The Integrated Security System of the Senate of the Italian Republic

The Integrated Security System of the Senate of the Italian Republic

G. Contardi F. Garzia R. Cusani 

Senate of the Italian Republic, Rome, Italy

Department of Information, Electronics and Telecommunication Engineering, SAPIENZA - University of Rome, Italy

Page: 
219-247
|
DOI: 
https://doi.org/10.2495/SAFE-V1-N3-219-247
Received: 
N/A
|
Accepted: 
N/A
|
Published: 
30 September 2011
| Citation

OPEN ACCESS

Abstract: 

The security of a complex site is strongly dependent on the use of integrated technological systems. Any weakness of the integrated system involves a weakness of the security of the site itself. For this reason it is necessary to design and realize highly integrated, effi cient and reliable security systems. The authors illustrate the work made to design and realize the integrated security system of the Senate of the Italian Republic.

Keywords: 

 communication system, control system, integrated security system

  References

[1] Waltz, E., Information Warfare – Principles and Operations, Artech House Publisher: Boston (USA), 1998.

[2] Denning, D.E., Information Warfare and Security, Addison-Wesley: Boston (USA), 1999.

[3] Nichols, R.K. & Lekkas, P.C., Wireless Security: Models, Threats, and Solutions,  McGraw-Hill: New York (USA), 2002.

[4] Garzia, F., The integrated safety/security system of the AccademiaNazionaledeiLincei at CorsiniPalace in Rome, Proc. of International Conference on Integrating Historic Preservation with Security, Fire Protection, Life Safety and Building Management Systems: Rome (Italy), pp. 77–99, 2003.

[5] Garzia, F. & Veca, G.M., Integrated security systems for hazard prevention, manage-ment and control in the Italian high speed train line, Risk Analysis III, WIT Press: Southampton (UK), pp. 287–293, 2002.

[6] Antonucci, E., Garzia, F. & Veca, G.M., The automatic vehicles access control system of the historical centre of Rome, Sustainable City II, WIT Press: Southampton (UK), pp. 853–861, 2002.

[7] Garzia, F., Sammarco, E. & De Lucia, M., The security telecommunication system of the Vatican CityState, Risk Analysis IV, WIT Press: Southampton (UK), pp. 773–782, 2004.

[8] Garzia, F., Sammarco, E. & Cusani, R., The integrated access control system of the Vatican CityState, SAFE 2007, WIT Press: Southampton (UK), pp. 431–440, 2007.

[9] Garzia, F., Sammarco, E. & Cusani, R., Integrated access control system for ports, SAFE 2009, WIT Press: Southampton (UK), pp. 313–323, 2009.

[10] Garzia, F., Sammarco, E. & Cusani, R., The integrated security system of the Vatican CityState, International Journal of Safety & Security Engineering, 1(1), pp. 1–17, 2011. doi:http://dx.doi.org/10.2495/SAFE-V1-N1-1-17

[11] Davis, L., Genetic Algorithms and Simulated Annealing, Morgan Kaufmann Publishers, Inc.: Los Altos, CA, 1987.

[12] Davis, L., Handbook of Genetic Algorithm, Van Nostrand Reinhold: New York, 1991.

[13] Diaz, A.H.F. & de Vasconcelos, J.A., Multiobjective Genetic Algorithms Applied to Solve Optimization Problems. IEEE Transactions of Magnetics, 38(2), pp. 1133–1136, 2002. doi:http://dx.doi.org/10.1109/20.996290

[14] Goldberg, D.E., Genetic Algorithms in Search, Optimisation and Machine Learning, Addison-Wesley: New York, 1989.

[15] Goldberg, D.E. & Deb, K., Foundations of Genetic Algorithms, Morgan Kaufmann: New York, 1991.

[16] Holland, J.H, Genetic algorithms. Scientifi c American, pp. 66–72, 1992. doi:http:// dx.doi.org/10.1038/scientifi camerican0792-66

[17] Winter, G., Periaux, J., Galan, M. & Cuesta, P., Genetic Algorithms in Engineering and Computer Science, John Wiley & Sons, Inc.: New York, 1995.

[18] Garzia, F. & Cusani, R., Optimisation of cellular base stations distribution in territory with urban and environmental restrictions by means of genetic algorithms, Proceedings of EETI 2004 Energy, Environment and Technological Innovation, Rio de Janeiro (Brazil), 2004.

[19] Garzia, F., Perna, C. & Cusani, R., UMTS network planning using genetic algorithms, International Journal of Communications and Network, 2(3), pp. 193–199, 2010. doi:http://dx.doi.org/10.4236/cn.2010.23028