Communications - Scientific Letters of the University of Zilina, 2015 (vol. 17), issue 1

Articles

Assessment of Fence Systems Usiing Fuzzy Modeliing

Libor Hadacek, Tomas Lovecek, Radomir Scurek, Mikael H. L. Zeegers

Communications - Scientific Letters of the University of Zilina 2015, 17(1):3-8 | DOI: 10.26552/com.C.2015.1.3-8  

The article deals with the use of fuzzy modeling for time estimate of wire fence systems resistance. The resulting time can be used then in quantitative analytical methods for assessing the effectiveness of a technical protection system. The values of the fence system time resistance are very difficult to detect. Neither the technical standards give an exhaustive answer to questions related to time resistance of mechanical barriers. Some experiments were carried out with the aim to determine the time required for penetration of the selected wire fence obstacles. On the basis of the experiment results fuzzy rules were designed allowing, in conjunction...

Proposal for Increase of Burglar Resistance of Commercially Manufactured Motor Vehicle Doors

Kamil Boc, Dagmar Vidrikova, Zoran Cekerevac, Jan Misik

Communications - Scientific Letters of the University of Zilina 2015, 17(1):9-14 | DOI: 10.26552/com.C.2015.1.9-14  

In many cases the level of personal protection especially during transportation by personal motor vehicles is dependent on burglar resistance of used car body materials. Currently commercially manufactured personal motor vehicles are modified by insertion offiller materials of high density (steel plates inserted into doors, steel reinforcements of vehicle floors). This approach causes not only increase in financial costs for procurement of such modified (armoured) vehicle, but also changes its driving characteristics. Particularly its financial cost affects its accessibility to wide public. Several cases of use of small firearms against the occupants...

The Reaction to Fire Tests for Natural Thermal Insulation of Hemp Material Modified by Fire Retardant Ohnostop Special

Adelaida Fanfarova, Ladislav Maris, Anton Osvald, Esko Mikkola

Communications - Scientific Letters of the University of Zilina 2015, 17(1):15-21 | DOI: 10.26552/com.C.2015.1.15-21  

The scope of the paper is the experiment focused on testing and evaluating the fire protection of fire retardant modification of combustible material by means of experimental scientific method of the reaction to fire test. We tested the specimens of natural thermal insulation made of hempen fibre provided by the company Profi air color s.r.o. Zilina. These tested specimens were impregnated with retardation technology by soaking in the fire retardant Ohnostop special, provided by the company Bakra s.r.o. Rimavska Sobota. The experiment was performed by two experimental methods - the single-flame source test and the test of limited flame spread with...

Critical Systems and Processes Affecting the Resilience of Subway Systems to Terrorism Risks

Pavla Gomba, Isabela Bradacova

Communications - Scientific Letters of the University of Zilina 2015, 17(1):22-27 | DOI: 10.26552/com.C.2015.1.22-27  

Terrorist attack on the urban transport systems with high concentration of people (such as the subway), depending on its mode, can cause different levels of damage including the elimination of sub-components of fire safety equipment or destruction of passive fire protection. To mitigate the effects of an attack, the resilience of vehicles, as well as efficiency of evacuation of the survivors affected mainly by the availability of adequate emergency exits, the number of evacuees and the local conditions of the process are critical. Based on the experience of previous attacks on the metro systems (Tokyo, London and other incidents), this paper identifies...

Integrated Management of Environmentalsafety and Technical Risks of Plants Producing Automobiles and Automobile Components

Milan Majernik, Petra Szaryszova, Martin Bosak, Lenka Stofova, Kani Kabdi

Communications - Scientific Letters of the University of Zilina 2015, 17(1):28-33 | DOI: 10.26552/com.C.2015.1.28-33  

The authors, as a result of their scientific and professional activities, present a concept of a future model for integrated management of risks in plants for production of automobiles and their components for contractors. They introduce the concept of a future standardized model of an integrated management system based on sub-aspects, impacts and risks according to the relevant current and upcoming new ISO standards of quality, environment, safety, including ISO 31000 Risks management and ISO/TS 16949. In this article the emphasis is placed on creation of a complex risks register (technical, environmental, safety), for this area of economic activity,...

Analysis of the Risks of Small and Medium-Sized Enterprises in the Zilina Region

Maria Hudakova, Katarina Buganova, Jan Dvorsky, Jaroslav Belas, Leo-Paul Dana

Communications - Scientific Letters of the University of Zilina 2015, 17(1):34-39 | DOI: 10.26552/com.C.2015.1.34-39  

Small and medium-sized enterprises (SMEs) are very sensitive to changes in the business environment which after a certain time are always reflected into quantitative characteristics of this sector. In 2013, we accomplished a statistical survey on current trends in the field of business risks for SMEs in selected regions of the Czech Republic and Slovakia. In this article we want to analyze the effects of selected risks of the survey with respect to the length of the small and medium-sized business enterprises in the Zilina region. SMEs should be aware of their risks, mainly due to their importance in the economic system of the Slovak Republic, which...

Formation of Critical Concentrations of Natural Gas at its Leakage

Ales Tulach, Miroslav Mynarz, Milada Kozubkova

Communications - Scientific Letters of the University of Zilina 2015, 17(1):40-45 | DOI: 10.26552/com.C.2015.1.40-45  

Spreading of natural gas during its leak from a domestic low pressure pipeline in a confined space is a complicated issue depending on many factors. In relation to possible explosion, created dangerous concentrations could be identified effectively by numerical simulations using mathematical CFD models. It is suitable to verify the results of numerical simulations by real experiment, even if it is a simplified one. Verified mathematical model could then offer detail picture of spreading of gas in a whole focused space. In executed numerical analysis, several mathematical models of gas flow were applied and they were compared to the results of experimental...

Results and Conclusions of the Project "Complex Model for Risk Assessment and Treatment in Industrial Processes" (Mopori)

Katarina Holla, Maria Simonova, Jan Kandrac, Stanislav Maly, Andrew Collins

Communications - Scientific Letters of the University of Zilina 2015, 17(1):46-51 | DOI: 10.26552/com.C.2015.1.46-51  

This article deals with selected results and conclusions which were achieved in the project APVV 0043-10 MOPORI during more than three years of its solution. The area of major industrial accidents prevention is very specific and concerns all EU member states. At the beginning we will describe the current state and bases of the project together with identification of the problem areas. In the next part we will aim at describing the algorithm created for assessing and managing the risks. Here we implemented suitable qualitative and quantitative methods and we will explain its applicability. Subsequently we will present software means for creating scenarios...

Quantification of Impacts on the Transport Serviceability at the Loss of Functionality of Significant Road Infrasturucture Objects

Bohus Leitner, Maria Luskova, Alan O'Connor, Pieter van Gelder

Communications - Scientific Letters of the University of Zilina 2015, 17(1):52-60 | DOI: 10.26552/com.C.2015.1.52-60  

Incidents and unexpected phenomena occurrence in transport significantly affect the performance and capacity parameters of traffic infrastructure and its important objects. The objective of this article is to indicate possible uses of software tools to model the traffic at the loss of functionality of potential elements of critical road infrastructure and to demonstrate the possibility of their efficient use. The conducted case study applied the simulation models for quantification of the infrastructure traffic load under standard conditions as well as during the constraint of the transport system operation, i.e. after implementation of restrictive...

Fire Losses in the Slovak Republic - Their Classification and Quantification

Jozef Klucka, Vladimir Mozer, Jan Dvorsky

Communications - Scientific Letters of the University of Zilina 2015, 17(1):61-66 | DOI: 10.26552/com.C.2015.1.61-66  

The paper deals with approaches to fire loss classification and quantification. Direct and indirect loss, total loss per fire and the relation of direct and indirect loss to the gross domestic product (GDP) are calculated. Furthermore, the Statgraphics Centurion XV package is used to express: total loss prediction for selected probabilities and probabilities for selected total fire loss values. The results are discussed and conclusions drawn in form of recommendations for the Fire & Rescue Services management in the Slovak Republic.

Utility of Computer Modelling in Determination of Safe Available Evacuation Time

Vladimir Mozer, Jiri Pokorny, Petr Kucera, Lubica Vrablova, Peter Wilkinson

Communications - Scientific Letters of the University of Zilina 2015, 17(1):67-72 | DOI: 10.26552/com.C.2015.1.67-72  

The main aim of the paper is to evaluate the primary factors affecting the safe available evacuation time with the utility of computer modelling, namely Consolidated Model of Fire and Smoke Transport (CFAST) computer model by NIST. The traditionally accepted base value of 2.5 minutes, used in many design standards, may not be appropriate due to its very generalised nature. Hence, a multi-criteria analysis is carried out in which four standard fire scenarios (fire growth rates) are modelled in a set of compartments with varying geometry. The simulation results are assessed against a range of critical conditions, including visibility, toxicity and temperature....

SHA-1 and MD5 Cryptographic Hash Functions: Security Overview

Roman Jasek

Communications - Scientific Letters of the University of Zilina 2015, 17(1):73-80 | DOI: 10.26552/com.C.2015.1.73-80  

Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers. In the article, we present a security overview of both algorithms and demonstrate the necessity to abandon them in favor of more resilient alternatives due to low computational requirements necessary to reverse engineer the message digests, or to future proof security due to advances in hardware performance and scalability. Suitability procedures and their methods of use are part of this article.

A Surveillance System for Enhancing the Safety of Rescue Teams

Zdenek Hon, Pavel Smrcka, Karel Hana, Jan Kaspar, Jan Muzik, Radek Fiala, Martin Viteznik, Tomas Vesely, Lukas Kucera, Tomas Kuttler, Radim Kliment, Vaclav Navratil

Communications - Scientific Letters of the University of Zilina 2015, 17(1):81-86 | DOI: 10.26552/com.C.2015.1.81-86  

The article summarizes preliminary results of the research and development of a system focused on enhancing the safety of teams participating in the integrated rescue system managing extraordinary events or crisis situations (fire, mass disaster, release of harmful industrial substances), and on the support in the course of training. Individual partial technical solutions are mentioned, which should lead to providing automatized telemetric monitoring equipment in a more resistant form making it possible to recognize the nature and intensity of the motion, including the determination of the topical and total energy outputs, monitoring of environmental...

First Responders Field Trials of Saliant Technology

Anton Osvald, Maria Luskova, Markku Parviainen, Mika Rasanen, Jozef Svetlik, Jaroslav Flachbart, Miroslava Vandlickova, Vladimir Mozer

Communications - Scientific Letters of the University of Zilina 2015, 17(1):87-92 | DOI: 10.26552/com.C.2015.1.87-92  

SALIANT - Selective Antibodies Limited Immuno Assay Novel Technology is the title of the research project developed and realised by a European consortium of biotechnology companies, universities and government forensic laboratories within the Seventh Framework Programme (FP7), Security Theme. The aim of this project was to develop a hand-held device for real-time analysis of trace levels of explosives, chemicals and drugs. The key innovation was a positive detection lateral-flow test for small molecules that is rapid, highly sensitive and simple to use making it ideally suited to deployment by First Responders and Forensic Service Providers at crime...

Risks of Bitcoin Virtual Currency

Zoran Cekerevac, Zdenek Dvorak, Ludmila Prigoda, Petar Cekerevac

Communications - Scientific Letters of the University of Zilina 2015, 17(1):93-98 | DOI: 10.26552/com.C.2015.1.93-98  

Bitcoin, digital money got into focus after the Mt Gox crash. It uses P2P interaction where an owner transfers the electronic coin to the next owner signing and adding a hash of the previous transaction and the public key of the next owner. Payment verification is accomplished by notifying the entire network about the transaction. This prevents double-spending and generation of non-existent money. Among the users, there is uncertainty about the safety on the theft and fraud. Among the authorities, there are dilemmas about present and future risks related to the Bitcoin implementation. The article deals with the benefits and risks of Bitcoin use.

New Approaches to the Analysis of the Security Environment and their Importance for Security Management

Ladislav Hofreiter, Ladislav Maris, Ludek Lukac, Lukasz Kister, Zbigniew Grzywna

Communications - Scientific Letters of the University of Zilina 2015, 17(1):99-104 | DOI: 10.26552/com.C.2015.1.99-104  

Examination of security environment in many security papers and studies is focused primarily on analysis of external security environment of different countries. Analyzing the current security problems led us to the realization that the security environment is characterized by a systemic arrangement in which there are systems of lower and higher order. We want to demonstrate that to ensure safety of the reference object at a lower level (e.g., small social groups, individuals) it is important to evaluate the security environment of the lower order (i.e., at sub-regional, local and sub-local level). Defining and analyzing security environment at lower...

Influence of Critical Infrastructure on Enterprise Economic Security

Stanislava Strelcova, David Rehak, David E. A. Johnson

Communications - Scientific Letters of the University of Zilina 2015, 17(1):105-110 | DOI: 10.26552/com.C.2015.1.105-110  

This article deals with critical infrastructure and its influence on enterprise economic security. In the introduction, the sectors of critical infrastructure from the point of view of the European Union, Czech Republic and Slovak Republic are characterized. Attention is paid to individual links between the elements of critical infrastructure and the enterprise. Subsequently, enterprise economic security, fundamental factors participating in its creation, and threats disturbing it with emphasis on critical infrastructure failure are discussed. The final part of this article presents possible impacts of critical infrastructure failure on the enterprise...

Analytics for Protecting Critical Infrastructure

Adam Zagorecki, Jozef Ristvej, Krzysztof Klupa

Communications - Scientific Letters of the University of Zilina 2015, 17(1):111-115 | DOI: 10.26552/com.C.2015.1.111-115  

In this paper we review the key trends related to application of information technology and, in particular, automated data analysis to the problem of protecting critical infrastructure. We focus on technologies that use automated data collection and analyses that can be exploited for improving security provision for critical infrastructure in the future. Of our particular interest are technologies that are at relatively early stage of adaptation and in our judgement have potential to significantly affect how the security is provided in the future, the technologies that support physical aspect of security. Then we discuss analytics in context of cyber-security...

Israel's Readiness for Health Emergencies

Alexandria Martinelli Navratil Van Praag, Vaclav Navratil, Leos Navratil

Communications - Scientific Letters of the University of Zilina 2015, 17(1):116-120 | DOI: 10.26552/com.C.2015.1.116-120  

Due to the geographic locations of Slovakia and the Czech Republic in Central Europe and the perceived threat of a mass terrorist act, along with the current economic climate, this article looks to determine the degree of readiness of both the Czech and Slovak Health Systems in addressing the impact of incidents in which there would be a large number of affected among population, particularly in cases where civilian contamination by any substance belonging to the group of CBRN (chemical, biological, radiological and nuclear agents) is minimal. Specifically, this article will inform readers about the readiness of State Health Services, in which the...

Car Trajectory Correction and Presentation Using Google Maps

Matus Pleva, Anton Cizmar

Communications - Scientific Letters of the University of Zilina 2015, 17(1):121-125 | DOI: 10.26552/com.C.2015.1.121-125  

This paper describes a trajectory correction algorithm which calculates the kinetic parameters of the tracked object (car using GPS data from tracking device) and detects faulty GPS samples. Input parameters contain GPS geographical coordinates of the object and the timestamp code of capturing the position. Based on these data and physical object limits, which the operator could modify, the algorithm decides if the sample is precise or faulty. In the case of faulty sample the algorithm suggests the estimated location of the point using Kalman filter implementation and the results are presented on the map using online web interface. When the operator...