{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T04:30:41Z","timestamp":1726806641799},"reference-count":25,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This article discusses computing systems that operate in residue number systems (RNSs). The main direction of improving computer systems (CSs) is increasing the speed of implementation of arithmetic operations and the reliability of their functioning. Encoding data in RNS solves the problem of optimal redundancy, i.e., the creation of such computing systems provides maximum reliability with restrictions on weight and size characteristics. This article proposes new structures of fault-tolerant CSs operating in RNS in the case of the application with an active fault-tolerant method. The use of the active fault-tolerant method (dynamic redundancy) in the RNSs provides higher reliability. In addition, with an increase in the digits of CSs, the efficiency of using the proposed structures increases.<\/jats:p>","DOI":"10.1515\/comp-2020-0171","type":"journal-article","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T03:23:53Z","timestamp":1646450633000},"page":"66-74","source":"Crossref","is-referenced-by-count":0,"title":["Designing of fault-tolerant computer system structures using residue number systems"],"prefix":"10.1515","volume":"12","author":[{"given":"Victor","family":"Krasnobayev","sequence":"first","affiliation":[{"name":"Department of Information Systems and Technologies Security, V. N. Karazin Kharkiv National University , 4 Svobody Sq. , Kharkiv , 61022 , Ukraine"}]},{"given":"Alexandr","family":"Kuznetsov","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Technologies Security, V. N. Karazin Kharkiv National University , 4 Svobody Sq. , Kharkiv , 61022 , Ukraine"},{"name":"JSC \u201cInstitute of Information Technologies,\u201d , Bakulin St., 12 , Kharkiv , 61166 , Ukraine"}]},{"given":"Anastasiia","family":"Kiian","sequence":"additional","affiliation":[{"name":"JSC \u201cInstitute of Information Technologies,\u201d , Bakulin St., 12 , Kharkiv , 61166 , Ukraine"},{"name":"Department of Information Systems and Technologies Security, V. N. Karazin Kharkiv National University , 6 Svobody Sq. , Kharkiv , 61022 , Ukraine"}]}],"member":"374","published-online":{"date-parts":[[2022,3,3]]},"reference":[{"key":"2022081707553246701_j_comp-2020-0171_ref_001","unstructured":"J. O. Tuazon, Residue Number System in Computer Arithmetic, Ames, Iowa, United States, Iowa State University, 1969, 10.31274\/rtd-180816-2270."},{"key":"2022081707553246701_j_comp-2020-0171_ref_002","doi-asserted-by":"crossref","unstructured":"P. V. A. Mohan, Residue Number Systems, Bangalore, India, Birkh\u00e4user, 2016. 10.1007\/978-3-319-41385-3.","DOI":"10.1007\/978-3-319-41385-3"},{"key":"2022081707553246701_j_comp-2020-0171_ref_003","unstructured":"L. Hanzo, L.-L. Yang, E.-L. Kuan, and K. Yen, \u201cResidue number system arithmetic,\u201d in: Single- and Multi-Carrier DS-CDMA, L. Hanzo, L.-L. Yang, E.-L. Kuan, and K. Yen, eds., Hoboken, New Jersey, John Wiley & Sons, Ltd, 2005, 10.1002\/0470863110.ch17."},{"key":"2022081707553246701_j_comp-2020-0171_ref_004","doi-asserted-by":"crossref","unstructured":"J. D. Dumas, \u201cParallel and high-performance systems [WWW Document],\u201d Computer Architecture, Boca Raton, Florida, CRC Press, 2016, https:\/\/doi.org\/10.4324\/9781315367118-6.","DOI":"10.4324\/9781315367118-6"},{"key":"2022081707553246701_j_comp-2020-0171_ref_005","doi-asserted-by":"crossref","unstructured":"A. Elahi, \u201cIntroduction to computer architecture,\u201d in: Computer Systems: Digital Design, Fundamentals of Computer Architecture and Assembly Language, A. Elahi, ed., Cham, Springer International Publishing, 2018, pp. 115\u2013136, 10.1007\/978-3-319-66775-1_6.","DOI":"10.1007\/978-3-319-66775-1_6"},{"key":"2022081707553246701_j_comp-2020-0171_ref_006","doi-asserted-by":"crossref","unstructured":"E. Bauer, R. Adams, and D. Eustace, \u201cUnderstanding redundancy,\u201d in: Beyond Redundancy, Hoboken, New Jersey, John Wiley & Sons, Ltd, 2011, pp. 35\u201358, 10.1002\/9781118104910.ch3.","DOI":"10.1002\/9781118104910.ch3"},{"key":"2022081707553246701_j_comp-2020-0171_ref_007","doi-asserted-by":"crossref","unstructured":"M. H. Weik, \u201cComputer system fault tolerance,\u201d in: Computer Science and Communications Dictionary, M. H. Weik, ed., Boston, MA, Springer US, 2001, pp. 274\u2013274, 10.1007\/1-4020-0613-6_3420.","DOI":"10.1007\/1-4020-0613-6_3420"},{"key":"2022081707553246701_j_comp-2020-0171_ref_008","unstructured":"D. Radhakrishnan and T. Pyon, \u201cFault tolerance in RNS: an efficient approach,\u201d in: Proceedings on 1990 IEEE International Conference on Computer Design: VLSI in Computers and Processors, Cambridge, MA, USA, IEEE, 1990, 10.1109\/iccd.1990.130156."},{"key":"2022081707553246701_j_comp-2020-0171_ref_009","doi-asserted-by":"crossref","unstructured":"T. F. Tay and C.-H. Chang, \u201cFault-tolerant computing in redundant residue number system,\u201d in: Embedded Systems Design with Special Arithmetic and Number Systems, Cham, Springer, 2017, pp. 65\u201388, 10.1007\/978-3-319-49742-6_4.","DOI":"10.1007\/978-3-319-49742-6_4"},{"key":"2022081707553246701_j_comp-2020-0171_ref_010","doi-asserted-by":"crossref","unstructured":"K. Phalakarn and A. Surarerks, \u201cAlternative redundant residue number system construction with redundant residue representations,\u201d in: 2018 3rd International Conference on Computer and Communication Systems (ICCCS), Nagoya, Japan: IEEE, 2018, 10.1109\/ccoms.2018.8463305.","DOI":"10.1109\/CCOMS.2018.8463305"},{"key":"2022081707553246701_j_comp-2020-0171_ref_011","doi-asserted-by":"crossref","unstructured":"N. I. Cherviakov, M. G. Babenko, and M. N. Shabalina, \u201cDevelopment of a secure system for distributed data storage and processing in the clouds based on the concept of active security in RNS,\u201d in: 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM). Presented at the 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM), St. Petersburg, Russia, IEEE, 2017, pp. 558\u2013560, 10.1109\/SCM.2017.7970649.","DOI":"10.1109\/SCM.2017.7970649"},{"key":"2022081707553246701_j_comp-2020-0171_ref_012","doi-asserted-by":"crossref","unstructured":"J. Wang, S. Ma, Z.-G. Yang, and J. Hu, \u201cA systemic performance evaluation method for residue number system,\u201d in: 2016 2nd IEEE International Conference on Computer and Communications (ICCC). Presented at the 2016 2nd IEEE International Conference on Computer and Communications (ICCC), Chengdu, IEEE, 2016, pp. 321\u2013325, 10.1109\/CompComm.2016.7924716.","DOI":"10.1109\/CompComm.2016.7924716"},{"key":"2022081707553246701_j_comp-2020-0171_ref_013","doi-asserted-by":"crossref","unstructured":"V. Krasnobayev, A. Kuznetsov, S. Koshman, and S. Moroz, \u201cImproved method of determining the alternative set of numbers in residue number system,\u201d in: Recent Developments in Data Science and Intelligent Analysis of Information, Cham, Springer, 2018, pp. 319\u2013328, 10.1007\/978-3-319-97885-7_31.","DOI":"10.1007\/978-3-319-97885-7_31"},{"key":"2022081707553246701_j_comp-2020-0171_ref_014","doi-asserted-by":"crossref","unstructured":"V. Krasnobaev, S. Koshman, A. Kononchenko, K. Kuznetsova, and T. Kuznetsova, \u201cThe formulation and solution of the task of the optimum reservation in the system of residual classes,\u201d in: 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine, IEEE, 2019, 10.1109\/atit49449.2019.9030483.","DOI":"10.1109\/ATIT49449.2019.9030483"},{"key":"2022081707553246701_j_comp-2020-0171_ref_015","doi-asserted-by":"crossref","unstructured":"M. Welschenbach, \u201cModular arithmetic: calculating with residue classes,\u201d Cryptography in C and C++, pp. 67\u201379, 2013, 10.1007\/978-1-4302-5099-9_5.","DOI":"10.1007\/978-1-4302-5099-9_5"},{"key":"2022081707553246701_j_comp-2020-0171_ref_016","doi-asserted-by":"crossref","unstructured":"V. Krasnobayev, A. Kuznetsov, I. Lokotkova, and A. Dyachenko, \u201cThe method of single errors correction in the residue class,\u201d in: 2019 3rd International Conference on Advanced Information and Communications Technologies (AICT), Lviv, Ukraine, IEEE, 2019, 10.1109\/aiact.2019.8847845.","DOI":"10.1109\/AIACT.2019.8847845"},{"key":"2022081707553246701_j_comp-2020-0171_ref_017","doi-asserted-by":"crossref","unstructured":"M. L. Shooman, \u201cN-modular redundancy,\u201d in: Reliability of Computer Systems and Networks, Hoboken, New Jersey, John Wiley & Sons, Ltd, 2002, pp. 145\u2013201, 10.1002\/047122460X.ch4.","DOI":"10.1002\/047122460X"},{"key":"2022081707553246701_j_comp-2020-0171_ref_018","doi-asserted-by":"crossref","unstructured":"F. P. Garc\u00eda M\u00e1rquez, ed., Fault Detection, Diagnosis and Prognosis, London, UK, IntechOpen, 2020, 10.5772\/intechopen.77564.","DOI":"10.5772\/intechopen.77564"},{"key":"2022081707553246701_j_comp-2020-0171_ref_019","unstructured":"T. Chen, Fault Diagnosis and Fault Tolerance, Chongqing, China, Computer Research Institute, Chongqing University, 1992, 10.1007\/978-3-642-77179-8."},{"key":"2022081707553246701_j_comp-2020-0171_ref_020","doi-asserted-by":"crossref","unstructured":"N. Kniazieva and T. Kunup, \u201cIncreasing the structural survivability of telecommunication networks,\u201d in: 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET). Presented at the 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), Lviv, Ukraine, IEEE, 2016, pp. 572\u2013576, 10.1109\/TCSET.2016.7452119.","DOI":"10.1109\/TCSET.2016.7452119"},{"key":"2022081707553246701_j_comp-2020-0171_ref_021","doi-asserted-by":"crossref","unstructured":"P. Ca\u00c8\u0179caval and F. Leon, \u201cActive redundancy allocation in complex systems by using different optimization methods,\u201d in: Computational Collective Intelligence, Lecture Notes in Computer Science, N. T. Nguyen, R. Chbeir, E. Exposito, P. Aniort\u00e9, B. Trawi\u0144ski, eds., Cham, Springer International Publishing, 2019, pp. 625\u2013637, 10.1007\/978-3-030-28377-3_52.","DOI":"10.1007\/978-3-030-28377-3_52"},{"key":"2022081707553246701_j_comp-2020-0171_ref_022","doi-asserted-by":"crossref","unstructured":"V. Yatskiv and T. Tsavolyk, \u201cImprovement of data transmission reliability in wireless sensor networks on the basis of residue number system correcting codes using the special module system,\u201d In: 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON), Kyiv, UKraine, IEEE, 2017, 10.1109\/ukrcon.2017.8100376.","DOI":"10.1109\/UKRCON.2017.8100376"},{"key":"2022081707553246701_j_comp-2020-0171_ref_023","doi-asserted-by":"crossref","unstructured":"I. A. Ushakov, ed., Optimal Resource Allocation, Hoboken, New Jersey, John Wiley & Sons, 2013, 10.1002\/9781118400715.","DOI":"10.1002\/9781118400715"},{"key":"2022081707553246701_j_comp-2020-0171_ref_024","unstructured":"A. M. Polovko, Fundamentals of Reliability Theory, Moscow, Science, 1964, p. 446, (in Russian)."},{"key":"2022081707553246701_j_comp-2020-0171_ref_025","unstructured":"A. M. Polovko, Fundamentals of Reliability Theory, New York, NY, Academic Press, 1968, p. 478."}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0171\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0171\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T20:19:40Z","timestamp":1726777180000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0171\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,3,16]]},"published-print":{"date-parts":[[2022,3,16]]}},"alternative-id":["10.1515\/comp-2020-0171"],"URL":"https:\/\/doi.org\/10.1515\/comp-2020-0171","relation":{},"ISSN":["2299-1093"],"issn-type":[{"type":"electronic","value":"2299-1093"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}