<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>http://www.scrip.org/journal/jsea</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">2059-9951</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>The theory graph modeling systems from quality modules 1 of the application areas</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>E. M. Lavrischeva Doctor of phys.-мath. Sci.</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Professor of MIPT</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>lavr@ispras.ru</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2019</year>
      </pub-date>
      <volume>7</volume>
      <issue>5</issue>
      <fpage>296</fpage>
      <lpage>317</lpage>
      <abstract>
        <p>The graph modeling of applied systems (AS) from ready resources (modules) are presented. The graph is represented by an adjacency and reach ability matrix. A new program structures are modeling by mathematical operations (unions, connections, etc.). The assemble of programs structures (complex, system, packets, AS, OS, IS, etc.) from modules in LP, as resources are integrating by such operations (link, make, weaver, config, etc.) and controlled on the quality every recourses and the making systems from them.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Definition 2. Two program structure S1 = (Т1, χ1) and S2 = (Т2, χ2) are identical if Т1 = Т2, χ1 = χ2 and the structures S1
and S2 are isomorphic, then Т1 is isomorphic to Т2 and χ1 = χ2. The concept of isomorphism of program structures
and their models is used in the specification of the abstraction level at which operations on these structures are defined.
For isomorphic graph objects, operations will be interpreted in the same way without orientation to a
specific composition of program elements, provided that such operations are defined over pairs (G, χ). The software
module is described in the LP and has an interface section in which external and internal parameters are set for data
exchange between related modules through Call/RMI operations, etc.</p>
      <p>
        The interface defines the connection of heterogeneous software modules according to the data and the way they are
displayed by programming systems with the LP. Its main functions are: data transfer between program elements (modules),
data conversion to the equivalent form and transition from the environment and platform of the called module to the caller
and back. Functions of conversion of different, non-equivalent data types is carried out with the help of a previously
developed library of 64 primitive functions for heterogeneous types of data of LP in the APROP system [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5">1-5</xref>
        ] and included
in the common system environments of the OS (IBM, MS, Oberon, UNIX, etc.).
      </p>
      <p>
        In practice, the assembly method of software modules is performed by operations (link, make, assembling, config,
weaver) special programs OS libraries (OS ES, IBM, MS.Net, etc.), a builder of complex applications in OS RV for SM
computers, complication modules for ERM "Elbrus" are used. In these operations and interface functions data type
conversion library [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Next, we consider the mathematical theory of graphs of software modular structures and
mathematical operations (union, projection, difference, etc.) implementation of ways of linking the graph modules and the
semantics of the transformation of data transmitted by the vertices of the graph.
      </p>
    </sec>
    <sec id="sec-2">
      <title>1.1 Definition of a modular structure graph</title>
      <p>Definition 3. A program aggregate is a pair S = (T, χ), where E – a model of the program modular structure of the
aggregate; χ - a characteristic function defined on the set of vertices X of the graph of the modular structure G. The value of
the χ function is defined as follows:
χ(x) = 1 if the module corresponding to the vertex х  X, - included in the unit;
χ(x) = 0 if the module corresponding to the vertex х  X, - not included in the software unit, but it is accessed from
other modules previously included.</p>
      <p>Definition 4. The model of the program structure of the program unit is an object described by the triple T = (G, Y, F),
where G = (X, E) - a directed graph, which is a graph of a modular structure;</p>
      <p>Y is a set of modules included in the program aggregate;
F is a correspondence function that puts an element of the set y at each vertex X of the graph.</p>
      <p>Function F maps X to Y, F : X → Y (1)</p>
      <p>
        In General, an element from Y can correspond to several vertices from the set X (which is typical for the dynamic
structure of the aggregate) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>The graph of software aggregates has the following properties:
1) graph G has one or more connectivity elements, each of which represents an acyclic graph, i.e. does not contain
oriented cycles;</p>
      <p>2) in each graph G is allocated a single vertex, which is called the root and is characterized by the fact that there are no
arcs included in it and the corresponding module of the software unit is performed first;</p>
      <p>3) cycles are allowed only for the case when some vertex has a recursive reference to itself. Typically, this feature is
implemented by the compiler with the corresponding LP and this type of communication is not considered by the
intermodule interface. Therefore, such arcs are not included in the graph. The exception to the consideration of other types
of cycles is due to the fact that some modules will have to remember the history of their calls in order to return control
correctly, which contradicts the properties of the modules;
4) An empty graph G0 corresponds to an empty program structure.</p>
      <p>Next, the graph G will be used to illustrate mathematical operations on modular structures. On Fig.2. four types of
subgraphs are shown for Fig.1. For the graph (Fig.1) set of subgraphs (from left to right) to create four programs: 1) from
the vertex x1 given three related vertices x1, x3 and x4; 2) for x3 given two vertices x5 and x6; 3) for x5 given two vertices x7
and x8; 4) to the program x5 added vertex x6, not associated with it.</p>
      <p>x 2</p>
    </sec>
    <sec id="sec-3">
      <title>1.2 The graph of the modules for Software structure</title>
      <p>The graph of the module (m) is represented as: Gm = (Хт, Eт). It contains a single vertex х  Хт for which χ(xj)=1. This
vertex is the root. An arc of the form (хj, хе, k) means calling the module to the corresponding vertex хj , i.e. to the module
with the vertex xl. The dark circle on the graph corresponds to the vertex for which χ(x) = 1;
light – χ(x)=0.</p>
      <p>Program graph Gp = (Хр, Ep) which is performed С (Sp) = 1; R (Sp) = 1. An example of a graph of such a program
modular structure is shown in Fig. 1.</p>
      <p>The graph of the complex G = (Xc, Ec) consists of n connectivity components (n &gt; 1), each of which is a graph and
c
p p p
includes: G c = G1  G2  , … ,  Gn ,
where Xc = X1p  X2p  , … ,  Xnp и Ec = E1p  E2p  , … ,  Enp.</p>
      <p>
        These definitions of the graph of the program module, program and complex are used for the process of assembling the
modules. These concepts may differ from similar ones, which are considered in other contexts of the work.
1.3 Matrix representation of graphs from program elements of module types
To determine the main operations on software structures, we use the mathematical apparatus of the matrix representation of
graphs in the form of an adjacency and reachability matrix. That is, the graph is represented by the matrix M= m (i, j) of
adjacency and is proved by the reachability matrix [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7 ref8">1-8</xref>
        ]. The element of the matrix тij determines the number of call
operators with index i, to the module with index j.
      </p>
      <p>In addition to the adjacency matrix (calls), the characteristic vector Vi = χ (xi) for i-elements is used. For a modular
structure graph (Fig. 1) characteristic vector and adjacency matrix have the form:</p>
      <p> 11   00 00 
V =  1  M =  0 0  (2)
 1   0 0 
 1   0 2 
 1  0 
  
 1  0 
 1  0 
M 1s   000 100 100 100 ; V 5s  111 , M5s  000 100 002, (3)
 0 0 0 0</p>
      <p>For the program graph (Fig. 1) the characteristic vector and the matrix of calls coincide with V and M, respectively, and
determine the form (2), in which all elements of V are equal to one. In the case of the complex, the characteristic vector and
the call matrix have the following form:
0 
0 
 </p>
      <p>M np </p>
      <p>Here V ip and M ip (i = 1, n ) denote the characteristic vector and the adjacency matrix for the graph of the i-th
program included in the graph of the complex. In the future, the matrix representation is used when performing
mathematical operations on software structures.</p>
    </sec>
    <sec id="sec-4">
      <title>1.4 The relation of the reach ability graph of program structures</title>
      <p>Let G = (X, E) - a graph of a program of modular structure; хi, xj - vertices belonging to X. If there is an oriented chain
from хi to xj in the graph G, then the vertex xj is reachable from the vertex хi. The following statement is true: if the vertex xj
is reachable from xl – из хj ,хl – from xj , then хl is reachable from хl. The proof of this fact is obvious.</p>
      <p>Consider a binary relation on the set X that determines the reach ability of one vertex of a graph to another. We
introduce the notation хi →хj - reach ability of the vertex xj from xi. The relation is transitive. Denote by D(хi)) the set of
vertices of graph G reachable from xi.. Then the equality</p>
      <p>xi  хi   D  xi  (5)
of determines the transitive closure of хi in relation to the achievability of tops. We prove the following theorems.</p>
      <p>Theorem 1. For the selected element of connectivity of the graph of the program structure, any vertex is reachable from
the root corresponding to the given vertex of the graph, i.e. the equality (х1 – root vertex).</p>
      <p>x1  х1  D  x1   X .</p>
      <p>Evidence. Suppose the vertex хi (хi  Х) is unattainable from x1. Then хi x1 and the set X' = X \ x1 - not empty.
Since the selected component of the graph is connected, there is a vertex хj x1 and a chain Н(хi, xj), leading from хi to
xj. Based on the acyclicity of the graph G, in X'' there should be a simple chain Н(хi,, xj), where the vertex хl does not include
arcs (this chain can be empty if X' consists only of xi). Consider the chain Н(xl, xj) = Н (xl, xi) U Н (xi, xj). This means that the
module xi is reachable from vertices х1 and хi and both vertices contain no incoming arcs. This contradicts the definition of a
graph of a modular structure with a single root vertex. The theorem is proved.</p>
      <p>The results of this theorem are important to substantiate
the requirement of the absence of oriented cycles in the x11 x 5
rgeraacphhaboiflitthye. pCroongsraidmerstthruecgturarpehwsihthowrenspinecFtigto. 3th.e notion of x 2 x 4 1</p>
      <p>From this figure it is clear that the graph contains a 1 1
directed cycle and modules corresponding to vertices х4, х5, x 3 x 6
х6 will never be executed.</p>
      <p>Thus, the results of theorem1 reinforce the requirement
that there are no oriented cycles in the graph of the program.</p>
      <p>We analyze the matrix representation of the reach ability
relation for the graph of the program structure Fig.1 with the
reach ability matrix A, which has the form (7).</p>
      <p>Coefficient aij = 1 if the module corresponding to the
index l is reachable from the module corresponding to the
index i the following results are based on the theorem from
graph theory.
 0
 0
А= 
 0

 0
 0

 0
(4)
(6)</p>
      <p>
        Theorem 2. The coefficient mij of the l-th degree of the adjacency matrix Мl determines the number of different routes
containing l arcs and connecting vertex xi to the vertex of the xj –oriented graph. The proof of this theorem is given in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
Consider the following three consequences of this theorem.
      </p>
      <p>Corollary 1.1. Matrix M = n М i , where M is the adjacency matrix of a directed graph with n vertices coincides up
l1
to the numerical values of the coefficients with the reachability matrix A.</p>
      <p>Evidence. In a directed graph containing n vertices, the maximum path length without repeating arcs cannot exceed n.
Therefore, the sequence of degrees of the adjacency matrix Mi, where i = 1,2, ..., n determines the number of all possible
paths in the graph with the number of arcs ≤ p. Let the coefficient mij of the matrix M be different from zero. This means
that there is a degree of matrix М i in which the corresponding coefficient mij is also nonzero. Therefore, there is a path
from vertex xi to xj, i.e. vertex xj is reachable from xi. This consequence determines the connection of the matrix of calls of
the graph of the modular structure M, coinciding with the reachability matrix A, and determines the algorithm for
constructing the latter.</p>
      <p>Corollary 1.2. Let there be a coefficient mii &gt; 0 for some i in the sequence of degrees of the adjacency matrix Mi. Then
there is a cycle in the original graph.</p>
      <p>Evidence. Let mii &gt; 0 for some l. Therefore xl reachable from xi, i.e. there is a cycle. According to the theorem, this cycle
has l arcs (generally repeated).</p>
      <p>Corollary 1.3. Let the n-th degree of the adjacency matrix of the Мп of the acyclic graph coincide with the zero matrix
(all coefficients are zero).</p>
      <p>Evidence. If the graph is acyclic, then the simplest path cannot have more than п – 1 arcs.</p>
      <p>If Мп has a coefficient other than zero, then there must be a path consisting of n arcs. And this way can only be oriented
cycle. Therefore, all coefficients of Мп for an acyclic graph are zero. This consequence provides a necessary and sufficient
condition for the absence of cycles in the graph of a modular structure.</p>
      <p>For acyclic graphs, the reachability ratio is equivalent to a partially strict order. The transitivity of the reachability ratio
was considered above. Anti-symmetry follows from the absence of oriented cycles: if the vertex xj is reachable from xj,
then the opposite is not true.</p>
      <p>We introduce the notation xi&gt;xj if vertex xj is reachable from vertex xi.</p>
      <p>Let G = (X, E) be an acyclic graph corresponding to some program structure.</p>
      <p>Consider the decreasing chain of elements of a partially ordered set X: xi1 &gt;xi2 &gt;…&gt; xin . …,
where " &gt; ” denotes the reachability ratio.</p>
      <p>Since X is finite, the chain breaks. The vertex xin has no outgoing arcs, i.e. the element xin is minimal (it corresponds to a
module that does not contain access to other modules). The maximum element in the set X is the root vertex.</p>
      <sec id="sec-4-1">
        <title>2 Mathematical operations on the graph elements</title>
        <p>Mathematical operations (U, , /, +, - ) on graphs are performed at the level of abstractions of elements of program
structures that lead to changes in graph elements and characteristic functions of systems: S = (G, χ).
Let S1 = (G1, χ1) and S2 = (G2, χ2) be two graphs of program structures G1 = (Х1 , E1 ) and G2 = (X2, E2)
respectively.</p>
        <p>We introduce the following notations:
D (х) – the set of vertices reachable from the vertex x;
D*(x) – the set of vertices from which vertex x is reachable.</p>
        <p>The same symbols are used for the same vertices included in the graphs G1 and G2. The main operations on the program
structures are discussed below</p>
        <p>Merge (join) operation S =S1 U (9)
is intended to form a graph of the structure of the complex and is formally defined as follows S1 and S2 – any program
structures that satisfy the definitions of claim 1:</p>
        <p>G = G1  G2,
where the symbol denotes a direct sum provided:</p>
        <p>Х = Х1  Х2, E1  E2 ,
χ (х) = χ1(х), if χ  X1,
χ (х) = χ2(x), if χ  Х2.</p>
        <p>The same vertices included in G1 and G2 are represented by different objects in the operations of combining program
structures. The characteristic vector and adjacency matrix of the program structure S are defined as follows:
V1,2 =  V1 
 , M1,2 =

V2 
where V1,2 and M1,2 are characteristic vectors and adjacency matrices of modular structures S1 and S2 respectively. This
operation is associative, but not commutative – the order of the operands determines the order of the components of the
complex.
(10)
(11)</p>
        <p>It should be noted that if the operands S1 and S2 satisfy the conditions for defining program structures, the result S will
also satisfy the same requirements. The join operation increases the number of connected graph elements. In addition, the
column structures may themselves have multiple items of connectedness. For the rest of the operation counts of the
operands and result are the only element of connection.</p>
        <p>The connection operation. We denote by xi and xj the root vertices of graphs G1 and G2 of program structures S1 and S2,
respectively. This operation</p>
        <p>S = S1 + S2 (12)
which is execute if these structures meet the following conditions:
- set X' = X2  X2 not empty;
- vertex xj  X' and χ (хj) = 0;
- D* (х)  D (x) = 0 for every х Х', where D* (х)  X1 и D (х)  X2;</p>
        <p>- G = G1 U G2, X = X 1 U X2 , E = E1 U E2, (13)
The characteristic function χ is satisfied under the condition:</p>
        <p>χ(х) = χ1(х), if х  Х1 \ X';
Х(х) = mах (χ1(х), χ2 (x))&gt; if х  X',</p>
        <p>χ(х) = χ2(х), if х  Х2 \ X' .</p>
        <p>First condition means that there are common vertices in graphs G1 and G2. According to the second condition, the root
vertex G2 belongs to the common part and for S1 the object corresponding to xj is not included in the program structure yet.</p>
        <p>The third condition prohibits the existence of cycles in the result graph. Indeed, if there is хп  D*(x)  D(x) , then хп&gt; х
and x &gt; хn, and x &gt; хn, then this means the existence of a cycle.</p>
        <p>If S1 and S2 satisfy the above conditions, the connection operation is partial.</p>
        <p>Let us determine whether the result of the connection operation belongs to the class of program structures. Since X'' is
not empty, the graph G has one connected component. The root vertex of the graph G is xi. The graph G itself has no
oriented cycles, i.e. is acyclic.</p>
        <p>Thus, S belongs to the class of program structures under consideration.</p>
        <p>This connection operation is not commutative and is generally not associative. To show that this operation is not
associative, consider the result S = (S1 + S2) + S3, where the root vertices of graphs G2 and G3 are part of the vertices of
graph G1 and Х2  Х3 ≠ 0.</p>
        <p>Then the result of the S2 + S3 join operation is undefined.</p>
        <p>The operation of projection. Let S1 = (G1, χ1) be a program structure and хiХ1. The operation of projection of this
structure to the top of the graph S1 is denoted as S = Рrxi(S1) and is defined as</p>
        <p>G(X, Г), Х = x i , E = {(xi, xj, K)| xi, xj X}, (14)
and for the characteristic function is χ(х) = χ1(х), if х  Х. The projection operation defines the program structure S1 in
the structure S. let's check the belonging of the structure S to the class of the considered program structures. If the graph of
the structure S1 is connected acyclically, then the same properties will be possessed by the graph G. There is a single root
vertex xi in the graph G. Thus, the program structure S belongs to the class under consideration.</p>
        <p>The difference operation for program structures is defined as follows. Let S1 = (G1, χ1) be a program structure and xi 
Х1. The difference operation is performed on this structure and its projection to the vertex xi of the corresponding graph (хi
is not the cortical vertex of the graph G1). Formally, the difference operation of the program structure has the form:</p>
        <p>S = S1 - Prxi (S1
and defined as follows</p>
        <p>E = {(xi , xj , K) | xi , xj  X } ,
where the set X' consists of such elements for which</p>
        <p>G = {X, E), X = (X1 \ xi )  X'</p>
        <sec id="sec-4-1-1">
          <title>Here, the characteristic function χ is defined as:</title>
          <p>X' = {x'j | (xl X1 \ xi ) &amp; (x'j  xi ) &amp; (xl , x'j ,K)E
(15)
(16)
(17)
χ(х) = χ1(х), если х  Х1 \ xi ;</p>
          <p>χ(х) = 0), если х  X' .</p>
          <p>The set X includes vertices that are not included in the set xi , and those vertices xi that include arcs from vertex X1 \
xi (sets X'). The characteristic function for elements х'  X' is zero. The difference operation is the inverse of the join
operation, i.e. the equality is performed:</p>
          <p>S - Pr (S) + Pr (S) = S. (18)</p>
          <p>xi xi</p>
          <p>Let us check that S, defined in (15), belongs to the class of program structures. If the graph is G, connected and
acyclic, then the graph G1 will have the same properties. The root vertex G is the same as the root vertex G1. Thus, S
satisfies the conditions for determining the program structure given in paragraph 1.</p>
          <p>Let S* be the set of program structures given by the direct product G* X χ*, where G* and χ* are the set of graphs and
the set of characteristic functions. Denote by Ω = {U, , /, +, -} - set of mathematical operations on program structures and
P, C and R - predicates of:</p>
          <p>Ω = {U, , /, +, - , P, C, R (19)</p>
          <p>Thus, an algebraic system  = (S, Ω ) over a set of program structures and operations on them (union, connection,
differences and projections) is defined.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>2.1 Characteristics of simple and complex graph structures</title>
      <p>Among the variety of program structures there are three main ones – a simple, complex structure with a call of
modules from the external environment and a dynamic structure. The main purpose of various structures is the
most optimal use of the main memory during the execution of the unit.</p>
      <p>Simple structure. An aggregate with a simple structure is created in the process of building modules based on the
operations of link calls. The amount of main memory occupied by an aggregate with a simple structure is constant and
n
equal to the sum of the volumes of individual modules: Vs =  vi , where vi is the amount of memory occupied by the i-th
i1
module. The corresponding graph of a modular structure is always connected.</p>
      <p>Complex structure. Assembly of complex structures with dynamic invocation of modules in the shared memory is
created in the Assembly process of the modules. In such an aggregate, the connections between the modules are not so rigid
and their sequence is determined by the modules included in the chain. The modules are loaded into the main memory at the
time of processing. When finished, the memory is freed and used to load another module. The graph of a complex program
structure is also connected (Fig.4) and is reflected in the matrix (2).
l0,n+p=v01+ … +vrp,n+p = v0  v1 +…+ v2 p  vn p = v0 +v1 +…+vrp+ vn p = v1+ … + vrp.</p>
      <p>2 2 2 2
This length l0, n+p will be equal to the sum of the memory modules for path х1,..., хrр.</p>
      <p>Thus, applying Floyd's algorithm to the graph in Fig. 2, we solve the problem of calculating the amount of memory for
the maximum chain.</p>
      <p>3). We replace the adjacency matrix with the path matrix. For each mij&gt;0, the corresponding location will be vij. The
values тij = Ø are replaced by – ∞. The program implementing Floyd's algorithm has the following form (it is assumed that
the path matrix is described as a two-dimensional matrix (п  n): this length l0, n+p will be equal to the sum of the memory
modules for path х1, хrр.
For k = 1 to n do</p>
      <p>For I = 1 to n do</p>
      <p>For j = 1 to n do</p>
      <p>if M[I, j ] &lt; M [ i l k] + M[k, j] then M [I, j]: = M [ i , k] + M[k, j].</p>
      <p>As a result of this algorithm, a matrix of maximum paths will be constructed. The maximum of l0, п+p will determine the
minimum amount оf l0, п+p memory for the memory-overlapping aggregate.</p>
      <p>
        The most complex structure for the values V0min ≤ V0 ≤ V0max can be constructed by following the algorithms proposed in [
        <xref ref-type="bibr" rid="ref4 ref5 ref6 ref7">4-7</xref>
        ].
The qualitative dependence of V0 on the number of dynamic sites is shown in Fig.5. Here п is the number of modules in the unit.
Despite the different kind of curves, they have a common pattern – any V0 is enclosed between the values of v0max и v0min.
      </p>
      <p>Dynamic structure. The mechanism of dynamic links between modules is different from the call mechanism. Dynamic
objects are loaded into the main memory when they are accessed. By analogy, we call the volume loaded with a single
treatment of a dynamic element, has its own program structure, for which the adjacency matrix is composed. If the same
modules are found in different dynamic structures, they are different objects.</p>
      <p>The original graph is used for illustration (Fig.1). Let the module corresponding to the vertex х1, be dynamically called
from the module corresponding to the vertex х3. The resulting modified graph is shown in Fig. 6. A dashed arrow indicates a
dynamic call. The module corresponding to the vertex x6, occurs twice.</p>
      <p>We construct an adjacency matrix for this aggregate. Each dynamic element will have its own CAL.L. To distinguish a
dynamic call, the corresponding matrix elements will contain negative numbers whose absolute values specify the number
of dynamic calls between the data of the module pair. The adjacency matrix will look like:</p>
      <sec id="sec-5-1">
        <title>We investigate the qualitative dependence of the</title>
        <p>amount of RAM on the number of dynamic segments
(Fig.5 and Fig. 6).</p>
        <p>With one component in the software unit of a simple
structure we have V1d = V .</p>
        <p>s</p>
        <p>If each dynamic component consists of one module,
then the modified Floyd algorithm finds the maximum
path and Vdn =V0min.</p>
        <p>Curve 1 defines a relationship in which different segments do not have the same modules. Curve 2 describes the
dependence for the case when different segments have the same modules. For them, the required memory increases due to
the duplication of such modules. However, dependence 2 is typical for the case when there are no identical modules in
dynamic structures and they are written in high-level LP. These modules are handled by utility tools – memory
management, I /o, emergency handling, etc.</p>
        <sec id="sec-5-1-1">
          <title>3 Operations of assembling elements of graph g</title>
          <p>Let the graph G be represented by the set of modules Х= {х1, х2... хт}, as described in PL, and located at the vertices of the
graph. The modules are assembled into a software unit. In this case, each pair of modules хi, хj (i, j – languages from the set of
LP are connected by the relation of call on the basis of which the module of communication х'ij is formed. In General, for
simple program structures, the aggregate contains link communication (call) operators and forward and reverse transformations
of data types passed from the calling module (in i-language) to the calling module (in j-language) and back [23].</p>
          <p>
            LP allows you to describe the information part - passport modules with a description of the transmitted data [
            <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref8 ref9">8-13</xref>
            ] and
operations call modules. Taking into account the passports of the modules, the software structure of the unit is built
(program - Prog, complex - Comp, package - Pac). The passport describes the special language WSDL containing: - a
subset of the operations associate link elements of the graph in the language L' that contains a description of the parameters
from the list of actual and formal parameters of the invocation; - mathematical operations on the graph and operations of
binding modules in a complex structure (Prig, Comp, Agar, Pack and so on).
          </p>
          <p>The operator modules link (make, config, assembling, etc. since 1994) takes the form:</p>
          <p>Link &lt;aggregate type&gt; &lt;aggregate name&gt; (&lt;main module name&gt;, &lt;additional list of module names&gt;) &lt;execution
mode&gt;,</p>
          <p>when constructing specific program structures, the vertices of the graph – modules can be marked with special symbols
ρ, denoting:
* – the beginning of the dynamic fragment with the vertex marked by this symbol;
+ - the module in the graph G is marked as the main program of the complex;
/ - means enabling debugging and so on.</p>
          <p>Using these designations, the graph G will take the form shown in figure 8 and has a representation:
E = { ( х 5 , х 7 , 1 ) , ( х 5 , x 8 , 1 ) , ( x 5 , х 8 , 2 ) } .</p>
          <p>The aggregate is given a unique name corresponding to the generated root module. For the graph E = {(х4, х6, 1)} a
fragment of operators providing a dynamic call will be formed in the communication module x'46. For a pair of modules
specified in Fig.8 vertices x4, x6, the structure of the corresponding part of the unit, including the communication module, is
shown in Fig. 9. Similarly links of modules and other types of calls are implemented.</p>
          <p>Thus, for a pair of modules xi, xj, a module of connection xij of the form:</p>
          <p>х'ij = S0 * (S1  S1T) * (S2  S2T) * S01,
where S0 is a fragment of the aggregate that defines the environment of xj module functioning;</p>
          <p>S1 – a fragment of the aggregate, including a sequence of calls to functions from the set {P, C, S}, each of which
performs the necessary conversion of the actual parameters when referring to the xj -module;</p>
          <p>S2 – a system with a fragment of operators for the inverse transformation of data types transmitted from xj to хi after its
execution;</p>
          <p>S01 – a piece of software structures with operators epilogue for the vertex xi, for the restoration of the environment.
Для описанных структур программ зададим операции link для сборки отдельных программ на рис.8:
Link Prog P1 (x1, x2);
Link Prog P2 (x1, x3) (x3, x6);
Link Comp P3 ((x1, x3) (x3, x5/ х'58)+ (x5, x7 (20)
Link Prog P4 (x1, x4), (x4, x6);
Link Comp (P1 U P2 U P3 U P4).</p>
          <p>The programs of the complex (aggregate, packets) are given unique names (P1, P2, P3, P4) corresponding to the root
names of modules in the chains of the graph.</p>
          <p>Thus, the process of constructing the program structure on the graph includes:
1. Enter the module description in the LP (L') and perform syntax checking.
2. Select the required modules and interfaces from the repositories and place them in the graph.
3. Translation of the unit modules in the LP.
4. Generation of communication modules for each interconnected pair of graph modules.</p>
          <p>
            5. Assembly of the elements of the graph in the finished structure, linking modules in the operating system (IBM, MS,
Oberon, Unix и др.) [
            <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5">1-5</xref>
            ].
          </p>
          <p>6. Test the system on data sets and assess the reliability of the unit.</p>
          <p>After the modules are built, the name of the software Assembly is entered into the boot library. If you create a fragment
that is later included in another aggregate, its name must match the name of the main module. In connection with the
transition to the Internet environment to work with various software and system services in the configuration assembly of
such tools provides security, data protection and quality assessment of ready-made modules, service resources and web
systems in Internet.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>3.1 Evaluation of the reliability and quality of systems</title>
      <p>The key characteristics of quality attributes is reliability and completeness as properties of the AS to eliminate failures with hidden
defects with this criterion and a quality model, which relates the measures and metrics of the internal, external and operational
type. From the standpoint of completeness of the product is the main indicator of quality are defects and failures.</p>
      <p>
        The model of defects based on multiple quality factors, analysis of causal relationships between them, combining
qualitative and quantitative assessments of their impact on the density of defects [
        <xref ref-type="bibr" rid="ref15 ref16 ref17 ref18 ref22">15-18, 22</xref>
        ]. To calculate the reliability
function uses a special formula:
      </p>
      <p>R ( t | T )  exp(  ( m (T  t )  m (T ))) ,</p>
      <p>Where t - the operating time of PS without a failure when testing in a period of time T; m (T) is a function of reliability
growth, as the average number of defects.</p>
      <p>The reliability of the software largely depends on the number remaining and corrected errors in the development process.
During operation, errors are also detected and eliminated. If the bug fixes are not made new, or at least new bugs introduced
is less than clear, in the course of operation reliability increases.</p>
      <p>To assess the quality systems used the standard quality model:
Mgua = {Q, A, M, W}, where
Q = {q1, q2, …, qi } i = 1,..., 6, – various quality characteristics (Quality – Q);</p>
      <p>A = { a1, a2,…, aj} j = 1,..., J, – the set of attributes (Attributes – A), each of which captures a separate property of the qi
quality characteristics;</p>
      <p>M = {m1, m2,..., mk} k =1,..., K, – the set of metrics (Metrics M) each element of the attribute aj for the measurement of
this attribute.</p>
      <p>W = {w1, w2,...,wn}, n = 1,..., N are weight coefficients (Weights W) for metrics of the set M.</p>
      <p>The quality standard identifies six basic quality characteristics: q1: functionality; q2: reliability; q3: use; q4: efficiency;
q5: maintainable; q6: portability.</p>
      <p>The quality q1 – q6 are assessed by the general formula:</p>
      <p>6
q 1   a 1 j m 1 j w 1 j</p>
      <p>j  1</p>
      <p>On the basis of obtained quantitative characteristics of the final grade is calculated by summing the values of individual
indicators and their comparison with the benchmark systems.</p>
      <p>
        Configuration of ready-made software recourses in the system
Under the configuration of the system is understood the structure of some of its version, including software elements,
combined with each other by link operations with parameters that specify the options for the functioning of the system [
        <xref ref-type="bibr" rid="ref1 ref16 ref17 ref18 ref19 ref2 ref20 ref21 ref22 ref3 ref4 ref5">1-5,
16-22</xref>
        ]. Version or system configuration according to the IEEE Standard 828-2012 (Configuration) includes:
– configuration basis – BC;
– configuration items;
– program elements (modules, components, services, etc.) included in the graph;
      </p>
      <p>Configuration Management is to monitor the modification of configuration parameters and components of the system,
as well as to conduct system monitoring, accounting and auditing of the system, maintaining the integrity and its
performance. According to the standard, the configuration includes the following tasks:
1. Configuration identification.
2. Configuration Control.
3. Configuration Status Accounting.
4. Configuration audit.
5. Trace configuration changes during system maintenance and operation;
6. Verification of the configuration components and testing of the system.</p>
      <p>
        A configuration build uses a system model and a set of out-of-the-box components that accumulate in the
operating environment repositories or libraries, and selects their operating environment Configurator (for example,
in http://7dragons.ru/ru). The Configuration assembles the components according to their interfaces [
        <xref ref-type="bibr" rid="ref1 ref15 ref2 ref3 ref4 ref5 ref9">1-5, 9, 15</xref>
        ] and
generates a system configuration file.
      </p>
      <p>The Configuration builds components and reuses for the AS using config operations to obtain the output PP file. The
product must be tested on a set of tests with the least number of errors. After that, the resulting PP is evaluated for quality
taking into account the incoming resources in the AS. For maintenance of PP the certificate of quality according to
standards has to be issued.</p>
      <sec id="sec-6-1">
        <title>4 The perspective technology for future</title>
        <p>
          Coordinated and parallel programming provides a division of the computational process into several subtasks (processes)
for TRAN’s computers and supercomputers, the results of which are sent via communication channels. Languages for
parallel programming - PVM, LAM. CHMP and MPI (Message Passing Interface) interface descriptions and OpenMP. The
POSIX standard provides messaging between programs in LP of C, C+ and Fortran [
          <xref ref-type="bibr" rid="ref15">15, 25</xref>
          ].
        </p>
        <p>Programming on classes, on a prototype in OOP and Object-component methods - OCM</p>
        <p>
          OCM are the mathematical design of systems by Graph from ready-made resources (objects, components, services, etc.)
to OM (Object Model). It is the formal method which transform the elements OM to a component model or a service
model [
          <xref ref-type="bibr" rid="ref15">15, 25, 32, 33</xref>
          ]. http://0x1.tv/20181122AF.
        </p>
        <p>
          Component paradigm. The basis of this paradigm - OCM graph in which vertexes graph are the components of the CRP
(reuses), interfaces and arcs specify the subject classification and the relationship between the vertices. Components are
described by the formalisms of the triangle of Frege [
          <xref ref-type="bibr" rid="ref15">15, 29</xref>
          ].
        </p>
        <p>
          Service-component paradigm. System and service-components - web resources implement intellectual knowledge of
specialists about applied fields in the Internet environment. Each implements some function and communicates with the
technological interface to interact with other services through protocols and provide Assembly and solution of applications
of different nature [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
        </p>
        <p>
          Methods of production of factories (Product Line/Product Family) programs and Appfab and certificate them of the
quality are discussed [
          <xref ref-type="bibr" rid="ref20">20, 23</xref>
          ].
        </p>
        <p>Application of the ontology language OWL (www.semantic_web.com), resource language (RDF) and intelligent agents
of ISO 15926 standard for networking. Ontology of Life Cycle and Computational geometry is a part of computer graphics
and algebra. Used in the practice of computing and control machines, numerical control etc. is also used in robotics (motion
planning and pattern recognition tasks), geographic information systems [27].</p>
        <p>The Agile methodology is focused on the close collaboration of a team of developers and users. It is based on a waterfall
model lifecycle incremental and rapid response to changing demands on PP. Variants of Agile: eXtreme Programming
(XP), SCRUM, DSDM…</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Internet Technologies</title>
      <p>Within the Internet (Things, Smart IoT) technologies are developing in the direction of creating smart computers, cities,
robots and devices for use in medicine, genetics, physics, etc. The information objects (IO) that specifies the digital
projection of real or abstract objects that use Semantic Web Ontology interoperability interfaces. IO through Web services
began more than 10 years ago. Interaction semantics IO is based on RDF and OWL language of ISO 15926 Internet 3.0.
The next step of the development of the Internet is Web 4.0, which allows network participants to communicate, using
intelligent agents. A new stage in the development of enterprise solutions-cloud (PaaS, SaaS) who spliced with Internet
space and used to create Adaptive applications. Cloud services interact through the Web page by using agents [28]. Internet
stuff (Internet of Things, Smart IoT) indicates the Smart support competing APPS using distributed micro services such as
Hyper cat (mobile communications); industrial Internet (Industrial), covering the new automation concepts-smart energy,
transportation, appliances, industry», and another.</p>
    </sec>
    <sec id="sec-8">
      <title>Computer nanotechnology</title>
      <p>Today computer nanotechnology is actually already working with the smallest elements, "atoms" similar to the thickness of
the thread (transistors, chips, crystals, etc.). For example, a video card from 3.5 million particles on single crystal,
multitouch maps for retinal embedded in the eyeglasses, etc.[28].</p>
      <p>
        In the future, ready-made software elements will be developed in the direction of nanotechnology by "reducing" to look
even smaller particles with predetermined functionality. Automation of communication, synthesis of such particles will give
a new small element, which will be used like a chip in a small device for use in medicine, genetics, physics, etc.[28-33].
In this article proposed the theoretical apparatus of graphs to create modular program structures. The graph theory allows us
to establish the shortest path of program elements (modules) and prove the correctness of binding graph modules using
adjacency matrices, reach ability and mathematical operations (association, connection, difference, etc.) in complex
program structures (complex, system, packets, etc.). Author are formulated the theoretical aspects of the application of
graph theory in [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref6 ref7 ref8 ref9">6-15</xref>
        ]. Since 2013, graph theory has been used in the modeling of complex systems of objects, components,
services, etc. (OCM) [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and has been used in the world practice in the transition to the Internet environment [6-14.
2229]. The paper describes the features of modeling systems using graph theory and mathematical operations on elements of
software structures with using Assembly operations (link, make, config, etc.), which are implemented in different
environments. Module objects testing and controlled on quality. After config programs elements – modules should be
verified and tested, then checked for quality. The AS made of them is checked according to standard ISO/IEC 9000 (1-4)
for quality, and then transferred to the customer (Project RFFI N19-01-00206).
      </p>
      <p>
        The graph theory, programming paradigms and ontology of mathematical modeling of applied problems for vital areas of
society (medicine, biology, physics, mathematics, economics, etc.) will become the main tools of smart machines of the
21st century [
        <xref ref-type="bibr" rid="ref15">15, 24-33</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Lavrischeva</surname>
            <given-names>E. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grishchenko</surname>
            <given-names>V. N.</given-names>
          </string-name>
          <article-title>The connection of multi-language modules in the OS of the ES</article-title>
          .- Moscow,
          <year>1982</year>
          .-
          <fpage>127p</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Lavrishcheva</surname>
            <given-names>E. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grishchenko</surname>
            <given-names>V. N.</given-names>
          </string-name>
          <article-title>Assembly programming. -</article-title>
          K.:
          <source>Of Sciences. Dumka</source>
          .
          <year>1991</year>
          .
          <article-title>-136p.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Lavrishcheva</surname>
            <given-names>E. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grishchenko</surname>
            <given-names>V. N.</given-names>
          </string-name>
          <article-title>Assembly programming Basics of software industry products'</article-title>
          .
          <source>K.: of Sciences.Dumka.-2009</source>
          .-
          <fpage>371p</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Glushkov</surname>
            <given-names>V. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stogniy</surname>
            <given-names>A. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lavrishcheva</surname>
            <given-names>E. M.</given-names>
          </string-name>
          <article-title>and others. System of automation of production of programs (The APROPOS)</article-title>
          .-Kiev,
          <year>1976</year>
          .-
          <fpage>134p</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Lipaev</surname>
            <given-names>V. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Posin</surname>
            <given-names>B. A.</given-names>
          </string-name>
          ,
          <article-title>Shtrik A. A. the Technology of Assembly programming</article-title>
          .-M.:
          <year>1992</year>
          .-284 p.
          <fpage>6</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Rimsky</surname>
            <given-names>G. V.</given-names>
          </string-name>
          <article-title>Structure and functioning of the modular automation system programmings</article-title>
          .
          <source>- Artificial intelligence: application in chemistry.-1987</source>
          .-
          <fpage>№</fpage>
          5.-p.
          <fpage>36</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Halstead</surname>
            <given-names>M. H.</given-names>
          </string-name>
          <article-title>the beginnings of a science about the programs</article-title>
          .- Perevod. with ang. -M.: Finance and statistics.-
          <year>1981</year>
          .-
          <fpage>201p</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Horn</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Winkler</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <article-title>Design of modular structures</article-title>
          .
          <article-title>- Computer technology of the socialist countries</article-title>
          .
          <source>- 1987</source>
          .- Issue .21.-p.
          <fpage>64</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Koval</surname>
            <given-names>G. I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korotun</surname>
            <given-names>T. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lavrishcheva</surname>
            <given-names>E. M.</given-names>
          </string-name>
          <article-title>On one approach to solving the problem of intermodule And technological interface// All. the collection of the Academy of Sciences and Min</article-title>
          .University of the USSR.
          <article-title>-1987.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Agafonov</surname>
            <given-names>V. N.</given-names>
          </string-name>
          <article-title>Program specification: conceptual tools and their organization</article-title>
          .
          <source>- Novosibirsk. - Science</source>
          ,
          <year>1987</year>
          . -
          <fpage>380p</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Kotov</surname>
            <given-names>V. E.</given-names>
          </string-name>
          ,
          <article-title>Introduction to the theory of program schemes</article-title>
          ,
          <source>Novosibirsk</source>
          ,
          <year>1978</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Nepeyvoda</surname>
            <given-names>N. N.</given-names>
          </string-name>
          <article-title>Program logic</article-title>
          .
          <source>- Programming</source>
          ,
          <year>1979</year>
          , №
          <volume>1</volume>
          , p.
          <fpage>15</fpage>
          -
          <lpage>25</lpage>
          ;
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Evstigneev</surname>
            <given-names>A. N.</given-names>
          </string-name>
          <article-title>Graph theory in programming</article-title>
          , Moscow, Nauka. -
          <year>1985</year>
          . -
          <fpage>351p</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Ershov</surname>
            ,
            <given-names>A. P.</given-names>
          </string-name>
          ,
          <article-title>introduction to the theory of programming</article-title>
          .-Moscow.-1977. -
          <fpage>287p</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Lavrischeva</surname>
            <given-names>E. M.</given-names>
          </string-name>
          <article-title>The theory of object-component modeling of software systems</article-title>
          .
          <source>Preprint the Russian Academy of Sciences, No. 29</source>
          , 2016 - M: 48 p.
          <source>ISBN 078-5-91474-025-9</source>
          .13;
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Lavrischeva</surname>
            <given-names>E. M.</given-names>
          </string-name>
          <string-name>
            <surname>Ryzhov</surname>
            <given-names>A. G.</given-names>
          </string-name>
          <article-title>Application the theory of General data types of ISO/IEC 11404 GDT Standard in relation to Big Data.- The conference “Actual problems in science and ways their development”</article-title>
          ,
          <source>27 December</source>
          <year>2016</year>
          , http://euroasia-science.ru.- p.
          <fpage>99</fpage>
          -
          <lpage>110</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Lavrischeva</surname>
            <given-names>E. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mytulyn</surname>
            <given-names>V. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozin</surname>
            <given-names>S. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ryzhov</surname>
            <given-names>A. G.</given-names>
          </string-name>
          <article-title>Creation of the application and information systems from ready-made Internet resources</article-title>
          .
          <source>The proceedings of ISP RAS</source>
          .-M.:
          <year>2018</year>
          , Volume
          <volume>30</volume>
          .
          <string-name>
            <surname>Issue</surname>
          </string-name>
          .1 p.
          <fpage>27</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Lavrischeva</surname>
            <given-names>E. M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Ryzhov</surname>
          </string-name>
          .
          <article-title>Approach to modeling systems and sites from ready-made resources.- XX AllRussian conference</article-title>
          ,
          <source>September 17-22</source>
          ,
          <year>2018</year>
          . Novorossiysk.-IPM
          <string-name>
            <surname>im.</surname>
            <given-names>M. V.</given-names>
          </string-name>
          <string-name>
            <surname>Keldysh</surname>
          </string-name>
          .
          <article-title>- Report presentation. Publication in the collection</article-title>
          .-p.
          <fpage>321</fpage>
          -
          <lpage>345</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>I. B.</given-names>
            <surname>Burdonov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Kosachev</surname>
          </string-name>
          ,
          <string-name>
            <surname>V. V.</surname>
          </string-name>
          <article-title>Kulyamin correspondence Theory for systems with locks</article-title>
          and
          <source>Destructions</source>
          .- Moscow,
          <year>2008</year>
          . -
          <fpage>411p</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Lavrischeva</surname>
            <given-names>E. M.</given-names>
          </string-name>
          <article-title>Software Engineering of computer systems</article-title>
          . Paradigms, technologies,
          <source>CASE- means - Sciences. Dumka.- 2014</source>
          .-
          <fpage>284p</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Bruno</surname>
            <given-names>Courcelle</given-names>
          </string-name>
          ,
          <article-title>Joost Engelfriet Graph structure and monadic second-order logic. A language-theoretical approach ( hal id: hal-oo646514) and Theory graph (wikipedia</article-title>
          .ru, Foxford.ru).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Lavrischeva</surname>
            <given-names>E. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pakulin</surname>
            <given-names>N.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ryjov</surname>
            <given-names>A.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zelenov</surname>
            <given-names>S. V.</given-names>
          </string-name>
          <article-title>Analysis of methods of assessment reliability of equipment and systems</article-title>
          .
          <source>Practice of application of methods of reliability.-Scientific- practical conference - OS DAY</source>
          , Moscow,
          <fpage>17</fpage>
          -18th
          <year>2018</year>
          .
          <source>The proceedings of ISP RAS, том5 DOI: 10</source>
          .15514/ISPRAS-2018-
          <volume>30</volume>
          (
          <issue>3</issue>
          ),
          <year>2018</year>
          . (http://0x1.tv/20180517F).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>