<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Evaluation of the Effectiveness of the Integrated Security System as an Information System</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Tetiana Vakaliuk</string-name>
          <email>tetianavakaliuk@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Dubyna</string-name>
          <email>Dubyna1357@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tetiana Nikitchuk</string-name>
          <email>tnikitchuk@ukr.net</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Andreiev</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Digitalisation of Education of the NAES of Ukraine</institution>
          ,
          <addr-line>9 M. Berlynskoho Str., Kyiv, 04060</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kryvyi Rih State Pedagogical University</institution>
          ,
          <addr-line>54 Gagarin Ave., Kryvyi Rih, 50086</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Zhytomyr Polytechnic State University</institution>
          ,
          <addr-line>103 Chudnivsyka Str., Zhytomyr, 10005</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <fpage>21</fpage>
      <lpage>23</lpage>
      <abstract>
        <p>Protection and health care, life, habitat, material, and intellectual property of a person is an essential task at the present stage of development of society. To solve this problem, integrated security systems consist of a video surveillance system, security and fire alarms, access control, and management systems. In the early stages of development, these components were mainly used as independent protection elements. To date, they are used in one complex to solve the problem of technical protection of the facility. One of the important hardware and software means of protection is the elements and devices of electronic technology, including touch devices. Their functioning is based on the achievements of solid-state physics, optics, electrooptics, electroacoustics, etc. Modern electronic technologies make it possible to create effective microelectronic sensor devices for security and protection systems, the operation of which consists of the use of optical, mechanical, magnetic, piezoelectric, tensometric, capacitive, and other types of signal converters. In the process of building modern security and protection systems, it is necessary, on the one hand, to have information about the capabilities and features of the functioning of individual constituent elements that ensure the fulfillment of tasks for the protection of an object. On the other hand, it is necessary to evaluate the effectiveness of the developed system, which should include both the reliability indicators of all elements and information transmission channels and the performance indicators of the functional task. The developed mathematical model of the effectiveness of the application of the security system will make it possible to make the right choice of the constituent elements of the system, the parameters of which most fully ensure the fulfillment of the security task. This approach ensures the organization of interaction between security alarm systems, fire alarms, access control systems, video surveillance systems, and centralized security consoles. a complex of technical means, a security system sensor, a centralized security control panel, ORCID: 0000-0001-6825-4697 (T. Vakaliuk); 0000-0003-3448-6072 (O. Dubyna); 0000-0002-9068-931X (T. Nikitchuk); 0000-0002-2601-</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>the effectiveness of the security system</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        At present, the object protection system is an integral part of any enterprise, private house, etc. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In general, such a system is integrated or complex and includes a video surveillance system, a
security and fire alarm system, and an access control and management system. By the tasks that are
solved during the protection of both the object as a whole and the management of information
protection, a complex integrated security system (ISS) must perform tasks related not only to detection
(issuance of an "alarm" signal) or non-detection the fact of unauthorized access, but also the
determination of belonging to a species, class, subclass or type depending on the problem being solved.
Based on this, ISS should be considered an information system designed to obtain information about
      </p>
      <p>
        2023 Copyright for this paper by its authors.
the state of the object and its further processing. This information can be sent both to the security control
panel and the owner's computer or mobile phone, both via wired and wireless communication channels
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. This will allow the operational staff (OS) or the owner to take management actions aimed at
taking appropriate measures related to the process of task forces and means of response.
      </p>
      <p>Today, as primary sensors, devices that have a fairly powerful functionality with the formation of
an extended format of data about the object can be used. The issue can be resolved not only by detection
but also by its classification. This, firstly, affects the complication of the hardware implementation of
the tools, secondly, it imposes restrictions related to the evaluation of the effectiveness of security
systems taking into account their reliability.</p>
      <p>This approach requires the use of private, generalized, and complex indicators when applying
complex technical tools (CTT) in security systems by the assigned tasks. An analysis of the literature
has shown that to date there is no mathematical model of CCT that would allow for an optimized choice
of the structure and composition of the facility security system, taking into account the quality indicators
of the system elements. Therefore, there is a problem in choosing a function model for evaluating the
effectiveness of automated systems for the protection of objects of this type.</p>
      <p>The purpose of the article is to build a mathematical model for evaluating the effectiveness of the
security system, taking into account the reliability of its elements.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Theoretical background</title>
      <p>
        In [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], the importance and necessity of taking into account the success factors of information security
management in the segment of small and medium-sized businesses is noted. 4 key success factors for
information security management have been identified, including the fit of information security
management with the company's business activities, top management support, tools of security controls,
and organizational awareness. In [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], the considerable complexity of the construction of the perimeter
security signaling system is shown. When choosing it, it is worth taking into account both the
engineering means of strengthening the perimeter and the strategy of organizing security at the facility
as a whole. In [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], an analysis of a significant number of factors affecting the qualitative and quantitative
indicators of object protection systems is carried out. They include the composition of the object; its
territorial location; configuration of the perimeter of fences; availability and location of means of access
control and management; video surveillance; alarm systems, types of sensors, and types of
communication channels. The complexity of building a facility's security system should correspond to
the level of threats. In [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the modern level of home automation to provide a security system, its
capabilities, advantages, and disadvantages are noted. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] shows the importance of providing home
security to prevent intrusions into both private homes and business premises and offices. For this, a
project built using a programmed microcontroller, motion sensors, and switches is proposed.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], attention is paid to the deployment of home security/alarm systems using Global System
Mobile (GSM) technology as a channel for transmitting alert signals to a smartphone. In [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] it is shown
that access control mechanisms of corporate information security technology usually reduce the
productivity of employees, forcing them to spend time on tasks related to security. The conducted
analysis shows that today, both in the private sector and in production, considerable attention is paid to
the safety of facilities. But organizations must invest heavily in security technologies and take steps to
reduce their cost to maintain a balance between security costs, resource drain, and security technology
effectiveness. In[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] , the general indicators of the evaluation of the effectiveness of complex protection
systems and the methods of their calculation are given. At the same time, quite a few works are devoted
to the effectiveness of technical protection of objects.
      </p>
    </sec>
    <sec id="sec-4">
      <title>3. Results 3.1.</title>
    </sec>
    <sec id="sec-5">
      <title>A probabilistic approach to evaluating the effectiveness of an integrated security system</title>
      <p>
        In the general case, indicators of efficiency with ISS, as an information system [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], can be
represented by a group that includes, on the one hand, indicators characterizing the CTT of security
systems, on the other hand, indicators characterizing the human factor. Taking into account that the
technical component of the CTT of protection systems is decisive in the reliability of their structures,
in the future we will stop at the consideration of the first group of indicators.
      </p>
      <p>
        To determine the effectiveness of the security system, we will use the approach in which the process
of evaluating the effectiveness of the object's security systems as an information system consists of
several stages, which include, first, the step-by-step transformation of the structures of the systems of
private generalized indicators, and second, their presentation in an indicator containing models of the
lower level of association, namely a complex (integral) indicator of efficiency. This makes it possible
to visualize the indicators of complex-type protection systems in the form of a hierarchy of indicators
of the efficiency and reliability of CTT [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        When considering the "tree" of efficiency and reliability indicators (Fig. 1), it is assumed that the
CTT consists (third level) of n sensors (primary elements) and m communication channels. Each of
these elements is characterized by the efficiency index Kefs, Kefch (left branch) and reliability Krs,
Krch (right branch). The second level is characterized, on the one hand, by efficiency indicators, namely
Kefs, Kefch, which have the meaning of generalizing efficiency indicators both due to the use of
security sensors and due to the use of communication lines (wired or radio communication),
respectively, on the other hand on the other hand, efficiency indicators, namely Krs, Krch, which have
the meaning of generalizing efficiency indicators that characterize the reliable characteristics of sensors
and communication lines, respectively. The first level of the hierarchy of CTT efficiency and reliability
indicators is characterized by higher-level indicators, which are presented in the form of Kectt, Krctt,
which have the meaning of complex indicators of the effectiveness of the CTT structure and the
reliability of the CTT structure, respectively. The higher level (zero) of the "tree" of indicators includes
indicators of the lower level and is represented by a comprehensive indicator of the effectiveness and
reliability of the CTT structure (Kef). At the same time, the analysis of the construction of object
protection systems makes it possible to conclude that this structure is an information-automated system
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], which is identified by several subsystems. Therefore, during the analysis of CTT, it is possible to
introduce information elements (IE) into consideration.
      </p>
      <p>Next, IE will be understood as the simplest element of object protection, reflecting sources
(channels) of information. Therefore, two classes of indicators that characterize, on the one hand, the
detected and recognizable properties, and, on the other hand, the reliable capabilities of the security
system, can act as indicators of the quality of the security system, in general, reflecting the efficiency
and reliability of the third level of the hierarchy (Fig. 1).</p>
      <p>
        The revealed and recognition properties of the CTT of the security system can be represented by the
probabilities of correct detection of the signal by the sensors, erroneous or correct classification of
objects, and timeliness of information processing in the path of signal recognition [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>The reliable capabilities of CTT are associated with sudden failures that occur during the operation
of security systems and are characterized by a set of several indicators, among which can be highlighted,
for example, the probability of error-free operation, the timely release of information through
communication channels, the effectiveness of the task performed in communication channels.
3.2.</p>
    </sec>
    <sec id="sec-6">
      <title>Assessments of the effectiveness of the complex technical tools ISS</title>
      <p>The above allows you to imagine the quality of the functioning of the security system of the object
protection system based on the hierarchy of indicators (Fig. 1) and introduce a vector indicator that
determines the effectiveness and reliability of CTT in the following form:</p>
      <p>е = ‖ 1,  2,  3,  4,  5‖ (1)</p>
      <p>In expression (1), components  1,  2,  3,  4,  5 are performance indicators characterizing the
detection of an object by sensors, the correctness of object classification, timeliness and correctness of
information processing in the processing unit, reliable characteristics of sensors and communication
lines, and timeliness of information delivery through communication channels, respectively.
0 level
1 level
2 level
3 level</p>
      <p>Кеf
Кеfcct</p>
      <p>Кrcct
s
f
e
К
h
c
f
e
К
s
r
К
h
c
r
К
1
s
f
e
K
n
s
f
e
К
1
h
c
f
е
К
m
h
c
f
е
К
1
s
r
К
n
s
r
К
1
h
c
r
К
m
h
c
r
К</p>
      <p>In general, the work of any security system consists in performing the following basic operations:
detection of a conditional violator, his recognition or identification as a result of processing the primary
information received from the sensor, making an appropriate decision based on the purpose of this
system (formation of control signals) and data transmission by communication channels to the technical
means of displaying information (computer, mobile phone, remote control) to the operator (owner).</p>
      <p>It should be noted that a certain class of modern sensors (for example, video cameras) are capable
of performing several of the main operations: detection, recognition, and identification, while for others
only detection is performed, and the rest of the operations take place in the processing unit (video
recorder, reception and control device, controller, etc.).</p>
      <p>In the general case, when building protection systems taking into account the works to evaluate the
constituent components  1,  2, and  3 included in expression (1), probabilistic indicators can be
considered:</p>
      <sec id="sec-6-1">
        <title>Pos – the probability of object detection by sensors;</title>
      </sec>
      <sec id="sec-6-2">
        <title>Pkl — the probability of correct classification of objects by sensors;</title>
        <p>Ppr is a probability that characterizes the timeliness of information processing in the signal
recognition path.</p>
        <p>It should be noted that two factors must be taken into account when analyzing security systems,
namely: firstly, the elemental base when creating sensors and communication channels is characterized
by sudden failures, that is, the above-mentioned IE during operation has a finite failure time, and
secondly, it is necessary to ensure the release of information within a time that does not exceed the
established regulatory requirement. In this case, when evaluating the elements of the structures of the
object protection system, it is advisable to present the components of the vector indicator with
probabilistic indicators and supplement them with the following reliability characteristics: the
probability of failure-free operation of the sensor Prd, the probability of failure-free operation of the
communication channel Prch and the probability of execution, which characterizes timeliness issuing
information via the communication channel Ptch. Taking into account the above, the vector indicator
represented by expression (1) is reduced to the form
 е = ‖  ,   ,   ,   ,    ℎ,   ℎ‖
(2)</p>
        <p>
          Taking into account the fact that currently the latest advances in microelectronics, namely integrated
technologies, are used in the protection systems in the manufacture of IEs, the presented types of IEs
are approximately equally reliable. In this case, from a practical point of view, in expression (2), along
with the values   ℎ,   , it is possible to operate with the value of the average failure intensity   [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
j
1
2
…
8
        </p>
        <sec id="sec-6-2-1">
          <title>Combination</title>
          <p>111
110
…
000</p>
        </sec>
      </sec>
      <sec id="sec-6-3">
        <title>Probability of false alarm:</title>
      </sec>
      <sec id="sec-6-4">
        <title>With</title>
        <p>
          Taking into account the multiplicative approach to combining generalizing indicators, the indicator of
efficiency and reliability of the CTT of the security system can be written analytically as
 е =   ,   ,   ,   ,   ℎ
(3)
At the initial stage of the security system, the detection process takes place with  
- the probability
of object detection by tools of detection (TD). This practically determines the next stages of processing
and execution of the task by the security system as a whole [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. A multifaceted protection system is
formed, as a rule, based on the application of TD and classification, which work on different principles
and refer to combined tools of detection (CTD) [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>The following schemes of logical processing of alarm signals from individual emergency shelters
have become the most widespread for CTD: M with N, in particular: 1 with 2 (N=2, M=1); 1 of 3 (N =
3, M = 1); 2 of 3 (N=3, M=2). Processing of such signals, as a rule, is carried out based on AND and</p>
      </sec>
      <sec id="sec-6-5">
        <title>OR logic circuits.</title>
        <p>According to the first scheme, all TDs must have the same probability of detection (when fixing the
probability of false alarms). When processing signals according to the second scheme, it is advisable to
equalize the values of the false alarm probabilities of all TDs, when fixing the probability of detection.</p>
        <p>At present, the following algorithms for processing binary signals from TD are the most widely
used:
- based on theoretically possible combinations of TD that worked;
- as a result of the assignment of weighting coefficients to TD.
probabilities and ̅̅1̅,̅̅̅2̅̅,̅̅3̅ - false alarm probabilities.</p>
        <p>We will give an example of the algorithm for processing binary signals from three TDs based on
theoretically possible combinations of TDs. For each of the TD, let's take  1,  2,  3 - their detection
∆  passes and in the presence of interference ⃑∆⃑⃑⃑⃑ (j- number of the combination).
Theoretically possible combinations of three TD</p>
        <p>∆ 
 1 2 3
 1 2(1 −  3)</p>
        <p>…
 2/3 = ∑ ∆ 
̅̅2̅/̅3̅ = ∑ ⃑∆⃑⃑⃑⃑</p>
        <p>4
4
 =1
 =1
8
∑ ∆  = ∑ ⃑∆⃑⃑⃑⃑ = 1
⃑∆⃑⃑⃑⃑</p>
        <p>…
̅̅1̅̅̅̅̅̅3̅</p>
        <p>2
̅̅1̅̅̅2̅(1 − ̅̅3̅)
(4)
(5)
(6)
(1 −  1)(1 −  2)(1 −  3)
(1 − ̅̅1̅)(1 − ̅̅2̅)(1 − ̅̅3̅)</p>
        <p>
          To find the probability of detection for the logic processing scheme 2 out of 3, it is necessary to add
up the probabilities of those combinations in which there are two or three units [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]:
∆ 
⁄
⃑∆⃑⃑⃑⃑
        </p>
        <p>given probability of detection.</p>
        <p>The optimal scheme for the logical processing of the CTD will be the one that, with the provision of
a given probability of detection, has the lowest probability of a false alarm, and, accordingly, the
synthesis of such an algorithm will be as follows: arrange the combinations in Table 1 in descending
order of the ratio</p>
        <p>and select from this table the number of first combinations that provide a</p>
        <p>At present, approaches to evaluating the effectiveness of ISS practically do not take into account the
fact that any object protection system operates under the conditions of significant uncertainty of both
internal and external environments and is described by mathematical models based on information that
is of an undefined or incomplete nature.</p>
        <p>Existing approaches are based either on the exclusion of uncertainty from their mathematical models
or on simplifications and formal descriptions. Therefore, the question arises in the development of new,
additional analytical approaches to solving problems regarding the assessment of the effectiveness of</p>
      </sec>
      <sec id="sec-6-6">
        <title>ISS applications.</title>
        <p>
          Based on the analysis of existing methods, it can be concluded that ISS should be considered a
complex information system and its effectiveness should be characterized by several partial indicators
and a general criterion should be formed based on them [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>
          As the analysis [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] showed, the effectiveness of ISS functioning depends on a significant number of
interrelated factors, which are assessed by a set of criteria that are in complex and quite often mutually
exclusive relationships. The current lack of a general approach to solving tasks in this class causes a
variety of different unrelated methods for assessing the level of security of objects. The process of
determining the effectiveness of object protection systems begins with the selection and justification of
indicators (criteria) for evaluating the effectiveness of the object protection system, followed by the
selection or development of methods for calculating these indicators.
evaluate the parameters of the effectiveness of object protection systems and their calculation methods
Conventional names of the approaches that can be used to select criteria and evaluate the parameters
of the effectiveness of object protection systems and their calculation methods
        </p>
        <sec id="sec-6-6-1">
          <title>The ISS assessment Indicator of performance assessment</title>
        </sec>
        <sec id="sec-6-6-2">
          <title>Method of calculation</title>
          <p>
            [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ].
approach
          </p>
        </sec>
        <sec id="sec-6-6-3">
          <title>Optimizing</title>
        </sec>
        <sec id="sec-6-6-4">
          <title>A multi-level approach</title>
        </sec>
        <sec id="sec-6-6-5">
          <title>Matrix</title>
        </sec>
        <sec id="sec-6-6-6">
          <title>Risk minimization method</title>
        </sec>
        <sec id="sec-6-6-7">
          <title>The indicator of the economic effect of risk management is calculated according to the formula that takes</title>
        </sec>
        <sec id="sec-6-6-8">
          <title>The task of discrete-form</title>
          <p>programming is solved: maximize

∑    
 =1</p>
          <p>If


 =1
∑     ≤  ,  = 1,  ;
 ∈ {0,1};  = 1,  ;</p>
          <p>categories.</p>
        </sec>
        <sec id="sec-6-6-9">
          <title>The ISS state is described by three parameters, for example: (S, O, AR) – set S – subjects, O – objects, AR – access rights.</title>
        </sec>
        <sec id="sec-6-6-10">
          <title>The ISS state is described by a set of</title>
          <p>privacy levels and a set of privacy</p>
        </sec>
        <sec id="sec-6-6-11">
          <title>Models of Bel La Padula, D.</title>
        </sec>
        <sec id="sec-6-6-12">
          <title>Denning.</title>
          <p>Balash's methods for integer
variables, branches, and limits,
exclusion of groups of
unknowns, elements of duality
theory, linear, convex, and
parametric programming</p>
          <p>tools.
1. Finding parameters.
2. Formation of a
threedimensional matrix of</p>
          <p>relations and its
transformation into a
two</p>
          <p>dimensional table.
3. Finding qualitative and
quantitative values of</p>
          <p>indicators
1. To carry out risk fixing.
2. Determine the risk index.
into account   - total probable
losses without treatment of
identified risks; total probable losses
after risk processing M; total actual
losses from exposure to risks   ; total
actual costs for processing identified
risks (</p>
          <p>=   ); total actual losses
from exposure to risks   ; total
actual costs for processing risks  
 = ( ∑   − ∑   ) −
( ∑   + ∑   ) +



 =1
 =1
−
(
+ ( ∑  
 =1</p>
          <p>=1
 =1
+ ∑  
 =1
)
)</p>
        </sec>
        <sec id="sec-6-6-13">
          <title>Neural network</title>
          <p>approach
(multicriteria evaluation)
Fuzzy indicators of protection of the
object in the form of linguistic
variables, such as: "completely
unprotected", "insufficiently
protected", "protected", "sufficiently
protected", "fully protected"
 = ∑

 =1
  (  )</p>
        </sec>
        <sec id="sec-6-6-14">
          <title>Informational and entropic</title>
        </sec>
        <sec id="sec-6-6-15">
          <title>Shannon's value of information entropy 7.</title>
        </sec>
        <sec id="sec-6-6-16">
          <title>Expert assessment</title>
        </sec>
        <sec id="sec-6-6-17">
          <title>The SR security level of the S system The number (n) and the list of</title>
          <p>( , ) =  
1
level of action and degree of
influence.
4. Determination of risk
management methods.</p>
        </sec>
        <sec id="sec-6-6-18">
          <title>5. Calculation of indicators</title>
          <p>characterizing risks.</p>
        </sec>
        <sec id="sec-6-6-19">
          <title>6. Calculation of the indicator</title>
          <p>of the economic effect of risk
management.</p>
          <p>
            Belonging to a certain level of
security is determined on the
interval [
            <xref ref-type="bibr" rid="ref1">0, 1</xref>
            ], reliability
indicators are a function of
membership   (  ), where  
is an element of the set X of
security requirements, A is a
set of values that determine
the fulfillment of security
requirements. Evaluation of
efficiency is carried out
according to clearly defined
criteria.
          </p>
          <p>An analytical calculation of the
information entropy of the
system is carried out using the
concept of function
convolution. With a linear
dependence, the efficiency of
the integration of subsystems
in terms of information is
considered satisfactory.</p>
          <p>Otherwise, it is ineffective.
parameters (i) that
characterize ISO are
determined. The values of the
subjective coefficients of
importance ( 
) are given to
each of the characteristics
  assigned by an expert. SR
parameter values are</p>
        </sec>
        <sec id="sec-6-6-20">
          <title>Frequency</title>
        </sec>
        <sec id="sec-6-6-21">
          <title>The expected loss from the i-th threat is calculated:</title>
          <p>=  ( ,  )
where  - is the parameter of the
frequency of the appearance of the
threat;</p>
        </sec>
        <sec id="sec-6-6-22">
          <title>V is a conditional indicator of loss. Total average losses</title>
          <p>2
 = ∑ =1


2
∑ =1  ( ⃗/ ⃗) ( ⃗) ( ⃗/
 ⃗) +  ,
 ( ⃗/ ⃗) – the probability of</p>
          <p>elimination;
 ( ⃗) – a priori probability of the
state of the object of control;
 ( ⃗/ ⃗) – loss of decision-makings at
the state of the object s
m is the number of recognized
threats.</p>
        </sec>
        <sec id="sec-6-6-23">
          <title>The threat of the i-th type occurs on</title>
          <p>average during the time  
Based on the analysis of
statistical material, the value
of S is set, the value of V is
chosen to be equal from 1 to
the maximum possible
amount of damage, and the
value of the indicator   is
calculated as a function of the
parameters V and S.</p>
        </sec>
        <sec id="sec-6-6-24">
          <title>The probability of non</title>
          <p>fulfillment of tasks as intended
by the object as a result of the
implementation of threats is
determined.</p>
        </sec>
        <sec id="sec-6-6-25">
          <title>Statistical processing of potential threats and their consequences.</title>
        </sec>
        <sec id="sec-6-6-26">
          <title>Probable 10.</title>
        </sec>
        <sec id="sec-6-6-27">
          <title>Statistical</title>
          <p>
            One of the ways to evaluate the effectiveness of ISS is an approach called optimization or
combinatorial. It solves the task of optimizing a species: maximizing a certain function under given
constraints. The type of objective function and the system of restrictions are built depending on the
nuances of the task [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ]. Let:
 = {  } – a plural of security threats,  = 1, …  ;
 = {  } – a plural of TD,  = 1, …  ;
 = {  } – allowable defense costs, moreover   – this is the cost of receiving i-th TD;
 ( ,  ) – the effectiveness of the application of the i-th threat to neutralize the j-th threat.
          </p>
          <p>To build a mathematical model, we enter the variable p(i,j) equal to 1 if the jth threat is detected by
the ith - TD and 0 otherwise.</p>
          <p>We believe that informational threats are not related to each other. The task is to find the maximum
effect from the detection of threats U with the help of the declared in the system of TD A, subject to
restrictions on the total amount of expenses C.</p>
          <p>Taking into account the obtained analytical expressions, the optimization problem of determining
the best structure of the integrated security system is presented in the form of the following ratio:
with restrictions</p>
          <p>=1  =1

∑   ∗ 
∑ ∑  е ( ,  )  ( ,  ) → 

 ∈
 ( ,  ) ∈ (1,0)
∑  ( ,  ) ≤ 
(7)
(8)</p>
          <p>
            Modern object protection systems can use several information transmission channels to increase
reliability. It can be a wired or Wi-Fi channel, or one or more mobile communication channels using
different operators [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ]. In addition, in the case of using wireless communication, the main and
additional data transmission channels on different frequency bands can be provided.
          </p>
          <p>To investigate the effectiveness of the proposed approach and mathematical model, we will use the
modern equipment of the Ajax security system. It represents the basic security alarm kits on the market,
which are necessary for the technical protection of the object. The main components of the kit are a
control panel, wireless motion, and opening detectors, and a key fob. Based on this set, by adding the
necessary elements, depending on the complexity of the object, you can form the required integrated
security system. These sets differ in various parameters and characteristics of the devices included in
the composition. In addition, video cameras from most modern manufacturers can be added to the
system. Thus, we get a modern integrated security system (ISS).</p>
          <p>By the proposed mathematical model, the probability of detecting an object   is determined by
motion sensors and partially by video cameras, the probability of correct classification   is determined
by video cameras, the operator, and the capabilities of special software, the probability characterizing
the timeliness of information processing in the signal recognition path   is determined by the operator
and the capabilities of special software, the probability of execution characterizing the timeliness of
information output via the communication channel   ℎ is determined by the state and number of
channels In addition, each element is characterized by a failure probability, which is approximately
equal to   .</p>
          <p>Table 1 shows the main characteristics of the elements of the basic set of the integrated security
system (ISS). By the proposed mathematical model, the probability of detecting an object   is
determined by motion sensors and partially by video cameras, the probability of correct classification
  is determined by video cameras, the operator, and the capabilities of special software, the probability
characterizing the timeliness of information processing in the signal recognition path   is determined
by the operator and the capabilities of special software, the probability of execution characterizing the
timeliness of information output via the communication channel   ℎ is determined by the state and
number of channels In addition, each element is characterized by a failure probability, which is
approximately equal to   .</p>
          <p>Table 3 shows the main characteristics of the elements of the basic set of the integrated security
system (ISS).</p>
        </sec>
      </sec>
      <sec id="sec-6-7">
        <title>Ajax StarterKit Cam Ajax StarterKit Cam Plus</title>
      </sec>
      <sec id="sec-6-8">
        <title>Approximate probability values of the relevant parameters are presented in Table 4.</title>
        <p>To obtain realistic values, it is necessary to conduct a study of each specific device (which is partially
done in production) and use expert groups. The price of each set is presented in conventional units.</p>
        <p>A graph of the dependence of the allowable costs of protection C on the efficiency of a given ISS is
shown in Fig. 2.</p>
        <p>The analysis of the data in Table 4 and the graph in Fig. 2 shows the value and nature of changes in
the components of the security system depending on the probability indicators and, accordingly, the
costs. Thus, when using a motion detector without photo verification, the values of   ,  
will be the
lowest, and with only two communication channels in the central unit, the value of   ℎ will also be
minimal, which determines the lowest efficiency indicator and, accordingly, the lowest costs. The use
of security system elements with better performance leads to an increase in costs, but also an
improvement in efficiency. At the same time, the proposed mathematical model makes it possible to
determine the weight of the improvement of the efficiency indicator when selecting the necessary
elements. For example, increasing the resolution of the video camera to 4 and 8MP in variants 4 and 5
(Table 4) leads to a slower improvement in the efficiency indicator than in the first three variants.</p>
        <p>
          Paper [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] proposes an algorithm for finding the optimal combination of physical protection means
and the mathematical model is supposed to minimize the cost of organizing a security system.
        </p>
        <p>In contrast, the proposed mathematical model makes it possible to find the best set of components
of an integrated security system at limited costs based on quantitative indicators characterizing the
quality of the main functions of the devices. This, in turn, more accurately takes into account the
specifics of each device and its contribution to the overall optimization process.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>4. Conclusions</title>
      <p>Thus, the considered approach to assessing the quality of the functioning of the technical component
in automated security systems, based on the use of the proposed probabilistic indicators, allows for the
analysis of devices of CTT from the position of an element of an automated information system. The
proposed analytical expressions make it possible to evaluate the effectiveness of the work of the CTT
within the framework of the implementation of the assigned tasks, taking into account the reliability of
their structures and probability indicators of information elements.</p>
      <p>As an efficiency indicator, it is proposed to use a complex parameter determined by the probabilities
of correct detection and classification of the object, timeliness of information processing, and fault-free
operation of both primary sensors and information transmission channels.</p>
      <p>To evaluate the effectiveness of the security system, it is suggested to use an optimization approach.
It allows you to determine the optimal ISS structure with the necessary restrictions that are characteristic
of this enterprise (cost, reliability, number of security lines, etc.). The optimization problem can be
solved by the methods of Balash or parametric programming.</p>
      <p>It is known that the probability of correct detection and classification is affected by a large number
of factors (time of day, weather conditions, distance to the object, etc.). One of the solutions to this
issue can be the application of the theory of fuzzy sets.</p>
    </sec>
    <sec id="sec-8">
      <title>5. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>I.K.</given-names>
            <surname>Olarewaju</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.E.</given-names>
            <surname>Ayodele</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.O.</given-names>
            <surname>Michael</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.S.</given-names>
            <surname>Alaba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.O.</given-names>
            <surname>Abiodun</surname>
          </string-name>
          ,
          <source>Design and Construction of an Automatic Home Security System Based on GSM Technology and Embedded Microcontroller Unit</source>
          ,
          <source>American Journal of Electrical and Computer Engineering</source>
          ,
          <volume>1 1</volume>
          (
          <issue>2017</issue>
          )
          <fpage>25</fpage>
          -
          <lpage>32</lpage>
          . doi:
          <volume>10</volume>
          .11648/j.ajece.
          <volume>20170101</volume>
          .14
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>I.I. Yenina.</surname>
          </string-name>
          <article-title>Processing of signals in case of unauthorized intrusions into the protected object, Scientific notes: a collection of scientific works</article-title>
          ,
          <volume>19</volume>
          (
          <year>2016</year>
          )
          <fpage>158</fpage>
          -
          <lpage>162</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>N.M.</given-names>
            <surname>Lobanchykova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.A.</given-names>
            <surname>Pilkevych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Korchenko</surname>
          </string-name>
          ,
          <article-title>Analysis and protection of IoT systems: Edge computing and decentralized decision-making</article-title>
          ,
          <source>Journal of Edge Computing, 1</source>
          <volume>1</volume>
          (
          <issue>2022</issue>
          )
          <fpage>55</fpage>
          -
          <lpage>67</lpage>
          . doi:
          <volume>10</volume>
          .55056/jec.573
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ključnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Mura</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sklenár</surname>
          </string-name>
          ,
          <article-title>Information security management in SMEs: factors of success</article-title>
          ,
          <source>Entrepreneurship and Sustainability Issues</source>
          ,
          <volume>6 4</volume>
          (
          <issue>2019</issue>
          )
          <fpage>2081</fpage>
          -
          <lpage>2094</lpage>
          . doi:
          <volume>10</volume>
          .9770/jesi.
          <year>2019</year>
          .
          <volume>6</volume>
          .
          <issue>4</issue>
          (
          <issue>37</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>I. I.</given-names>
            <surname>Yenina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. P.</given-names>
            <surname>Pleshkov</surname>
          </string-name>
          ,
          <article-title>Integration of technical means in perimeter security alarm systems, Scientific notes: a collection of scientific works</article-title>
          ,
          <volume>19</volume>
          (
          <year>2016</year>
          )
          <fpage>176</fpage>
          -
          <lpage>180</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kaur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Khairwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Jain</surname>
          </string-name>
          ,
          <article-title>Home automation and security system</article-title>
          ,
          <source>Advanced Computational Intelligence: An International Journal (ASCII)</source>
          ,
          <volume>3 3</volume>
          (
          <issue>2016</issue>
          )
          <fpage>17</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.C</given-names>
            <surname>Nwalozie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.N</given-names>
            <surname>Aniedu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.S.</given-names>
            <surname>Nwokoye</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.E</surname>
          </string-name>
          ,Abazuonu,
          <article-title>Enhancing Home Security Using SMS-based Intruder Detection System</article-title>
          ,
          <source>International Journal of Computer Science and Mobile Computing. 4 6</source>
          (
          <issue>2015</issue>
          )
          <fpage>1177</fpage>
          -
          <lpage>1184</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>W.</given-names>
            <surname>Zeng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Koutny</surname>
          </string-name>
          ,
          <article-title>Modelling and analysis of corporate efficiency and productivity loss associated with enterprise information security technologies</article-title>
          ,
          <source>Journal of Information Security and Applications</source>
          ,
          <volume>49</volume>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1016/j.jisa.
          <year>2019</year>
          .
          <volume>102385</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Toliupa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ya. Samokhvalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. V.</given-names>
            <surname>Tsiopa</surname>
          </string-name>
          ,
          <article-title>Complex information protection systems of special objects and their assessment methodology</article-title>
          ,
          <source>Modern Information Security</source>
          ,
          <volume>1</volume>
          (
          <year>2014</year>
          )
          <fpage>81</fpage>
          -
          <lpage>88</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>H.M. Rozorinov</surname>
            ,
            <given-names>I.A.</given-names>
          </string-name>
          <string-name>
            <surname>Sirchenko</surname>
          </string-name>
          ,
          <article-title>An expert estimation of efficiency of the information defense systems application in the networks of audiovisual content distribution</article-title>
          , Scientific notes of Taurida National V.I. Vernadsky University. Series:
          <source>Technical Sciences 6</source>
          (
          <year>2022</year>
          )
          <fpage>48</fpage>
          -
          <lpage>52</lpage>
          . doi:
          <volume>10</volume>
          .32782/
          <fpage>2663</fpage>
          -
          <lpage>5941</lpage>
          /
          <year>2022</year>
          .6/09
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>N. R.</given-names>
            <surname>Hansen</surname>
          </string-name>
          ,
          <source>Probability Theory and Statistics</source>
          , Department of Mathematical Sciences University of Copenhagen,
          <year>November 2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Bhadane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. D.</given-names>
            <surname>Wani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Shukla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Yeole</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          <article-title>Review on Home Control Automation Using GSM and Bluetooth</article-title>
          ,
          <source>International Journal of Advanced Research in Computer Science and Software Engineering. 5</source>
          <volume>2</volume>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yu. Fedorov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Khalizev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.S.</given-names>
            <surname>Tarasov</surname>
          </string-name>
          ,
          <article-title>Choosing technical components of the physical protection system of objects</article-title>
          , IOP Conference Series: Materials Science and Engineering. IOP Publishing,
          <volume>1227 1</volume>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1088/
          <fpage>1757</fpage>
          -899X/1227/1/012008
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>