A numerical model for impacts of left-turn non-motorized vehicles on through lane capacity metrics


  • Jaroslav Jevčák Technical University of Košice, Faculty of Aeronautics Author
  • Miroslav Kelemen Technical University of Košice, Faculty of Aeronautics Author
  • Matej Antoško Technical University of Košice, Faculty of Aeronautics Author
  • Ladislav Choma Technical University of Košice, Faculty of Aeronautics Author
  • Jarosław Kozuba Silesian University of Technology, Faculty of Transport Author




compact camera, integrated airport security, safety system, experiment


The article presents an experimental exploration of the selected technical features of the Avigilon 2.0C-H4A-BO1-IR Compact Zoom Camera with IR Adaptive Illumination. The article describes the purpose, procedure, and results of the motion detection verification, as well as the identification of motion detection errors, using Avigilon's investigated camera, to the distance of guaranteed recognition capability in specific daylight conditions that determines video analysis. This article constitutes the first part of the internal research activity of the Department of Flight Preparation - pre-research, for the design of an integrated mobile airport security system. For safety reasons, the testing was performed near the airport and not at the airport. The test sample was obtained by using the Avigilon 2.0C-H4A-BO1-IR camera located 8 meters above the ground level in the direction of the selected perimeter of the "protected area" for the experiment. The movement in the space was made by people and the passage of motor vehicles at a distance that was less than the distance guaranteed by the camera's recognition capability in the specific daylight conditions. The movement of persons and motor vehicles was generally performed perpendicular to the position of the camera, left to right, and/or back. The speed of movement of people was, as a rule, an average walking speed of 1m/s, the motor vehicles ranging up to 40km /h. Identification of motion detection errors is important for corrections of the prepared information model of security risk assessment of a protected object based on the fuzzy logic to support the airport security management decisions, as well as for finding a technical solution to eliminate these camera vulnerabilities, or selecting and testing another camera for our mobile technology platform. The results advance our theoretical knowledge and have a praxeological significance for the creation of a technological demonstrator and subsequently a prototype of a smart mobile airport security system. Institutions responsible for the protection of state borders, the fight against illegal migration, smuggling of goods, etc. are also interested in mobile security solutions.


AGUILETA, A.A., BRENA, R.F., MAYORA, O., MOLINO-MINERORE, E., TREJO, L.A., 2019. Multi-Sensor Fusion for Activity Recognition - A Survey. Sensors, 2019, 19, 3808.

AMBROZIAK, T., JACHYMOWSKI, R., PYZA, D., SZCZEPANSKI, E., 2014. Analysis of the traffic stream distribution in terms of identification of areas with the highest exhaust pollution. Archives of Transport, 32(4), 7-16. DOI: 10.5604/08669546.1146993.

AXXON, 2020. The Axxon Next software package is a next-generation open-platform video management software VMS. Available at: https://doc.axxonsoft.com/confluence/display/next42en/User+Guide.+Introduction) (accessed 13.05.2020).

CAPUTO, C. A., 2014. Digital Video Surveillance and Security. Monograph. Second edition. Oxford: Elsevier.

IEC, 2020. International Electrotechnical Commission series of IEC 62676 - Video Surveillance Systems for use in security applications , IEC TC 79 Alarm and electronic security systems. Switzerland. Available at: https://www.iec.ch/dyn/www/f?p=103:30:0::::FSP_ORG_ID,FSP_LANG_ID:1269,25 (accessed 13.05.2020).

KELEMEN, M., 2017. Security of the Slovak Republic and issues of protected interests: Security and criminal law research topics. Fire protection, Safety and Security. International Scientific Conference Proceedings, 2017, 312-316. WoS. Zvolen: Technical University.

KELEMEN, M., BLIŠŤANOVÁ, M., 2014. Logistic Modelling to handle the Threat of Floods- The Bodva River example. SGEM 2014: 14th International Multidisciplinary Scientific GeoConference: Conference Proceedings :Volume III: 17-26 June, 2014, 715-723. Sofia, Bulgaria : STEF92 Technology.

KELEMEN, M., KRIŽOVSKÝ, S., BLIŠŤANOVÁ, M., BLIŠŤAN, P., KOVÁČOVÁ, L., 2015. Influence of Camera System on offenses in the City of Košice - Security Science and Education as Factors of Crime Prevention. Košice: VŠBM Košice, 2015.

KYRIAKOU, K., LAKAKIS, K., SAYVVAIDIS, P., BASBAS, S., 2019. Analysis of spatiotemporal data to predict traffic conditions aiming at a smart navigation system for sustainable urban mobility. Archives of Transport, 52(4), 27-46. DOI: https://doi.org/10.5604/01.3001.0014.0206.

LEE, H., PARK, S.H., YOO, J.H.; JUNG, S.H., HUH, J. H., 2020. Face Recognition at a Distance for a Stand-Alone Access Control System. Sensors, 2020, 20, 785.

LOVEČEK, T. REITŠPÍS, J. 2011. Security systems: Design and evaluation of object protection systems. Žilina: EDIS – University of Zilina.

NILSSON, F., 2009. Intelligent Network Video. Monograph. Boca Raton: CRC Press. 2009.

PALMER, D., 2017. 175,000 IoT cameras can be remotely hacked thanks to flaw, says security researcher. Available at: https://www.zdnet.com/article/175000-iot-cameras-can-beremotely-hacked-thanks-to-flaw-says- security-researcher/.

PRICE, C.J., FORREST, S. J., 2017. Commercial aviation airport security. In Practical aviation security. Predicting and Preventing Future Threats. 3rd. ed. Elsevier, 2017, 205-263. https://doi.org/10.1016/B978-0-12-804293-9.00005-9.

PURPURA, P. Ph., 2017. External Threats and Countermeasures. In Effective Physical security. Elsevier. 2017, 219-248. https://doi.org/10.1016/B978-0-12-804462-9.00009-9.

REHAK, D., BERNATIK, A., DVOŘAK, Z., HROMADA, M., 2020. Safety and Security Issues in Technical Infrastructures. IGI Global: Hershey, PA, USA, ISBN 978-1-7998-3059-7, doi:10.4018/978-1-7998-3059-7.

SC4, 2020. System C 4. Available at: https://www.c4portal.com/Product/Default.aspx?lang=sk (accessed 13.05.2020).

SEMENOV, I., FILINA-DAWIDOWICZ, L., TROJANOWSKI, P., 2019. Integrated approach to information analysis for planning the transport of sensitive cargo. Archives of Transport, 51(3), 65-76. DOI: https://doi.org/10.5604/01.3001.0013.6163.

STN, 2013. STN EN 50132-7: 2013 (33 4592) Alarm systems. CCTV tracking systems for use in security applications. Part 7: Instructions for use. Bratislava: SUTN, 2013.

STN, 2014. STN EN 62676-1-1 (33 4592) 1.10.2014. Image monitoring systems for use in safety applications. Part 1-1: Requirements for image systems. Bratislava: SUTN, 2014.

SZABO, S., PILÁT, M., TOBISOVÁ, A., MAKÓ, S., 2019. Operational statistics of Kosice Airport. Scientific Journal of Silesian University of Technology: Zeszyty Naukowe Politechniki Śląskiej: Series Transport: Seria Transport, 102, 197-203.

TOBISOVÁ, A., ROZENBERG, R., VAGNER, J., JENČOVÁ, E., 2017. Social network applicability in air transport. Transport Means. Proceedings of the International Conference Volume 2017-September, 2017, 21st International Scientific Conference Transport Means 2017; Rest House "Azuolynas" L. Rezos Str. 54 Juodkrante; Lithuania; 20 September 2017 through 22 September 2017, 1040-1044. Kaunas: Kaunas University of Technology.

VIDRIKOVA, D., BOC, K., DVOŘAK, Z., REHAK, D., 2017. Critical Infrastructure and Integrated Protection. Association of Fire and Safety Engineering: Ostrava, Czech Republic, 2017. ISBN 978-80-7385-190-3.

YOUNG, S.C., 2015. Closed Circuit Television. In The Science and Technology of Counterterrorism. Measuring Physical and Electronic Security Risk. Elsevier, 2015, 359-418. https://doi.org/10.1016/B978-0-12-420056-2.00011-7.






Original articles

How to Cite

Jevčák, J., Kelemen, M., Antoško, M., Choma, L., & Kozuba, J. (2020). A numerical model for impacts of left-turn non-motorized vehicles on through lane capacity metrics. Archives of Transport, 55(3), 17-27. https://doi.org/10.5604/01.3001.0014.4200


Most read articles by the same author(s)

Similar Articles

1-10 of 146

You may also start an advanced similarity search for this article.