as fire signalling.
Conference Paper
Integrated security system need an efficient communication network to exchange the great amount of data necessary to make them work correctly. In the present paper, a new adaptive genetic controller for the dynamic optimization of network traffic of integrated security systems whose theoretical results have been tested and confirmed on wide and complex integrated security systems such as the Vatican City and Senate of Italian Republic ones is presented.
Article
Full-text available
Wireless networks are very useful in mobile services. In particular environments, such as the underground Gran Sasso mountain National Laboratories of the Italian Institute of Nuclear Physics they represent a vital resource for safety/security/communication. The purpose of this paper is to illustrate the design procedure, based on genetic algorithm, which has been used to design the mentioned wireless network, guaranteeing a high level of performances and reliability.