Research Article
Mathematical Approach to Security Risk Assessment
Table 2
The gate parameters (an example).
| Zone number | Gate number | Gate type | Probability of detection inwards | Probability of detection outwards | Inward penetration time s | Outward penetration time s | m | m |
| TO | | | 0.410 | 0.400 | 26 | 25 | 207 | 114 | 1 | 1 | G | 0.350 | 0.340 | 29 | 27 | 213 | 71 | 1 | 2 | G | 0.350 | 0.340 | 29 | 27 | 209 | 148 | 1 | 3 | R | 0.280 | 0.300 | 33 | 31 | 185 | 101 | 1 | 4 | R | 0.360 | 0.340 | 31 | 31 | 194 | 100 | 1 | 5 | R | 0.390 | 0.370 | 41 | 43 | 186 | 148 | 1 | 6 | R | 0.410 | 0.450 | 35 | 38 | 180 | 135 | 1 | 7 | R | 0.360 | 0.340 | 36 | 38 | 181 | 114 | 2 | 1 | G | 0.340 | 0.360 | 35 | 32 | 145 | 155 | 2 | 2 | G | 0.350 | 0.360 | 31 | 34 | 161 | 72 | 2 | 3 | G | 0.340 | 0.360 | 35 | 32 | 159 | 188 | 2 | 4 | R | 0.340 | 0.360 | 29 | 27 | 186 | 71 | 2 | 5 | R | 0.420 | 0.390 | 31 | 32 | 220 | 71 | 2 | 6 | R | 0.380 | 0.340 | 28 | 24 | 213 | 155 | 2 | 7 | R | 0.390 | 0.340 | 40 | 38 | 179 | 155 | 3 | 1 | G | 0.410 | 0.380 | 35 | 34 | 32 | 115 | 3 | 2 | G | 0.380 | 0.350 | 29 | 28 | 165 | 31 | 3 | 3 | G | 0.410 | 0.380 | 35 | 34 | 159 | 188 | 3 | 4 | R | 0.400 | 0.390 | 34 | 36 | 123 | 32 | 3 | 5 | R | 0.370 | 0.360 | 28 | 26 | 233 | 36 | 3 | 6 | R | 0.390 | 0.340 | 28 | 23 | 217 | 179 | 3 | 7 | R | 0.280 | 0.290 | 26 | 28 | 101 | 182 |
|
|