METHOD FOR DETERMINING THE BIT GRID OVERFLOW OF A COMPUTER SYSTEM OPERATING IN THE SYSTEM OF RESIDUAL CLASSES

Authors

  • A. S. Yanko National University “Yuri Kondratyuk Poltava Polytechnic”, Poltava, Ukraine, Ukraine
  • V. A. Krasnobayev V. N. Karazin Kharkiv National University, Kharkiv, Ukraine, Ukraine
  • S. B. Nikolsky Municipal establishment “Kharkiv humanitarian-pedagogical academy” of Kharkiv regional council, Kharkiv, Ukraine, Ukraine
  • O. O. Kruk National University “Yuri Kondratyuk Poltava Polytechnic”, Ukraine

DOI:

https://doi.org/10.15588/1607-3274-2024-1-21

Keywords:

arithmetic operation of modular addition, bit grid overflow, comparison operation, computer system, nonpositional code, rank of the number, system of residual classes, zeroing procedure

Abstract

Context. Consideration of a set of examples of practical application of the procedure for identifying overflow of the bit grid of a computer system operating in a non-positional number system in residual classes. The object of the study is the process of processing data represented in the residual class system.

Objective. The goal of the work is to consider and analyze examples of the bit grid overflow definition of a computer system when implementing the operation of adding two numbers in a system of residual classes based on the application of a method for determining the bit grid overflow, based on the use of the concept of number rank.

Method. The specificity of the functioning of a computer system in a system of residual classes requires the implementation of not only modular operations, but also requires the implementation of additional, so-called non-modular operations. Non-modular operations include the operation of determining the overflow of the bit grid of a computer system in the system of residual classes. In a non-positional number system in residual classes, implementing the process of detecting overflow of the bit grid of a computer system is a difficult task to implement. The method considered in the work for determining the overflow of the bit grid is based on the use of positional features of a non-positional code of numbers in the system of residual classes, namely the true and calculated ranks of a number. The process of determining the overflow of the result of the operation of adding two numbers in the system of residual classes has been studied, since this arithmetic operation is the main, basic operation performed by a computer system.

Results. The developed methods are justified theoretically and studied when performing arithmetic modular operations of addition, subtraction and multiplication using tabular procedures.

Conclusions. The main advantage of the presented method is that the process of determining the overflow of the bit grid can be carried out in the dynamics of the computing process of the computer system, i.e. without stopping the solution of the problem. This circumstance makes it possible to reduce the unproductive expenditure of the computer system in the system of residual classes. In addition, this method can be used to control the operation of adding two numbers in the residual class system. This increases the reliability of obtaining the true result of the operation of adding two numbers in the system of residual classes.

Author Biographies

A. S. Yanko, National University “Yuri Kondratyuk Poltava Polytechnic”, Poltava, Ukraine

PhD, Associate Professor, Associate Professor of the Department of Computer and Information Technologies and Systems

V. A. Krasnobayev, V. N. Karazin Kharkiv National University, Kharkiv, Ukraine

Dr. Sc., Professor, Professor of Department of Electronics and Control Systems

S. B. Nikolsky, Municipal establishment “Kharkiv humanitarian-pedagogical academy” of Kharkiv regional council, Kharkiv, Ukraine

PhD, Associate Professor, Associate Professor of the Department of Informatics

O. O. Kruk, National University “Yuri Kondratyuk Poltava Polytechnic”

Post-graduate student of the Department of Automation, Electronics and Telecommunications

References

Akushskij I. Ya., Yudickij D. I. Mashinnaya arifmetika v ostatochnyx klassax. Mosсow, Sovet. radio, 1968, 440 p.

Krasnobayev V., Yanko A., Hlushko A. Information Security of the National Economy Based on an Effective Data Control Method, Journal of International Commerce, Economics and Policy, 2023, No. 14(3), Article no. 2350021. DOI: 10.1142/S1793993323500217

Butt M. A., Ajmal Z., Khan Z. I. , Idrees M., Javed Y. An InDepth Survey of Bypassing Buffer Overflow Mitigation Techniques, Applied Sciences, 2022, No. 12(13), P. 6702. DOI: 12. 6702. 10.3390/app12136702

Gavrylenko S. Y., Chelak V. V., Semenov S. G. Development of method for identification the computer system state based on the decision tree with multi-dimensional nodes, Radio Electronics, Computer Science, Control, 2022, No. (2), pp. 113–121. DOI: https://doi.org/10.15588/1607-3274-2022-2-11

Laktionov O., Lievi L., Tretia A., Movin M. Investigation of combined ensemble methods for diagnostics of the quality of interaction of human-machine systems, Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu, 2023, No. 4, pp. 138–143. DOI: https://doi.org/10.33271/nvngu/2023-4/138

Salnikov D., Karaman D., Krylova V. Highly reconfigurable soft-CPU based peripheral modules design, Advanced Information Systems, 2023, No. 7(2), pp. 92–97. DOI: https://doi.org/10.20998/2522-9052.2023.2.13

Yanko A., Koshman S., Krasnobayev V. Algorithms of data processing in the residual classes system, International Scientific-Practical Conference: Problems of Infocommunications. Science and Technology (PIC S&T). Kharkov, 2017, pp. 117– 121. DOI: 10.1109/INFOCOMMST.2017.8246363

Torgashev V. A. Sistema ostatochnyx klassov i nadezh-nost' CVM. Moscow, Sovet. radio, 1973, 118 p.

Mohan P. V. A. Residue Number Systems: Theory and Applications. Birkhäuser Basel, Springer International Publishing, Switzerland, 2016, 351 p. DOI: 10.1007/978-3-319-41385-3_2 9

Colbert I., Pappalardo A., Petri-Koenig J. A2Q: AccumulatorAware Quantization with Guaranteed Overflow Avoidance Supplementary Material, 2023 IEEE/CVF International Conference on Computer Vision (ICCV). Paris, France, 2023, pp. 16943–16952. DOI: 10.1109/ICCV51070.2023.0155

Bo L., Ruifeng Z., Jiangang L., Wenxin G., Yang L. Control on Abnormal Data Overflow of Distribution Network Management Platform, Journal of Physics: Conference Series 1748, 2021, No. 032064, pp. 1–5. DOI: 10.1088/1742-6596/1748/3/032064

Meakin R. L. Adaptive spatial partitioning and refinement for overset structured grids, Computer Methods in Applied Mechanics and Engineering, 2000, No. 189 (4), pp. 1077–1117. DOI: https://doi.org/10.1016/S0045-7825(99)00369-2

Hui H. W., Zhou C. C., Xu S. G., Lin F. H. A Novel Secure Data Transmission Scheme in Industrial Internet of Things, China Communications, 2020, No. 17 (1), pp. 73–88. DOI: 10.23919/JCC.2020.01.006

Chiamwongpaet S., Piromsopa K. Boundary Bit: Architectural Bound Checking for Buffer-Overflow Protection, ECTI Transactions on Computer and Information Technology (ECTI-CIT), 2020, No. 14, pp. 162–173. DOI:10.37936/ecticit.2020142.212338

Tsukada M., Matsutani H. An Overflow/Underflow-Free FixedPoint Bit-Width Optimization Method for OS-ELM Digital Circuit, IEICE Trans. Fundamentals, Vol. E105–A, No. 3, 2022, pp. 437–447. DOI: 10.1587/transfun.2021VLP0017

Xie H., Song Y., Cai L., Li M. Overflow Aware Quantization: Accelerating Neural Network Inference by Low-bit MultiplyAccumulate Operations, 29th International Joint Conference on Artificial Intelligence. Japan, 2020, pp. 868–875. DOI: https://doi.org/10.24963/ijcai.2020/121

Lee S., Shin D. J. Overflow-Detectable Floating-Point Fully Homomorphic Encryption, IEEE Access, 2024, pp. 1–21. DOI: 10.1109/ACCESS.2024.3351738

Li T., Wang Y., Li R., Li K. A bidirectional overflow digital correction algorithm with a single bit redundancy used in the pipeline A/D converters, 2009 IEEE 8th International Conference on ASIC. Changsha, Hunan, 2009, pp. 238–241. DOI: 10.1109/ASICON.2009.5351482

Cha Y., Cho G., Choi H., Song H. N bit result integer multiplier with overflow detector, Electronics Letters, 2001, No.(37), pp. 940–942. DOI: 10.1049/el:20010633.

Ivohin E. V. Gavrylenko V. V., Ivohina K. E. On the recursive algorithm for solving the traveling salesman problem on the basis of the data flow optimization method, Radio Electronics, Computer Science, Control, 2023, No. (3), pp. 141–147. DOI: https://doi.org/10.15588/1607-3274-2023-3-14

Ulman Z., Czyzak M. and Zurada J. Effective RNS scaling algorithm with the Chinese remainder theorem decomposition, Proceedings of IEEE Pacific Rim Conference on Communications Computers and Signal Processing, 1993, Vol. 2, pp. 528– 531 DOI: 10.1109/PACRIM.1993.407305

Krasnobayev V. A., Yanko A. S., Kovalchuk D. M. Methods for tabular implementation of arithmetic operations of the residues of two numbers represented in the system of residual classes, Radio Electronics, Computer Science, Control, 2022, No. 4, pp. 18–27. DOI: https://doi.org/10.15588/1607-3274-2022-4-2

Subbotin S. A. Data clustering based on inductive learning of neuro-fuzzy network with distance hashing, Radio Electronics, Computer Science, Control, 2022, No. 4, pp. 71–85. DOI: https://doi.org/10.15588/1607-3274-2022-4-6

Krasnobayev V. Koshman S., Yanko A., Martynenko А. Method of Error Control of the Information Presented in the Modular Number System, International Scientific-Practical Conference: Problems of Infocommunications Science and Technology (PIC S&T). Kharkov, 2018, pp. 39–42. DOI: 10.1109/INFOCOMMST.2018.8632049

Chao Huang, Peterson D., Rauch H., Teague J., Fraser D. Implementation of a fast digital processor using the residue number system, IEEE Transactions on Circuits and Systems, 1981, January, Vol. 28, № 1, pp. 32–38. DOI: 10.1109/TCS.1981.1084905

Szabo N. S., Tanaka R. I. Residue Arithmetic and Its Applications to Computer Technology. New York, McGraw-Hill, 1967, 236 p.

Piestrak S. J. Design of residue generators and multioperand modular adders using carry-save adders, Proceedings 10th IEEE Symposium on Computer Arithmetic, 26–28 June, 1991, pp. 100–107. DOI: 10.1109/ARITH.1991.145540

Salnikov D., Karaman D., Krylova V. Highly reconfigurable soft-CPU based peripheral modules design, Advanced Information Systems, 2023, No. 7(2), pp. 92–97. DOI: https://doi.org/10.20998/2522-9052.2023.2.13

Downloads

Published

2024-04-02

How to Cite

Yanko, A. S., Krasnobayev, V. A., Nikolsky, S. B., & Kruk, O. O. (2024). METHOD FOR DETERMINING THE BIT GRID OVERFLOW OF A COMPUTER SYSTEM OPERATING IN THE SYSTEM OF RESIDUAL CLASSES . Radio Electronics, Computer Science, Control, (1), 228. https://doi.org/10.15588/1607-3274-2024-1-21

Issue

Section

Progressive information technologies