Implementation of Secure Traffic Light Management Using a Neuromorphic Computing Base Based on Fuzzy Graphs
( Pp. 11-16)

More about authors
Volosova Aleksandra V. Cand. Sci. (Eng.), Associate Professor; associate professor
Bauman Moscow State Technical University
Moscow, Russian Federation Matyukhina Ekaterina N. Cand. Sci. (Eng.), Associate Professor; associate professor
Moscow Automobile and Road State Technical University (MADI)
Moscow, Russian Federation Morozov Egor A. Moscow Automobile and Road State Technical University (MADI); Moscow, Russian Federation.
Abstract:
The task of safe traffic light management is to normalize traffic. Secure management involves the implementation of the protection of information involved in the management process. The traffic light management process is a complex dynamic process. The control object is a set of traffic lights. The subject of management is a specific management system, which can be autonomous or part of a top-level management system. The implementation of a traffic light based on a neuromorphic computing base allows you to perform some of the control processes in automatic mode. As part of the control process, you have to deal with different types of data (sensor readings, control signals of different levels, etc.). Big data is processed throughout the entire control process, and one of the main tasks is to reduce the dimensionality of the information being processed. The successful solution of this problem directly depends on the model of organization of a set of traffic lights. The article discusses various traffic lights, each of which is equipped with an intelligent controller. The neuromorphic basis of the intelligent controller allows you to expand the capabilities of the computing base at a low level. Fuzzy graphs are used to represent a set of traffic lights and to connect the traffic lights to the control system. This model makes it possible to combine the information and control components of the process of interaction between the object and the subject of management into one whole. The advantages of this representation are the minimization of information necessary for the successful solution of the problem of safe management, and the expansion of the possibilities of the management process through the use of fuzzy information.
How to Cite:
Volosova A.V., Matyukhina E.N., Morozov E.A. Implementation of Secure Traffic Light Management Using a Neuromorphic Computing Base Based on Fuzzy Graphs. Computational Nanotechnology. 2025. Vol. 12. No. 1. Pp. 11–16. (In Rus.). DOI: 10.33693/2313-223X-2025-12-1-11-16. EDN: LLTELF
Reference list:
Morozov E.A., Volosova A.V. Implementation of intelligent automatic traffic control in urban control zones based on the use of fuzzy models. Computational Nanotechnology. 2023. Vol. 10. No. 4. Pp. 39–45. (In Rus.). DOI: 10.33693/2313-223X-2023-10-4-39-45. EDN: FXSDTS.
Volosova A.V. The use of a tensor model for processing uncertainty in complex dynamical systems. Computational Nanotechnology. 2023. Vol. 10. No. 1. Pp. 79–87. (In Rus.). DOI: 10.33693/2313-223X-2023-10-1-79-87. EDN: UEVWUE.
Maksimychev O.I., Mezentsev K.N., Volosova A.V. Infor­mation and communication technologies and elements of artificial intelligence in intelligent transport systems. World of Transport and Technological Machines. 2023. No. 1-1 (80). Pp. 112–118. (In Rus.). DOI: 10.33979/2073-7432-2023-1(80)-1-112-118. EDN: FZKCDR.
Maksimychev O.I., Volosova A.V., Mezentsev K.N. et al. The use intelligent electronic hitch for vehicle management. In: Intelligent technologies and electronic devices in vehicle and road transport complex. Conference Proceedings TIRVED 2021. DOI: 10.1109/TIRVED53476.2021.9639222. EDN: LRNJVX.
Volosova A.V., Yurchik P.F., Golubkova V.B. et al. Using a digital twin in ultra-large-scale System. In: Intelligent technologies and electronic devices in vehicle and road transport complex. Conference Proceedings TIRVED 2023. DOI: 10.1109/TIRRED58506.2023.10332708.
Keywords:
information security, neuromorphic computing, neuromorphic controller, intelligent controller, fuzzy graphs, smart traffic light.


Related Articles

Multiscale Modeling for Information Control and Processing Pages: 11-20 DOI: 10.33693/2313-223X-2022-9-1-11-20 Issue №20643
A Refined Method for Analytical Modeling of the Processes of Spreading Virus Software to Assess the Security of Informatization Objects
virus software Information system Information Security security threat modeling information security risk assessment
Show more
Public Law Pages: 16-20 DOI: 10.33693/2782-7372-2023-2-2-16-20 Issue №23134
Integrated Approach of Personnel Training for Cybersecurity: Challenges and Problems
digital economy information law intellectual property information security information warfare
Show more
Pages: 16-20 DOI: 10.33693/2782-7372-2023-2-2-16-20 Issue №
Integrated Approach of Personnel Training for Cybersecurity: Challenges and Problems
digital economy information law intellectual property information security information warfare
Show more
Multiscale modeling for information control and processing Pages: 26-37 DOI: 10.33693/2313-223X-2021-8-1-26-37 Issue №18588
The modeling of information security system design processes in state information systems
modeling of information security processes information security information security management graphical modeling methodology of functional graphical modeling
Show more
Mathematical Modeling, Numerical Methods and Complex Programs Pages: 25-34 DOI: 10.33693/2313-223X-2024-11-4-25-34 Issue №173588
Using Graphs to Identify Asset Security Compromises
company assets data loss information security risk assessment threats
Show more
Information Security Pages: 23-38 DOI: 10.33693/2313-223X-2023-10-4-23-38 Issue №47939
The Modeling of Processes of Design of Information Protection Systems in Financial Information Systems
modeling of information security processes information security information security management graphical modeling methodology of functional graphical modeling
Show more
Information Security Pages: 45-55 DOI: 10.33693/2313-223X-2022-9-2-45-55 Issue №21224
The Modeling of Processes of Design of Information Protection Systems in Critical Information Infrastructures
modeling of information security processes information security information security management graphical modeling methodology of functional graphical modeling
Show more
Political Institutions, Processes and Technologies Pages: 49-54 DOI: 10.33693/2223-0092-2025-15-2-49-54 Issue №195081
Dynamics of Information Support for National and Military Security of Turkey at the Present Stage
Turkey national security military security information security foreign policy
Show more
1. NATIONAL ECONOMY AND MANAGEMENT 08.00.05 Pages: 41-45 Issue №19821
Prospects for the Development of Industry 4.0 in the Context of Digitalization of the Russian Economy
digital economy Industry 4.0 cybersecurity digital technologies data protection
Show more
2. PUBLIC LAW (STATE LAW) (5.1.2.) Pages: 48-54 Issue №22137
On Proposals for Improving the Legal Support of Information Security of the Russian Federation in the Context of Sanctions and Threats from Unfriendly States
information security information and telecommunication infrastructure national security cybersecurity legal support
Show more