DOI QR코드

DOI QR Code

Information Technology for Mobile Perimeter Security System Creation

  • Mazin Al Hadidi (Computer Engineering Department. Faculty of Engineering Technology Al-Balqa' Applied University) ;
  • Jamil S. Al-Azzeh (Computer Engineering Department. Faculty of Engineering Technology Al-Balqa' Applied University) ;
  • Lobanchikova N. (Zhytomyr State Technological University) ;
  • Kredentsar S. (National Aviation University) ;
  • Odarchenko R. (National Aviation University) ;
  • Opirskyy I. (Lviv Polytechnic National University) ;
  • Seilova N. (Kazakh National Research Technical University)
  • Received : 2024.10.05
  • Accepted : 2024.10.20
  • Published : 2024.10.30

Abstract

This paper is about information technology of creation of mobile (of rapid deployment) security systems of the area perimeter. This system appears to be a complex of models and methods, information, software and hardware means that are interacted with users during decision-making and control of implementation for management solutions. The proposed information technology aimed at improving the protection level for security departments by automating the process of dangers detection for perimeters and decision-making for alarm. The structural model of the system, the model of system's components interaction and the model of identifying the subjects of emergencies threats have been proposed. A method for identifying unauthorized access to the perimeter of the protected object, using the production model of knowledge representation, was created. It is a set of linguistic expressions (such as "IF-THEN") and knowledge matrix. The method of ranking for objects, which are threats of unauthorized access to the perimeter for protected area, has been proposed. Practical value of work consists in the possibility of the use this information technology by perimeter's security systems of various objects. Proposed models are complete and suitable for the hardware and software implementation.

Keywords

References

  1. Yudin O.K. Information security in data networks [Text]/ O.K. Yudin, O.G. Korchenko, G.F. Konahovych, Kyiv, Interservis, 2009, 719 p.
  2. Information security and economic safety for enterprise: monograph [Text] / O.O. Kuznetsov, S.P. Evseev, S.V. Kavun, Kharkiv, KhNEU, 2008, 360 p.
  3. Graivoronsky M.V. Safety information and communication systems [Text] / M.V. Graivoronsky, O.M. Novikov, Kyiv, BHV, 2009, 608 p.
  4. Pilkevych I.A. Information security in ICS: tutorial [Text] / I. Pilkevych, K. Molodetska, N. Lobanchykova, Zhytomyr, ZhSU, 2014, 170 p.
  5. Kavun S.V. Information security: manual / S. V. Kavun, Kharkiv, KhNEU, 2009, 368 p.
  6. Zavgorodny V. I. Complex protection of information in computer systems: tutorial [Text] / V. Zavgorodny, Moscow, Logos; 2001, 365 p.
  7. Belov E. Basis of information security: tutorial for higher education [Text] / Belov E., Los V., Meshcheryakov A., Moscow, Studio, 2006, 356 p.
  8. Malyuk A.A. Information security and conceptual and methodological framework for the information security: [tutorial for higher education], Moscow, Hotline-Telecom, 2004, 280 p.
  9. Zgurovsky M. Z. Basis of system analysis: manual [for higher aducation] / M. Z. Zgurovsky, N. D. Pankratova, Kyiv, BHV, 2007, 544 p.