Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2019

01-12-2019

Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems

Authors: Sh. G. Magomedov, V. P. Los’

Published in: Automatic Control and Computer Sciences | Issue 8/2019

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The paper is devoted to the problem of improving the performance of microprocessors used in access control systems. We allocate requirements and propose a variant of the composition of instructions that are necessary for the high-quality design of microprocessors (operating through a residue number system, for access control), which are aimed at improving their performance in the composition of an access control system.
Literature
1.
go back to reference Magomedov, Sh.G. and Shamkhalov, F.I., Features of the use of microprocessor devices in access control systems, Prom. ASU Kontrollery, 2018, no. 3, pp. 16–19. Magomedov, Sh.G. and Shamkhalov, F.I., Features of the use of microprocessor devices in access control systems, Prom. ASU Kontrollery, 2018, no. 3, pp. 16–19.
3.
go back to reference https://ru.wikipedia.org/wiki/Математический_сопроцессор. https://ru.wikipedia.org/wiki/Математический_сопроцессор.
4.
go back to reference Osinin, I.P., Modular-logarithmic coprocessor for mass arithmetic calculations, Vestn. Yuzhno-Ural. Gos. Univ.,Ser.: Vychisl. Mat. Inf., 2017, vol. 6, no. 2, pp. 22–36. Osinin, I.P., Modular-logarithmic coprocessor for mass arithmetic calculations, Vestn. Yuzhno-Ural. Gos. Univ.,Ser.: Vychisl. Mat. Inf., 2017, vol. 6, no. 2, pp. 22–36.
5.
go back to reference The Basic System of Microprocessor Instructions. https://prog-cpp.ru/asm-command/#mov. The Basic System of Microprocessor Instructions. https://​prog-cpp.​ru/​asm-command/​#mov.
6.
go back to reference Magomedov, Sh.G., Morozova, T.Yu., and Akimov, D.A., Ensuring the security of data transmission in computer networks based on the use of systems of residual classes, Probl. Inf. Bezop., Komp’yut. Sist., 2016, no. 3, pp. 43–47. Magomedov, Sh.G., Morozova, T.Yu., and Akimov, D.A., Ensuring the security of data transmission in computer networks based on the use of systems of residual classes, Probl. Inf. Bezop., Komp’yut. Sist., 2016, no. 3, pp. 43–47.
7.
go back to reference Chervyakov, N.I., Modulyarnye parallel’nye vychislitel’nye struktury neiroprotsessornykh sistem (Modular Parallel Computing Structures of Neuroprocessor Systems), Moscow: Fizmatlit, 2003. Chervyakov, N.I., Modulyarnye parallel’nye vychislitel’nye struktury neiroprotsessornykh sistem (Modular Parallel Computing Structures of Neuroprocessor Systems), Moscow: Fizmatlit, 2003.
8.
go back to reference Omondi, A., Residue Number System: Theory and Implementation, London: Imperial College Press, 2007.CrossRef Omondi, A., Residue Number System: Theory and Implementation, London: Imperial College Press, 2007.CrossRef
9.
go back to reference Kogel'man, L.G. and Artozei, E.A., A model of information security system. An access control system, Sovrem. Inf. Tekhnol., 2016, no. 23, pp. 94–98. Kogel'man, L.G. and Artozei, E.A., A model of information security system. An access control system, Sovrem. Inf. Tekhnol., 2016, no. 23, pp. 94–98.
10.
go back to reference Kazantsev, I.S., Methods for identification and authentication of the operator in modern systems for monitoring and controlling access to information, Sovrem. Tendentsii Razvit. Nauki Tekhnol., 2016, no. 5-3, pp. 63–66. Kazantsev, I.S., Methods for identification and authentication of the operator in modern systems for monitoring and controlling access to information, Sovrem. Tendentsii Razvit. Nauki Tekhnol., 2016, no. 5-3, pp. 63–66.
11.
go back to reference Omondi, A. and Premkumar, B., Advances in Computer Science and Engineering: Texts, vol. 2: Residue Number System. Theory and Implementation, London: Imperial College Press, 2007.CrossRef Omondi, A. and Premkumar, B., Advances in Computer Science and Engineering: Texts, vol. 2: Residue Number System. Theory and Implementation, London: Imperial College Press, 2007.CrossRef
12.
go back to reference Pankov, V., The effectiveness of incentive mechanism, and the potential level of satisfaction of the needs of the employee, Russ. J. Technol., 2015, no. 4, pp. 288–291. Pankov, V., The effectiveness of incentive mechanism, and the potential level of satisfaction of the needs of the employee, Russ. J. Technol., 2015, no. 4, pp. 288–291.
13.
go back to reference Zegzhda, P.D., Anisimov, V.G., Suprun, A.F., Anisimov, E.G., and Saurenko, T.N., Models and a decision support method for ensuring information security of information control systems, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 1, pp. 43–47. Zegzhda, P.D., Anisimov, V.G., Suprun, A.F., Anisimov, E.G., and Saurenko, T.N., Models and a decision support method for ensuring information security of information control systems, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 1, pp. 43–47.
Metadata
Title
Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems
Authors
Sh. G. Magomedov
V. P. Los’
Publication date
01-12-2019
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2019
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411619080182

Other articles of this Issue 8/2019

Automatic Control and Computer Sciences 8/2019 Go to the issue