<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Method of data control in the residue classes</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>V. N. Karazin Kharkiv National University</institution>
          ,
          <addr-line>Svobody sq., 4, Kharkiv, 61022</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Methods of data control in the residue classes are considered in the article. The main advantage of non-positional notation in the residue classes lays in the possibility of an organization of the process of quick implementation of modular arithmetic operations of addition, subtraction and multiplication. The base of the method is the procedure of generating and using the positional indication of non-positional code. That allows increasing efficiency of the procedure of data control granted by the residue classes.</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>Methods of data control</kwd>
        <kwd>the system of the residue classes</kwd>
        <kwd>the positional indications of the non-positional code</kwd>
        <kwd>computer systems and components</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        It is well known, that the main advantage of non-positional notation in the residue
classes (NRC) is laid in the possibility of quick process of organization of modular
arithmetic operations of addition, subtraction and multiplication [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>However, in computer systems for common purpose it is needed to perform
socalled non-modular (position) operations except the above listed arithmetic
operations. The following operations belong to these:
 Arithmetic and algebraic congruence of numbers and its absolute values;
 Sign of number definition;
 Definition of existing of overflow of bit grid of computer system (CS);
 Rounding of value of result of operation;
 Computing the absolute value;
 Division and multiplication of fraction
 Translation of data from code of NRC to positional notation and back;
 Expanding of original NRC (it is an informational process in which familiar
remainders {ai } , that correspond to basis {mi } , define value of remainders with the
same code structure by other additional basis);
 Control, diagnostic and correction mistakes of NRC data, etc.</p>
      <p>
        Generally, all positional operations come down to the procedure of definition of an
index of j numerical  jmi ,  j  1 mi  interval of entering (detecting) of number
А  а1,..., аi–1, аi , аi1,..., an , an1  . It is appropriate to use so-called positional
indications of non-positional code (PINC) to define an index of j numerical interval of
detecting A. The following indications are the most frequently used in NRC (within
existing PINCs) [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]:
 Indications based on the procedure of number’s translating from NRC to PINC;
 Indications based on the procedure of nulevization (reduction to zero polynomial)
(definition of the value of yn1 );
 Indications based on the procedure of expanding given system of basis of NRC;
 Rank r of number A, etc.
      </p>
      <p>
        There are disadvantages of the above-mentioned PINC. At first, it is technical and
time complexity of PINC generating (developing) for given code structure
А  а1,..., аi–1, аi , аi1,..., an , an1  . At second, it is no mean time of implementation
having applied the existing positional indications, non-modular operations in NRC,
specifically, operations of control, diagnostic of correction of data mistakes [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ].
      </p>
      <p>It becomes obvious that the research of developing methods of generating new
PINC in NRC is important; because of them, we can use operatively non-modular
operations. It should be pointed out, population (sequence) of defined modular and
non-modular operations, which are implemented by PINC, can realize any
nonmodular operation.</p>
      <p>Beforehand we will consider the general requirements to PINC, on base of which
in article will be developed method of increasing of operational efficiency of data
control:
 To define exactly correctness and incorrectness of number A in NRC (to define
fact of detecting/not detecting of number A in an informational numerical [0, M ]
 Simplicity</p>
      <p>n
interval, where M   mi ) by used (chosen, developed, generated) PINC;
i1
of generating PINC for given code structure
of
data
А  а1,..., аi–1, аi , аi1,..., an , an1  ;
 Simplicity of using of generated indication for data control in NRC (in general case
for implementing positional operations);
 Indication has to have clear and understandable physical meaning;
 Indication must be analytically described by simple mathematical relator;
 It is possible to technically implement process of data control in NRC by using</p>
    </sec>
    <sec id="sec-2">
      <title>PINC;</title>
      <p> Using the chosen indication of non-positional code has to provide the given fidelity
of data control in NRC;
 PINC using has to provide the possibility of exception from the control procedure,
diagnostic and correction of mistakes in NRC the most difficult positional
operations.</p>
      <p>It is reasonable to develop and research the method of data control in NRC on the
base of PINC using, resulting from the above-mentioned information.
2</p>
      <p>Method of generating of positional indication of
nonpositional code structure of data in NRC</p>
    </sec>
    <sec id="sec-3">
      <title>Looking upon method of generating of PINC (Fig. 1).</title>
      <p>The indication nA forms proceeding from representation of initial code structure
А  а1,..., аi–1, аi , аi1,..., an , an1  , which is represented as NRC
with
basis {mi} , i  1, n 1 , in the way of creating of so-called uniserial code (UC).</p>
    </sec>
    <sec id="sec-4">
      <title>In standard form, UC</title>
      <p>K N(nA )  Z N(A)1 Z N(A)1 ... Z1( A) Z ( A)
0
represents sequence of binary bits, which contains ones and a zero, index of which is
at nA place (the count is performed from right to left, from digit bit Z ( A) to digit bit
0</p>
      <sec id="sec-4-1">
        <title>Z N(A)1). Indication of PINC</title>
        <p>nA
 jmi ,  j  1 mi </p>
        <p>defines an index of j numerical interval
of detecting of number
А  а1,..., аi–1, аi , аi1,..., an , an1  .</p>
        <p>Mathematically PINC nA represents a positive integer, which points out the location
of zero binary bit in the record of UC K N(nA )  Z ( A)  0 .
nA</p>
      </sec>
      <sec id="sec-4-2">
        <title>The procedure of generating UC K N(nA ) lies in the following. A constant</title>
        <p>KH ( A)  a1' ,..., ai'1, ai , ai'1,..., an'1 </p>
        <p>mi
defines in the block of constants of nuvelization (BCN). It is performed by the
definition of remainder ai of number А  а1,..., аi–1, аi , аi1,..., an , an1  for chosen
integer mi of NRC.</p>
        <p>Further, using the chosen constant of nuvelization KH ( A) , we displace number A
mi
on the left edge of the interval  jmi ,  j  1 mi  by implementing operation
Ami  A  KH m(Ai)   a1 , a2 , ..., ai1 , ai , ai1 , ..., an1   a1' , a2' , ..., ai'1 , ai , ai'1 ,..., an'1  
 a1(1) , a2(1) , ..., ai(1)1, 0, ai(1)1 , ..., an(1)1  .</p>
        <sec id="sec-4-2-1">
          <title>Choice informational {mi} , i 1,n and control mk  mn1</title>
        </sec>
        <sec id="sec-4-2-2">
          <title>1. ( mi  mi1 ) basis of residue classes for representing data</title>
          <p>A  (a1,a2,...,ai1,ai,ai1,...,an,an1) , GCD (mi,mj ) 1,i  j .
2.
3.</p>
          <p>Choice of basis mi {mi}, ( j 1,n 1) , by which defines an index of j
numerical interval  jmi,  j 1mi  of detecting number А.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Defining the constant of reducing to zero polynomial</title>
      <p>KHm(A)  (a1' ,a2',...,ai'1,ai,ai'1,...,an',an'1)</p>
      <p>i
by value of remainder ai (by module mi ) of number A.</p>
    </sec>
    <sec id="sec-6">
      <title>Defining the value</title>
      <p>Ami  A KHm(Ai)  a1,a2,...,ai1,ai,ai1,...,an,an1
a1',a2',...,ai'1,ai,ai'1,...,an,an1  a(1),a2(1),...,ai(1)1,0,ai(1)1,...,an(1),an(1)1.
 1</p>
    </sec>
    <sec id="sec-7">
      <title>Defining UC</title>
      <p>n1
K1</p>
      <p>Ki
KN(nA) ZN(A)1 ZN(A)2 ... Z0(A), KN(niA) ZN(Ai)1 ZN(Ai)2 ... Z0(A).</p>
      <p>N   mK , Ni ]M / mi[ , M  mi . Am  KA mi  ZK(AA) .</p>
      <p>i
n
i1
 m  0mi  Z(A),
A
Ami 1...mi  Z(0A),
i</p>
      <p>1

Am  (N  2)mi  ZN(A)2,</p>
      <p>i
Am  (N 1)mi  Z(A)</p>
      <p>i N1.

Am 0mi  Z(A),
Ami 1...mi  Z(0A),
i</p>
      <p>1

Ammi ((NNii 12))mmii ZZ(N(AAi))2.,</p>
      <p>i
A</p>
      <p>Ni1</p>
      <p>Defining PINC nA of number A, which means numerical value of nA for
6 which Z(A)  Z(A)  0 , which means Am  nA mi  0 .</p>
      <p>KA nA i
Herewith Zl(A) 1, (Am l mi  0; l  nA) .</p>
      <p>i
PINC nA has to define the fact of entering or not entering initial number A in the
interval [0, M ) . We have to implement operation
to define the fact of detecting number in numerical informational interval [0, M).</p>
      <p>The operation (1) is carried out simultaneously using the population of N constants
Ami  K A  mi  Z K(AA)
K A  mi  K A  0, N 1 ,
(1)
(2)
(3)
n1
where N   mK :</p>
      <p>K 1</p>
      <p>K i
which means
value</p>
      <p>In this case, UC represents in the view
 mi  0  mi  Z0( A) ,
 A
 AAmi 1 mi  Z1( A) ,
 mi  .2..mi  Z2( A) ,
 Ami  (N  2)  mi  Z N(A)2 ,
 Ami  (N 1)  mi  Z N(A)1.</p>
      <p>K N(nA )  Z N(A)1 Z N(A)2 ... Z1( A) Z ( A)
0
The only value nA from (1) exists in total (2) analytical rations. For nA there is
Z ( A)  Z ( A)  0 (K A  nA ) ,</p>
      <p>K A nA</p>
      <p>Ami  nA  mi  0 .</p>
    </sec>
    <sec id="sec-8">
      <title>The rest of values (2) equal</title>
      <p>Zl( A)  1 ( Ami  l  mi  0; l  nA ) .</p>
    </sec>
    <sec id="sec-9">
      <title>In the general case, the amount of N binary bits in the record UC</title>
      <sec id="sec-9-1">
        <title>K N(nA ) equal to</title>
        <p>n1
N   mK .</p>
        <p>K 1</p>
        <p>K i</p>
        <p>It should be pointed out, that there is no necessity to have the whole sequence of
values Z ( A) from (3) to define only the fact of the garbling of number ( A  M ) . It is</p>
        <p>K A
enough to have UC K (nA ) with length only Ni ]M / mi[</p>
        <p>Ni
value ]M / mi [ describes the lesser integer of number M / mi ).</p>
        <p>In this case values of variables of numerical intervals  jmi ,  j  1 mi  , which are
out of informational interval 0, M  , make no matter for establishing the fact of
correctness control of number A.
of binary bits (where
3</p>
        <p>Method of operational data control in NRC on base of using
positional indication of non-positional code
The procedure of generating of positional indication of non-positional code (fig. 1)
laid in the base of method of operational data control in residue classes. In that way,
the essence of the method of data control in residue classes lies in the following. For
the controlled code structure А  а1,..., аi–1, аi , аi1,..., an , an1  , which is
represented in residue classes, developed (defined) PINC nA by generating UC</p>
        <p>K N(niA )  Z N(Ai)1 Z N(Ai)2 ... Z1( A) Z0( A)
in view of sequence of Ni binary bits. Choosing of basis mi of NRC is performed by
special-purpose in accordance with defined measures. The constant of nuvelization
KH ( A)  a1', a2' ,..., ai ,..., an' , an'1 </p>
        <p>mi
is selected depending on a result of the value of remainder ai of number A. Further
implementation operation is carried out:</p>
        <p>Ami  A  KH m(Ai)  a1, a2 ,..., ai ,..., an , an1   a1' , a2' ,..., ai ,..., an' , an'1  
 a(1) , a(1)</p>
        <p> 1 2 ,..., 0,..., an(1) , an(1)1  .</p>
        <p>Using Ni constants K A  mi  K A  0, Ni 1 simultaneously the operations of
subtractions Ami  K A  mi are carried out, in the result of which appears the values of
binary bits Z ( A) , so the UC K (nA ) forms.</p>
        <p>K A Ni</p>
        <sec id="sec-9-1-1">
          <title>The values of PINC nA defined from the equation Ami  nA  mi  0 .</title>
          <p>If nA  Ni , number A is considered as a wrong. In the opposite case ( nA  Ni )
number A is correct. In common view, method of data control is represented on Fig. 2.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>Algorithm of defining UC of number</title>
      <sec id="sec-10-1">
        <title>Method of generating of PINC nA :</title>
        <p>Ami  nA  mi  0 , Zn( AA)  0 ; Zl( A)  1, Ami  l  mi  1; l  nA .
Data control A   a1, a2 ,..., ai1, ai , ai1,..., an , an1  in NRC.</p>
      </sec>
      <sec id="sec-10-2">
        <title>If nA &gt; Ni , then number Ã is wrong (garbled).</title>
      </sec>
      <sec id="sec-10-3">
        <title>If nA  Ni , then number А is right (ungarbled).</title>
        <p>we define that nA  9</p>
      </sec>
    </sec>
    <sec id="sec-11">
      <title>By implementation of ratio (2) we form UC</title>
    </sec>
    <sec id="sec-12">
      <title>Resulting from the view of UC and using formula</title>
      <p>K (nA)  K3(99)  {11...110111111111} .</p>
      <p>Ni</p>
      <p>Amn1  nA  mn1  0 ,
( Amn1  nA  mn1  99  9 11  0 ),
meaning Z (A)  Z9(A) .</p>
      <p>nA</p>
      <sec id="sec-12-1">
        <title>Because of Ni  39  nA  9 it means that there is no mistake in data.</title>
        <p>Check: А  100  M  420 (number A is right).
Example 2. Perform control of data A  (00,10, 000, 010,1010) .</p>
      </sec>
    </sec>
    <sec id="sec-13">
      <title>The constant</title>
      <p>KH m(An)1  (01,10, 000, 011,1010)
is selected by value of a5  1010 in BCN (Table 1).</p>
    </sec>
    <sec id="sec-14">
      <title>We deduce that</title>
    </sec>
    <sec id="sec-15">
      <title>Because</title>
      <p> A  KH ( A)  (10, 00, 000,110, 0000) .</p>
      <p>mn1</p>
      <p>Amn1  nA  mn1  440  44 11  0
then UC has view K (nA )  K3(940)  {11...11...11} and nA  40 .</p>
      <p>Ni</p>
      <sec id="sec-15-1">
        <title>Because of Ni  39  nA  40 it means that there is a mistake in data.</title>
        <p>Check: А  450  M  420 (number A is wrong).
Example 3. Perform control of data А  01,11, 010, 000,1001. .</p>
      </sec>
    </sec>
    <sec id="sec-16">
      <title>The constant</title>
      <p>is selected by value of a5  1001 in BCN (Table 1). We deduce that
KH ( A)  (00, 01,100, 010,1001)</p>
      <p>mn1
Amn1
 A  KH ( A)  (01,10, 011,101, 0000) .</p>
      <p>mn1</p>
    </sec>
    <sec id="sec-17">
      <title>Because</title>
      <p>then UC has view
and nA  38 .</p>
      <p>Amn1  nA  mn1  418  38 11  0</p>
      <p>Because nA  38  Ni  39 of it means that number A is right (ungarbled).
Though the check А  427  M  420 shows us that number A is wrong (Fig. 3).</p>
      <p>
        The represented method can be used for improving promising computer systems
and their components and in the other practically important applications [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8 ref9">5-9</xref>
        ]. In
particular, mathematical transformation in the system of the residue classes can be
successfully adopted for optimization of calculations of cryptographic methods of data
protection [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref24 ref25 ref26 ref27">10-15, 24-27</xref>
        ], also in code theories and complicated discrete signals
[1621], in authentication and steganography [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ].
4
      </p>
      <p>Conclusions
Thus, the method of data control in the system of residue classes is presented in the
article. The procedure of forming and using of position indication of non-positional
code is the base for a method of operational control of data in a residue class. Use of
PINC allows to increase efficiency of the procedure of data control provided to NRC.
It should be pointed out, that any non-modular operation can be implemented by
set (sequence) of defined modular and non-modular operations, which are
implemented by PINC. Using PINC in the method provides the possibility of exception of
the most complicated positional operations from the procedure of control, diagnostic
and correction of mistakes in NRC.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Akushsky</surname>
            ,
            <given-names>I.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yuditsky</surname>
            ,
            <given-names>D.I.:</given-names>
          </string-name>
          <article-title>Machine modular arithmetic</article-title>
          . M.:
          <string-name>
            <surname>Sov</surname>
          </string-name>
          .
          <source>Radio (in Russian)</source>
          (
          <year>1968</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Kolyada</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pak</surname>
            ,
            <given-names>I.T.</given-names>
          </string-name>
          :
          <article-title>Modular structures of pipeline processing of digital information</article-title>
          . Minsk: University (in Russian) (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Krasnobayev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koshman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moroz</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Improved Method of Determining the Alternative Set of Numbers in Residue Number System</article-title>
          .
          <source>In: Recent Developments in Data Science and Intelligent Analysis of Information. ICDSIAI 2018. Advances in Intelligent Systems and Computing</source>
          , Springer, Cham,
          <year>2018</year>
          , vol.
          <volume>836</volume>
          , pp.
          <fpage>319</fpage>
          -
          <lpage>328</lpage>
          . (
          <year>2019</year>
          ) doi:10.1007/978-3-
          <fpage>319</fpage>
          -97885-7_
          <fpage>31</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Krasnobayev</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yanko</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koshman</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          :
          <article-title>A Method for arithmetic comparison of data represented in a residue number system</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          ,
          <year>2016</year>
          , vol.
          <volume>52</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>145</fpage>
          -
          <lpage>150</lpage>
          . (
          <year>2016</year>
          ) doi:10.1007/s10559-016-9809-2
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Xiao</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>A Component Model for Network Processor Based System</article-title>
          .
          <source>In: 2007 IEEE/ACS International Conference on Computer Systems and Applications</source>
          , Amman,
          <year>2007</year>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>50</lpage>
          . (
          <year>2007</year>
          ) doi:10.1109/AICCSA.
          <year>2007</year>
          .370863
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Andrushkevych</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliynykov</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rodinko</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <string-name>
            <given-names>A Prospective</given-names>
            <surname>Lightweight</surname>
          </string-name>
          <article-title>Block Cipher for Green IT Engineering</article-title>
          . In: Kharchenko V.,
          <string-name>
            <surname>Kondratenko</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kacprzyk</surname>
            <given-names>J</given-names>
          </string-name>
          . (eds) Green IT Engineering: Social, Business and
          <string-name>
            <given-names>Industrial</given-names>
            <surname>Applications</surname>
          </string-name>
          .
          <source>Studies in Systems, Decision and Control</source>
          , Springer, Cham,
          <year>2019</year>
          , vol.
          <volume>171</volume>
          , pp.
          <fpage>95</fpage>
          -
          <lpage>112</lpage>
          . (
          <year>2019</year>
          ) doi:10.1007/978-3-
          <fpage>030</fpage>
          -00253-
          <issue>4</issue>
          _
          <fpage>5</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potii</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perepelitsyn</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ivanenko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poluyanenko</surname>
          </string-name>
          , N.:
          <article-title>Lightweight Stream Ciphers for Green IT Engineering</article-title>
          . In: Kharchenko V.,
          <string-name>
            <surname>Kondratenko</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kacprzyk</surname>
            <given-names>J</given-names>
          </string-name>
          . (eds) Green IT Engineering: Social, Business and
          <string-name>
            <given-names>Industrial</given-names>
            <surname>Applications</surname>
          </string-name>
          .
          <source>Studies in Systems, Decision and Control</source>
          , Springer, Cham,
          <year>2019</year>
          , vol.
          <volume>171</volume>
          , pp.
          <fpage>113</fpage>
          -
          <lpage>137</lpage>
          . (
          <year>2019</year>
          ) doi:10.1007/978-3-
          <fpage>030</fpage>
          -00253-
          <issue>4</issue>
          _
          <fpage>6</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Study On simulation and design of data links human computer interface</article-title>
          .
          <source>In: 2011 International Conference on Computer Science and Service System (CSSS)</source>
          ,
          <year>Nanjing</year>
          ,
          <year>2011</year>
          , pp.
          <fpage>4066</fpage>
          -
          <lpage>4069</lpage>
          . (
          <year>2011</year>
          ) doi:10.1109/CSSS.
          <year>2011</year>
          .5974893
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Irfan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghosh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Optimization of information retrieval using evolutionary computation: A survey</article-title>
          .
          <source>In: 2017 International Conference on Computing, Communication and Automation (ICCCA)</source>
          ,
          <source>Greater Noida</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>328</fpage>
          -
          <lpage>333</lpage>
          . (
          <year>2017</year>
          ) doi:10.1109/CCAA.
          <year>2017</year>
          .8229837
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Moskovchenko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pastukhov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prokopenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kropyvnytskyi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Heuristic Methods of Hill Climbing of Cryptographic Boolean Functions</article-title>
          . In: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kharkiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2018</year>
          .8632017
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Panchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prokopovych-Tkachenko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kurinniy</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shoiko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Periodic Properties of Cryptographically Strong Pseudorandom Sequences</article-title>
          . In: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kharkiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>129</fpage>
          -
          <lpage>134</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2018</year>
          .8632021
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tymchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kachko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Experimental Studies of the Modern Symmetric Stream Ciphers</article-title>
          . In: 2018 International ScientificPractical Conference Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kharkiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>125</fpage>
          -
          <lpage>128</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2018</year>
          .8632058
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Rodinko</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliynykov</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>An Approach to Search for Multi-Round Differential Characteristics of Cypress-256</article-title>
          . In: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kharkiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>659</fpage>
          -
          <lpage>662</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2018</year>
          .8631904
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Ivanov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruzhentsev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliynykov</surname>
          </string-name>
          , R.:
          <article-title>Comparison of Modern Network Attacks on TLS Protocol</article-title>
          . In: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kharkiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>565</fpage>
          -
          <lpage>570</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2018</year>
          .8632026
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Gruschka</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mavroeidis</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vishi</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jensen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR</article-title>
          .
          <source>In: 2018 IEEE International Conference on Big Data (Big Data)</source>
          , Seattle, WA, USA,
          <year>2018</year>
          , pp.
          <fpage>5027</fpage>
          -
          <lpage>5033</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/BigData.
          <year>2018</year>
          .8622621
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Serhiienko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prokopovych-Tkachenko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Construction of cascade codes in the frequency domain</article-title>
          . In: 2017 4th
          <string-name>
            <given-names>International</given-names>
            <surname>Scientific-Practical Conference</surname>
          </string-name>
          Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          ,
          <year>Kharkov</year>
          ,
          <volume>20187</volume>
          , pp.
          <fpage>131</fpage>
          -
          <lpage>136</lpage>
          . (
          <year>2017</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2017</year>
          .8246366
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kiyan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uvarova</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Serhiienko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smirnov</surname>
          </string-name>
          , V.:
          <article-title>New Code Based Fuzzy Extractor for Biometric Cryptography</article-title>
          . In: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kharkiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>119</fpage>
          -
          <lpage>124</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2018</year>
          .8632040
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>I.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamula</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          :
          <article-title>Cryptographic signals: requirements, methods of synthesis, properties, application in telecommunication systems</article-title>
          .
          <source>Telecommunications and Radio Engineering</source>
          ,
          <year>2017</year>
          , vol.
          <volume>76</volume>
          (
          <issue>12</issue>
          ), pp.
          <fpage>1079</fpage>
          -
          <lpage>1100</lpage>
          . (
          <year>2017</year>
          ) doi:10.1615/TelecomRadEng.v76.
          <year>i12</year>
          .
          <fpage>50</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19. Kuznetsov, .A,
          <string-name>
            <surname>Pushkar</surname>
          </string-name>
          <article-title>'ov,</article-title>
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Kiyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Kuznetsova</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          :
          <article-title>Code-based electronic digital signature</article-title>
          .
          <source>In: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Kyiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>331</fpage>
          -
          <lpage>336</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/DESSERT.
          <year>2018</year>
          .8409154
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>I.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamula</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semenko</surname>
          </string-name>
          , Ye.A.:
          <article-title>Ensemble and correlation properties of cryptographic signals for telecommunication system and network applications</article-title>
          .
          <source>Telecommunications and Radio Engineering</source>
          ,
          <year>2016</year>
          , vol.
          <volume>75</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>169</fpage>
          -
          <lpage>178</lpage>
          . (
          <year>2016</year>
          ) doi:10.1615/TelecomRadEng.v76.
          <year>i17</year>
          .
          <fpage>40</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>I.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamula</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semenko</surname>
            ,
            <given-names>A.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morozov</surname>
            ,
            <given-names>V.L.</given-names>
          </string-name>
          :
          <article-title>Method for synthesis of performed signals systems based on cryptographic discrete sequences of symbols</article-title>
          .
          <source>Telecommunications and Radio Engineering</source>
          ,
          <year>2017</year>
          , vol.
          <volume>76</volume>
          (
          <issue>17</issue>
          ), pp.
          <fpage>1523</fpage>
          -
          <lpage>1533</lpage>
          . (
          <year>2017</year>
          ) doi:10.1615/TelecomRadEng.v76.
          <year>i17</year>
          .
          <fpage>40</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shekhanin</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolhatin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikheev</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Belozertsev</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Hiding data in the structure of the FAT family file system</article-title>
          .
          <source>In: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Kyiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>337</fpage>
          -
          <lpage>342</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/DESSERT.
          <year>2018</year>
          .8409155
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Svatovskiy</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shevtsov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Post-quantum message authentication cryptography based on error-correcting codes</article-title>
          . In: 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          ,
          <year>Kharkiv</year>
          ,
          <year>2016</year>
          , pp.
          <fpage>51</fpage>
          -
          <lpage>54</lpage>
          . (
          <year>2016</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2016</year>
          .7905333
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Conceptual fundamentals of a theory of mathematical interpretation</article-title>
          .
          <source>Int. J. Computing Science and Mathematics</source>
          ,
          <year>2015</year>
          , vol.
          <volume>6</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>107</fpage>
          -
          <lpage>121</lpage>
          . (
          <year>2015</year>
          ) doi:10.1504/IJCSM.
          <year>2015</year>
          .069459
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Indicative-geometric method for estimation of any business entity</article-title>
          .
          <source>Int. J. Data Analysis Techniques and Strategies</source>
          ,
          <year>2016</year>
          , vol.
          <volume>8</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>87</fpage>
          -
          <lpage>107</lpage>
          . (
          <year>2016</year>
          ) doi: 10.1504/IJDATS.
          <year>2016</year>
          .077486
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Zamula</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Complex systems modeling with intelligent control elements</article-title>
          .
          <source>Int. J. Model. Simul. Sci. Comput</source>
          .,
          <year>2017</year>
          , vol.
          <volume>08</volume>
          (
          <issue>01</issue>
          ). (
          <year>2017</year>
          ) doi:10.1142/S179396231750009X
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamula</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikheev</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Calculation of expense for local computer networks</article-title>
          .
          <source>In: Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&amp;T)</source>
          ,
          <year>2017</year>
          4th International, Kharkiv, Ukraine,
          <year>2017</year>
          , pp.
          <fpage>146</fpage>
          -
          <lpage>151</lpage>
          . (
          <year>2017</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2017</year>
          .8246369
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>