Acceso abierto

Analisys of Access Points with the Queue Model for Biometric Access Control in Large Headcount Plants


Cite

54/2014. (XII. 5.) BM Decree on the National Fire Protection Regulations (2014). Budapest: National Legislation.Search in Google Scholar

Berek, L. (2014). Security Systems. Budapest: National University of Public Service.Search in Google Scholar

Bunyitai, A. (2011). Location and role of access control systems in asset protection. Budapest: Hadmernok, VI.(4.), 17-25.Search in Google Scholar

Fishwick, P. A., & Hyungwook, P. (2008). Queue Modeling and Simulation. In Principles of Modeling and Simulation: A Multidisciplinary Approach. New Jersey, USA: John Wiley & Sons, Inc.Search in Google Scholar

Hanka, L. (2013). Applications for using binomial distribution in functioning identification systems, the application of maximum likelihood principle. Spring Technical Symposium, Budapest, Hungary: University of Obuda.Search in Google Scholar

Hanka, L., & Werner, G. (2015). Using the Beta-Binomial Distribution for the Analysis of Biometric Identification. 13th International Symposium on Intelligent Systems and Informatics: Proceedings, 209-216, Subotica, Serbia.10.1109/SISY.2015.7325381Search in Google Scholar

Hillier, F. S., & Lieberman, G. J. (2014). Introduction to Operations Research. New York, USA: McGraw-Hill Higher Education.Search in Google Scholar

Hungarian Standards Institution. (2015). MSZ EN 60839-11-2:2015. Alarm systems and electronic security systems. Part 11-2.: Electronic access control systems. Application Guidelines. Budapest: Hungarian Standards Institution.Search in Google Scholar

Kendall, D. G. (1953). Stochastic processes occurring in the theory of queues and their analysis by the method of imbedded Markov chain. Annals of Mathematical Statistics, Vol. 24, Issue 3, 338-354.10.1214/aoms/1177728975Search in Google Scholar

Kleinrock, L. (1975). Queueing Systems Volume 1: Theory. New York: Wiley - Interscience.Search in Google Scholar

Law, A. M. (2015). Simulation Modeling and Analysis. 5th Edition. Tucson, Arizona, USA: McGrow-Hill.Search in Google Scholar

Little, J. D. (1961). A proof of the queuing formula: l = λw. Operations Research, Vol. 9(3), pp. 383-387, available at: http://fisherp.scripts.mit.edu/wordpress/wp-content/uploads/2015/11/ContentServer.pdf10.1287/opre.9.3.383Search in Google Scholar

Lovász, L. (2009). Complexity of Algorithms. Budapest: ELTE, Institute of Mathematics.Search in Google Scholar

Lukács, J. (2014). Develop and present an access gate placement strategy through a few selected subway stations. Budapest: BME Budapest University of Technology and Economics.Search in Google Scholar

Otti, C. (2015). Classification of biometric access control systems based on real-time throughput. Proceedings of Fifth International Scientific Videoconference of Scientists and PhD. students or candidates, Bratislava, 63-71.Search in Google Scholar

Otti, C. (2016). Biometric Systems User Pattern Positioning Issues. DOSZ, Spring Wind Conference, 251-260, Budapest.Search in Google Scholar

Pap, G., & Szűcs, G. (2014). Stochastic processes. Szeged, Hungary: STE Institution of Bolyai, Stochastic Department.Search in Google Scholar

Pokorádi, L. (2008). Modeling of systems and processes. Debrecen, Hungary: Campus Kiado.Search in Google Scholar

Szeidl, L. (2009). Mass Service. Budapest, Hungary: University of Obuda, Institute of Informatics.Search in Google Scholar

Sztrik, J. (2011). Basics of queuing theory. Debrecen, Hungary: University of Debrecen.Search in Google Scholar