<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Methods of nulling numbers in the system of residual classes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>V. N. Karazin Kharkiv National University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svobody sq.</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kharkiv</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine v.a.krasnobaev@gmail.com</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>kuznetsova.tatiana</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>@gmail.com</string-name>
          <email>dr.smirnovoa@gmail.com</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Central Ukrainian National Technical University</institution>
          ,
          <addr-line>avenue University, 8, Kropivnitskiy, 25006</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Poltava National Technical Yuri Kondratyuk University</institution>
          ,
          <addr-line>Poltava</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The article presents the nullification of numbers in the system of residual classes (SRC). This method is widely used in the non-positional number system in the SRC with the need to determine positional characteristics. Two methods of nullification are presented in the article: the method of successive subtractions and the method of parallel subtractions. Based on these methods, algorithms are developed for their implementation. The essence of the method of successive subtractions is that the nullification procedure is carried out consequently from the junior foundation to the oldest. The essence of the parallel subtraction method is that the nullification procedure is carried out parallel in time for two reasons. It is advisable to use these methods in the implementation of operations of comparing numbers in the SRC, and in monitoring data presented in the SRC. The estimation of these methods by the number of equipment and by the time of implementation of the nullification procedure is made. In terms of the efficiency of the nullification procedure, a parallel subtraction method was proposed.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Methods of data control in the system of residual classes
based on the principle of nulling
One of the methods for determining the correctness of a number is the nulling
(nullification) method, which consists in the transition from the initial number.</p>
      <p>
        A  (a1, a2 , ..., an , an1)
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
to the number:
      </p>
      <p>
        AZ  (0, 0, ..., 0, n1)
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
with the help of such a sequence of transformations in which there is no output
outside the working range of the system of residual classes (SRC) [1-8].
      </p>
      <p>The process of nulling a number consists in successively subtracting from this
number the nulling constants of the form:
(m1.1, m1.2 , ..., mn1) , where m1.1  (1, 2, ..., m1 1) ;
(0, m2.2 , ..., mn1,2 ) , where m2.2  (1, 2, ..., m2 1) .</p>
      <p>In this case, the number A  (a1, a2 , ..., an , an1) is sequentially converted to a form
A  (0, a2 , ..., an , an1) , then to a number A  (0, 0, ..., an, an1) etc.</p>
      <p>By repeating the process n times, we get:</p>
      <p>A(Z )  (0, 0, ..., 0,  n1) .</p>
      <p>If  n1  0 , then the original number is correct and lies in the range [0, M ) , if
 n1  0 , then the number is incorrect and lies in the range [ jM , ( j 1)M ) , for
j  (1, 2, ..., mn1 1) , where ( j 1) is the value of the number of the interval in
which the operand A falls.</p>
      <p>We show that an error A can transfer the correct number A , lying in the interval
[0, M ) , only in one of the two intervals.</p>
      <p>We write A  A  A , i.e.</p>
      <p>
        A  (a1, a2 , ..., an , an1)  (0, 0, ..., ai , ..., 1) .
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
      </p>
      <p>Obviously, A is not in the first (working) interval [0, M ) , since the first interval
contains the correct number:</p>
      <p>Let A be in the k -th interval:
We write the system of two inequalities:
Add up the two inequalities:</p>
      <p>A0  (0, 0, ..., 0, 0) .
(k 1)M  A  kM .
0  A  M ,

(k 1)M  A  kM .</p>
      <p>(k 1)M  A  A  (k 1)M .</p>
      <p>Let j  k 1 , then we can write:
jM</p>
      <p> A  ( j  2)M ,
i.e. an error may cause the correct operand to be incorrect, lying only in one of two
intervals [ jM , ( j  1)M ) or [( j 1)M , ( j  2)M ) .
2</p>
      <p>Method of successive subtractions</p>
      <p>
        Consider the nulling procedure in terms of the time of its implementation. The e
ssence of the first (Z1), the basic in the theory of SRC, nullification procedure (the
procedure of sequential nullification (SN)) consists of a sequence of operations for
subtracting in form:
by means of a set of NC of the form (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ):
      </p>
      <p>
        For example: performing the first subtraction operation:
... || an(0)3 || an(0)2 || an(0)1 || an(0) || an(0)1 ]  [t1(0) || t 2(0) || t3(0) ||
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
performing the second subtraction:
|| [a(0)  t (0) ] mod m
3 3
3
      </p>
      <p>with the help of a sequence of operations that does
not result in the output of the numerical value of the number А(0)
range
[0, M)
of
the</p>
      <p>SRC.</p>
      <p>
        In
this
case,
the
over the working
initial
A(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )  (0, 0, 0, a4(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) , ..., an(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) , an(3)1 ) and so on.
By repeating the subtraction n times, we get the value A(Z )  (0 || 0 || ... || 0 || an(n)1 ) , or
A(Z )  (0 || 0 || ... || 0 ||  n1 ) , where  n1  an(n)1 . The SN procedure is shown in Fig. 1.
[a(0)  t(0) ] mod m3 || ...
      </p>
      <p>3 3
3
4
5
6</p>
      <p>
        [a(0)  t (0) ] mod m
i 1 i 1
[a(0)
n3
|| ...
[a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )  t (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) ] mod m
n1 n1
n1
 
7
8
For
value
A(i )
the
value
of
the
remainder
a (
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
4
of
a
|| ...
      </p>
      <p>
        [a(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
n3
 t (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) ] mod m
n3
n3
|| [a(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
n2
 t (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) ] mod m
n2
n2
[a(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
n1
 t (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) ] mod m
n1
n1
|| [a(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )  t (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) ] mod m
n n
n
|| [a(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
n1
 t (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) ] mod m
n1
n1
  [0 || 0 || 0 || 0 || a(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) ||
5
|| a(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) || a(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) || a(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) ||
i1 i i1
...
      </p>
      <p>
        a(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) || a(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) || a(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
n3 n2 n1
a(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) || a(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) ] .
      </p>
      <p>n n1</p>
    </sec>
    <sec id="sec-2">
      <title>Appeal by the</title>
      <p>value</p>
      <p>0 0 || an(n12) || an(n2) || an(n12)] in BNCn2 for the NC
Performing a subtraction operation A(n1)  A(n2)  NC(n2)  [0 || 0 || 0 |
2n ...|| 0 || 0 || 0 || tn(n1) || tn(n11)] 0 || 0 0 ...|| 0 0 || 0 ||... 0 0 0
||[an(n1) tn(n1)]modmn [an(n11) tn(n11)]modmn1 [0|| 0|| 0|| || 0|| 0|| 0||
... 0 || 0 || 0 0 an(n)1] , где an(n)1   n1.</p>
      <p>TZ1  2n add</p>
      <p>
        Denoting the sampling time of the NC from the corresponding nullification block
(NB) of the CS functioning in the SRC as t1, and the time of subtracting from the
number А(i-1) the constant NC(i-1), i.e. performing the operation А(i) = А(i-1)  NC(i-1) – as
t2, we get the total time ТZ1 of the nullification procedure for the first Z1 method:
ТZ1 = n (t1 + t2).
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
      </p>
      <p>Parallel subtraction method</p>
      <p>
        Consider the following method (Z3) of operational control of data in the SRC
(parallel nullification method (PNM)). The essence of the proposed control method is that
the nullification procedure is carried out parallel in time for two reasons. For n -even
numbers, we have аі(i–1), an(ii1)1 ( i  1, n / 2 ), namely a1(0), an`(0); a2(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), an–1(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ); a3(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), an–
2(
        <xref ref-type="bibr" rid="ref2">2</xref>
        );… an(n/2/2) , an( n/2)/21) (see Fig. 2). For n -odd numbers, we have a1(0), an(0); a2(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), an–1(
        <xref ref-type="bibr" rid="ref1">1</xref>
        );
a3(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), an(2)2 ; … a((n1)/21) (see Fig. 3). In this case, for an arbitrary value i of NC for
(n1)/2
the corresponding number, have the following form: A(i)  [0|| 0|| || 0|| ai(i)1 || a(i) ||...
i2
izeroes
izeroes
...|| a(i)
      </p>
      <p>ni1 || an(i)i || 0|||| 0|| 0|| an(i)1 ] ,
. . .</p>
      <p>a(i1)
i
ai(i11)
. . .</p>
      <p>an(2)1
For an arbitrary value i we have that:</p>
      <p>A(i1)  A(i)  NC(i) 
[0 || 0 || ... || 0 || ti(i)1 || ti(i)2 || ti(i)3 ||</p>
      <p>|| tn(i)i2 || tn(i)i1 || tn(i)1 || 0 ... 0 || tn(i)1 ] 
... 0
[a(i)  t (i) ] mod m
i1 i1
i1
...
. . .
. . .</p>
      <p>The algorithm for performing the PNM procedure is presented in Table. 2. Before
getting the value 
n1
 a(n/ 2) for n - even number, we have that:
n1
n/ 21zeroes
n/ 21zeroes
A(n/ 21)
n
A(Z )  A(n/2)  [0 || 0 || ... || 0 || ... || 0 || 0 ||  n1  an(n/12) ] .
|| 0 || t((n1)/ 21) ] ,</p>
      <p>n1</p>
      <p>.
value
and
|| ...
...
value
and
value
A(i )</p>
      <p>
        A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )  A(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )  NC (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )  [0 || a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) || a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) ||
2 3
||
|| ...
value
and
Appeal by the value of the remainders
and
a (i 1)
n i 1
value
A(i 1)
n 1
      </p>
      <p>A(i)  A(i 1)  NC (i 1)  [0 || 0 || 0 || ...
... 0
||
|| ...
value
and
a(i )
ni
...
Further for n even n odd numbers we get: for n even number. Appeal by
the
value
of
the
remainders
a ( n / 21)
n / 2
and
a ( n / 21)
n / 21
of
a
number
A(n/ 21)  [0 || 0 ||</p>
    </sec>
    <sec id="sec-3">
      <title>For n odd number.</title>
      <p>value
of
the</p>
      <p>remainder
in
((n1)/ 21) || 0
(n1)/ 2</p>
      <p>odd numbers, we obtain the following values of the
... 0
a(n/ 2)  , where
n1 
n

n1</p>
      <p>... 0
|| [a((n1)/ 21)  t ((n1)/ 21) ] mod m
n1 n1
n1</p>
      <p>  [0 || 0 || ...
where 
n1
 a((n1)/ 2) .</p>
      <p>n1
0 ...</p>
      <p>0
0 || a((n1)/ 2) ] ,</p>
      <p>n1
T</p>
      <p>Z 3</p>
      <p> n </p>
      <p>The time ТZ3 for performing the zeroing procedure for the first (Z3) method of the
PNM is defined as:
 n 
 2 
i 1</p>
      <p>When implementing the nullification procedure for the second (Z3) method in the
block of nullification constants (NB) of the calculator in the SRC, it is necessary to
have K</p>
      <p>Z 3
  (m  m
i</p>
      <p> 1) nullification constants. In this case, the number of NZ3
double
digits</p>
      <p>Conclusions</p>
      <p>The article presents the nullification of numbers in the system of residual classes
(SRC). This method is widely used in the non-positional number system in the SRC
with the need to determine positional characteristics. Two methods of nullification are
presented in the article: the method of successive subtractions and the method of
parallel subtractions. Based on these methods, algorithms are developed for their
implementation. The essence of the method of successive subtractions is that the
nullification procedure is carried out consequently from the junior foundation to the oldest.
The essence of the parallel subtraction method is that the nullification procedure is
carried out parallel in time for two reasons.</p>
      <p>It is advisable to use these methods in the implementation of operations of
comparing numbers in the SRC, and in monitoring data presented in the SRC [9-13]. The
estimation of these methods by the number of equipment and by the time of
implementation of the nullification procedure is made. In terms of the efficiency of the
nullification procedure, a parallel subtraction method was proposed.</p>
      <p>The obtained research results can be useful for various methods of increasing the
reliability and fault tolerance of computer systems [14-18].
7. V. Krasnobayev, A. Kuznetsov, M. Zub, K. Kuznetsova. Methods for comparing numbers
in non-positional notation of residual classes. In Proceedings of the Second International
Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), Zaporizhzhia,
Ukraine, April 15-19, 2019., pp. 581–595. 2019.
8. V. Krasnobayev, A. Kuznetsov, I. Lokotkova and A. Dyachenko, "The Method of Single
Errors Correction in the Residue Class," 2019 3rd International Conference on Advanced
Information and Communications Technologies (AICT), Lviv, Ukraine, 2019, pp. 125-128.
doi: 10.1109/AIACT.2019.8847845
9. E. Dubrova, "Fault-Tolerant Design: An Introduction" course notes, Royal Institute of</p>
      <p>Technology, Stockholm, Sweden, 2013, 147 p. https://pld.ttu.ee/IAF0530/draft.pdf
10. V. Krasnobaev, A. Kuznetsov, V. Babenko, M. Denysenko, M. Zub and V. Hryhorenko,
"The Method of Raising Numbers, Represented in the System of Residual Classes to an
Arbitrary Power of a Natural Number," 2019 IEEE 2nd Ukraine Conference on Electrical
and Computer Engineering (UKRCON), Lviv, Ukraine, 2019, pp. 1133-1138. doi:
10.1109/UKRCON.2019.8879793
11. M. Radu, "Reliability and fault tolerance analysis of FPGA platforms," IEEE Long Island
Systems, Applications and Technology (LISAT) Conference 2014, Farmingdale, NY, 2014,
pp. 1-4.
12. A. Yanko, S. Koshman and V. Krasnobayev, "Algorithms of data processing in the
residual classes system," 2017 4th International Scientific-Practical Conference Problems of
Infocommunications. Science and Technology (PIC S&amp;T), Kharkov, 2017, pp. 117-121.
13. V.A. Krasnobayev, A.S. Yanko, S.A. Koshman. “A Method for arithmetic comparison of
data represented in a residue number system” Cybernetics and Systems Analysis, vol. 52,
issue 1, pp. 145-150, January 2016. DOI: 10.1007/s10559-016-9809-2
14. S. Shu, Y. Wang and Y. Wang, "A research of architecture-based reliability with fault
propagation for software-intensive systems," 2016 Annual Reliability and Maintainability
Symposium (RAMS), Tucson, AZ, 2016, pp. 1-6.
15. S. S. Gokhale, M. R. Lyu and K. S. Trivedi, "Reliability simulation of component-based
software systems," Proceedings Ninth International Symposium on Software Reliability
Engineering (Cat. No.98TB100257), Paderborn, Germany, 1998, pp. 192-201.
16. A. Tiwari, Karen Tomko "Enhanced Reliability of Finite State Machines in FPGA
Through efficient Fault Detection and Correction", IEEE Transaction on Reliability, vol.
54, nr.3, pp. 459-467.
17. C. M. Reddy and N. Nalini, "FT2R2Cloud: Fault tolerance using time-out and
retransmission of requests for cloud applications," 2014 International Conference on Advances in
Electronics Computers and Communications, Bangalore, 2014, pp. 1-4.
18. C. Braun and H. Wunderlich, "Algorithm-based fault tolerance for many-core
architectures," 2010 15th IEEE European Test Symposium, Praha, 2010, pp. 253-253.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>D. I.</given-names>
            <surname>Popov</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Gapochkin</surname>
          </string-name>
          ,
          <article-title>"Development of Algorithm for Control and Correction of Errors of Digital Signals, Represented in System of Residual Classes,"</article-title>
          <source>2018 International Russian Automation Conference (RusAutoCon)</source>
          , Sochi,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Y. N.</given-names>
            <surname>Kocherov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Samoylenko</surname>
          </string-name>
          and
          <string-name>
            <surname>A. I. Koldaev</surname>
          </string-name>
          ,
          <article-title>"Development of an Antinoise Method of Data Sharing Based on the Application of a Two-Step-Up System of Residual Classes," 2018 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon)</article-title>
          , Vladivostok,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Krasnobayev</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koshman</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moroz</surname>
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2019</year>
          )
          <article-title>Improved Method of Determining the Alternative Set of Numbers in Residue Number System</article-title>
          . In: Chertov O.,
          <string-name>
            <surname>Mylovanov</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kacprzyk</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kreinovich</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stefanuk</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>(eds) Recent Developments in Data Science and Intelligent Analysis of Information</article-title>
          .
          <source>ICDSIAI 2018. Advances in Intelligent Systems and Computing</source>
          , vol
          <volume>836</volume>
          . Springer, Cham, pp.
          <fpage>319</fpage>
          -
          <lpage>328</lpage>
          ,
          <issue>05</issue>
          <year>August 2018</year>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -97885-7_
          <fpage>31</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>M.</given-names>
            <surname>Kasianchuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Yakymenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Pazdriy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Melnyk</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Ivasiev</surname>
          </string-name>
          ,
          <article-title>"Rabin's modified method of encryption using various forms of system of residual classes," 2017 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM)</article-title>
          ,
          <year>Lviv</year>
          ,
          <year>2017</year>
          , pp.
          <fpage>222</fpage>
          -
          <lpage>224</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>V.</given-names>
            <surname>Krasnobayev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kononchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kuznetsova</surname>
          </string-name>
          .
          <article-title>Method of data control in the residue classes</article-title>
          .
          <source>In Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019)</source>
          , Zaporizhzhia, Ukraine,
          <source>April 15-19</source>
          ,
          <year>2019</year>
          ., pp.
          <fpage>241</fpage>
          -
          <lpage>252</lpage>
          .
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>M.</given-names>
            <surname>Kasianchuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Yakymenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Pazdriy</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Zastavnyy</surname>
          </string-name>
          ,
          <article-title>"Algorithms of findings of perfect shape modules of remaining classes system,"</article-title>
          <source>The Experience of Designing and Application of CAD Systems in Microelectronics, Lviv</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>316</fpage>
          -
          <lpage>318</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>