Increasing the Efficiency of Microprocessors in an Access Control Systems

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    This paper is devoted to the problem of improving the performance of microprocessors used in access control systems. The requirements are described, and a set of commands is proposed, that are necessary for efficient design of microprocessors working on the basis of the residue number system for the purpose of monitoring and access control. The proposed approach is aimed at improving the efficiency of microprocessor operation as part of the access control system.

     

     


  • Keywords


    function, microprocessor, commands, system, modular.

  • References


      [1] Magomedov Sh. Organization of secured data transfer in computers using sign-value notation//ITM Web of Conferences. 2017. Т. 10 DOI: 10.1051/itmconf/20171004004

      [2] Magomedov Sh.G. Classification of access boundaries and associated factors of influence in the access control system / Bulletin of the Astrakhan State Technical University. Series: Management, Computer Science and Informatics. 2018. № 1. P. 62-70. DOI: 10.24143 / 2072-9502-2018-1-62-70

      [3] https://en.wikipedia.org/wiki/Mathematical_Supcessor

      [4] Osinin I.P. Modular-Logarithmic Coprocessor for Mass Arithmetic Computations / Bulletin of South-Ural State University. Series: Computational Mathematics and Informatics. 2017. T. 6. № 2. P. 22-36.

      [5] The basic system of commands of the microprocessor // https://prog-cpp.ru/asm-command/#mov

      [6] Magomedov Sh.G., Morozova T.Yu., Akimov D.A. Ensuring the security of data transmission in computer networks based on the use of residual class systems / Information Security Problems. Computer systems. 2016. № 3. P. 43-47.

      [7] Chervyakov N.I. Modular structure of the parallel computing systems neuroprocessor. 288 p. Moscow, Publishing Fizmatlit.

      [8] Omondi A. Residue Number System: Theory and Implementation. London: Imperial College Press, 2007. 312 p.

      [9] Kogelman LG, Artozey E.A. Model of information security system. access control system / Modern information technologies. 2016. No. 23. P. 94-98.

      [10] Kazantsev IS Methods of identification and authentication of the operator in modern systems for monitoring and controlling access to information / Current trends in the development of science and technology. 2016. № 5-3. Pp. 63-66.

      [11] Omondi A., Premkumar B. Advances in Computer Science and Engineering: Texts. Vol. 2 Residue number system. Theory and Implementation. London: Imperial College Press, 2007. 296 p


 

View

Download

Article ID: 23318
 
DOI: 10.14419/ijet.v7i4.36.23318




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.