Mathematical Model of a Radiobeam Detection System Signal
DOI:
https://doi.org/10.64915/RADAP.2025.102.%25pKeywords:
detection, radiobeam, perimeter security means, mathematical modelAbstract
This paper presents the development of a mathematical model of the information signal of a radiobeam detection system for studying the factors influencing its parameters. The model is based on the Huygens–Fresnel principle. The intruder is represented by an equivalent rectangle, which sequentially occludes certain regions of the wave phase front during movement. The information signal is defined as the normalized difference between the field strength in the absence of the intruder model and the field strength in its presence and motion. The mathematical model of the information signal was verified by physical simulation at a frequency of 9.3 GHz using a R2-61 panoramic VSWR meter, standard horn antennas, and metal plates of various sizes that were moved across the detection zone.
The model demonstrated good agreement with experimental data, allowing its application for predicting the waveform of information signals. A series of computational experiments was performed for frequencies of 10.5 GHz, 5.8 GHz, 2.5 GHz, and 1.0 GHz for a 50 m security perimeter. Three intruder movement scenarios were analyzed: upright, bent over, and crawling. It was shown that at higher frequencies (10.5 GHz), the signal during crawling exhibits a positive increment, creating a risk of undetected intruder crossing in systems configured to trigger on negative increments. Lowering the frequency to 5.8 GHz and 2.5 GHz provides more stable negative increments at slightly reduced signal amplitude. At 1.0 GHz, a significant reduction in the signal level is observed. The proposed mathematical model of the information signal accounts for the operating frequency, antenna spacing, intruder geometry, its position, and movement method. This makes it possible to create a database of signals for a specific security perimeter, enabling the use of correlation-based signal processing methods. The obtained results allow selecting the optimal frequency range for a given security perimeter, reducing the volume of experimental testing on a security perimeter, and improving information signal processing algorithms, which will enhance detection reliability and reduce the number of false alarms.
References
References
1. Yevseiev, S., Melenti, Y., Voitko, O., Hrebeniuk, V., Korchenko, A., et al. (2021). Development of a concept for building a critical infrastructure facilities security system. Eastern-European Journal of Enterprise Technologies, Vol. 3, No. 9(111), pp. 63–83. DOI: 10.15587/1729-4061.2021.233533.
2. Armstrong D. and Peile C. (2005). Perimeter intruder detection systems performance standard. Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, pp. 33-36. DOI: 10.1109/CCST.2005.1594845.
3. U.S. Department of Homeland Security, Science and Technology Directorate. (2025, April 10). Perimeter intrusion detection sensors., date of access: 8 August 2025.
4. 100 m Microwave Bistatic Sensor FMW-100 – Forteza. Ornicom, date of access: 10 August 2025.
5. 500 m Microwave Bistatic Sensor FORTEZA-500 – Forteza. Ornicom, date of access: 10 August 2025.
6. Gong, X., Zhang, J. and Cochran, D. (2012). A Coverage Theory of Bistatic Radar Networks: Worst-Case Intrusion Path and Optimal Deployment. arXiv, 11(19), 3080. DOI: 10.48550/arXiv.1206.1355.
7. Xu, X., Zhao, C., Ye, T. and Gu, T. (2019). Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage. Sensors, Vol. 19, Iss. 2, Article 225. DOI: 10.3390/s19020225.
8. Redpath, G. (2016, May). Reducing perimeter false alarms. SMART Security Solutions, date of access: 12 August 2025.
9. Blacksmith P., Poirier J. L. and Holt F. S. (1979). Radar intrusion detection system. U.S. Patent No. 4,132,988A. U.S. Patent and Trademark Office.
10. Ludlow, P., Redpath, G. and Seawright, S. (2016). Bidirectional bistatic radar perimeter intrusion detection system (U.S. Patent Application No. US20160178741A1). United States Patent and Trademark Office.
11. Griffiths, D. J. (2023). Introduction to Electrodynamics (5th ed.). Cambridge University Press, 602 р.
12. Kakani, S. L. (2020). Electrodynamics: Classical and Quantum. CBS Publishers and Distributors, 944 р.
13. Willis, N. J. (2005). Bistatic Radar, (2nd ed.). IET, 337 р.
14. Tekinerdogan, B., Özcan, K., Yağız, S. and Yakın, İ. (2021). Feature-Driven Survey of Physical Protection Systems. arXiv. DOI: 10.48550/arXiv.2104.00949.
15. Tripathi, D., Tripathi, A. K., Singh, L. K., Chaturvedi, A. (2022). Towards analyzing the impact of intrusion prevention and response on cyber-physical system availability: A case study of NPP. Annals of Nuclear Energy, Vol. 168, 108863. DOI: 10.1016/j.anucene.2021.108863.
16. Villegas-Ch, W. and García-Ortiz, J. (2023). Authentication, access, and monitoring system for critical areas with the use of artificial intelligence integrated into perimeter security in a data center. Frontiers in Big Data, Vol. 6, Article 1200390. DOI: 10.3389/fdata.2023.1200390.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 В. Г. Сторож, С. Є. Фабіровський, І. Н. Прудиус, Ю. М. Матієшин, В. І. Оборжицький, Р. М. Гурмач

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).