Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30172
Infrastructure means for Adaptive Camouflage

Authors: Jiri Barta, Albert Srnik

Abstract:

The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. It means that common computer aided technologies are used from the perspective of new, better protection of selected infrastructure objects. The paper is focused on the co-product of the Czech Defence Research Project - ADAPTIV. This project is carrying out by the University of Defence, Faculty of Economics and Management at the Department of Civil Protection. The project creates system and technology for adaptive cybernetic camouflage of armed forces objects, armaments, vehicles and troops and of mobilization infrastructure. These adaptive camouflage system and technology will be useful for army tactic activities protection and for decoys generation also. The fourth chapter of the paper concerns the possibilities of using the introduced technology to the protection of selected civil (economically important), critical infrastructure objects. The aim of this section is to introduce the scientific capabilities and potential of the University of Defence research results and solutions for the practice.

Keywords: ADAPTIV, Adaptive camouflage technology, CAMouflage, Cybernetic Active Camouflage

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1334179

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1155

References:


[1] Ludík, T., Ráček, J. Process Methodology for Emergency Management. IFIP Advances in Information and Communication Technology, Heidelberg : Springer, 2011, 359, pp 302-309, ISSN 1868-4238. 2011.
[2] Proch├ízkov├í, D. a kol. (2006). Bezpe─ìnost a krizové ř├¡zen├¡. 1. vyd. Praha: Police history, 2006. 255 s. ISBN 80-86477-35-5.
[3] Urban, R., Urbánek, J.F. & Lokajová,V. Computer-Aided Dynamic Modelling of New Terrorist Threats Life Cycles, In 5th European Computing Conference (ECC '11), WSEAS Press, 2011, Paris, France, ISBN: 978-960-474-297-4, pp 228-232.
[4] Urban, Roman & Urbánek, J.F. Computer-Aided Expert System for a Ranking of New Terrorist Threats , In 5th European Computing Conference (ECC '11), WSEAS Press, 2011, Paris, France, ISBN: 978- 960-474-297-4, pp 210-215.
[5] Urbánek, J. F. Application Modelling & Simulation of Data Flow in Disaster Events Management, In 8th Int. Conf. on Simulation, modelling and optimization, SMO '08, Santander, Spain, WSEAS, 2008, pp 256- 260. ISBN 978-960-474-007-9, ISSN 1790-2769.
[6] Urbánek, J.F., Průcha, J. A Development of Wireless Interoper-mobile Application for Outdoor Operation Management, In 8th Int. Conf. on Electronics, hardware, wireless and optical communications, EHAC '09, Cambridge (UK) : WSEAS Press. 2009. p 57-64. ISBN 978-960-474- 053-6. ISSN 1790-5117.ID 609-289, pp 57-64.
[7] Zouhdi, S., Sihvola, A., Vinogradov, A.P. (2008). Metamaterials and Plasmonics: Fundamentals, Modelling, Applications. New York: Springer-Verlag. 2008. 316 p. ISBN 9781402094064.
[8] Council Directive 2008/114/EC on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection
[online].
[cit. 2011-6-6]. WWW: http://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2008:345:00 75:0082:CS:PDF
[9] Law No. 240/2000 on Emergency Management and on the modification of certain codes (Crisis Code), in latter wording.