<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Data Errors Control in the Modular Number System Based on the Nullification Procedure</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>V. N. Karazin Kharkiv National University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svobody sq.</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kharkiv</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine v.a.krasnobaev@gmail.com</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>kuznetsov@karazin.ua</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>kate.kuznetsova.</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>@gmail.com</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Poltava National Technical Yuri Kondratyuk University</institution>
          ,
          <addr-line>Poltava</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>A method for error control in the modular number system (MNS) based on the use of the zeroing procedure is proposed. Error control in the MNS is a non-positional operation and requires the development of special methods, designed to increase the efficiency of this procedure. This method is designed to verify the correct implementation of the computing process of computer systems and components. It is assumed that the error in one module remainder does not affect the residual values corresponding to other modules (bases) of the MNS. The essence of the proposed method is that, when performing the procedure of zeroing in the MNS, the operation of determining is combined in time, in accordance with the digits ai(i1) and an(ii1)1 of the number A(i1) , the zeroing constant ZC (i) and the calculation operation for the values of ai(i1) and an(ii1)1 of the following digits ai(i)1 and an(i-)i of the number A(i) . This makes it possible to increase the efficiency of information control, presented in the modular number system.</p>
      </abstract>
      <kwd-group>
        <kwd>Automated Design Systems</kwd>
        <kwd>Computer System and Components</kwd>
        <kwd>Method for Error Control</kwd>
        <kwd>Modular Number System</kwd>
        <kwd>Pair Number Zeroing with Preliminary Selection of Digits</kwd>
        <kwd>Positional Number Systems</kwd>
        <kwd>Zeroing Block</kwd>
        <kwd>Zeroing Procedure</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The main direction of modern science and technology is the development and use of
new advanced information technologies based on the extensive use of computer
systems and components (CSC). Information technologies are increasingly invading our
lives, penetrating all processes (social, economic, political). Scales and complexity of
the tasks solved by modern computer systems impose qualitatively new requirements
to their main characteristics: productivity, reliability and efficiency of systems that
causes need of improvement existing and creations of new means of information
processing. In modern computer systems, an improvement in one group of quality</p>
      <p>
        Copyright © 2020 for this paper by its authors. Use permitted under Creative
Commons License Attribution 4.0 International (CC BY 4.0).
indicators, for example, an increase in productivity, leads to a deterioration in others –
a complication of structure, an increase in cost, a decrease in reliability, etc. [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7">1-7</xref>
        ].
      </p>
      <p>
        In connection with the constant complication of scientific and technical problems
of processing integer data, the trend of development of CSC is aimed at increasing the
speed (productivity) and reliability of the implementation of integer arithmetic
operations [
        <xref ref-type="bibr" rid="ref3 ref7 ref8 ref9">3, 7-9</xref>
        ]. The results of recent years in the field of information technology by
various groups of the scientists and engineers of methods for increasing the
productivity, reliability, survivability and also reliability of calculations of computer systems
have shown that it is practically impossible to achieve this within the limits of the
positional number systems (PNS) [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref9">9-13</xref>
        ].
      </p>
      <p>
        This is due to the main disadvantage of modern CSC, functioning in the PNS: the
presence of inter-digit relations between the processed numbers. These relations
negatively affect the architecture of the CSC and the methods of implementing arithmetic
operations, complicate the equipment, they limit the speed and reliability of
performing arithmetic operations. In this regard, in the PNS, the increase in the performance
of the CSC is achieved by increasing the clock frequency, as well as through the use
of methods and tools for parallel data processing, and also by use of different types of
reservation [
        <xref ref-type="bibr" rid="ref14 ref15 ref16 ref17">14-18</xref>
        ].
      </p>
      <p>Application of the basic methods of increasing the productivity of the CSC, based
on the parallelization of computations, by using some properties of solvable tasks and
algorithms cannot increase the productivity of CSC in each and every case. The scope
of their application is limited to a class of tasks to be solved. In addition, the process
of artificial dismemberment of the algorithm itself, the determination and allocation
of independent computing branches and related operations requires large labor costs,
and it is not always possible to parallelize arbitrary algorithms in general. It should be
noted that all existing methods of increasing productivity in PNS have a general
disadvantage: the impossibility of parsing the maximum algorithms that are solved at the
level of elementary operations.</p>
      <p>However, this approach does not always solve the problem of cardinal increase in
speed and reliability of performing arithmetic operations in the PNS.</p>
      <p>To date, there has been a gap between the increasing requirements for improving
the performance of real-time computer systems, on the one hand, and the
impossibility of satisfying these requests based on the use of existing PNS, on the other hand.</p>
      <p>This fact led to the need to find ways to increase productivity, for example, based
on the use of new structural solutions in the creation of CSC.</p>
      <p>
        Scientific researches were conducted in recent years, identify promising ways to
improve the performance of computer systems, which are based on the use of the
modular number system (MNS) [
        <xref ref-type="bibr" rid="ref10 ref11 ref7 ref8 ref9">7-11</xref>
        ]. However, in existing researches little
attention is paid to issues devoted to the implementation of positional operations in the
MNS [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">13-15</xref>
        ]. This article focuses on solving this problem.
      </p>
      <p>Research methodology and analysis of results</p>
    </sec>
    <sec id="sec-2">
      <title>Search of ways of increase in realibility</title>
      <p>Currently, intensive searches are underway to improve the efficiency of arithmetic
operations through the development and implementation of reliable and fast real-time
CSC.</p>
      <p>
        The results of the studies devoted to the improvement of the characteristics of CSC
showed that one really practical direction is the approach based on the use of MNS
codes [
        <xref ref-type="bibr" rid="ref10 ref12 ref3">3, 10, 12</xref>
        ]. Ascending from the known Chinese remainder theorem (the task of
restoring the original number Ak by the aggregating of its remains (deductions) {ai }
by dividing it into a series of natural numbers m1, m2 , ..., mn (modules) of MNS) ,
which was previously interpreted as a structural theorem of abstract algebra,
guaranteed the specified parallelism in the calculations over integers, under the conditions
that the result of ring operations belongs to the range of integers, defined by modules
product of MNS. Having its ideological roots of the classical works of Euler, Gauss
and Chebyshev on the theory of comparisons, MNS introduced new ideas in the
development of creation methods of highly-productive and ultra reliable CSC.
      </p>
      <p>At present again interest in use of MNS as tool for increase in productivity,
reliability, survivability and also reliability of calculations of computer systems
increases. It is caused primarily by the following circumstances:</p>
      <p>– the emergence of the numerous scientific and theoretical publications devoted to
the theory and practice of the computer systems and components creating in MNS;
– wide distribution of mobile processors that require high speed data processing at
low energy consumption; the lack of inter-bits transfers during arithmetic operations
of addition and multiplication of numbers in MNS allows to reduce energy
consumption;</p>
      <p>– strong interest to MNS is being shown by the banking structures, where it is
necessary in real time to handle large amount of data safely and reliably, i.e. they are
required highly-productive means for highly reliable computing with errors
selfcorrection, that is typical to the MNS codes;</p>
      <p>– the elements density increasing on a single chip doesn’t always allow to perform
a complete and qualitative testing; in this case there is an increasing importance of
providing failover operation of CSC;</p>
      <p>– the need for the use of the specialized CSC to perform a large number of
operations on vectors, which require high-speed performance of integer addition and
multiplication operations (matrix multiplication problems, the problems of the scalar
product of vectors, Fourier transformation, etc.);</p>
      <p>– the widespread introduction of microelectronics into all spheres of human
activity significantly increased relevance and importance of previously rare, and now so
massive scientific and practical problems, as a digital signal and image processing,
image recognition, cryptography, multi-bit data processing and storage, etc.; this
circumstance requires enormous computing resources being in excess of the existing
possibilities;</p>
      <p>– the current level of microelectronics development is coming to its limits from the
point of view of productive provision and reliability of existing and future computer
systems and components of large data sets processing in real time;</p>
      <p>– taking it over nanoelectronics, molecular electronics, micromechanics,
bioelectronics, optical, optoelectronic and photonic computers and others are still rather far
from the real industrial production and employment.</p>
      <p>– the modern development of integrated circuit technology allows to have a fresh
look at the principles of devices construction with modular arithmetic employment
and provides wide opportunities to use new design techniques (such as the
methodology of systems design on a chip-SoC) both in the development of individual
computing units, and computer systems in general; integral technology enables more flexible
design of computer systems and components and allows us to implement MNS -based
devices as effectively as on the basis of the binary system; furthermore at present in
order to improve the effectiveness of computer devices development, automated
design systems (ADS) are widely used; in this respect, the design of computer systems
and components based on MNS does not differ from the working with the help of
ADS data of binary data-blocks in PNS;</p>
      <p>
        – unfortunately, Ukraine today in contrast to the theoretical development,
technologically is behind the foreign microelectronics of some leading countries; in this
case, it is advisable to use the existing theoretical achievements and practical
experience in the creation of effective computer systems and components in MNS [
        <xref ref-type="bibr" rid="ref10 ref12 ref14 ref16 ref17">10, 12,
14, 16-18</xref>
        ].
      </p>
      <p>One of the disadvantages of MNS is that there are no simple signs of the output of
the result of operations outside the operating range [0, М), where:
n
M  mi</p>
      <p>i1
– operating range; mi  i -th MNS base; n – number of operating bases of MNS.
This requires additional time to implement the error correction process. This
circumstance reduces the effectiveness of the use of MNS in the CSC.</p>
      <p>
        At the heart of the majority of control methods of data are based on the analysis of
information, that is on comparison of data. Therefore researches and development of
mathematical models, methods and algorithms of comparison of numbers in MNS is
an important and relevant task. Now it is possible to allocate three groups of methods
of comparison of numbers in MNS [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10-12</xref>
        ].
      </p>
      <p>The first group includes methods of direct comparison, based on the conversion of
numbers AMNS and BMNS from a code MNS at PNS:
and
АPNS   1 2... 0
ВPNS   1 2...  0
(  – digits number (number length) AMNS and BMNS ) and their further
comparison on the basis of use of binary position adders.</p>
      <p>The second group of methods includes methods based on the principle of zeroing.
The procedure for the zeroing process consists in transition from initial number:</p>
      <p>AMNS  (a1, a2 ,..., ai1, ai , ai1,..., an )
presented to MNS to the number of species:</p>
      <p>AM(zN)S  (0, 0,..., 0, n(А) ).</p>
      <p>Then, on value  (A) the interval [ jmi , ( j  1)mi ) of hit of number is defined AMNS .</p>
      <p>n
The number zeroing is performed in the same way:</p>
      <p>
        BMNS  (b1, b2 ,..., bi1, bi , bi1,..., bn )
from where we receive values  n(B) . Position comparison of the received values
 (A) and  n(B) defines result of comparison of numbers AMNS and BMNS [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14">10-14</xref>
        ].
n
      </p>
      <p>To the third group of methods, we will assign the methods based on the definition
(allocation) or the formation of special features, the so-called positional features of
the non-positional code.</p>
      <p>To detect errors in MNS, the most commonly used procedure is zeroing. The
essence of the procedure consists in the successive subtraction from the initial number:
of certain minimum numbers ZC(i) – zeroing constants such that the number A is
successively transformed into a number of type:
А  (а1, а2 ,,аn , аn1)</p>
      <p>
        An  (0,0,,0, n1)
in n cycles. If the obtained value of the remainder on the control basis  n1  0,
then it is assumed that the number A is erroneous. In this case, the zeroing constants
must be chosen in such a way that in the subtractions such as А  ZC(i) the output of
the number outside the operating [0, М) range [
        <xref ref-type="bibr" rid="ref10 ref12">10, 12</xref>
        ] would not take place. A
significant disadvantage of methods of error detection in MNS is the need for
significant time and hardware costs in the implementation, which causes significant
unproductive computing costs [
        <xref ref-type="bibr" rid="ref14 ref15 ref16">14-16</xref>
        ].
      </p>
      <p>The purpose of this article is the development and research of the error control
method in MNS based on the application of the zeroing procedure.
2.2</p>
    </sec>
    <sec id="sec-3">
      <title>Method of errors control</title>
      <p>In general, the essence of the procedure of the process of zeroing consists of the
sequence of the following operations.</p>
      <p>Stage 1. Initial checked number:</p>
      <p>A  A(0)  (a1(0) , a2(0) ,...ai(0) , ai(01) ,...an(0) , an(0)1)
(1)
Expression (1) is successively reduced to the form:</p>
      <p>A(H )  (0, 0,..., 0, 0,  n1)
by means of a subtraction operation sequence that does not result in the output of a
numerical value of the А0 number outside of the operating range [0, M) of MNS. As
noted earlier, this operation in MNS is called zeroing, and consists from successive
subtraction (from one of the MNS bases) from the initial number А0 of minimum
numbers, the so-called zeroing constants (ZC(i) ) of the form:</p>
      <p>ZC(1)  (t1,1, t2,1, t3,1,..., tn,1, tn1,1), t1,1  1, m1 1;
ZC(2)  (0, t2,2 , t3,2 ,..., tn,2 , tn1,2 ), t2,2  1, m2 1;</p>
      <p>ZC(3)  (0, 0, t3,3,..., tn,3 , tn1,3 ), t3,3  1, m3 1;</p>
      <p>ZC(n)  (0, 0,..., 0, tn,n , tn1,n ), tn,n  1, mn 1.</p>
      <p>A</p>
      <p>A  A(0)  (a1(0) , a2(0) ,...ai(0) , ai(01) ,...an(0) , an(0)1)
Next, the initial checked number:
is successively reduced to the form A(H) , that is,</p>
      <p>ZC(i)  (0, 0,..., 0, ti,i , ti1,i ,..., tn,i , tn1,i ), ti,i  1, mi 1;
(2)
and so on.</p>
      <p>A  A(0)  (a1(0) , a2(0) ,...ai(0) , ai(01) ,...an(0) , an(0)1)</p>
      <p>A(1)  (0, a2(1) , a3(1) ,..., an(1) , an(1)1),
A(2)  (0, 0, a3(2) ,..., an(2) , an(2)1),</p>
      <p>A(3)  (0, 0, 0, a4(3) ,..., an(3) , an(3)1)</p>
      <p>Repeating the subtraction n times we get the value A(H )  (0, 0,..., 0, an(n)1) , or
A(H )  (0, 0,..., 0, n1) , where  n1  an(n)1 . The general scheme of subtraction
А(i)  А(i1)  ZC(i) involving zeroing constants (2) is presented in the following
form:
where:
(i-1) ,..., an(i-1) , an(i-11) )</p>
      <p>A(i-1)  (0, 0,..., 0, ai(i-1) , ai1
</p>
      <p>ZC(i)  (0, 0,..., 0, ai(i-1) ,ti1,i ,..., tn,i , tn1,i )
A(i)  [0,..., 0,[ai(i-1)  ai(i-1) ]mod mi ,
[ai(i-11) - ti1,i ]mod mi1,..., [an(i-11)  tn1,i ]mod mn1],</p>
      <p>ai(i)1  (ai(i-11)  tt1,i ) mod mi1.</p>
      <p>Denoting the sampling time ZC from the corresponding zeroing block (ZB) CSC as
t1 , and the subtraction time from the number А(i1) of constant ZCi , that is,
performing operation А(i)  А(i1)  ZC(i) – after t2 , we get the total time for
performing the operation of zeroing in the form Т Н1  n(t1  t2 ) . When presenting ZB in the
tabular form, we can assume that practically t1  t2  add . In this case, the zeroing
time is equal to the value Т Н1  2n add , where:  add – subtraction time from number
А(i1) of zeroing constant КН (i) ; n – number of information bases of MNS.</p>
      <p>Stage 2. After finding the value  n1 in the first step, the second stage compares
 n1 with zero. If  n1  0 (number A is in range [0, M)), then the conclusion is
drawn that the number A</p>
      <p>is not distorted (correct), i.e. there are no errors. If
 n1  0 (number A isn’t in range [0, M) ), then the conclusion is drawn that the
number A is distorted (wrong), i.e. there is an error on one of the bases (modules)
mi of MNS. Total time Т1 of error detection is defined as T1  TZ1  Тс1 , where Тс1
– time of comparing  n1 with zero. Practically time Тс1 comparison is performed in
one clock cycle, in this case it can be assumed that T1  TZ1  2n add .</p>
      <p>The essence of the method of information error detection in MNS proposed in the
article is based on the implementation of the procedure of pair number zeroing with
preliminary selection of digits (PNZPSD). The PNZPSD procedure is that the zeroing
operation in the ZB is combined in time with the BZC selection operation by digits
аі(i1) and аn(iі1)1 of number А(i1) of the constant ZC(i) and creation operation on
values аі(i1) and аn(iі1)1 of numbers ai(i)1 and an(i-)i . At the same time, the subtraction
operation from the number А(i1) of the zeroing constant ZC(i) (i.e., operation
А(i1)  ZC(і) ) and the operation of selecting the next zeroing constant:</p>
      <p>ZC(i1)  (0,, 0, ti1,i1, ti2,i1,, tn1,i1, 0,0, tn1,i1) .</p>
      <p>According to the values of ai(i)1 and an(i-)i in the next stage of zeroing, on the bases of
mi1 and mni , we will refer to the BZC for the next zeroing constant:</p>
      <p>ZC(i1)  (0,, 0, ti1,i1, ti2,i1, ..., tn1,i1, 0,0, tn1,i1) .</p>
      <p>Indeed, the values of аi1 and аni , which will be subtracted from ai(i)1 and an(i)i ,
respectively, in order to obtain ai(i11) and an(ii1)1 , are determined only by the values of
аі(i1) and аn(iі1)1 . The number of clock cycles that are free from addition, during
which the reference is made to the BZC CSC and the formation of the next address is
equal to the value n 1 / 2 , ([x] is the integer closest to x, but not exceeding it).
At the same time, zeroing is carried out simultaneously on two information bases of
MNS a1, an ; a2 , an1 , etc. After every two subtractions, one additional time step is
required to form the next address and access the accumulator of zeroing constants. In
this regard, for every two addition clock cycles ( add  0 ) there is one clock cycle
that is free from addition. Let's compare the effectiveness of the method of error
detection in the MNS proposed in the article with the existing method based on the
procedure of ordinary zeroing.</p>
      <p>To quantify the effectiveness of the proposed method, we introduce the notion of
an efficiency coefficient:</p>
      <p>K (jne)f  TZ1  add  TZj  add 100%</p>
      <p>TZ1  add
where j – number of the zeroing method ( j  2 , for pairwise zeroing; j  3 , for
pairwise zeroing with prefetching of digits; j  4 , for pairwise number zeroing with
prefetching of digits).</p>
      <p>Expression (3) can also be represented in the form (4):
In accordance with the expression (4), we define the quantitative value K (jne)f for
j  2, 4 while n  4 , n  6 , n  8 , n  10 and n  16 , i.e. for l-byte machine words
( l  1, 2, 3, 4, 8 ) of CSC.</p>
      <p>The resulting calculated data will be placed in Table 1.</p>
      <p>K (jne)f  TZ1 - TZj 100% .</p>
      <p>TZ1
(3)
(4)
l(n)
Kef
K (enf) ,[%]
1(4)
62
3(8)
62
4(10)
65
8(16)
62
mation bases of the MNS n  1,16 provides a range of representation of numbers in
modern CSC, which makes it possible to use the data obtained when designing them.</p>
      <p>Here is an example of a specific technical implementation of the error detection
operation in the CSC, which functions in the MNS. Let MNS be given by the bases
m1  3 , m2  4 , m3  5 , m4  7 , m5  11 (n  4) , i.e. one-byte (l = 1) CSC is
considered.</p>
      <p>In this case, the working numerical range is:
and the full range is:</p>
      <sec id="sec-3-1">
        <title>The error distribution intervals are shown in Table 2.</title>
        <p>Suppose it is necessary to carry out a control (check the fact of presence or absence
of an error) of the number:</p>
        <p>A  A(0)  (a1(0) , a2(0) , a3(0) , a4(0) , a5(0) )   (1, 0, 0,1, 4) ,</p>
        <p>ZC(1)  t1,1, t2,1, t3,1, t4,1, t5,1  ,
where t1,1  a1(0)  1 and t4,1  a(40)  1 . In this case with ZB
we choose
ZC(1)  1,1,1,1,1 , Table 3.</p>
        <p>Further, in accordance with the proposed method of PNZPSD, we perform an
operation А(1)  А(0)  ZC(1) :
and, simultaneously, for number:
with ZB we choose:</p>
        <p>ZC(2)  0, t2,2 , t3,2 , 0, t5,2  ,
of form a2(1)  t2,2  3 and a3(1)  t3,2  4 . In this case (see Table 4) ZC(2) is defined
as:

</p>
        <p>А(0)  1, 0, 0,1, 4
ZC(1)  1, 1, 1, 1, 1</p>
        <p>A1  0, 3, 4, 0, 3
А(1)  0, 3, 4, 0, 3
ZC(2)  0, 3, 4, 0, 3 .</p>
        <p>А(1)  0, 3, 4, 0,3
ZC(2)  0, 3, 4, 0,3</p>
        <p>A(2)  0, 0, 0, 0, 0.</p>
        <p>Next, we define the difference А(1)  ZC (2) :</p>
      </sec>
      <sec id="sec-3-2">
        <title>Thus, a zeroed number is obtained</title>
        <p>A(2)  A(Z )  (0, 0,..., 0,..., 0, n1)  (0, 0, 0, 0, 5 ),
where  5  0 . Conclusion: the number А(0)  1, 0, 0,1, 4 has no errors (see Table 2).</p>
        <p>Verification: the number А(0) in the PNS is А(0)  400 , i.e. is within the working
numerical range [0, 419).
In the modern world rapid growth of volumes of information and increase in
complexity of the set scientific and technical tasks, connected with achievement of
appropriate level of quality and reliability of transmitted data is observed. Therefore, the
main objective of scientists in the field is development of theoretical bases for
construction of high-speed and reliable CSC.</p>
        <p>In PNS the problem of increase in reliability and productivity can't be effectively
solved without deterioration some key technical and economic indicators of CSC. At
the same time, there are positive results of researches which have shown efficiency of
application of MNS for increase in speed of realization of integer arithmetic
operations, reduction of time of error detection and as a result increase the productivity and
reliability of CSC. The methodological basis for building a CSC in the MNS involves
a comprehensive solution to the problem of increasing the productivity and integrity
of the processing of integer data, as well as providing information security,
impedance, performance and durability of the functioning of CSC. Existing data comparison
method in MNS don't provide the maximum accuracy of comparison of numbers.
Thus, there is a problem of improvement of a method of the fast comparison of data
based on the application of the zeroing procedure.</p>
        <p>It is known that considerable time of control of data reduces overall effectiveness
of application of CSC in MNS, at realization of integer arithmetic and other modular
operations. Results of a research of control methods of the data in MNS which are
carried out in article have shown that the existing control methods of data in MNS
based on use of application of the zeroing procedure reduce control time.</p>
        <p>Applications of this method provides obtaining reliable result of control of data in
MNS. By the accuracy of the control data in the MNS, we understand the probability
of obtaining the true result of the control operation data presented in the MNS.</p>
        <p>The essence of the method of error control is to use the procedure of pair number
zeroing with the preliminary selection of digits. This makes it possible to increase the
efficiency of the procedure for data zeroing in comparison with other control methods
up to 30%. The practical significance of the results obtained is that, in comparison
with the existing methods of error control in MNS, the error detection time is more
than halved. This circumstance makes it possible to increase the overall efficiency of
the use of MNS in the creation of CSC [19-24].
18. Kasianchuk, M., Yakymenko, I., Pazdriy, I., Zastavnyy, O.: Algorithms of findings of
perfect shape modules of remaining classes system. In: The Experience of Designing and
Application of CAD Systems in Microelectronics. IEEE (2015)
19. Chornei, R.K., Daduna V.M., H., Knopov, P.S.: Controlled Markov Fields with Finite
State Space on Graphs. Stochastic Models. 21, 847–874 (2005).
doi:10.1080/15326340500294520
20. Ponochovniy, Y., Bulba, E., Yanko, A., Hozbenko, E.: Influence of diagnostics errors on
safety: Indicators and requirements. In: 2018 IEEE 9th International Conference on
Dependable Systems, Services and Technologies (DESSERT). IEEE (2018).
doi:10.1109/dessert.2018.8409098
21. Runovski, K., Schmeisser, H.: On the convergence of fourier means and interpolation
means. Journal of Computational Analysis and Applications. 6(3), 211-227 (2004)
22. Tkach, B.P., Urmancheva, L.B.: Numerical-analytic method for finding solutions of
systems with distributed parameters and integral condition. Nonlinear Oscillations. 12, 113–
122 (2009). doi:10.1007/s11072-009-0064-6
23. Bondarenko, S., Liliya, B., Oksana, K., &amp; Inna, G.: Modelling instruments in risk
management. International Journal of Civil Engineering and Technology. 10(1), 1561-1568
(2019)
24. Krasnobayev, V., Koshman, S., Yanko, A., Martynenko, A.: Method of Error Control of
the Information Presented in the Modular Number System. In: 2018 International
Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC
S&amp;T). IEEE (2018). doi:10.1109/infocommst.2018.8632049</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Shu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>A research of architecture-based reliability with fault propagation for software-intensive systems</article-title>
          .
          <source>In: 2016 Annual Reliability and Maintainability Symposium (RAMS)</source>
          .
          <source>IEEE</source>
          (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .1109/rams.
          <year>2016</year>
          .7447984
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Gokhale</surname>
            ,
            <given-names>S.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lyu</surname>
            ,
            <given-names>M.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trivedi</surname>
            ,
            <given-names>K.S.:</given-names>
          </string-name>
          <article-title>Reliability simulation of component-based software systems</article-title>
          .
          <source>In: Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257)</source>
          .
          <source>IEEE Comput. Soc (0)</source>
          . doi:
          <volume>10</volume>
          .1109/issre.
          <year>1998</year>
          .730882
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Krasnobayev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koshman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moroz</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Improved Method of Determining the Alternative Set of Numbers in Residue Number System</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          . pp.
          <fpage>319</fpage>
          -
          <lpage>328</lpage>
          . Springer International Publishing (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -97885-7_
          <fpage>31</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Tiwari</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tomko</surname>
            ,
            <given-names>K.A.</given-names>
          </string-name>
          :
          <article-title>Enhanced Reliability of Finite-State Machines in FPGA Through Efficient Fault Detection and Correction</article-title>
          .
          <source>IEEE Transactions on Reliability</source>
          .
          <volume>54</volume>
          ,
          <fpage>459</fpage>
          -
          <lpage>467</lpage>
          (
          <year>2005</year>
          ). doi:
          <volume>10</volume>
          .1109/tr.
          <year>2005</year>
          .853438
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Reddy</surname>
            ,
            <given-names>C.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nalini</surname>
          </string-name>
          , N.:
          <article-title>FT2R2Cloud: Fault tolerance using time-out and retransmission of requests for cloud applications</article-title>
          .
          <source>In: 2014 International Conference on Advances in Electronics Computers and Communications. IEEE</source>
          (
          <year>2014</year>
          ). doi:
          <volume>10</volume>
          .1109/icaecc.
          <year>2014</year>
          .7002396
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Braun</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wunderlich</surname>
          </string-name>
          , H.-J.:
          <article-title>Algorithm-based fault tolerance for many-core architectures</article-title>
          .
          <source>In: 2010 15th IEEE European Test Symposium</source>
          . IEEE (
          <year>2010</year>
          ). doi:
          <volume>10</volume>
          .1109/etsym.
          <year>2010</year>
          .5512738
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Krasnobayev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kononchenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Method of data control in the residue classes</article-title>
          .
          <source>In Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019). Zaporizhzhia, Ukraine, April 15-19</source>
          , pp.
          <fpage>241</fpage>
          -
          <lpage>252</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Popov</surname>
            ,
            <given-names>D.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gapochkin</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          :
          <article-title>Development of Algorithm for Control and Correction of Errors of Digital Signals, Represented in System of Residual Classes</article-title>
          . In: 2018 International Russian Automation Conference (RusAutoCon).
          <source>IEEE</source>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1109/rusautocon.
          <year>2018</year>
          .8501826
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kocherov</surname>
            ,
            <given-names>Y.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Samoylenko</surname>
            ,
            <given-names>D.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koldaev</surname>
            ,
            <given-names>A.I.</given-names>
          </string-name>
          :
          <article-title>Development of an Antinoise Method of Data Sharing Based on the Application of a Two-Step-Up System of Residual Classes</article-title>
          . In: 2018 International Multi-Conference on
          <article-title>Industrial Engineering and Modern Technologies (FarEastCon)</article-title>
          .
          <source>IEEE</source>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1109/fareastcon.
          <year>2018</year>
          .8602764
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Krasnobayev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zub</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsova</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Methods for comparing numbers in non-positional notation of residual classes</article-title>
          .
          <source>In Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019). Zaporizhzhia, Ukraine, April 15-19</source>
          , pp.
          <fpage>581</fpage>
          -
          <lpage>595</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Kasianchuk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakymenko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pazdriy</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Melnyk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ivasiev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Rabin's modified method of encryption using various forms of system of residual classes</article-title>
          .
          <source>In: 2017 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM)</source>
          .
          <source>IEEE</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Krasnobayev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lokotkova</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dyachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>The Method of Single Errors Correction in the Residue Class</article-title>
          .
          <source>In: 2019 3rd International Conference on Advanced Information and Communications Technologies (AICT)</source>
          .
          <source>IEEE</source>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1109/AIACT.
          <year>2019</year>
          .8847845
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Dubrova</surname>
          </string-name>
          , E.:
          <string-name>
            <surname>Fault-Tolerant Design</surname>
          </string-name>
          . Springer New York (
          <year>2013</year>
          ). doi:
          <volume>10</volume>
          .1007/978-1-
          <fpage>4614</fpage>
          - 2113-9
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Krasnobaev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Babenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Denysenko</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zub</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hryhorenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The Method of Raising Numbers, Represented in the System of Residual Classes to an Arbitrary Power of a Natural Number</article-title>
          .
          <source>In: 2019 IEEE 2nd Ukraine Conference on Electrical and Computer</source>
          Engineering (UKRCON).
          <source>IEEE</source>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1109/UKRCON.
          <year>2019</year>
          .8879793
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Radu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Reliability and fault tolerance analysis of FPGA platforms</article-title>
          .
          <source>In: IEEE Long Island Systems, Applications and Technology (LISAT) Conference</source>
          <year>2014</year>
          . IEEE (
          <year>2014</year>
          ). doi:
          <volume>10</volume>
          .1109/lisat.
          <year>2014</year>
          .6845211
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Yanko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koshman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krasnobayev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Algorithms of data processing in the residual classes system</article-title>
          .
          <source>In: 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&amp;T)</source>
          .
          <source>IEEE</source>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1109/infocommst.
          <year>2017</year>
          .8246363
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Krasnobayev</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yanko</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koshman</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          :
          <article-title>A Method for Arithmetic Comparison of Data Represented in a Residue Number System</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          .
          <volume>52</volume>
          ,
          <fpage>145</fpage>
          -
          <lpage>150</lpage>
          (
          <year>2016</year>
          ).
          <source>doi: 10.1007/s10559-016-9809-2</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>