초록
This paper is about information technology of creation of mobile (of rapid deployment) security systems of the area perimeter. This system appears to be a complex of models and methods, information, software and hardware means that are interacted with users during decision-making and control of implementation for management solutions. The proposed information technology aimed at improving the protection level for security departments by automating the process of dangers detection for perimeters and decision-making for alarm. The structural model of the system, the model of system's components interaction and the model of identifying the subjects of emergencies threats have been proposed. A method for identifying unauthorized access to the perimeter of the protected object, using the production model of knowledge representation, was created. It is a set of linguistic expressions (such as "IF-THEN") and knowledge matrix. The method of ranking for objects, which are threats of unauthorized access to the perimeter for protected area, has been proposed. Practical value of work consists in the possibility of the use this information technology by perimeter's security systems of various objects. Proposed models are complete and suitable for the hardware and software implementation.