By Topic

Configuration of integrated security system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Levin, M.Sh. ; Inst. for Inform. Transm. Problems, Russian Acad. of Sci., Moscow, Russia ; Leus, A.V.

This paper focuses on modular hierarchical design of configuration for an integrated security system. Hierarchical morphological design approach is used to search for Pareto-effective design solutions. An applied example involves the following: hierarchical (tree-like) model of the security system, design alternatives for system components/parts, criteria for the selection of the design alternatives, solving process as selection of the design alternatives and their synthesis into composite decisions as Pareto-effective solutions. System improvement/reconfiguration and multistage design are considered as well.

Published in:

Industrial Informatics, 2009. INDIN 2009. 7th IEEE International Conference on

Date of Conference:

23-26 June 2009