{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T16:20:38Z","timestamp":1769012438215,"version":"3.49.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/ewdts.2019.8884396","type":"proceedings-article","created":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T06:34:05Z","timestamp":1572935645000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Use of Natural Information Redundancy in On-Line Testing of Computer Systems and their Components"],"prefix":"10.1109","author":[{"given":"Oleksandr","family":"Drozd","sequence":"first","affiliation":[{"name":"Odessa National Polytechnic University, Odessa, Ukraine"}]},{"given":"Anatoliy","family":"Sachenko","sequence":"additional","affiliation":[{"name":"Ternopil National Economic University, Ternopil, 46027, Ukraine"}]},{"given":"Svetlana","family":"Antoshchuk","sequence":"additional","affiliation":[{"name":"Odessa National Polytechnic University, Odessa, Ukraine"}]},{"given":"Julia","family":"Drozd","sequence":"additional","affiliation":[{"name":"Odessa National Polytechnic University, Odessa, Ukraine"}]},{"given":"Mykola","family":"Kuznietsov","sequence":"additional","affiliation":[{"name":"Odessa National Polytechnic University, Odessa, Ukraine"}]}],"member":"263","reference":[{"key":"ref39","year":"0","journal-title":"Intel Cyclone FPGA series"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCSET.2018.8336255"},{"key":"ref33","article-title":"Nuclear power plants - Instrumentation and control systems important to safety - Requirements for coping with common cause failure. Geneva: International Electrotechnical Commission","year":"2007","journal-title":"IEC 62340 2007"},{"key":"ref32","first-page":"476","article-title":"Features of Hidden Fault Detection in Pipeline Components of Safety-Related System","volume":"1356","author":"drozd","year":"0","journal-title":"CEUR Workshop Proceedings"},{"key":"ref31","first-page":"267","article-title":"Diversity in Open Source Intrusion Detection Systems","author":"asad","year":"2014","journal-title":"Computer Safety Reliability and Security Lecture Notes in Computer Science 8666"},{"key":"ref30","first-page":"507","article-title":"Computer's analysis method and reliability assessment of fault-tolerance operation of information systems","volume":"1356","author":"atamanyuk","year":"0","journal-title":"CEUR Workshop Proceedings"},{"key":"ref37","first-page":"328","article-title":"The principle of recovery logic FPGA for critical applications by adapting to failures of logic elements","author":"tyurin","year":"2013","journal-title":"World Applied Sciences Journal"},{"key":"ref36","first-page":"654","article-title":"Improving of a Circuit Checkability and Trustworthiness of Data Processing Results in LUT-based FPGA Components of Safety-Related Systems","volume":"1844","author":"drozd","year":"0","journal-title":"CEUR Workshop Proceedings"},{"key":"ref35","first-page":"322","article-title":"Use of Natural LUT Redundancy to Improve Trustworthiness of FPGA Design","volume":"1614","author":"drozd","year":"0","journal-title":"CEUR Workshop Proceedings"},{"key":"ref34","first-page":"498","article-title":"The control technology of integrity and legitimacy of LUT-oriented information object usage by self-recovering digital watermark","volume":"1356","author":"zashcholkin","year":"0","journal-title":"CEUR Workshop Proceedings"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1108\/K-03-2013-0053"},{"key":"ref40","year":"0","journal-title":"Intel FPGA Architecture"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2013.6662656"},{"key":"ref12","first-page":"1","article-title":"Synopsys","year":"2016","journal-title":"DWFC Flexible Floating Point Overview"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55595-9_11"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DT.2013.6566310"},{"key":"ref15","article-title":"IEC 61508-1:2010","year":"2010","journal-title":"Functional Safety of Electrical \/ Electronic \/ Programmable Electronic Safety Related Systems - Part General requirements Geneva International Electrotechnical Commission"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EWDTS.2013.6673183"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1134\/S0005117917020084"},{"key":"ref18","author":"hahanov","year":"2017","journal-title":"Cyber Physical Computing for IoT-driven Services"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095202"},{"key":"ref28","year":"2015","journal-title":"Delphi 10 Seattle Embarcadero"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1134\/S0005117915100112"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2001.915042"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2002.998395"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2015.7407"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2004.1333305"},{"key":"ref5","first-page":"33","article-title":"Comparison between the basic LSB Replacement Technique & Increased Capacity of Information Hiding in LSB's Method for Images","volume":"45","author":"kekre","year":"2012","journal-title":"International Journal of Computer Applications"},{"key":"ref8","article-title":"Programming Guide \/ Version 1.0, NVIDIA Corporation","year":"2007","journal-title":"NVIDIA CUDA Compute Unified Device Architecture"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"72","DOI":"10.47839\/ijc.15.2.840","article-title":"Parallelism and complexity of a small-world network model","volume":"15","author":"hiromoto","year":"2016","journal-title":"International Journal of Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2006.61"},{"key":"ref9","first-page":"32","article-title":"Synthesis of multilevel structures with multiple outputs","volume":"1631","author":"opanasenko","year":"0","journal-title":"CEUR Workshop Proc"},{"key":"ref1","first-page":"7","article-title":"On-Line Testing for VLSI - a Compendium of Approaches. Electronic Testing: Theory and Application","volume":"12","author":"nicolaidis","year":"1998","journal-title":"JETTA"},{"key":"ref20","article-title":"Data Integrity Checking Based on Residue Number System and Chinese Remainder Theorem in Cloud","volume":"3","author":"hema","year":"2014","journal-title":"International Journal of Innovative Research in Science Engineering and Technology"},{"key":"ref22","article-title":"ANSI\/IEEE","year":"1985","journal-title":"IEEE Standard for Binary Floating-Point Arithmetic"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EDTC.1996.494375"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2011.6072759"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2008.98"},{"key":"ref23","first-page":"10016","year":"2008","journal-title":"(Revision of IEEE Std 754&#x2013;1985)IEEE Standard for Floating-Point Arithmetic IEEE 3 Park Avenue"},{"key":"ref26","author":"sellers","year":"1968","journal-title":"Error Detecting Logic for Digital Computers"},{"key":"ref25","article-title":"Theory of numbers","author":"sushkevich","year":"1956","journal-title":"Kharkov State University"}],"event":{"name":"2019 IEEE East-West Design & Test Symposium (EWDTS)","location":"Batumi, Georgia","start":{"date-parts":[[2019,9,13]]},"end":{"date-parts":[[2019,9,16]]}},"container-title":["2019 IEEE East-West Design &amp; Test Symposium (EWDTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8871308\/8884369\/08884396.pdf?arnumber=8884396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:33:32Z","timestamp":1756154012000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8884396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/ewdts.2019.8884396","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}