<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Design of a Residual Adder in Computer Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Victor Krasnobayev</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alexander Kuznetsov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Victoria Popenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tetiana Kuznetsova</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>JSC “Institute of Information Technologies</institution>
          ,”
          <addr-line>12 Bakulin str., Kharkiv, 61166</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>V. N. Karazin Kharkiv National University</institution>
          ,
          <addr-line>4Svobody sq., Kharkiv, 61022</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>206</fpage>
      <lpage>212</lpage>
      <abstract>
        <p>The purpose of this article is to consider an algorithm for synthesizing the structure of the adder of two residuals ai and bi numbers A  (a1, a2 ,..., ai ,..., ak ) and B  (b1,b2 ,...,bi ,...,bk ) for an arbitrary value of the module mi of the residual class system (RCS), by organizing interbit connections between binary one-bit adders (BOA), the combination of which makes up the structure of modulo adder. The algorithm for the synthesis of adders by arbitrary modules is based on the usage of existing adders by module M  2n 1 , which consists of a set of sequentially located BOA, by introducing and using additional inter-bit connections of the form i j . Specific examples of the synthesis of structures of binary adders for various values of the RCS modules mi are given.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Residual class system</kwd>
        <kwd>non-positional code structures</kwd>
        <kwd>binary one-bit adders</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The operation of adding two numbers is the main operation, which is implemented by a computer
system (CS), both in a positional binary notation (PN) and in a non-positional notation of residual
classes [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1–4</xref>
        ]. The adder of two numbers is the main part of the operating device of CS in PN. Adders
of two numbers by the module mi are also elements of CS along with positional adders [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8">5–8</xref>
        ]. In RCS,
the modular addition operation (ai  bi ) mod mi is implemented on the basis of the usage of low-bit
modulo mi adders [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref9">9–13</xref>
        ]. One of the methods for implementation of the modular addition operation
(ai  bi ) mod mi is based on the usage of structures of positional low-bit binary adders [
        <xref ref-type="bibr" rid="ref14 ref15 ref16 ref17">14–17</xref>
        ]. This
approach provides a wide range of options for the implementation of the structure of such adders. This
allows to fully use available practical experience in the design and selection of structures of binary
adders [
        <xref ref-type="bibr" rid="ref12 ref18 ref4">4, 12, 18</xref>
        ]. The purpose of the article is to consider an algorithm for synthesizing the structure
of an adder of two residues of numbers by module.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Design of a Residual Adder</title>
      <p>The article discusses the synthesis of an adder of two residues of numbers by an arbitrary RCS
module mi. Synthesis of modulo adder is a procedure for constructing the structure of a non-positional
adder from positional binary one-bit adders (BOA). In a non-positional adder by an arbitrary module
mi, an addition circuit is used, which is implemented in the structure of adder by module M  2n 1 .
This is achieved by organizing and using additional inter-bit connections i j , in the general case,
between the j th and the i th BOA of the adder module M .</p>
      <p>An arbitrary initial structure of a n -bit binary adder by the module M  2n 1 is shown in Fig. 1.</p>
      <p>The task of an adder by module mi synthesis is to ensure the modular addition of two residues for
given modules by means of an adder by module M  2n 1 . In this article, this is achieved by
introducing into the adder by module M additional links of the form i j , where the sign i j
denotes the connection between the output of the j -th BOA and the input of the i th BOA. A diagram
of the organization of such an additional connection between the output of the j th BOA and the input
of the i th BOA is shown in Fig. 2.</p>
      <p>
        The essence of constructing adders by module RCS is as follows. In the initial adder by module
M  2n 1 , on the basis of certain rules, additional connections i j are formed [
        <xref ref-type="bibr" rid="ref12 ref17 ref8">8, 12, 17</xref>
        ]. The usage
of additional connections i j in the adder by module M  2n 1 allows synthesizing an adder for
performing the operation of adding the residues of numbers by module mi, since the introduction of
additional connections i j changes the weights of individual bits of the adder and reduces the module
of the adder from the initial value M to the required modulus value mi.
      </p>
      <p>In the general case, the modulo adder synthesis algorithm consists of a sequence of performing the
following operations.</p>
      <p>1. Obtaining the structure of the adder by module M  2n 1 , where</p>
      <p>n  [log2 (mi 1)] 1 .</p>
      <p>2. Determination of the adder binary bits Si for which equality Si  0 is true. The process of
determining the condition Si  0 is based on the representation of the module in binary code.
3. Additional connection i j begins with the most significant bit of the adder.</p>
      <p>4. Additional connection i j goes to the BOA input, for which Si  0 .</p>
    </sec>
    <sec id="sec-3">
      <title>3. Examples of Residual Adders</title>
      <p>Two examples of synthesis of structures of adder are considered.</p>
      <p>Example 1. mi  53 . The stages of the synthesis of an adder by the module of RCS are as follows.
1. In accordance with the size of the module mi  53 , the number n of BOA of an adder by the
module M  2n 1 is determined. For the module mi  53 there is</p>
      <p>n  [log2 (mi 1)] 1  [log2 (53 1)] 1  6 .</p>
      <p>The structure of the adder by module
will be the following (Fig. 3).</p>
      <p>M  2n 1  63</p>
      <p>The initial structure of the adder by module mi  53 without additional connections i j will be
the same.</p>
      <p>2. Module mi  53 in binary code S6 S5 S4 S3 S2 S1 is 110101, which means</p>
      <p>S6  1, S5  1, S4  0 , S3  1 , S2  0 and S1  1.</p>
      <p>From the form of the module mi  53 which is represented in the binary code,</p>
      <p>S2  S4  0
is determined.</p>
      <p>3. Based on the obtained results, the structure of the adder by the module mi  53 is represented in
the following form</p>
      <p>In accordance with the synthesis method, two additional connections 46 and 26 are
introduced into the adder by module M  26 1. In order to check the correctness of the synthesis of
the adder by module mi  53 , the value of the RCS module M  mi for a given adder structure is
determined. Based on the given structure of the adder (Fig. 4), a number of structures of individual parts
of the adder by the module mi  53 are composed. The first part of the adder structure is shown in
Fig. 5.</p>
      <p>The first part of the adder structure module M1 will be the following</p>
      <p>M1  3  5  4 1 .</p>
      <p>The second part of the adder structure is shown in Fig. 6.</p>
      <p>For this part of the adder, the structure module M 2 will be the following</p>
      <p>M 2  M1  3  2 1  ( 6  5  4 1)  3  2 1 .</p>
      <p>For adder, by module, the value of module M  mi of RCS will be determined as follows (fig. 4-6)
mi  M 2  1 1  ( 6  5  4 1)  3  2 1  1 1  (23 1)  22 1  2 1  53 .</p>
      <p>Based on the performed calculations, there is the conclusion that the synthesis of the adder by
module mi  53 (fig. 4) was carried out correctly.</p>
      <p>Example 2. mi  97 . The stages of the synthesis of an adder by the module of RCS are as follows.
1. In accordance with the size of the module mi  97 , the number n of BOA of an adder by the
module M  2n 1 is determined. For the module mi  97 there is</p>
      <p>n  log2 mi 1  1  log2 97 1 1  7 .</p>
      <p>The structure of the adder by module
will be the following (Fig. 7).
2. Module mi  97 in binary code S7S6 S5 S4 S3 S2 S1 is 1100001, which means</p>
      <p>S7  1, S6  1, S5  S4  S3  S2  0, S1  1.</p>
      <p>3. Based on the obtained results, the structure of the adder by the module mi  97 is represented in
Fig. 8.</p>
      <p>In accordance with the synthesis method, four additional connections Х 57 , Х 47 , Х 37 , Х 27 are
introduced into the adder by module M  27 1 . In order to check the correctness of the synthesis of
the adder by module mi  97 , the value of the RCS module M  mi for a given adder structure is
determined.</p>
      <p>The first part of the adder structure is shown in Fig. 9.</p>
      <p>The first part of the adder structure module M1 will be the following M1  7  6  5 1 .</p>
      <p>The second part of the adder structure is shown in Fig. 10.</p>
      <p>The first part of the adder structure module M2 will be the following M 2  M1  4 1 .</p>
      <p>The third part of adder structure is shown in Fig. 11.</p>
      <p>The first part of the adder structure module M3 will be the following M3  M 2  3 1.</p>
      <p>The fourth part of the adder structure is shown in Fig. 12.</p>
      <p>The first part of the adder structure module M4 will be the following M 4  M3  2 1 .</p>
      <p>The fifth part of the adder structure is shown in Fig. 13.
The value of module mi :</p>
      <p>M1  7  6  5 1 (Fig. 9);</p>
      <p>M 2  M1  4  1   7  6  5  1  4  1 (Fig. 10);</p>
      <p>M3  M 2  3 1   7  6  5 1 4 1 3 1 (Fig. 11);</p>
      <p>M 4  M 3  2  1   7  6  5  1  4  1  3  1  2  1 (Fig. 12);</p>
      <p>M5  M4  1 1   7  6  5 1  4 1  3 1  2 1  1 1 (Fig. 13).</p>
      <p>In this case, the result of the synthesis of the adder by module mi  97 (Fig. 8) is correct.</p>
      <p>The given examples of the synthesis of the structure of adders by the module of RCS confirm the
possibility of practical usage of the algorithm which is considered in the article.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions</title>
      <p>The article considers an algorithm for synthesizing the structure of adders by the module mi of RCS.
The algorithm for the synthesis of adders is based on the usage of existing adders by modules
M  2n 1 , which are widely used in CS, operating both in the PN and in the RCS. The article directly
provides an algorithm for the synthesis of an adder by module mi . The algorithm is implemented by
introducing and using additional inter-bit connections i j . The article formulates the rules for
introducing these additional connections. The usage of additional connections (based on the structure
of adder by module M  2n 1 ) allows creating an adder that implements the operation of adding two
residues ai and bi of numbers. A set of k adders by the module is an adder of two numbers
A  (a1, a2 ,..., ai ,..., ak ) and B  (b1,b2 ,...,bi ,...,bk ) in RCS. Specific examples of the synthesis of adders
by the module for various values of the RCS modules mi are given.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Acknowledgments</title>
      <p>This work was supported in part by the National Research Foundation of Ukraine under Grant
2020.01/0351.</p>
    </sec>
    <sec id="sec-6">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Yadin</surname>
          </string-name>
          , Computer Systems Architecture, 1st ed.,
          <source>Chapman</source>
          and Hall/CRC,
          <string-name>
            <surname>Boca</surname>
            <given-names>Raton</given-names>
          </string-name>
          , Taylor &amp; Francis Group, CRC Press,
          <year>2016</year>
          . doi:
          <volume>10</volume>
          .1201/9781315373287.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Wright</surname>
          </string-name>
          , Performance Modeling,
          <source>Benchmarking and Simulation of High Performance Computing Systems, Future Generation Computer Systems</source>
          <volume>92</volume>
          (
          <year>2019</year>
          )
          <fpage>900</fpage>
          -
          <lpage>902</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.future.
          <year>2018</year>
          .
          <volume>11</volume>
          .020.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>H.</given-names>
            <surname>Kopetz</surname>
          </string-name>
          , (Ed.),
          <source>Modeling Real-Time Systems, in: Real-Time Systems: Design Principles for Distributed Embedded Applications</source>
          ,
          <string-name>
            <surname>Springer</surname>
            <given-names>US</given-names>
          </string-name>
          , Boston, MA,
          <year>1997</year>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>96</lpage>
          . doi:
          <volume>10</volume>
          .1007/0-306- 47055-
          <issue>1</issue>
          _
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R. S.</given-names>
            <surname>Alford</surname>
          </string-name>
          , Computer Systems Engineering Management, CRC Press,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .1201/9781351070829.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P. V A</given-names>
            .
            <surname>Mohan</surname>
          </string-name>
          ,
          <source>Residue Number Systems</source>
          , Springer International Publishing, Cham,
          <year>2016</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -41385-3.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Y.Zhang,</surname>
          </string-name>
          <article-title>An FPGA implementation of redundant residue number system for low cost fast speed fault tolerant computations</article-title>
          ,
          <source>Master's thesis</source>
          , Nanyang Technological University, Singapore,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .32657/10220/47113.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>E.</given-names>
            <surname>Vassalos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bakalis</surname>
          </string-name>
          ,
          <article-title>Residue-to-Binary Converter for the New RNS Moduli Set ${2^2n-2, \ 2^n-1, \ 2^n+1}$</article-title>
          ,
          <source>in: 2019 Panhellenic Conference on Electronics Telecommunications (PACET)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/PACET48583.
          <year>2019</year>
          .
          <volume>8956249</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V. A.</given-names>
            <surname>Krasnobayev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Koshman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. O.</given-names>
            <surname>Kuznetsova</surname>
          </string-name>
          ,
          <article-title>A Method for Implementing the Operation of Modulo Addition of the Residues of Two Numbers in the Residue Number System</article-title>
          ,
          <source>Cybern Syst Anal</source>
          .
          <volume>56</volume>
          (
          <year>2020</year>
          )
          <fpage>1029</fpage>
          -
          <lpage>1038</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10559-020-00323-9.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V. M.</given-names>
            <surname>Amerbaev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Telpukhov</surname>
          </string-name>
          ,
          <article-title>Hardware Implementation of Fir Filter Based on Number-theoretic Fast Fourier Transform in Residue Number System</article-title>
          ,
          <source>Open Engineering Sciences Journal</source>
          <volume>1</volume>
          (
          <year>2014</year>
          ). doi:
          <volume>10</volume>
          .2174/2352628901401010001.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P. V. A.</given-names>
            <surname>Mohan</surname>
          </string-name>
          ,
          <source>Implementation of Residue Number System Based Digital Filters, Residue Number System</source>
          <volume>2</volume>
          (
          <year>2018</year>
          ).
          <article-title>URL: journal.accsindia.org/implementation-of-residue-number-systembased-digital-filters</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P. V. A.</given-names>
            <surname>Mohan</surname>
          </string-name>
          , Specialized Residue Number Systems, in: P.V.A.
          <string-name>
            <surname>Mohan</surname>
          </string-name>
          (Ed.),
          <source>Residue Number Systems: Theory and Applications</source>
          , Springer International Publishing, Cham,
          <year>2016</year>
          , pp.
          <fpage>177</fpage>
          -
          <lpage>193</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -41385-
          <issue>3</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>V.</given-names>
            <surname>Krasnobayev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yanko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Akhmetov</surname>
          </string-name>
          , T. Kuznetsova,
          <article-title>Processing of the Residuals of Numbers in Real and Complex Numerical Domains</article-title>
          , in: T.
          <string-name>
            <surname>Radivilova</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Ageyev</surname>
          </string-name>
          , N. Kryvinska (Eds.),
          <source>Data-Centric Business and Applications</source>
          , Springer International Publishing, Cham,
          <year>2021</year>
          , pp.
          <fpage>529</fpage>
          -
          <lpage>555</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -43070-2_
          <fpage>24</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.</given-names>
            <surname>Krasnobayev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Koshman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Moroz</surname>
          </string-name>
          ,
          <article-title>Improved Method of Determining the Alternative Set of Numbers in Residue Number System</article-title>
          , in: O.
          <string-name>
            <surname>Chertov</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Mylovanov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Kacprzyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Kreinovich</surname>
          </string-name>
          , V. Stefanuk (Eds.),
          <source>Recent Developments in Data Science and Intelligent Analysis of Information</source>
          , Springer International Publishing, Cham,
          <year>2019</year>
          , pp.
          <fpage>319</fpage>
          -
          <lpage>328</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -97885-7_
          <fpage>31</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bayoumi</surname>
          </string-name>
          , G. Jullien,
          <string-name>
            <given-names>W.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <surname>A VLSI</surname>
          </string-name>
          <article-title>implementation of residue adders</article-title>
          ,
          <source>IEEE Transactions on Circuits and Systems</source>
          <volume>34</volume>
          (
          <year>1987</year>
          )
          <fpage>284</fpage>
          -
          <lpage>288</lpage>
          . doi:
          <volume>10</volume>
          .1109/TCS.
          <year>1987</year>
          .
          <volume>1086130</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Harman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.E.</given-names>
            <surname>Shparlinski</surname>
          </string-name>
          ,
          <article-title>Products of Small Integers in Residue Classes and Additive Properties of Fermat Quotients</article-title>
          ,
          <source>Int Math Res Notices</source>
          <volume>5</volume>
          2016
          <fpage>1424</fpage>
          -
          <lpage>1446</lpage>
          . https://doi.org/10.1093/imrn/rnv182.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Karpinski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ivasiev</surname>
          </string-name>
          , I. Yakymenko,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kasianchuk</surname>
          </string-name>
          , T. Gancarczyk,
          <article-title>Advanced method of factorization of multi-bit numbers based on Fermat's theorem in the system of residual classes</article-title>
          ,
          <source>in: 16th International Conference on Control, Automation and Systems (ICCAS)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>1484</fpage>
          -
          <lpage>1486</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICCAS.
          <year>2016</year>
          .
          <volume>7832500</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>V.</given-names>
            <surname>Krasnobayev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Popenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kononchenko</surname>
          </string-name>
          , T. Kuznetsova,
          <article-title>Determination of Positional Characteristics of Numbers in the Residual Class System</article-title>
          ,
          <source>in: IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>151</fpage>
          -
          <lpage>156</lpage>
          . doi:
          <volume>10</volume>
          .1109/DESSERT50317.
          <year>2020</year>
          .
          <volume>9125030</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Hard</surname>
          </string-name>
          real-time
          <source>computing systems</source>
          , Springer US, Boston, MA,
          <year>1997</year>
          . doi:
          <volume>10</volume>
          .1007/b102312.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>