Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2019

01.12.2019

Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems

verfasst von: Sh. G. Magomedov, V. P. Los’

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2019

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The paper is devoted to the problem of improving the performance of microprocessors used in access control systems. We allocate requirements and propose a variant of the composition of instructions that are necessary for the high-quality design of microprocessors (operating through a residue number system, for access control), which are aimed at improving their performance in the composition of an access control system.
Literatur
1.
Zurück zum Zitat Magomedov, Sh.G. and Shamkhalov, F.I., Features of the use of microprocessor devices in access control systems, Prom. ASU Kontrollery, 2018, no. 3, pp. 16–19. Magomedov, Sh.G. and Shamkhalov, F.I., Features of the use of microprocessor devices in access control systems, Prom. ASU Kontrollery, 2018, no. 3, pp. 16–19.
3.
Zurück zum Zitat https://ru.wikipedia.org/wiki/Математический_сопроцессор. https://ru.wikipedia.org/wiki/Математический_сопроцессор.
4.
Zurück zum Zitat Osinin, I.P., Modular-logarithmic coprocessor for mass arithmetic calculations, Vestn. Yuzhno-Ural. Gos. Univ.,Ser.: Vychisl. Mat. Inf., 2017, vol. 6, no. 2, pp. 22–36. Osinin, I.P., Modular-logarithmic coprocessor for mass arithmetic calculations, Vestn. Yuzhno-Ural. Gos. Univ.,Ser.: Vychisl. Mat. Inf., 2017, vol. 6, no. 2, pp. 22–36.
5.
Zurück zum Zitat The Basic System of Microprocessor Instructions. https://prog-cpp.ru/asm-command/#mov. The Basic System of Microprocessor Instructions. https://​prog-cpp.​ru/​asm-command/​#mov.
6.
Zurück zum Zitat Magomedov, Sh.G., Morozova, T.Yu., and Akimov, D.A., Ensuring the security of data transmission in computer networks based on the use of systems of residual classes, Probl. Inf. Bezop., Komp’yut. Sist., 2016, no. 3, pp. 43–47. Magomedov, Sh.G., Morozova, T.Yu., and Akimov, D.A., Ensuring the security of data transmission in computer networks based on the use of systems of residual classes, Probl. Inf. Bezop., Komp’yut. Sist., 2016, no. 3, pp. 43–47.
7.
Zurück zum Zitat Chervyakov, N.I., Modulyarnye parallel’nye vychislitel’nye struktury neiroprotsessornykh sistem (Modular Parallel Computing Structures of Neuroprocessor Systems), Moscow: Fizmatlit, 2003. Chervyakov, N.I., Modulyarnye parallel’nye vychislitel’nye struktury neiroprotsessornykh sistem (Modular Parallel Computing Structures of Neuroprocessor Systems), Moscow: Fizmatlit, 2003.
8.
Zurück zum Zitat Omondi, A., Residue Number System: Theory and Implementation, London: Imperial College Press, 2007.CrossRef Omondi, A., Residue Number System: Theory and Implementation, London: Imperial College Press, 2007.CrossRef
9.
Zurück zum Zitat Kogel'man, L.G. and Artozei, E.A., A model of information security system. An access control system, Sovrem. Inf. Tekhnol., 2016, no. 23, pp. 94–98. Kogel'man, L.G. and Artozei, E.A., A model of information security system. An access control system, Sovrem. Inf. Tekhnol., 2016, no. 23, pp. 94–98.
10.
Zurück zum Zitat Kazantsev, I.S., Methods for identification and authentication of the operator in modern systems for monitoring and controlling access to information, Sovrem. Tendentsii Razvit. Nauki Tekhnol., 2016, no. 5-3, pp. 63–66. Kazantsev, I.S., Methods for identification and authentication of the operator in modern systems for monitoring and controlling access to information, Sovrem. Tendentsii Razvit. Nauki Tekhnol., 2016, no. 5-3, pp. 63–66.
11.
Zurück zum Zitat Omondi, A. and Premkumar, B., Advances in Computer Science and Engineering: Texts, vol. 2: Residue Number System. Theory and Implementation, London: Imperial College Press, 2007.CrossRef Omondi, A. and Premkumar, B., Advances in Computer Science and Engineering: Texts, vol. 2: Residue Number System. Theory and Implementation, London: Imperial College Press, 2007.CrossRef
12.
Zurück zum Zitat Pankov, V., The effectiveness of incentive mechanism, and the potential level of satisfaction of the needs of the employee, Russ. J. Technol., 2015, no. 4, pp. 288–291. Pankov, V., The effectiveness of incentive mechanism, and the potential level of satisfaction of the needs of the employee, Russ. J. Technol., 2015, no. 4, pp. 288–291.
13.
Zurück zum Zitat Zegzhda, P.D., Anisimov, V.G., Suprun, A.F., Anisimov, E.G., and Saurenko, T.N., Models and a decision support method for ensuring information security of information control systems, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 1, pp. 43–47. Zegzhda, P.D., Anisimov, V.G., Suprun, A.F., Anisimov, E.G., and Saurenko, T.N., Models and a decision support method for ensuring information security of information control systems, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 1, pp. 43–47.
Metadaten
Titel
Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems
verfasst von
Sh. G. Magomedov
V. P. Los’
Publikationsdatum
01.12.2019
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2019
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411619080182

Weitere Artikel der Ausgabe 8/2019

Automatic Control and Computer Sciences 8/2019 Zur Ausgabe

Neuer Inhalt