<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Victor Krasnobayev [0000-0001-5192-9918] , Alexandr Kuznetsov [0000-0003-2331-6326] , Anna Kononchenko [0000-0002-8101-6500] , Tetiana Kuznetsova [0000-0001-6154-7139]</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">V</forename><forename type="middle">N</forename><surname>Karazin</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Kharkiv National University</orgName>
								<address>
									<addrLine>Svobody sq., 4</addrLine>
									<postCode>61022</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Victor Krasnobayev [0000-0001-5192-9918] , Alexandr Kuznetsov [0000-0003-2331-6326] , Anna Kononchenko [0000-0002-8101-6500] , Tetiana Kuznetsova [0000-0001-6154-7139]</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">E4BAE29C6B9918F5C2E3E70E0F71563D</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T08:31+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Methods of data control in the residue classes are considered in the article. The main advantage of non-positional notation in the residue classes lays in the possibility of an organization of the process of quick implementation of modular arithmetic operations of addition, subtraction and multiplication. The base of the method is the procedure of generating and using the positional indication of non-positional code. That allows increasing efficiency of the procedure of data control granted by the residue classes.</p><p>Keywords. Methods of data control, the system of the residue classes, the positional indications of the non-positional code, computer systems and components.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Introduction</head><p>It is well known, that the main advantage of non-positional notation in the residue classes (NRC) is laid in the possibility of quick process of organization of modular arithmetic operations of addition, subtraction and multiplication <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>.</p><p>However, in computer systems for common purpose it is needed to perform socalled non-modular (position) operations except the above listed arithmetic operations. The following operations belong to these: ,..., , , ,..., ,</p><formula xml:id="formula_0">i i i n n А а а а а a a   </formula><p>. It is appropriate to use so-called positional indications of non-positional code (PINC) to define an index of j numerical interval of detecting A. The following indications are the most frequently used in NRC (within existing PINCs) <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>:</p><p> Indications based on the procedure of number's translating from NRC to PINC;  Indications based on the procedure of nulevization (reduction to zero polynomial) (definition of the value of 1 n y  );  Indications based on the procedure of expanding given system of basis of NRC;  Rank r of number A, etc.</p><p>There are disadvantages of the above-mentioned PINC. At first, it is technical and time complexity of PINC generating (developing) for given code structure</p><formula xml:id="formula_1">  1 -<label>1 1 1</label></formula><p>,..., , , ,..., ,</p><formula xml:id="formula_2">i i i n n А а а а а a a    .</formula><p>At second, it is no mean time of implementation having applied the existing positional indications, non-modular operations in NRC, specifically, operations of control, diagnostic of correction of data mistakes <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>. It becomes obvious that the research of developing methods of generating new PINC in NRC is important; because of them, we can use operatively non-modular operations. It should be pointed out, population (sequence) of defined modular and non-modular operations, which are implemented by PINC, can realize any nonmodular operation.</p><p>Beforehand we will consider the general requirements to PINC, on base of which in article will be developed method of increasing of operational efficiency of data control:</p><p> To define exactly correctness and incorrectness of number A in NRC (to define fact of detecting/not detecting of number A in an informational numerical [0, ] M interval, where</p><formula xml:id="formula_3">1 n i i M m   </formula><p>) by used (chosen, developed, generated) PINC;</p><p> Simplicity of generating PINC for given code structure of data</p><formula xml:id="formula_4">  1 -1<label>1 1</label></formula><p>,..., , , ,..., ,</p><formula xml:id="formula_5">i i i n n А а а а а a a  </formula><p> ;  Simplicity of using of generated indication for data control in NRC (in general case for implementing positional operations);  Indication has to have clear and understandable physical meaning;  Indication must be analytically described by simple mathematical relator;  It is possible to technically implement process of data control in NRC by using PINC;  Using the chosen indication of non-positional code has to provide the given fidelity of data control in NRC;</p><p> PINC using has to provide the possibility of exception from the control procedure, diagnostic and correction of mistakes in NRC the most difficult positional operations.</p><p>It is reasonable to develop and research the method of data control in NRC on the base of PINC using, resulting from the above-mentioned information.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Method of generating of positional indication of nonpositional code structure of data in NRC</head><p>Looking upon method of generating of PINC (Fig. <ref type="figure" target="#fig_1">1</ref>). The indication A n forms proceeding from representation of initial code structure</p><formula xml:id="formula_6">  1 -1<label>1 1</label></formula><p>,..., , , ,..., ,</p><formula xml:id="formula_7">i i i n n А а а а а a a    , which is represented as NRC with ba- sis { } i m , 1, 1 i n </formula><p> , in the way of creating of so-called uniserial code (UC).</p><p>In standard form, UC</p><formula xml:id="formula_8">  ( ) ( ) ( ) ( ) ( ) 1 1 1 0 ... A n A A A A N N N K Z Z Z Z   </formula><p>represents sequence of binary bits, which contains ones and a zero, index of which is at A n place (the count is performed from right to left, from digit bit ( )</p><formula xml:id="formula_9">0 A Z to digit bit ( ) 1 ). A N Z  Indication of PINC A n defines an index of j numerical interval    , 1 i i jm j m    of detecting of number   1 -1<label>1 1</label></formula><p>,..., , , ,..., ,</p><formula xml:id="formula_10">i i i n n А а а а а a a    .</formula><p>Mathematically PINC A n represents a positive integer, which points out the location of zero binary bit in the record of UC  </p><formula xml:id="formula_11">( ) ( ) 0 A A n A N n K Z  .</formula><p>The procedure of generating UC ( )</p><formula xml:id="formula_12">A n N K lies in the following. A constant   ( ) ' ' ' ' 1 1 1 1 ,..., , , ,..., i A i i i n m KH a a a a a    </formula><p>defines in the block of constants of nuvelization (BCN). It is performed by the definition of remainder i a of number</p><formula xml:id="formula_13">  1 -1<label>1 1</label></formula><p>,..., , , ,..., ,</p><formula xml:id="formula_14">i i i n n А а а а а a a    for chosen inte- ger m i of NRC.</formula><p>Further, using the chosen constant of nuvelization</p><formula xml:id="formula_15">( ) i A m KH</formula><p>, we displace number A on the left edge of the interval </p><formula xml:id="formula_16">   , 1 i i jm j m    by implementing operation     ' ' ' ' ' 1 2 1 1 1 1 2 1 1 1 (1) (1) (1) (1)<label>(1</label></formula><formula xml:id="formula_17">i i i n i i i n i i n i i A m m A A KH a a a a a a a a a a a a a a a a a                    1. Choice informational { } i m , 1, i n  and control 1 k n m m   ( 1 i i m m  </formula><p>) basis of residue classes for representing data</p><formula xml:id="formula_18">1 2 1 1 1</formula><p>( , ,..., , , ,..., , )</p><formula xml:id="formula_19">i i i n n A a a a a a a a     , GCD ( , ) 1 i j m m  , i j  .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Choice of basis { }</head><formula xml:id="formula_20">i i m m  , ( 1, 1) j n   , by which defines an index of j numerical interval    , 1 i i jm j m   </formula><p>of detecting number А.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3.</head><p>Defining the constant of reducing to zero polynomial 4.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Defining the value ( )</head><formula xml:id="formula_21">i i A m m A A KH      1 2 1 1 1</formula><p>, ,..., , , ,..., ,</p><formula xml:id="formula_22">i i i n n a a a a a a a       (1) (1) (1) (1) (1) ' ' ' '<label>(1) 1 2 1 1 1 1 2 1 1 1 , ,..., , , ,..., , , ,..., , 0, ,..., ,</label></formula><p>.</p><formula xml:id="formula_23">i i i n n n i i n a a a a a a a a a a a a a             5. Defining UC   ( ) ( ) ( ) ( ) 1 2 0 ... A n A A A N N N K Z Z Z    ,   ( ) ( ) ( ) ( ) 0 1 2 ... A i i i n A A A N N N K Z Z Z    . 1 1 n K K K i N m      , ] / [ i i N M m  , 1 n i i M m    . ( ) i A A m A i K A K m Z    . ( ) 0 ( ) 1 ( ) 2 ( ) 1 0 , 1 , . . . ( 2) ,<label>( 1)</label></formula><p>.</p><formula xml:id="formula_24">i i i i A m i A m i A m i N A m i N A m Z A m Z A N m Z A N m Z                        ( ) 0 ( ) 1 ( ) 2 ( ) 1 0 , 1 , . . . ( 2) ,<label>( 1)</label></formula><p>. M . We have to implement operation</p><formula xml:id="formula_25">i i i i i i A m i A m i A m i i N A m i i N A m Z A m Z A N m Z A N m Z                        6 Defining PINC A n of number A, which means numerical value of A n for which ( ) ( ) 0 A A A A K n Z Z   , which means 0 i m A i A n m    . Herewith ( ) 1, ( 0; ) i A m i A l Z A l m l n      .</formula><formula xml:id="formula_26">( ) i A A m A i K A K m Z   <label>( 1 )</label></formula><p>to define the fact of detecting number in numerical informational interval [0, M). The operation ( <ref type="formula" target="#formula_1">1</ref>) is carried out simultaneously using the population of N constants</p><formula xml:id="formula_27">  0, 1 A i A K m K N    , where 1 1 n K K K i N m      : ( )<label>0 ( ) 1 ( ) 2 ( ) 2 ( ) 1 0 , 1 , 2 , . . . ( 2) , ( 1)</label></formula><p>.</p><formula xml:id="formula_28">i i i i i A m i A m i A m i A m i N A m i N A m Z A m Z A m Z A N m Z A N m Z                            <label>( 2 )</label></formula><p>In this case, UC represents in the view</p><formula xml:id="formula_29">  ( ) ( ) ( ) ( ) ( ) 1 2 1 0 ... A n A A A A N N N K Z Z Z Z   <label>( 3 )</label></formula><p>The only value A n from (1) exists in total (2) analytical rations. For A n there is ( ) ( )</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="0">( )</head><formula xml:id="formula_30">A A A A A A K n Z Z K n    , which means 0 i m A i A n m    . The rest of values (2) equal ( ) 1 A l Z  ( 0 ; i m i A l m    ) A l n  .</formula><p>In the general case, the amount of N binary bits in the record UC ( )</p><formula xml:id="formula_31">A n N K equal to value 1 1 n K K K i N m      .</formula><p>It should be pointed out, that there is no necessity to have the whole sequence of values ( ) In this case values of variables of numerical intervals</p><formula xml:id="formula_32">A A K Z from<label>(</label></formula><formula xml:id="formula_33">   , 1 i i jm j m   </formula><p>, which are out of informational interval   0, M , make no matter for establishing the fact of correctness control of number A.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Method of operational data control in NRC on base of using positional indication of non-positional code</head><p>The procedure of generating of positional indication of non-positional code (fig. <ref type="figure" target="#fig_1">1</ref>) laid in the base of method of operational data control in residue classes. In that way, the essence of the method of data control in residue classes lies in the following. For the controlled code structure</p><formula xml:id="formula_34">  1 -1<label>1 1</label></formula><p>,..., , , ,..., , </p><formula xml:id="formula_35">i i i n n А а а а а a a    , which is repre- sented in residue classes, developed (defined) PINC A n by generating UC   ( ) ( ) ( ) ( ) ( ) 1 0 1 2 ... A i i i n A A A A N N N K Z Z Z Z    in view</formula><formula xml:id="formula_36">    ( ) ' ' ' ' 1 2 1 1 2 1 (1) (1) (1) (1) 1 2 1</formula><p>, ,..., ,..., , , ,..., ,..., , , ,..., 0,..., , .</p><formula xml:id="formula_37">i i A m i n n i n n m n n A A KH a a a a a a a a a a a a a a             Using Ni constants A i K m    0, 1 A i K N   simultaneously the operations of sub- tractions i m A i A K m  </formula><p>are carried out, in the result of which appears the values of binary bits ( )</p><formula xml:id="formula_38">A A K Z , so the UC ( ) A i n N K forms.</formula><p>The values of PINC A n defined from the equation 0</p><formula xml:id="formula_39">i m A i A n m    . If A i n N </formula><p>, number A is considered as a wrong. In the opposite case</p><formula xml:id="formula_40">( A i n N </formula><p>) number A is correct. In common view, method of data control is represented on Fig. <ref type="figure" target="#fig_2">2</ref>.</p><formula xml:id="formula_41">Algorithm of defining UC   ( ) ( ) ( ) ( ) ( ) 1 0 1 2 ... A i i i n A A A A N N N K Z Z Z Z    of number   1 2 1 1 1</formula><p>, ,..., , , ,..., ,</p><formula xml:id="formula_42">i i i n n A a a a a a a a     .</formula><p>Method of generating of PINC A n :</p><formula xml:id="formula_43">0 i m A i A n m    , ( ) 0 A A n Z  ; ( ) 1, 1; i A m i A l Z A l m l n      . Data control  <label>1 2 1 1 1 , ,..., , , ,..., , i i i n n</label></formula><p>A a a a a a a a</p><formula xml:id="formula_44">    in NRC. If &gt; A i n N , then number Ã is wrong (garbled). If A i n N </formula><p>, then number А is right (ungarbled). </p><formula xml:id="formula_45">n М Мm            1 1</formula><p>/ / 420/11 38,18 39</p><formula xml:id="formula_46">i n i n N N M m M m         .</formula><p>Contents of the block of constants of nuvelization (BCN) concerning basis </p><formula xml:id="formula_47">K K   .</formula><p>Resulting from the view of UC and using formula  shows us that number A is wrong (Fig. <ref type="figure" target="#fig_4">3</ref>). The represented method can be used for improving promising computer systems and their components and in the other practically important applications <ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref>. In particular, mathematical transformation in the system of the residue classes can be successfully adopted for optimization of calculations of cryptographic methods of data protection <ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b23">[24]</ref><ref type="bibr" target="#b24">[25]</ref><ref type="bibr" target="#b25">[26]</ref><ref type="bibr" target="#b26">[27]</ref>, also in code theories and complicated discrete signals <ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref>, in authentication and steganography <ref type="bibr" target="#b21">[22,</ref><ref type="bibr" target="#b22">23]</ref>.</p><formula xml:id="formula_48">m A n A n m         ), meaning ( ) ( ) 9 A A A n Z Z  . Because of 39 9 i A N n    it</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusions</head><p>Thus, the method of data control in the system of residue classes is presented in the article. The procedure of forming and using of position indication of non-positional code is the base for a method of operational control of data in a residue class. Use of PINC allows to increase efficiency of the procedure of data control provided to NRC. It should be pointed out, that any non-modular operation can be implemented by set (sequence) of defined modular and non-modular operations, which are implemented by PINC. Using PINC in the method provides the possibility of exception of the most complicated positional operations from the procedure of control, diagnostic and correction of mistakes in NRC.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>Arithmetic and algebraic congruence of numbers and its absolute values;  Sign of number definition;  Definition of existing of overflow of bit grid of computer system (CS);  Rounding of value of result of operation;  Computing the absolute value;  Division and multiplication of fraction  Translation of data from code of NRC to positional notation and back;  Expanding of original NRC (it is an informational process in which familiar re-mainders{ } i a , that correspond to basis { } i m , define value of remainders with the same code structure by other additional basis);  Control, diagnostic and correction mistakes of NRC data, etc.Generally, all positional operations come down to the procedure of definition of an index of j numerical</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The method of generating PINC in NRC</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Method of data control in NRC Examine now the examples of implementing of method of control for specific NRC, which is given with basis 1 2 3 4 3, 4, 5, 7 m m m m     and</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Example of implementing operation of data control in NRC for</figDesc><graphic coords="10,124.68,159.36,351.60,170.28" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Table 1 .</head><label>1</label><figDesc>Constants</figDesc><table><row><cell>k m</cell><cell></cell><cell cols="7">1 11 m  n  are given in Table 1.</cell></row><row><cell cols="4">Example</cell><cell>1.</cell><cell>Perform</cell><cell cols="4">control</cell><cell>of</cell><cell>data</cell><cell>that</cell><cell>represented</cell><cell>in</cell></row><row><cell cols="2">view</cell><cell>A </cell><cell cols="3">(01, 00, 000, 010, 0001)</cell><cell>.</cell><cell></cell><cell></cell></row><row><cell cols="6">Constant of nuvelization</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="2">1 KH  ( ) n A m</cell><cell></cell><cell cols="2">(01, 01, 001, 001, 0001)</cell></row><row><cell cols="8">is selected by values of remainders</cell><cell>а</cell><cell>К</cell><cell></cell><cell>n a</cell><cell>1 </cell><cell>5 a  </cell><cell>0001</cell><cell>of number A in BCN CS</cell></row><row><cell cols="7">(Table 1). Then we define value</cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head></head><label></label><figDesc>means that there is no mistake in data.</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="2">n m A</cell><cell cols="2">1 </cell><cell>A KH  </cell><cell>1  ( ) n A m</cell><cell></cell><cell>(10, 00, 000,110, 0000)</cell><cell>.</cell></row><row><cell cols="2">Because</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>n m A</cell><cell></cell><cell>1</cell><cell>A n m n  </cell><cell>1 </cell><cell></cell><cell>440 44 11 0   </cell></row><row><cell cols="7">then UC has view</cell><cell>K</cell><cell cols="3">( ) A i n N</cell><cell></cell><cell>K</cell><cell>(40) 39</cell><cell></cell><cell>{11...11...11}</cell><cell>and</cell><cell>40 n  . A</cell></row><row><cell cols="4">Because of</cell><cell></cell><cell>N</cell><cell>i</cell><cell cols="2"></cell><cell cols="3">39</cell><cell></cell><cell>n</cell><cell>A</cell><cell></cell><cell>40</cell><cell>it means that there is a mistake in data.</cell></row><row><cell cols="12">Check: Example 3. Perform control of data 450 420 А M    (number A is wrong).  01,11, 010, 000,1001 .  А </cell><cell>.</cell></row><row><cell cols="5">The constant</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>1 KH  ( ) n A m</cell><cell></cell><cell>(00, 01,100, 010,1001)</cell></row><row><cell cols="12">is selected by value of 5 1001 a </cell><cell>in BCN (Table 1). We deduce that</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="3">n m A</cell><cell>1 </cell><cell>A KH  </cell><cell>1  ( ) n A m</cell><cell></cell><cell>(01,10, 011,101, 0000)</cell><cell>.</cell></row><row><cell cols="2">Because</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>n m A</cell><cell></cell><cell>1</cell><cell>A n m n  </cell><cell>1 </cell><cell></cell><cell>418 38 11 0   </cell></row><row><cell cols="7">then UC has view</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>K</cell><cell>( ) A i n N</cell><cell></cell><cell>K</cell><cell>(38) 39</cell><cell></cell><cell>{011...11...11}</cell></row><row><cell>and</cell><cell cols="3">38 n  . A</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Because</cell><cell></cell><cell>n</cell><cell>A</cell><cell cols="2"></cell><cell cols="2">38</cell><cell></cell><cell></cell><cell>N</cell><cell>i</cell><cell></cell><cell>39</cell><cell>of it means that number A is right (ungarbled).</cell></row><row><cell cols="7">Though the check</cell><cell>А</cell><cell></cell><cell cols="3">427</cell><cell></cell><cell>M</cell><cell></cell><cell>420</cell></row><row><cell cols="2">Check:</cell><cell>А</cell><cell cols="2"></cell><cell cols="3">100</cell><cell></cell><cell cols="3">M</cell><cell></cell><cell>420</cell><cell>(number A is right).</cell></row><row><cell cols="12">Example 2. Perform control of data</cell><cell>A </cell><cell>(00,10, 000, 010,1010)</cell><cell>.</cell></row><row><cell cols="5">The constant</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>1 KH  ( ) n A m</cell><cell></cell><cell>(01,10, 000, 011,1010)</cell></row><row><cell cols="12">is selected by value of 5 1010 a </cell><cell>in BCN (Table 1).</cell></row><row><cell cols="7">We deduce that</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Machine modular arithmetic</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">Y</forename><surname>Akushsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">I</forename><surname>Yuditsky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sov. Radio</title>
		<editor>M.</editor>
		<imprint>
			<date type="published" when="1968">1968</date>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Kolyada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">T</forename><surname>Pak</surname></persName>
		</author>
		<title level="m">Modular structures of pipeline processing of digital information</title>
				<meeting><address><addrLine>Minsk</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1992">1992</date>
		</imprint>
		<respStmt>
			<orgName>University</orgName>
		</respStmt>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Improved Method of Determining the Alternative Set of Numbers in Residue Number System</title>
		<author>
			<persName><forename type="first">V</forename><surname>Krasnobayev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Koshman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Moroz</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-97885-7_31</idno>
	</analytic>
	<monogr>
		<title level="m">Recent Developments in Data Science and Intelligent Analysis of Information</title>
				<meeting><address><addrLine>ICDSIAI; Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018. 2018. 2019</date>
			<biblScope unit="volume">836</biblScope>
			<biblScope unit="page" from="319" to="328" />
		</imprint>
	</monogr>
	<note>Advances in Intelligent Systems and Computing</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A Method for arithmetic comparison of data represented in a residue number system</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">A</forename><surname>Krasnobayev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Yanko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Koshman</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10559-016-9809-2</idno>
	</analytic>
	<monogr>
		<title level="j">Cybernetics and Systems Analysis</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="145" to="150" />
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A Component Model for Network Processor Based System</title>
		<author>
			<persName><forename type="first">H</forename><surname>Xiao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wu</surname></persName>
		</author>
		<idno type="DOI">10.1109/AICCSA.2007.370863</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE/ACS International Conference on Computer Systems and Applications</title>
				<meeting><address><addrLine>Amman</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007. 2007. 2007</date>
			<biblScope unit="page" from="47" to="50" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A Prospective Lightweight Block Cipher for Green IT Engineering</title>
		<author>
			<persName><forename type="first">A</forename><surname>Andrushkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Gorbenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Oliynykov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rodinko</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-00253-4_5</idno>
	</analytic>
	<monogr>
		<title level="m">Green IT Engineering: Social, Business and Industrial Applications. Studies in Systems, Decision and Control</title>
				<editor>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Kondratenko</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Kacprzyk</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="volume">171</biblScope>
			<biblScope unit="page" from="95" to="112" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Lightweight Stream Ciphers for Green IT Engineering</title>
		<author>
			<persName><forename type="first">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Potii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Perepelitsyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ivanenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Poluyanenko</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-00253-4_6</idno>
	</analytic>
	<monogr>
		<title level="m">Green IT Engineering: Social, Business and Industrial Applications. Studies in Systems, Decision and Control</title>
				<editor>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Kondratenko</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Kacprzyk</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="volume">171</biblScope>
			<biblScope unit="page" from="113" to="137" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Study On simulation and design of data links human computer interface</title>
		<author>
			<persName><forename type="first">A</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chen</surname></persName>
		</author>
		<idno type="DOI">10.1109/CSSS.2011.5974893</idno>
	</analytic>
	<monogr>
		<title level="m">2011 International Conference on Computer Science and Service System (CSSS)</title>
				<meeting><address><addrLine>Nanjing</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">2011. 2011</date>
			<biblScope unit="page" from="4066" to="4069" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Optimization of information retrieval using evolutionary computation: A survey</title>
		<author>
			<persName><forename type="first">S</forename><surname>Irfan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ghosh</surname></persName>
		</author>
		<idno type="DOI">10.1109/CCAA.2017.8229837</idno>
	</analytic>
	<monogr>
		<title level="m">2017 International Conference on Computing, Communication and Automation (ICCCA)</title>
				<meeting><address><addrLine>Greater Noida</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="328" to="333" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Heuristic Methods of Hill Climbing of Cryptographic Boolean Functions</title>
		<author>
			<persName><forename type="first">I</forename><surname>Moskovchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pastukhov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kuznetsova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Prokopenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kropyvnytskyi</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2018.8632017</idno>
	</analytic>
	<monogr>
		<title level="m">2018 International Scientific-Practical Conference Problems of Infocommunications</title>
				<meeting><address><addrLine>Kharkiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
	<note>Science and Technology (PIC S&amp;T)</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Periodic Properties of Cryptographically Strong Pseudorandom Sequences</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kavun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Panchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Prokopovych-Tkachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Kurinniy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Shoiko</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2018.8632021</idno>
	</analytic>
	<monogr>
		<title level="m">2018 International Scientific-Practical Conference Problems of Infocommunications</title>
				<meeting><address><addrLine>Kharkiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="129" to="134" />
		</imprint>
	</monogr>
	<note>Science and Technology (PIC S&amp;T)</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Experimental Studies of the Modern Symmetric Stream Ciphers</title>
		<author>
			<persName><forename type="first">I</forename><surname>Gorbenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Tymchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Gorbenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kachko</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2018.8632058</idno>
	</analytic>
	<monogr>
		<title level="m">2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&amp;T)</title>
				<meeting><address><addrLine>Kharkiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="125" to="128" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">An Approach to Search for Multi-Round Differential Characteristics of Cypress-256</title>
		<author>
			<persName><forename type="first">M</forename><surname>Rodinko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Oliynykov</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2018.8631904</idno>
	</analytic>
	<monogr>
		<title level="m">2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&amp;T)</title>
				<meeting><address><addrLine>Kharkiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="659" to="662" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Comparison of Modern Network Attacks on TLS Protocol</title>
		<author>
			<persName><forename type="first">O</forename><surname>Ivanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Ruzhentsev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Oliynykov</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2018.8632026</idno>
	</analytic>
	<monogr>
		<title level="m">2018 International Scientific-Practical Conference Problems of Infocommunications</title>
				<meeting><address><addrLine>Kharkiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="565" to="570" />
		</imprint>
	</monogr>
	<note>Science and Technology (PIC S&amp;T)</note>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR</title>
		<author>
			<persName><forename type="first">N</forename><surname>Gruschka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Mavroeidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Vishi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jensen</surname></persName>
		</author>
		<idno type="DOI">10.1109/BigData.2018.8622621</idno>
	</analytic>
	<monogr>
		<title level="m">2018 IEEE International Conference on Big Data (Big Data)</title>
				<meeting><address><addrLine>Seattle, WA, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="5027" to="5033" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Construction of cascade codes in the frequency domain</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Serhiienko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Prokopovych-Tkachenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2017.8246366</idno>
	</analytic>
	<monogr>
		<title level="m">4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&amp;T)</title>
				<meeting><address><addrLine>Kharkov</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="volume">20187</biblScope>
			<biblScope unit="page" from="131" to="136" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">New Code Based Fuzzy Extractor for Biometric Cryptography</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kiyan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Uvarova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Serhiienko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Smirnov</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2018.8632040</idno>
	</analytic>
	<monogr>
		<title level="m">2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&amp;T)</title>
				<meeting><address><addrLine>Kharkiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="119" to="124" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Cryptographic signals: requirements, methods of synthesis, properties, application in telecommunication systems</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">D</forename><surname>Gorbenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Zamula</surname></persName>
		</author>
		<idno type="DOI">10.1615/TelecomRadEng.v76.i12.50</idno>
	</analytic>
	<monogr>
		<title level="j">Telecommunications and Radio Engineering</title>
		<imprint>
			<biblScope unit="volume">76</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="1079" to="1100" />
			<date type="published" when="2017">2017. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Code-based electronic digital signature</title>
		<author>
			<persName><forename type="first">.</forename><forename type="middle">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pushkar'ov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kiyan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kuznetsova</surname></persName>
		</author>
		<idno type="DOI">10.1109/DESSERT.2018.8409154</idno>
	</analytic>
	<monogr>
		<title level="m">2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="331" to="336" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Ensemble and correlation properties of cryptographic signals for telecommunication system and network applications</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">D</forename><surname>Gorbenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Zamula</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ye</forename><forename type="middle">A</forename><surname>Semenko</surname></persName>
		</author>
		<idno type="DOI">10.1615/TelecomRadEng.v76.i17.40</idno>
	</analytic>
	<monogr>
		<title level="j">Telecommunications and Radio Engineering</title>
		<imprint>
			<biblScope unit="volume">75</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="169" to="178" />
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Method for synthesis of performed signals systems based on cryptographic discrete sequences of symbols</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">D</forename><surname>Gorbenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Zamula</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">E</forename><surname>Semenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">L</forename><surname>Morozov</surname></persName>
		</author>
		<idno type="DOI">10.1615/TelecomRadEng.v76.i17.40</idno>
	</analytic>
	<monogr>
		<title level="j">Telecommunications and Radio Engineering</title>
		<imprint>
			<biblScope unit="volume">76</biblScope>
			<biblScope unit="issue">17</biblScope>
			<biblScope unit="page" from="1523" to="1533" />
			<date type="published" when="2017">2017. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Hiding data in the structure of the FAT family file system</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Shekhanin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kolhatin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Mikheev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Belozertsev</surname></persName>
		</author>
		<idno type="DOI">10.1109/DESSERT.2018.8409155</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018. 2018</date>
			<biblScope unit="page" from="337" to="342" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Post-quantum message authentication cryptography based on error-correcting codes</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Gorbenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Svatovskiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Shevtsov</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2016.7905333</idno>
	</analytic>
	<monogr>
		<title level="m">Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&amp;T)</title>
				<meeting><address><addrLine>Kharkiv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016. 2016. 2016</date>
			<biblScope unit="page" from="51" to="54" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Conceptual fundamentals of a theory of mathematical interpretation</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kavun</surname></persName>
		</author>
		<idno type="DOI">10.1504/IJCSM.2015.069459</idno>
	</analytic>
	<monogr>
		<title level="j">Int. J. Computing Science and Mathematics</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="107" to="121" />
			<date type="published" when="2015">2015. 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Indicative-geometric method for estimation of any business entity</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kavun</surname></persName>
		</author>
		<idno type="DOI">10.1504/IJDATS.2016.077486</idno>
	</analytic>
	<monogr>
		<title level="j">Int. J. Data Analysis Techniques and Strategies</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="87" to="107" />
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Complex systems modeling with intelligent control elements</title>
		<author>
			<persName><forename type="first">A</forename><surname>Zamula</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kavun</surname></persName>
		</author>
		<idno type="DOI">10.1142/S179396231750009X</idno>
	</analytic>
	<monogr>
		<title level="j">Int. J. Model. Simul. Sci. Comput</title>
		<imprint>
			<biblScope unit="volume">08</biblScope>
			<biblScope unit="issue">01</biblScope>
			<date type="published" when="2017">2017. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Calculation of expense for local computer networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kavun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zamula</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Mikheev</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2017.8246369</idno>
	</analytic>
	<monogr>
		<title level="m">Scientific-Practical Conference Problems of Infocommunications</title>
				<meeting><address><addrLine>Kharkiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="146" to="151" />
		</imprint>
		<respStmt>
			<orgName>Science and Technology (PIC S&amp;T</orgName>
		</respStmt>
	</monogr>
	<note>), 2017 4th International</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
