Abstract
A multiple-valued-logic protected-data coding method is proposed for distant ordering/disordering of a fuzzy logic model accumulated in a robotic agent. Fuzzy-rule-set disordering is a means to realize the distributed logic lock, preventing a hacker from unapproved use of the robotic device itself or its internal data. The multiple-valued-logic protected-data coding is the method used here to increase greatly the secret-key space. Optical-data line is to be used for distant transfer of secret codes between the key and lock devices.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
T. Bräunl, Embedded Robotics. Mobile Robot Design and Applications with Embedded Systems, Springer, Berlin (2006).
A. L. Antipov, A. Yu. Bykovsky, N. A. Vasiliev, and A. A. Egorov, J. Russ. Laser Res., 27, 492 (2006).
A. Yu. Bykovsky, I. V. Vladimirov, and I. N. Kompanets, Radiotekhnika, 1, 110 (2006).
A. L. Antipov, A. Yu. Bykovsky, N. A. Vasiliev, and A. A. Egorov, Opt. Memory Neural Networks, 16, 211 (2007).
B. Ya. Ryabko and A. N. Fionov, Cryptographical Methods of Information Protection [in Russian], Hot Line: Telecom, Moscow (2005).
D. C. Rine (ed.), Computer Science and Multiple-Valued Logic: Theory and Applications, North Holland, Amsterdam (1984)
A. L. Antipov, A. Yu. Bykovsky, N. A. Vasiliev, and A. A. Egorov, Proc. SPIE, 7024, 702403 (2006).
A. L. Antipov, A. Yu. Bykovsky, N. A. Vasiliev, and A. A. Egorov, Izv. Ross. Akad. Nauk, Ser. Fiz., 72, 697 (2008).
L. A. Zadeh, The Concept of a Linguistic Variable and Its Application to Approximate Reasoning, Elsevier, New York (1973).
J. R. Jang, C. T. Sun, and E. Mizutani, Neuro-Fuzzy and Soft Computing. A Computational Approach to Learning and Machine Intelligence, Prentice-Hall, Upper Saddle River, NJ (1973).
A. N. Averkin, I. Z. Batyrshin, A. F. Blishun, et al., Fuzzy Sets in Models of Control and Artificial Intelligence [in Russian], Nauka, Moscow (1986).
A. N. Averkin, A. Yu. Bykovsky, and A. V. Melnik, Proc. SPIE, 3733, 392 (1999).
L. G. Shapiro and G. C. Stockman, Computer Vision, Prentice-Hall, Upper Saddle River, NJ (2001).
H. P. Huang and C. C. Liang, Fuzzy Sets Syst., 127, 49 (2002).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Antipov, A.L., Bykovsky, A.Y. & Egorov, A.A. Data-protection ordering/disordering of a fuzzy logic model in a robotic agent via the optical-data-transfer line. J Russ Laser Res 29, 322–335 (2008). https://doi.org/10.1007/s10946-008-9022-5
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10946-008-9022-5