Lecturer(s)
|
-
Křesálek Vojtěch, doc. RNDr. CSc.
-
Goňa Stanislav, Ing. Ph.D.
|
Course content
|
1. Introduction. Standard and advanced security technologies to ensure object security a methods for detecting and preventing information leakage using interception devices 2. Standard motion detectors 3. Advanced motion detectors 4. Modern motion detectors and their installation in alarm systems 5. Biometric identification systems 1 (theory of biometrics) 6. Biometric identification systems 2 (fingerptint, sensors) 7. Biometric identification systems 3 (fingerptint, algorithms) 8. Biometric identification systems 4 (face recogniton) 9. Biometric identification systems 5 (other biometric systems) 10. Frequency spectrum and modulation of high frequency and microwave signals (in relation with radio evanesdropping devices) 11. Antennas, Radiorecivers, architecture, basic parameters 12. Eavesdropping devices (line eavesdropping, wireless microphones, laser eavesdropping) 13. Anti-eavesdropping technology (broadband detectors, surveillance receivers, spectrum analyzers, detection of nonlinear transitions) 14. Searching for hidden monitoring devices and cameras. Jamming of frequency spectrum. Laboratories: 1. Introduction, splitting individual laboratory tasks 2. Measurement of laboratory task no. 1 (Modern motion detectors) 2. Measurement of laboratory task no. 2 (Fingerprint reader) 3. Measurement of laboratory task no. 3 (IR camera) 4. Measurement of laboratory task no. 4 (Face recognition Vision 3Di) 5. Computational exercise, RF, MW 6. Computational exercise, antennas, propagation of EM waves 7. Computational exercise, radioreceivers 8. Measurement of laboratory task no. 5 (Wireless radiomicrophones, fscan) 9. Measurement of laboratory task no. 6 (Wireless radiomicrophones, search) 10. Measurement of laboratory task no. 7 (Mobile phone jammer) 11. Measurement of laboratory task no. 8 (Search for a hidden metallic lines) 12. Reserve 13. Classification
|
Learning activities and teaching methods
|
Lecturing, Simple experiments, Practice exercises, Students working in pairs
|
learning outcomes |
---|
Knowledge |
---|
Describe in detail the physical principles and operation of standard and advanced motion detectors |
Describe in detail the physical principles and operation of standard and advanced motion detectors |
Familiarize yourself with the technical parameters of motion detectors |
Familiarize yourself with the technical parameters of motion detectors |
He orients himself in the issue of installing motion detectors |
He orients himself in the issue of installing motion detectors |
Explain the physical principles of biometric systems, can explain their parameters |
Explain the physical principles of biometric systems, can explain their parameters |
Describe the functioning of electronic devices for the realization and search of interception of voice communications and hidden cameras |
Describe the functioning of electronic devices for the realization and search of interception of voice communications and hidden cameras |
Skills |
---|
Select the appropriate motion detector for the given application |
Select the appropriate motion detector for the given application |
Can correctly position and set the motion detector |
Can correctly position and set the motion detector |
It can connect the motion detector to the arming control panel using a suitable bus |
It can connect the motion detector to the arming control panel using a suitable bus |
Can work with biometric systems based on fingerprint and 2D/3D face recognition |
Can work with biometric systems based on fingerprint and 2D/3D face recognition |
Can Use a technique to perform and locate wiretapping of voice communications |
Can Use a technique to perform and locate wiretapping of voice communications |
teaching methods |
---|
Knowledge |
---|
Lecturing |
Lecturing |
Students working in pairs |
Students working in pairs |
Practice exercises |
Simple experiments |
Practice exercises |
Simple experiments |
assessment methods |
---|
Written examination |
Written examination |
Recommended literature
|
-
C. Rauscher. Fundamentals of spectrum analysis. Munich, 2008. ISBN 978-3-939837-01-0.
-
Černohorský D., Nováček Z., Raida Z. Elektromagnetické vlny a vedení. Brno, 1999.
-
D. Maltoni. Handbook of Fingerprint Recognition. 2009. ISBN 978-0387954318.
-
G. Honey. Intruder Alarms. 2007. ISBN 9780750681674.
-
Rak, R., Matyáš, V., Říha, Z. a kol. Biometrie a identita člověka ve forenzních a komerčních aplikacích. Grada, 2008. ISBN 978-80-247-6392-7.
-
R.Bansal. Handbook of engineering electromagnetics. New York: Marcel Dekker, 2004. ISBN 0-8247-5628-2.
-
S.Goňa. Kompletní systém prezentací ve formátu PowerPoint umístěných na serveru univerzity. Zlín, 2020.
-
S.Z. Li. Handbook of Face Recognition. 2011. ISBN 978-0857299314.
-
Šebesta V. Systémy procesy signály. Brno, PC-DIR, 1995.
|