<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Methods for comparing numbers in non-positional notation of residual classes</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>V. N. Karazin Kharkiv National University</institution>
          ,
          <addr-line>Svobody sq., 4, Kharkiv, 61022</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>Methods for optimizing computations in computer systems and components that are based on the use of arithmetic transformations in the system of residual classes are considered. Methods of comparing numbers in the system of residual classes based on the representation and processing of data without directly converting the compared numbers from a modular code to a positional code and back are investigated. Some methods are based on the principle of obtaining and comparing a unitary single-row code. Based on the proposed methods, algorithms for their implementation have been developed, in accordance with which a class of patentable devices has been developed for performing arithmetic and algebraic comparison of numbers in the system of residual classes.</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>Non-positional number system</kwd>
        <kwd>class of residues</kwd>
        <kwd>arithmetic nonpositional coding</kwd>
        <kwd>computer systems and components</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>It is known that the use of non-positional number system in residual classes (RCS)
significantly increases the reliability and performance of the computer system (CS)
[1-8]. However, the need to determine the positional characteristics of numbers in the
RCS reduces the overall effectiveness of the use of modular codes. Existing methods
for processing positional data, in particular, methods for comparing numbers into
RCS, have significant drawbacks, the main of which is the need to convert numbers
from RCS to positional number system and vice versa, which reduces user
productivity and reliability of CS [9-12].</p>
      <p>In the article there are four methods for comparing numbers into RCS, based on the
presentation and processing of data without directly converting the compared
numbers from a modular code (an RCS code) into a positional code and backward.</p>
      <p>Methods for arithmetic comparison of numbers in RCS
Let the RCS be given by ordered (mi &lt; mi+1) mutually n pairs by simple natural
numbers (bases) m1, m2, …, mn, d let the compared operands be represented as:</p>
      <p>A= (a1, a2, …, an), B = (b1, b2, …, bn).</p>
      <p>In the case, it is assumed that the source operands lie in the appropriate intervals:
 ,  and  j2M , ( j2  1)M  ,
 j1M ( j1  1)M 
 mn mn   mn mn 
n
where M   m1 , and the interval's number jk 1 is determined by the well-known
i1
expression jk   nmn (mod mn ) , where the value of mn is determined from the
comparison solution mn M / mn  l(mod mn ) . When j1 ≠ j2 the operation of arithmetic
comparison can be implemented by comparing the number of intervals, namely: if
j1 &lt; j2, then A &lt; B, if j1 &gt; j2, then A &gt; B. When j1 = j2 is determined by the number
0  j3  ( mn 1 ) / 2 , then A &lt; B, and if
mn  1</p>
      <p> j3  m , then A &gt; B.</p>
      <p>2</p>
      <p>The well-known [1] method of arithmetic comparison of numbers with RCS
involves the conversion of numbers and type A( H )  ( 0,0,..., n ) , which requires n 1
clock cycles of the null operation. In addition, it is necessary to make a positional
comparison of the (j1 + 1) and (j2 + 1) intervals of the source operands A and B. All of
this complicates the comparison algorithm and increases the comparison time of
numbers, which leads to the need to develop a comparison method for RCS, which do
not require determination of positional characteristics. Consider each of these
methods.
2.1</p>
      <p>The method of arithmetic comparison of numbers in the RCS (the method
of arithmetic parallel subtraction)
We will consider comparable numbers in arbitrary intervals:  jmi , ( j 1)mi  , where
 
 n 
j  1, N 1 N   mk  .</p>
      <p> kk li </p>
      <p>In the case, the source operands A, B are reduced to numbers that are multiples to
mi , by modular subtraction of the following form:</p>
      <p>Am  A  ai  ( a1( i ) ,a2(i ) ,...,ai(i1) ,0,ai(i1) ,...,an(i ) ,</p>
      <p>i
Bm  B  bi  ( b1( i ) ,b2(i ) ,...,bi(i1) ,0,bi1 ,...,bn(i ) ,</p>
      <p>
        ( i )
i
ai  ( a1 ,a2 , ..., ai ,an ) , bi  ( b1,b2 , ..., bi , bn ) .
where
lows (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ):
      </p>
      <p>Further, by means of a set of constants 0, mi , 2mi , ..., ( N 1)mi , represented by
( n 1) -у base of the RCS m1 , m2 , ..., mi1 , mi1 , ..., mn , the construction of the
socalled single-row code, respectively, in the form</p>
      <p>K(NnA )  { zN zN 1...z2 z1 } , znA  0 ( z1  1;1  1, N ,1  nA ) ,</p>
      <p>K(NnB )  { zN zN 1...z2 z1 } , znB  0 ( z1  1,1  1, N ,1  nB ) .</p>
      <p>
        The algorithm for constructing a single-row code in RCS can be represented as
fol Am  0  z1 ,
 i
 Ami  mi  z2 ,

 Ami  2mi  z3 ,
z  0 , at Bm  nB  mi  0; z  1 , at Bm  nB  mi .
nB i nB i
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
Geometrically, this number comparison method can be explained as follows. The
 n 
interval 0,  mi  is divided into segments. The source operands A и B, by
subtract i1 
ing the constants of the form
n1
 m , с and shift to the left edge of their hit interval.
 1
 i
This is the equivalent to bringing the compared numbers to numbers, which are
compile to comparison mi of the RCS. On this basis, the accuracy W с and comparison of
the operands depends on the size of the base mi , that is W  W ( mi ) . However, with
the maximum accuracy of the comparison Wmax  W ( mmin ) (for an ordered of the
RCS Wmax  W ( m1 ) the number of equipment for technical devices realizing the
comparison operation in the RCS increases dramatically. Indeed, the number of
equipment N0 of the comparison device in the RCS significantly depends on the
number of address N1, performing the operation of parallel subtraction:
      </p>
      <p>In this way, necessity of ensure a high degree of accuracy of comparison requires a
significant amount of equipment, which reduces the efficiency of using existing
methods of comparing numbers in the RCS. This situation determines the relevance
and importance of finding more effective methods of comparing numbers in the RCS,
ensuring a high accuracy of W comparison with a minimum numbers N0 of
equipment comparing devices.</p>
      <p>
        In general, the task is interpreted as follows. It is necessary to find N0  min at
Wmax, i.e. N0(Wmax )  min . As shown above Wmax  W ( m1 ) . In this case, a change
in the base mi ( i  1,n ) affects only the number N1 of the equipment of the group of
adders. In this case, the problem is correctly formulated as a definition (
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
N1(Wmax )  min .
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
      </p>
      <p>
        Obviously, with high accuracy equal to the unit length of the interval,
Wmax  W ( mi  2 ) . However, in this case N1(Wmax )  max , и and this result does
not satisfy the condition (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ). On the other hand – N1(Wmin )  min . Thus, it is
necessary to develop such a method of comparison (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ). This problem is solved by the
method described below.
2.2
      </p>
      <p>
        The method of arithmetic comparison of numbers in the RCS (the method
of parallel subtraction with the comparison of residues)
We introduce an additional operation of comparing the residues an and bn the
magnitude of the bases mn of the RCS. In this case, the result of the comparison of the
residuals simultaneously with the result of the comparison of the single-row code
K (NnA ) and K (NnB ) , is determined by the solution of the problem (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), i.e. Wmax and
with the minimum amount of equipment Nmin is the result of solving the operation of
if nA  nB , then A  B;

if nA  nB , then A  B;
if nA  nB , and at the same time

an  bn , at A  B,
      </p>
      <p>
an  bn , at A  B,

an  bn , at A  B.</p>
      <p>
        The set of relations (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) represents the general algorithm for the implementation of
the operation of arithmetic comparison of numbers in the RCS. It is advisable to
consider examples of specific performance of the operation of arithmetic comparison of
numbers in the RCS. Let the RCS be given by bases, m1  2, m2  3 and m3  5 .
Code words are given in Table 1. In Table 2 given constants an (bn) presented in a
given RCS, and in Table 3, constants of a single-row code are   mn
 n1 
  0,  m  mi on the basis of the RCS ( i  1,n 1) .
 i1 i 
comparing two numbers in RCS. The algorithm for determining the result of an
arithmetic comparison operation can be represented as follows:
B21  (
        <xref ref-type="bibr" rid="ref1">1,00,001</xref>
        ) . In this case, the values of the constants (Table 2) determine the
values Amn  A23  an  (
        <xref ref-type="bibr" rid="ref10">0,10,000</xref>
        ) , Bmn  B21  bn  ( 01,00,000 ) , which
corresponds to the shift of the operands A and B to the left edge of the interval [20, 25).
Then we use the constants of the single-row code (Table 3), we determine the
singlerow code for the input numbers in the form:
      </p>
      <p>
        K (NnA )  K(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )  {110111} ; K (NnB )  K( nB )  K(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )  {110111} ,
      </p>
      <p>6 6 6
where</p>
      <p>n1
N1   mi  6 .</p>
      <p>i1</p>
      <p>
        At the same time the comparison result an  011  bn  001 is determined in
parallel with the ( n  [log2( mn 1 )]  1 )-th bit comparison circuit in time. So, if
nA  nB  4 , in accordance with the above algorithm, we determine that A23  B21 .
( 0  N 1) mn
0  m3  0
1 m3  5
2  m3  10
3  m3  15
4  m3  20
5  m3  25
B3  (
        <xref ref-type="bibr" rid="ref1">1,00,011</xref>
        ) . In this case, the following differences are determined from the
values of the constants (Table 2):
      </p>
      <p>
        Amn  A23  an  (
        <xref ref-type="bibr" rid="ref10">0,10,00</xref>
        ) and Bmn  B3  bn  (
        <xref ref-type="bibr" rid="ref1">1,00,000</xref>
        ) ,
which corresponds to the shift of the operand А23 to the left edge of the interval
[20, 25), and the operand B3 to the left edge of the interval [0, 5). Next, using the
constants of the single-row code (Table 3), we determine the single-row code for the
considered input operands A23 , and B3:
      </p>
      <p>
        K (NnA )  K(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )  {101111} , K(NnB )  K (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )  {111110 } .
      </p>
      <p>6 6</p>
      <p>So, if nA  5  nB  1 , in accordance with the above algorithm, we determine that
A23  B3 .
2.3</p>
      <p>The arithmetical method of comparison of numbers in the RCS (the
method of comparison with a constant)
Consider the method of implementing the operation of arithmetic comparison of
numbers in the RCS. The essence of this method is that not the operands A and B, are
directly compared, but the quantities   ( A  B ) mod M  ( 1 , 2 ,..., n ) and m1.</p>
      <p>In this case, the value is determined:
 m    1  ( 0, 2 , 3 , ..., n ) ,</p>
      <p>1
where constants  1  ( 1 , 2 , 3 , ..., n ) and  1  ( a1  b1 ) mod m1 are represented in
a given RCS.</p>
      <p>
        Then the general algorithm for comparison of the operands is presented in the
form:
 A  B, at  m  m1;
 1
 A  B, at  m  m1;
 1
 A  B, at  m  0.
 1
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
By dialing constants
 n 
0, m1 , 2m1 , ..., ( N 1)  m1  N   mi  ,
 i1 
which were represented in the RCS with bases m2 , m3 , ..., mn , the construction of a
single-row code in the form of:
      </p>
      <p>K n(n )  { zN zN 1...z2 z1 } ,
where
In addition</p>
      <p>
        The first module m1 RCS is also represented by a single-row code of length N
binary digits, in which the second place on the right will be zero ( m1 1 m1  0 ) , and
on the rest - one, i.e. the single-row unitary code will be represented as:
Kn(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )  {11...101} .
      </p>
      <p>
        Further, by known methods, in accordance with algorithm (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ), operands A and B,
represented by a single-row code, are compared.
      </p>
      <p>
        Example 3. For the above RCS we consider an example of the implementation of
this method. Let the numbers be equal A  ( 0,01,010 ) and B  (
        <xref ref-type="bibr" rid="ref1 ref10">1,10,011</xref>
        ) . We
define the value:
  ( A  B ) mod M  ( 0 1) mod 2, ( 01 10 ) mod 3, ( 010  011 ) mod 5 
 (
        <xref ref-type="bibr" rid="ref1 ref10">1,10,100</xref>
        ).
      </p>
      <p>
        By value  1  1 we define a constant in the form  1  (
        <xref ref-type="bibr" rid="ref1">1,01,001</xref>
        ) (Table 4). Then
we perform the operation:
 m     ( 00,01,011) .
      </p>
      <p>1
The operand  m , which is a multiple of the module m1  2 value, goes to the
1
first inputs of the corresponding adders, the second inputs of which receive the
corresponding constants (Table 5).
Since  m1 14mi  0 , then the single-row code will take the form:</p>
      <p>Kn(n )  K1(514 )  { 011111111111111} .</p>
      <p>
        In accordance with algorithm (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ), we determine that A &lt; B.
      </p>
      <p>The advantage of the considered method is to ensure maximum accuracy of
comparison with an acceptable amount of equipment for its implementation.
2.4</p>
      <p>The method of algebraic comparison of numbers in the RCS
It is easy to go from the implementation of the operation of arithmetic comparison of
numbers to the algebraic comparison of numbers. In this case, the compared numbers
A and B have one additional significant digit, i.e. the number is accompanied by a
indication  A( B ) of the sign signA( signB ) , where:</p>
      <p>0, if A( B )  0,
 A(  B )  </p>
      <p>1, if A( B )  0.</p>
      <p>In this way, the compared numbers are presented in the form:</p>
      <p>
        A  (  A ; A )   A ;( a1,a2 ,...,an ) , and B  (  B ; B )   B ;( b1,b2 ,...,bn ) ,
and the method of comparing numbers A and B is determined by the set of
operations (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ).
      </p>
      <p>We will conduct a comparative analysis of the implementation time of the
comparison operation of two numbers А and В or the proposed method and the most
wellknown. The essence of the known method is to convert the numbers А and В from the
system of residual classes to the positional number system АПСС, ВПСС and the further
comparison of the operands of АPNS и ВPNS. Moreover, the transfer of numbers from
RCS to PNS is made in accordance with the expression:</p>
      <p>n
APNS   ai Bi</p>
      <p>
        M
,
where ai  [ APNS / mi ]mi , where Bi – is the orthogonal basis over the mi base of the
RCS.
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
      </p>
      <p>
        For the known and proposed methods of comparing numbers, the implementation
time is determined by the corresponding mathematical relations
where
 t(
        <xref ref-type="bibr" rid="ref11">11</xref>
        ) – is the implementation time of the multiplication operation for the maximum
mn by the magnitude of the RCS module (the implementation time of the
multiplication operation of two-digit binary numbers K  [log2( mn 1)]  1 );
 t(
        <xref ref-type="bibr" rid="ref12">12</xref>
        ) – is the time ( n 1) of the th addition of two numbers of the type
ai Bi  ai1Bi1( i  1,n 1) ;
 t(
        <xref ref-type="bibr" rid="ref13">13</xref>
        ) – is the time for determining the deduction of the number of АPNS (ВPNS);
 t(
        <xref ref-type="bibr" rid="ref14">14</xref>
        ) – is the comparison time of the positional operands of the АPNS and ВPNS;
 t(21) – is the time of implementation of the operation of subtraction in the RCS
      </p>
      <p>ACOK  ai ;
 t(22) – is the time of implementation of the operation of subtraction in the RCS</p>
      <p>Ami  k  mi ;
 t(23) – is the time of comparison of two positional N-bit single-row unitary codes of
two corresponding numbers.</p>
      <p>It is known that the time of addition of tc and ty multiplication of two operands in
the PNS is determined by the following relations:</p>
      <p>
        tc   ( 2 1) and ty  2 2 ,0
where ρ is the bit width of the processed operands; τ – is the time of "shift" of one
binary digit. In this case, the time of "triggering" of the logical element AND (OR) is
determined by the expression: tAND  tOR   / 2 , and t( 23 )  6tn and expression
  n  2
t(
        <xref ref-type="bibr" rid="ref13">13</xref>
        )  2 log2   mi 1  1 .
      </p>
      <p>
          i1  
TR(1C)S  t(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )  t(
        <xref ref-type="bibr" rid="ref12">12</xref>
        )  t(
        <xref ref-type="bibr" rid="ref13">13</xref>
        )  t(
        <xref ref-type="bibr" rid="ref14">14</xref>
        ) ,
      </p>
      <p>
        TR(C2S)  t( 21)  t( 22 )  t( 23 ) ,
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
(
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
      </p>
      <p>
        Taking into account the above, relations (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) and (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ), respectively, are presented in
the form:
  n  2
TR(1C)S  2 k 2  ( n 1) ( 2k 1)  2 log2   mi 1  1  3 ;
      </p>
      <p>  i1  </p>
      <p>TR( C2S)  2  2  3 .</p>
      <p>
        According to with expressions (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) and (
        <xref ref-type="bibr" rid="ref9">9</xref>
        ), values are calculated TR(1C)S , TR(C2S)
(table 6) for various l – byte bit CS grids ( l  1,4 ) . From Table 6 it can be seen that
with increasing length of the CS discharge grid, which is typical of the current trend
in the development of systems and tools for processing digital information, the
effectiveness of applying the proposed methods for comparing numbers, as compared to
existing ones, increases.
      </p>
      <p>On the basis of the proposed methods, algorithms for their implementation have
been developed, in accordance with which a class of patentable devices has been
developed for performing arithmetic and algebraic comparisons of numbers in an RCS
[13-15]. Prospective direction of a further research is the argumentation of practical
recommendations concerning a realization of the introduced method and the ways of
its use in different mechanisms of an information security of telecommunications
networks and systems [16-31].
3</p>
      <p>Conclusion
In this paper, a method is proposed for comparing numbers in a non-positional
number system of remainder classes, which is based on the principle of obtaining and
comparing a unitary single-row code.</p>
      <p>The developed method can be used to improve advanced computer systems and
their components. In particular, its practical use allows to increase the performance of
computer calculations and the reliability of information systems.
4th International Scientific-Practical Conference Problems of Infocommunications.
Science and Technology (PIC S&amp;T), Kharkov, 2017, pp. 101–104. (2017)
doi:10.1109/INFOCOMMST.2017.8246359
19. Kuznetsov, A., Kiyan, A., Uvarova, A., Serhiienko, R., Smirnov, V.: New Code Based
Fuzzy Extractor for Biometric Cryptography. In: 2018 International Scientific-Practical
Conference Problems of Infocommunications. Science and Technology (PIC S&amp;T),
Kharkiv, Ukraine, 2018, pp. 119–124. (2018) doi:10.1109/INFOCOMMST.2018.8632040
20. Gorbenko, I., Kuznetsov, A., Tymchenko, V., Gorbenko, Y., Kachko, O.: Experimental
Studies of the Modern Symmetric Stream Ciphers. In: 2018 International
ScientificPractical Conference Problems of Infocommunications. Science and Technology (PIC
S&amp;T), Kharkiv, Ukraine, 2018, pp. 125–128. (2018)
doi:10.1109/INFOCOMMST.2018.8632058
21. Eberhart, R.C., Shi, Y.: Tracking and optimizing dynamic systems with particle swarms.</p>
      <p>
        In: Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat.
No.01TH8546), Seoul, South Korea, 2001, pp. 94–100. (2001)
doi:10.1109/CEC.2001.934376O
22. Ivanov, O., Ruzhentsev, V., Oliynykov, R.: Comparison of Modern Network Attacks on
TLS Protocol. In: 2018 International Scientific-Practical Conference Problems of
Infocommunications. Science and Technology (PIC S&amp;T), Kharkiv, Ukraine, 2018, pp. 565–
570. (2018) doi:10.1109/INFOCOMMST.2018.8632026
23. Kandemir, M., Choudhary, A., Ramanujam, J., Kandaswamy, M.A.: A unified framework
for optimizing locality, parallelism, and communication in out-of-core computations. IEEE
Transactions on Parallel and Distributed Systems, 2000, vol. 11(
        <xref ref-type="bibr" rid="ref7">7</xref>
        ), pp. 648–668. (2000)
doi:10.1109/71.877759
24. Pousset, Y., Vauzelle, R., Combeau, P.: Optimising the computation time of radio
coverage predictions for microcellular mobile systems. IEEE Proceedings - Microwaves,
Antennas and Propagation, 2003, vol. 150(
        <xref ref-type="bibr" rid="ref5">5</xref>
        ), pp. 360–364. (2003)
doi:10.1049/ipmap:20030543
25. Xing, C., Wang, H.: Optimized similarity computation for nearest neighbor choosing.
      </p>
      <p>
        In: Proceedings of 2012 2nd International Conference on Computer Science and Network
Technology, Changchun, 2012, pp. 2011–2014. (2012)
doi:10.1109/ICCSNT.2012.6526313
26. Munetomo, M., Bando, S.: A scalable infrastructure of interactive evolutionary
computation to evolve services online with data. In: 2013 IEEE International Conference on Big
Data, Silicon Valley, CA, 2013, pp. 28–28. (2013) doi:10.1109/BigData.2013.6691793
27. Kavun, S.: Conceptual fundamentals of a theory of mathematical
interpretation. Int. J. Computing Science and Mathematics, 2015, vol. 6(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), pp. 107–121.
(2015) doi:10.1504/IJCSM.2015.069459
28. Kavun, S.: Indicative-geometric method for estimation of any business entity. Int. J. Data
Analysis Techniques and Strategies, 2016, vol. 8(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), pp. 87–107. (2016) doi:
10.1504/IJDATS.2016.077486
29. Kovtun, V., Kavun, S., Zyma, O.: Co-Z Divisor Addition Formulae in Homogeneous
Representation in Jacobian of Genus 2 Hyperelliptic Curves over Binary Fields. International
Journal Biomedical Soft Computing and Human Sciences, 2012, vol. 17(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), pp. 37–43.
(2012) doi:10.24466/ijbschs.17.2_37
30. Zamula, A., Kavun, S.: Complex systems modeling with intelligent control elements. Int.
      </p>
      <p>J. Model. Simul. Sci. Comput., 2017, vol. 08(01). (2017)
doi:10.1142/S179396231750009X
31. Kavun, S., Zamula, A., Mikheev, I.: Calculation of expense for local computer networks.</p>
      <p>In: Scientific-Practical Conference Problems of Infocommunications. Science and
Technology (PIC S&amp;T), 2017 4th International, Kharkiv, Ukraine, 2017, pp. 146–151. (2017)
doi:10.1109/INFOCOMMST.2017.8246369</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Shu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>A research of architecture-based reliability with fault propagation for software-intensive systems</article-title>
          .
          <source>In: 2016 Annual Reliability and Maintainability Symposium (RAMS)</source>
          , Tucson,
          <string-name>
            <surname>AZ</surname>
          </string-name>
          ,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . (
          <year>2016</year>
          ) doi:10.1109/RAMS.
          <year>2016</year>
          .7447984
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Gokhale</surname>
            ,
            <given-names>S.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lyu</surname>
            ,
            <given-names>M.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trivedi</surname>
            ,
            <given-names>K.S.:</given-names>
          </string-name>
          <article-title>Reliability simulation of component-based software systems</article-title>
          .
          <source>In: Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257)</source>
          , Paderborn, Germany,
          <year>1998</year>
          , pp.
          <fpage>192</fpage>
          -
          <lpage>201</lpage>
          . (
          <year>1998</year>
          ) doi:10.1109/ISSRE.
          <year>1998</year>
          .730882
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Tiwari</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tomko</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Enhanced Reliability of Finite State Machines in FPGA Through Efficient Fault Detection and Correction</article-title>
          .
          <source>IEEE Transaction on Reliability</source>
          , vol.
          <volume>54</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>459</fpage>
          -
          <lpage>467</lpage>
          . (
          <year>2005</year>
          ) doi:10.1109/TR.
          <year>2005</year>
          .853438
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sprintson</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Reliability assurance of cyber-physical power systems</article-title>
          .
          <source>In: IEEE PES General Meeting</source>
          , Providence, RI,
          <year>2010</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . (
          <year>2010</year>
          ) doi:10.1109/PES.
          <year>2010</year>
          .5590189
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Krasnobayev</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koshman</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mavrina</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          :
          <article-title>A Method for Increasing the Reliability of Verification of Data Represented in a Residue Number System</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          ,
          <year>2014</year>
          , vol.
          <volume>50</volume>
          (
          <issue>6</issue>
          ), pp.
          <fpage>969</fpage>
          -
          <lpage>976</lpage>
          . (
          <year>2014</year>
          ) doi:10.1007/s10559-014-9688-3
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Reddy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nalini</surname>
          </string-name>
          , N.:
          <article-title>FT2R2Cloud: Fault tolerance using time-out and retransmission of requests for cloud applications</article-title>
          .
          <source>In: 2014 International Conference on Advances in Electronics Computers and Communications</source>
          , Bangalore,
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . (
          <year>2014</year>
          ) doi:10.1109/ICAECC.
          <year>2014</year>
          .7002396
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Braun</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wunderlich</surname>
          </string-name>
          , H.:
          <article-title>Algorithm-based fault tolerance for many-core architectures</article-title>
          .
          <source>In: 2010 15th IEEE European Test Symposium</source>
          , Praha,
          <year>2010</year>
          , pp.
          <fpage>253</fpage>
          -
          <lpage>253</lpage>
          . (
          <year>2010</year>
          ) doi:10.1109/ETSYM.
          <year>2010</year>
          .5512738
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Radu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Reliability and fault tolerance analysis of FPGA platforms</article-title>
          .
          <source>In: IEEE Long Island Systems, Applications and Technology (LISAT) Conference</source>
          <year>2014</year>
          , Farmingdale, NY,
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . (
          <year>2014</year>
          ) doi:10.1109/LISAT.
          <year>2014</year>
          .6845211
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Akushsky</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yuditsky</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>: Machine arithmetic in residual classes</article-title>
          . Moscow, Sov.
          <source>Radio (in Russian)</source>
          (
          <year>1968</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Torgashov</surname>
          </string-name>
          , V.:
          <article-title>System of residual classes and reliability of digital computers</article-title>
          . Moscow, Sov.
          <source>Radio (in Russian)</source>
          (
          <year>1973</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Krasnobayev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koshman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moroz</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Improved Method of Determining the Alternative Set of Numbers in Residue Number System</article-title>
          .
          <source>In: Recent Developments in Data Science and Intelligent Analysis of Information. ICDSIAI 2018. Advances in Intelligent Systems and Computing</source>
          , Springer, Cham,
          <year>2018</year>
          , vol.
          <volume>836</volume>
          , pp.
          <fpage>319</fpage>
          -
          <lpage>328</lpage>
          . (
          <year>2019</year>
          ) doi:10.1007/978-3-
          <fpage>319</fpage>
          -97885-7_
          <fpage>31</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Krasnobayev</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yanko</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koshman</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          :
          <article-title>A Method for arithmetic comparison of data represented in a residue number system</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          ,
          <year>2016</year>
          , vol.
          <volume>52</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>145</fpage>
          -
          <lpage>150</lpage>
          . (
          <year>2016</year>
          ) doi:10.1007/s10559-016-9809-2
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. Patent for utility model No.
          <volume>73379</volume>
          ,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          , G 06F 7
          <article-title>/04. Device for the popular danich, which is presented in the classroom extra</article-title>
          . No. u
          <year>2012</year>
          01885. Appl.
          <volume>02</volume>
          /20/2012. Publ.
          <volume>09</volume>
          /25/2012, Bull. No.
          <volume>18</volume>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. Patent for utility model No.
          <volume>73384</volume>
          ,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          , G 06F 7
          <article-title>/04. Device for the same number of numbers in the classroom too</article-title>
          . No. u
          <year>2012</year>
          01916. Appl.
          <volume>02</volume>
          /20/2012. Publ.
          <volume>09</volume>
          /25/2012, Bull. No.
          <volume>18</volume>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. Patent for utility model No.
          <volume>73407</volume>
          ,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          , G 06F 7
          <article-title>/04. Device for algebraic porous numbers with class numbers No</article-title>
          .
          <source>U 2012 02150. Appl. February 24</source>
          ,
          <year>2012</year>
          . Publ.
          <volume>09</volume>
          /25/2012, Bull. No.
          <volume>18</volume>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>I.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamula</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semenko</surname>
            ,
            <given-names>A.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morozov</surname>
            ,
            <given-names>V.L.</given-names>
          </string-name>
          :
          <article-title>Method for complex improvement of characteristics of orthogonal ensembles based on multiplicative combining of signals of different classes</article-title>
          .
          <source>Telecommunications and Radio Engineering</source>
          ,
          <year>2017</year>
          , vol.
          <volume>76</volume>
          (
          <issue>18</issue>
          ), pp.
          <fpage>1581</fpage>
          -
          <lpage>1594</lpage>
          . (
          <year>2017</year>
          ) doi:10.1615/TelecomRadEng.v76.
          <year>i18</year>
          .
          <fpage>10</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Si-ru</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Application of Improved Genetic Algorithm in Optimization Computation</article-title>
          .
          <source>In: 2009 Fifth International Conference on Natural Computation, Tianjin</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>144</fpage>
          -
          <lpage>148</lpage>
          . (
          <year>2009</year>
          ) doi:10.1109/ICNC.
          <year>2009</year>
          .393
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Gorbenko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamula</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morozov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Methods for implementing communications in info-communication systems based on signal structures with specified properties</article-title>
          .
          <source>In: 2017</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>