Drones as an Example of the Use of Smart Technologies in Cooperation with the State Security Forces in the Context of the Smart Cities Concept in the Czech Republic
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F62690094%3A18450%2F24%3A50021621" target="_blank" >RIV/62690094:18450/24:50021621 - isvavai.cz</a>
Result on the web
<a href="https://www.sciencedirect.com/science/article/pii/S1877050924011165?via%3Dihub" target="_blank" >https://www.sciencedirect.com/science/article/pii/S1877050924011165?via%3Dihub</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1016/j.procs.2024.05.100" target="_blank" >10.1016/j.procs.2024.05.100</a>
Alternative languages
Result language
angličtina
Original language name
Drones as an Example of the Use of Smart Technologies in Cooperation with the State Security Forces in the Context of the Smart Cities Concept in the Czech Republic
Original language description
Using unmanned aerial vehicles (drones) in security has become common in the Czech Republic. This paper focuses on using drones as an example of the application of smart technologies in conjunction with the Internet of Things (IoT) and state security forces, especially in cooperation with the police, fire and medical emergency services in the context of the new Smart Cities concept. Drones are one of the most suitable examples of use along with IoT within the security sector, which play a key role in the daily protection of citizens' safety, public order security and crisis management. It is related to developing and implementing 5G networks, which allow real-time transmission of data obtained by drones directly to information systems, and is also gaining importance. This technology enables fast and efficient communication between the different actors involved in an intervention and creates a platform for fast and effective emergency response. Among other things, paying attention to cybersecurity, such as securing data transmissions, protecting against cyber threats, complying with security standards and legislation, and introducing special procedures and methodologies applicable in crisis, is essential. © 2024 The Authors. Published by ELSEVIER B.V.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
—
Continuities
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Others
Publication year
2024
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Procedia computer science
ISBN
—
ISSN
1877-0509
e-ISSN
1877-0509
Number of pages
8
Pages from-to
229-236
Publisher name
Elsevier
Place of publication
Shannon
Event location
Lisbon
Event date
Oct 4, 2023
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
—