2016
DOI: 10.4028/www.scientific.net/kem.685.148
|View full text |Cite
|
Sign up to set email alerts
|

Initial Data Forming for Process Simulation in System “Intruder – Physical Protection System”

Abstract: The article describes basic approaches to conducting an efficiency assessment of a nuclear object physical protection system as well as the possibility of creation of the intruder analytical model to determine time indicators of overcoming nuclear object protection boundaries by an intruder with defined characteristics. An intruder uses different tactics and methods to overcome boundaries of protection. A multivariate analysis lays in a basis of research that taking into account psycho-physiological and physic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 3 publications
(4 reference statements)
0
2
0
Order By: Relevance
“…Work of the complex is based on the simulation of interaction "attacker -security system" with regards of characteristics of both [5]. The main functions of the complex are performed by a special The software configuration is designed in the form of target blocks -units, which are allocated according to the performing tasks [6].…”
Section: Basic Elements Of the Analytical Complexmentioning
confidence: 99%
“…Work of the complex is based on the simulation of interaction "attacker -security system" with regards of characteristics of both [5]. The main functions of the complex are performed by a special The software configuration is designed in the form of target blocks -units, which are allocated according to the performing tasks [6].…”
Section: Basic Elements Of the Analytical Complexmentioning
confidence: 99%
“…These results characterize the accuracy and speed of the executed operator's procedures. In setting the initial data for modeling the interaction in the system "intruder -security" for the effective working of the operator takes time and the probability of successful performance of the task for an adjustable time interval [6].…”
Section: Effectiveness Evaluationmentioning
confidence: 99%