Abstract

It was found that search engines provide a wide selection of detectors with technical characteristics. A significant range of characteristics ensures the use of detectors for solving problems in security systems. A search and sorting mode for security system alarms has been developed. It is based on the necessary and sufficient characteristics of detectors, which ensure their selection depending on the tasks set for security systems. Criteria for their selection are formed on the basis of user requirements and technical characteristics of detectors. Priorities of criteria for the selection of security system detectors have been introduced. The model creates an ordered list of notifiers that meet the specified criteria. Each notifier of the list is assigned a unique individual number. According to the importance of the criteria, the notifiers are ranked, the number of iterations of which depends on the number of selected criteria. a The maximum change in position of the list detector is defined as the ratio of the number of list detectors to the priority number of the criterion. The application of the developed model for the selection of security system alarms is provided as an example. In the first iteration, the ranking of alarms depends on the type of the first criteria field, which can be descriptive or numerical. If the field with the criterion is descriptive, its content is verified and the alarms are sorted. Otherwise, the alarms are ranked by the value of the alarm parameter. The permissible ranking of alarms covers all positions in the table. For all other criteria, the maximum change in the positions of the alarms depends both on the value of the criterion and on the priority of the criterion, which limits the maximum change in positions. After all the rankings, at the top of the formed list is an alarm with one of the best first, second, and fourth criteria. The third criterion meets the consumer's request. According to the fifth criterion, this sensor is average. Considering the development of ranking technologies, the relation-based ranking may not meet the needs of customers. At the same time, tools and methods for the potential hacking of alarms are evolving. Therefore, in further research, an alternative to ranking by criteria is proposed, but not by criteria relations, but by user choice. This information technology will influence the ranking of the list depending on the compromises on the criteria.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.