• Nie Znaleziono Wyników

View of New Technologies in the Field of Ensuring Security for Restricted and Public Areas at Airports

N/A
N/A
Protected

Academic year: 2021

Share "View of New Technologies in the Field of Ensuring Security for Restricted and Public Areas at Airports"

Copied!
5
0
0

Pełen tekst

(1)

EH]SLHF]HęVWZRLHNRORJLD

Gabriel Nowacki, Bohdan Paszukow

1HZWHFKQRORJLHVLQWKHƜHOGRIHQVXULQJVHFXULW\

IRUUHVWULFWHGDQGSXEOLFDUHDVDWDLUSRUWV

JEL: R41. DOI: 10.24136/atest.2019.191.

DDWD]JâRV]HQLD: 19.05.2019. DDWDDNFHSWDFML: 20.08.2019.

The paper refers to innovative solution of security at international

$LUSRUWVWDNLQJVSHFLÀFDOO\LQWRFRQVLGHUDWLRQFXUUHQWFKDOOHQJHV

ZLWKLQVHFXUHSURFHVVLQJRISDVVHQJHUVDQGSURWHFWLRQRIFULWLFDO

DQGSXEOLFVSDFHVLQOLJKWRIW\SHVRIFXUUHQWPDMRUWKUHDWV2QH

RIWKHPDLQUHDVRQVZK\DYLDWLRQEHLQJRQHRIWKHPRVWUHJXODWHG

PHDQVRIWUDQVSRUWLQVHQVHRIVHFXULW\LVWKHIDFWRIFRQWLQXHV

VHULRXVULVNDQGYXOQHUDELOLW\IRUWHUURULVWDWWDFNV,QVWHDGRIFRQ

WLQXHVLPSOHPHQWDWLRQRIVWULFWVHFXULW\PHDVXUHVWKHQXPEHURI

LQFLGHQWVDQGEUHDFKHVZLWKLQDYLDWLRQLQWHUQDWLRQDOVHFXULW\HQYL

URQPHQWEHLQJXSGDWHGDOPRVWDWGDLO\EDVLVDOODURXQGWKHZRUOG

7KHUHIRUHWKHSULPDU\UROHRIDOODYLDWLRQUHJXODWRU\DQGSURIHV

VLRQDOVWDNHKROGHUVLVWRHIIHFWLYHO\SURWHFWDQGVHFXUHYDULHW\RI

DYLDWLRQHFRV\VWHPVVXFKDVDLUSRUWVDQGDLUOLQHV7RPHHWWKH

FKDOOHQJHVRILQFUHDVHGVHFXULW\UHJXODWLRQVDQGJURZLQJQXPEHU

RISDVVHQJHUVDQGWRNHHSXSGDWHRQWKHODWHVWDQWLWHUURULVP

VWUDWHJLHVDLUSRUWVDUHORRNLQJIRUWDLORUPDGHVROXWLRQV6XFKVR

OXWLRQVDUHSULPDU\EDVHGRQHOHFWURQLFGHSOR\PHQWRIQHZW\SHV

RIHTXLSPHQWDLPLQJWRLPSURYHGHWHFWLRQRIWKUHDWVPDWHULDOVZLWK

VSHFLÀFIRFXVRQH[SORVLYHVDQG&%51WKUHDWV:LWKLQWKHVFRSH

RIWKLVSDSHUSUHVHQWHGNH\WHFKQRORJLFDOHOHPHQWVVXSSRUWLQJ

WKUHDWVGHWHFWLRQDVZHOODVLQGLFDWHGPDLQSRLQWVUHIHUULQJWR

JHQHUDOSHUFHSWLRQDPRQJVWDLUSRUWVHFXULW\V\VWHPV

Keywords: threats, advanced technology, security system.

Introduction

$ir transSort Slays a signiÀcant role in the gloEal economy. 6aIe air services are conducive to the develoSment oI trade, tourism and international politics [5]. By 2030, international air passen- ger traIÀc is e[pected to increase to  Eillion a year, Zith around

. Eillion passengers present.

$ir transport is e[posed to terrorist attacNs []. 7he oEMect oI a terrorist attacN may Ee elements oI airport inIrastructure and airplanes, Eoth at airports and during taNe-oII and landing operations, as Zell as during Áight. 7he threat oI a terrorist at- tacN at the airport is still a current threat. 7errorists, aiming at the destruction oI airport inIrastructure or aircraIt Eoth on the ground and in the air , can Ering e[plosive charges to the air- port area and to airplanes. 7hey may also seeN to aEduct a pas- senger plane to Ee used to attacN Irom an air on an important, selected oEMect a government administration Euilding, a large airport . 7hey can also aEduct a civilian aircraIt, and then use it Ior a suicide attacN on a passenger plane at the airport or in the air. 7he use oI means oI destruction to destroy damage the inIrastructure oI the airport or aircraIt at the airport during taNe- oII or landing is also not e[cluded [].

,n 20²20,  acts oI unlaZIul interIerence in air trans- port in the Zorld Zere recorded, Zhich caused the death oI 

people. )reTuently, improvised e[plosive devices are used to try to attacN airport inIrastructure, Zhich is Zhy security systems

play a Ney role in containing and detecting threats. ,n addition, attacNs targeting puElic ]ones have shoZn an increasing threat precisely to the places Zhere passengers gather EeIore departure.

7o reduce the risN oI attacN in puElic areas, as Zell as reduce the numEer oI inMuries and damage, many solutions can Ee applied.

7he analysis oI the literature and oZn research shoZs that the security systems used so Iar do not ensure consistent solving oI proElems in the scope oI preventing neZ types oI acts oI unlaZ- Iul interIerence aimed at airport inIrastructure.

7he suEMect oI the research undertaNen Zithin paper reIers to proElematic related to the neZ resolution oI the international airport security system. 'ue to neZ types oI threats, that aIIects not only hard airport inIrastructure, Eut also its soIt components, such as departure halls, parNing lots or airport hotels, it can Ee concluded that the security systems used so Iar, have not Eeen aEle to eIIectively and consistently solve proElems related to the prevention against neZ types oI acts oI unlaZIul interIerence against airport·s inIrastructure.

$irport security checNs are no longer static, Eut dynamic, so that passengers suEMected to them can adapt to them. :hen moving to the ´dynamic revieZµ, maNe sure that no visiEle and static vulneraEilities arise. 7hereIore, a risN-Eased system should also contain unpredictaEle and deterrent elements.

7he aim oI this research Zas to analy]e the innovative solu- tion oI the international airport security system ,$66 , taNing into account actual operational solutions, as Zell as current threats and those that may arise in the Iuture, also in the Àeld oI neZ technology.

7he research proElem Zas Iormulated as IolloZs: Zhat is and Zhat determines the security oI an international airport"

,n reIerence to the aEove-mentioned proElem, the research hypothesis Zas deÀned as IolloZs: the security oI an interna- tional airport, Zhich aims to ensure sterility oI security restricted areas and the protection oI puElic areas, depends mainly on proIessional competences oI security personnel 3&63 , moreo- ver Irom proper selection and technical condition oI electronic assisting devices 7&($' .

,n the solving oI mentioned research proElem and proving hypotheses, the IolloZing research methods Zere applied: anal- ogy, deÀnition, analysis, synthesis, induction, deduction, mod- eling and diagnostic tests intervieZs and anonymous surveys amongst groups oI aviation e[perts.

7he research Zas carried out among e[perts Irom variety oI international organi]ations, as Zell as Eased on anonymous sur- vey taNen Zithin airport authorities and security services repre- sentatives specialists in (urope and aEroad.

7he research shoZs that the laZ is not alZays Neeping up Zith

the groZing threat, and the measures are inadeTuate to today·s

risN maps. )or this purpose, it is necessary to modiIy, depending

on the needs, some selected inIrastructural elements oI the air-

port ecosystem, so that in the most eIIective and the least costly

Zay in operational and Ànancial terms to introduce methods

and measures to minimi]e the possiEility oI a given threat.

(2)

EH]SLHF]HęVWZRLHNRORJLD

1. New Technology In The Field Of Security Control 1.1. IPDJLQJ ZLWK PLOOLPHWHU ZDYHV

7he suspicion oI an increased threat posed Ey the use oI e[- plosives and non-metallic Zeapons has led to the study oI neZ passenger security screening technologies, including techniques Ior detecting trace amounts oI chemical, Eiological and e[plo- sives, and imaging methods that [-ray garments. :ith each suE- sequent security system that Zill Ee created, you Zill also need to consider the requirements Ior additional space required to conduct security controls, equipment, laEor costs and increased operational sNills that these technologies impose on carriers and airports [2].

)or noZ, several emerging technologies can detect metal and non-metal Zeapons, e[plosives and other types oI smuggled materials hidden under many layers oI clothing. 7hese technolo- gies create images that can distinguish these materials. 3hysical contact is not needed here [3].

,maging technologies scan oEMects, looNing Ior natural radia- tion that is emitted Ey the human Eody passive imaging , or e[- pose oEMects to a special type oI radiation, reÁected Ey the Eody active imaging . ,n each oI these cases, materials such as metal Zeapons or plastic e[plosives diIIer in the EacNground image oI the human Eody Eecause they emit or reÁect a diIIerent type oI radiation than the human Eody [2].

7he images are vieZed Ey a trained operator Zho can identiIy the oEMect that is a potential threat. 6ometimes this happens Zith the help oI image enhancement soItZare that highlights unusual shapes or any other anomalies [10].

$lthough these technologies can not detect oEMects hidden in the Eody or seZn into the sNin, they are considered to Ee used to perIorm security checNs at airports, as carriers Zill Ee aEle to search passengers Ior more material than is possiEle Zith current systems.

1.2. OWKHU WHFKQRORJLHV IRU GHWHFWLQJ WUDFH DPRXQWV RI H[SORVLYHV 7echnologies Ior detecting traces oI e[plosives are Eased on di- rect chemical identiÀcation oI e[plosives or vapors containing e[plosives. 7hus, the presence oI a dangerous oEMect or EomE is inIerred Irom the presence oI solid particles or vapors.

7he main diIIerence EetZeen the technology oI detecting trac- es oI e[plosives and electromagnetic or imaging is that Zhen detecting traces oI e[plosives, a sample oI the e[plosive must

Ee transported to the instrument at a concentration that e[ceeds the detection limit.

7racN detection technology can not Ee used to detect the pres- ence oI metal Zeapons or any other metal material commonly classiÀed as IorEidden to carry on Eoard an aircraIt.

7Zo important steps in detecting traces are collecting the sample and chemical identiÀcation. ,n order to determine the presence oI e[plosives, Eoth steps must ZorN at the same time.

7he stage oI collecting the sample in this procedure is the main point oI contact EetZeen the technology and the oEMects Eeing inspected.

([plosive suEstances can Ee transported Irom a given person to the detection device as Iumes or solid particles. 2riginally, the technology oI detecting traces oI e[plosives Iocused on collect- ing Iumes around a person or luggage. +oZever, due to the Iact that many modern e[plosives do not emit too much vapors at room temperature, attention has Eeen paid to e[plosive particles on the sNin and other surIaces. 7he methodology and technique oI the sample preparation procedure is a Ney element in the eI- Iective detection oI potential ha]ards.

,n order to detect traces oI e[plosives, they should Ee col- lected Irom the air sample vapor technologies or separated Irom the suEstrate molecular technologies . ,n the case oI a va- por test, large amounts oI air should Ee collected, Irom Zhich a small amount oI the suEstance to Ee tested should Ee sepa- rated. ,n the case oI a molecular test, the pieces oI e[plosive should Ee removed Irom the surIace to Zhich they adhere [].

Both Zays oI detecting trace amounts oI e[plosives have their strengths and ZeaNnesses, depending on the type oI e[plosive Ze are looNing Ior.

9apor technologies are more eIIective in detecting e[plosives Zith high vapor pressure, Zhile molecular technologies are Eet- ter suited Ior e[plosives Zith loZ vapor pressure, such as plastic e[plosives used Ey the military.

$lthough the use oI hand-held scanners is a potentially eIIec- tive technique Ior collecting samples, it requires more ZorN and taNes more time than collecting samples using an automated system.

7he optimal solution could Ee to connect a hand-held scanner to an automated system Ior detecting trace amounts oI e[plo- sives in order to oEtain an additional control system at a higher level.

Fig. 2. Percentage of technology used to detect explosives and drugs using ETD equipment in individual region [8]

Fig. 1. Diagram of the Transportation Safety Administration, explaining

the basics of the millimeter imaging technology [4, 10]

(3)

EH]SLHF]HęVWZRLHNRORJLD

$Iter the terrorist attacNs that tooN place in -anuary 2015 in 3aris, it Zas predictaEle that the demand Ior electronic e[plo- sive detection systems (7' - ([plosives trace detectors . Zill increase in the (uropean aviation sector and in the security oI puElic transport, protected Euildings, in the group oI Àrst-aiders and the puElic saIety sector [].

2. Results Of Own Empirical Researches

$s regards technical equipment oI the security control points, the maMority oI respondents Zithin anonymous survey stated that they are equipped in a good manner, adequate to the e[isting threats. +oZever, the group oI responses also included opinions indicating a certain degree oI the lacN oI adequacy oI the techni- cal equipment used to eIIectively detect current threats.

)our categories oI ansZers Zere distinguished, oI Zhich three clearly indicated the imperIections oI the technical equipment.

7he service malIunctions in neZ types oI equipment and the de- gree oI its modernity have Eeen largely accentuated. ,n addition, comments that highlighted the Ànancial issues related to the purchase oI modern technical solutions and Zhich some airports could not cope Zith, Zere not Zithout signiÀcance.

$naly]ing the results oI research in the Àeld oI employee com- petencies, in the light oI the eIIectiveness oI e[plosives detection, it can Ee concluded that generally given ratings indicated as high and medium level oI eIIectiveness almost equally 7aEle 1, 2 .

$naly]ing the proElem oI detection eIIectiveness more deeply, research activities Zere Iocused on the speciÀcation oI the same parameter in the conte[t oI &B51 threats. 7he results oI the study conÀrmed loZ marNs Ior the eIIectiveness oI detecting such threats.

&ertainly, the use oI modern technologies to detect poten- tial threats is a very important element oI the airport security system.

6imilarly, elements oI technical eIÀciency oI equipment have Eeen assessed as highly important Ior the correct Iunctioning oI the applied technical solutions 7aEle  .

7he eIIectiveness oI the detection oI e[plosives Ey the used elements oI technical equipment has Eeen determined at a high level, thus giving indications oI a high degree oI eIÀciency in the detection oI e[plosives 7aEle 5 .

$naly]ing in a more detailed Zay the speciÀc type oI &B51 threats, the respondents rated the elements oI the security con- trol points equipment in electronic devices supporting detection, at much loZer level.

,n the author·s opinion, currently availaEle technological so- lutions can radically help in increasing the capacity oI control points and optimi]e the eIÀciency oI personnel, through appro- priate use oI resources and space, to meet the groZing numEer oI passengers and the enlarging terrorist threat.

Table 3. 7KH HIIHFWLYHQHVV RI &%51 WKUHDW GHWHFWLRQ

3RVVLEOH DQVZHU 1R %

1 High 29 24,6

2 Medium 34 28,8

3 Low 48 40,7

4 No answer 7 5,9

6ource: oZn study results.

Table 4. 7KH XVH RI WKH ODWHVW WHFKQRORJ\

3RVVLEOH DQVZHU

1 PHDQV WKH ORZHVW JUDGH DQG  ² WKH KLJKHVW UDWLQJ 1R %

1 The lowest 7 5,9

2 Low 7 5,9

3 Medium 28 23,7

4 High 52 44,1

5 The highest 20 16,9

No answer 4 3,4

6ource: oZn study results.

Table 5. 7HFKQLFDO HIÀFLHQF\ VWDWXV

3RVVLEOH DQVZHU 1 PHDQV WKH ORZHVW JUDGH

DQG   WKH KLJKHVW UDWLQJ 1R %

1 The lowest 6 5,1

2 Low 6 5,1

3 Medium 17 14,4

4 High 57 48,3

5 The highest 32 27,1

6ource: oZn study results.

Table 6. 7KH HIIHFWLYHQHVV RI H[SORVLYH GHWHFWLRQ 3RVVLEOH DQVZHU

1 PHDQV WKH ORZHVW JUDGH DQG  ² WKH KLJKHVW UDWLQJ 1XPEHU %

1 The lowest 7 5,9

2 Low 9 7,6

3 Medium 23 19,5

4 High 37 31,4

5 The highest 41 34,7

No answer 1 0,8

6ource: oZn study results.

Table 7. 7KH HIIHFWLYHQHVV RI &%51 WKUHDWV GHWHFWLRQ 3RVVLEOH DQVZHU

1 PHDQV WKH ORZHVW JUDGH DQG  ² WKH KLJKHVW UDWLQJ 1R %

1 The lowest 15 12,7

2 Low 30 25,4

3 Medium 33 28,0

4 High 15 12,7

5 The highest 19 16,1

No answer 6 5,1

6ource: oZn study results.

Table 1. 7HFKQLFDO HTXLSPHQW IRU VHFXULW\ FRQWURO SRLQWV DW LQWHUQDWLRQDO DLUSRUW

3RVVLEOH DQVZHU 1R %

1 It is fully adequate to the existing threats 11 9,3 2 It is rather adequate to the existing threats 88 74,6 3 It is rather inadequate to existing threats 19 16,1 4 It is completely inadequate to existing threats – – 6ource: oZn study results.

Table 2. 7KH HIIHFWLYHQHVV IRU H[SORVLYH GHWHFWLRQ

3RVVLEOH DQVZHU 1R %

1 High 53 44,9

2 Medium 54 45,8

3 Low 11 9,3

6ource: oZn study results.

(4)

EH]SLHF]HęVWZRLHNRORJLD

3. Innovative Solution Of Iass

7he IolloZing Àgures very schematically outlined the security concept oI an international airport, Iocusing Eoth on puElic and restricted areas, as Zell as on selected elements oI technical and personal solutions that can Ee used, depending on the loca- tion oI potential threats.

)igure 3 presents the Easic layout oI landside and airside ]ones. ,n addition, the diagram includes the standard distriEu- tion oI around-aircraIt inIrastructure such as cargo terminal, ground handling terminal and $7&. /ocation oI main service Euildings, including the air terminal is located e[actly on the Eorder oI the restricted area. 7aNing the aEove into account, it is necessary to introduce additional security control procedures in all listed locations - depending on the oEMect oI the inspec- tion passengers, employees, cargo, airport supplies, on-Eoard supplies, etc. . 7he diagram also includes the appro[imate ar- rangement oI access control points located inside and outside the terminal.

7he presented scheme also includes an element oI addi- tional protection oI the aircraIt, resulting Irom the &ommunity regulations or individual requirements oI an air carrier at a given airport.

)igure , in a general Zay, captures the Iour most important components oI a properly constructed airport security system Ior puElic areas. $ccording to the author, the Ney element is the training and aZareness, among all those ZorNing Zithin the air- port·s ecosystem. ,n addition, the elements related to inIrastruc- ture assumptions, video monitoring vehicle and people ÁoZ con- trol system are Ney components aIIecting the security oI airports in the era oI today·s threats.

,n addition, the author oI the dissertation undertooN to visu- ali]e the technical measures used to secure restricted areas )igure 5 .

Fig. 4. Main pillars of the security system of public areas 6ource: oZn study research graph.

Fig. 3. The basic layout of airport airside and landside areas [1]

(5)

EH]SLHF]HęVWZRLHNRORJLD

7he scheme )igure 5 proposes a EreaNdoZn into security measures and methods used:

¡

toZards the airport·s e[ternal inIrastructure,

¡

in relation to security control points and,

¡

Ior neZ types oI threats such as drones or &B51 threats.

Summarize

7he airport terminal condition Zill change essentially in the com- ing years. -oined Zith developing traveler desires and the need to enhance security e[ecution despite a changing ZorldZide danger, this neZ environment Zill prompt a change in numer- ous strategies. 6ecurity Zill turn into a streamlined procedure dependent on collaEoration and inIormation trade.

,n the course oI the conducted research, it Zas Iound that the proIessional competencies oI security personnel are one oI the most important elements oI the international airport security system and are generally positively assessed Ey the respond- ents. ,n a similar Zay, the issues oI proper selection and techni- cal condition oI assistive devices and rescue equipment Zere positively veriÀed. ,n the light oI the research carried out, it ap- pears that the most important and most diIÀcult elements are still the issues oI Iorecasting and detecting threats. 'ue to its comple[ity and unpredictaEility, this proElem still leaves a Zide margin Ior improvement and increasing their eIIectiveness.

7he methodology oI the conducted research made it possiEle to taNe a much deeper looN at the issue oI proIessional com- petences oI employees and the elements related to the proper selection oI devices supporting neZ threats in the Zorld.

7he results oI the research shoZed that Zith regard to &B51 threats, the technical equipment oI security control points does not alloZ Ior eIIective detection oI such threats. 7his is an impor- tant piece oI inIormation Ior Euilding security control systems, Eoth in relation to critical areas oI airports and puElic areas.

Bibliography:

1. $ 0orphological $pproach Ior 3roactive 5isN 0anagement in

&ivil $viation 6ecurity - th $,$$ $erospace 6ciences 0eet- ing, $t 2rlando, )/, -anuary 200.

2. $ir 7ransport ,7 5evieZ, $ll &hange at the airport, 2ctoEer 201.

3. BroZne, 0., In search of security: radar scanners that un- dress people, 7he 1eZ <orN 7imes. 0ay 5, 201.

4. &oncept oI Iuture technology in &&79 cameras that detects criminal and terrorist attacNs. *otrend 7echnologies ,nterna- tional. 0arch 12, 201 Ey 3rasad.

5. 'irector general·s report on the gloE- al air transport industry. ,$7$, 5 -une, 201.

. 'olniN, $., Understanding Terrorist Innovation: Technology, Tactics and Global Trends, -une 2, 200 Ey 5outledge.

. (lias, B., Airport and Aviation Secu- rity: U.S. Policy and Strategy in the Age of Global Terrorism, 6eptemEer 14, 200 Ey $uerEach 3uElications.

. (7' 0arNet 6i]e, 6hare and 7rends

$nalysis 5eport, 0arch 201, *rand 9ieZ 5esearch.

. 1oZacNi *., 2leMniN ., :oŬniaN *.,

$QDOL]D]DJURŮHĽWHUURU\VW\F]Q\FKGOD

sektora transportu lotniczego, Å/ogistyNaµ 2015, nr 4.

10. :orNing .noZledge: Body 6canners ² :eapons 5evealed, 6cientiÀc $merica 201.

Nowe technologie w zaNresie zapewnienia bezpieczeĽstwa dla stref zastrzeŮonych i ogylnodostĘpnych na lotnisNach

$UW\NXâGRW\F]\]DVWRVRZDQLDQRZ\FKWHFKQRORJLLZ]DNUHVLHEH]- SLHF]HĽVWZDQDPLĘG]\QDURGRZ\FKORWQLVNDFKELRUĉFSRGXZDJĘ

DNWXDOQHZ\]ZDQLD]ZLĉ]DQH]RGSUDZĉSDVDŮHUyZRFKURQĉNU\- W\F]Q\FKLRJyOQRGRVWĘSQ\FKVWUHIZŒZLHWOHDNWXDOQ\FKSRZDŮ- Q\FK]DJURŮHĽ-HGQ\P]JâyZQ\FKSRZRGyZGODNWyU\FKORWQLF- WZRMHVWMHGQ\P]QDMEDUG]LHMXUHJXORZDQ\FKŒURGNyZWUDQVSRUWX

ZVHQVLHEH]SLHF]HĽVWZDMHVWIDNWŮHQDGDOZ\VWĘSXMĉSRZDŮQH

]DJURŮHQLDLSRGDWQRŒýQDDWDNLWHUURU\VW\F]QH/LF]EDLQF\GHQWyZ

LQDUXV]HĽZPLĘG]\QDURGRZ\PŒURGRZLVNXEH]SLHF]HĽVWZDORW- QLF]HJRDNWXDOL]RZDQDMHVWQLHPDOFRG]LHQQLHQDFDâ\PŒZLHFLH

'ODWHJRJâyZQĉUROĉZV]\VWNLFKSRGPLRWyZUHJXODF\MQ\FKL]DZR- GRZ\FKZORWQLFWZLHMHVWVNXWHF]QDRFKURQDUyŮQRURGQ\FKHNRV\V- WHPyZORWQLF]\FKWDNLFKMDNORWQLVNDLOLQLHORWQLF]H$E\VSURVWDý

Z\]ZDQLRP]ZLĉ]DQ\P]UHVWU\NF\MQ\PLSU]HSLVDPLZ]DNUHVLH

EH]SLHF]HĽVWZDLURVQĉFĉOLF]EĉSDVDŮHUyZDWDNŮHDE\E\ýQD

ELHŮĉFR]QDMQRZV]\PLVWUDWHJLDPLDQW\WHUURU\VW\F]Q\PLORWQLVND

SRV]XNXMĉQRZ\FKUR]ZLĉ]DĽZW\P]DNUHVLH7DNLHUR]ZLĉ]DQLD

RSLHUDMĉVLĘSU]HGHZV]\VWNLPQDHOHNWURQLF]Q\PZGUDŮDQLXQR- Z\FKURG]DMyZXU]ĉG]HĽPDMĉF\FKQDFHOXSRSUDZĘZ\NU\ZDQLD

PDWHULDâyZVWDQRZLĉF\FK]DJURŮHQLH]HV]F]HJyOQ\PXZ]JOĘG- QLHQLHPPDWHULDâyZZ\EXFKRZ\FKL]DJURŮHĽ&%51:UDPDFK

WHJRDUW\NXâX]DSUH]HQWRZDQRNOXF]RZHHOHPHQW\WHFKQRORJLF]- QHZVSLHUDMĉFHZ\NU\ZDQLH]DJURŮHĽDWDNŮHZVND]DQRJâyZQH

SXQNW\RGQRV]ĉFHVLĘGRRJyOQHMSHUFHSFMLZŒUyGV\VWHPyZEH]- SLHF]HĽVWZDORWQLVN

Sâowa Nluczowe: ]agroŮenia, ]aaZansoZana technologia, system Ee]piec]eĽstZa.

Autorzy:

dr haE. inŮ. Gabriel Nowacki, proI. :$7 ² :oMsNoZa $Nademia 7echnic]na, :yd]iaâ &yEernetyNi

dr Bohdan Paszukow ² eNspert Z oEs]ar]e Ee]piec]eĽstZa lotnic- tZa ora] &B51

Fig. 5. Summary of the analysis of technical measures used to secure critical and restricted zones

6ource: oZn study research graph.

Cytaty

Powiązane dokumenty

Rozdział pierwszy jest poświęcony specyficznym uwarunkowaniom determinującym działalność opiekuńczo-wychowawczą na Wileńszczyźnie, która w okresie II RP wyróż- niała

Dąbek oznacza to, że akty prawa miejscowego: stanowią element systemu powszechnie obowiązujących przepisów prawa RP; obowiązują powszechnie jedynie na obszarze

Naszym celem jest uchwycenie zmian w zasadach ogłaszania aktów nor- matywnych w warunkach społeczeństwa informacyjnego przez państwo, które przestało być

− ценности, которые реализуются в отношениях человека к человеку – любовь, дружба, сострадание (ценности общения), −

ВЫВОДЫ Таким образом, становление самооценки в дошкольном возрасте имеет определенные особенности: − функционирование самооценки

Stąd też tak ważną rolę w dzia- łalności przed rozpoczęciem misji, jak i później – miała edukacja w różnych dziedzinach nauki oraz wieloraka po- moc nowo ochrzczonym

A research program was initiated by the Ship Structure Committee in May, 1968 to determine the effect of flame straightening and mechanical straightening at elevated temperatures on