You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Editor’s Choice
  • Article
  • Open Access

26 August 2022

UAV and IoT-Based Systems for the Monitoring of Industrial Facilities Using Digital Twins: Methodology, Reliability Models, and Application

,
,
,
,
,
,
and
1
School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wuhan 430070, China
2
School of Computer Science, Hubei University of Technology, Wuhan 430068, China
3
Department of Computer Systems, Networks and Cybersecurity, National Aerospace University “KhAI”, 17, Chkalov Str., 61070 Kharkiv, Ukraine
4
Research Institute for Intelligent Computer Systems, West Ukrainian National University, 11, Lvivska Str., 46009 Ternopil, Ukraine
This article belongs to the Special Issue Complex Data Processing Systems and Computing Algorithms: New Concepts and Applications

Abstract

This paper suggests a methodology (conception and principles) for building two-mode monitoring systems (SMs) for industrial facilities and their adjacent territories based on the application of unmanned aerial vehicle (UAV), Internet of Things (IoT), and digital twin (DT) technologies, and a set of SM reliability models considering the parameters of the channels and components. The concept of building a reliable and resilient SM is proposed. For this purpose, the von Neumann paradigm for the synthesis of reliable systems from unreliable components is developed. For complex SMs of industrial facilities, the concept covers the application of various types of redundancy (structural, version, time, and space) for basic components—sensors, means of communication, processing, and presentation—in the form of DTs for decision support systems. The research results include: the methodology for the building and general structures of UAV-, IoT-, and DT-based SMs in industrial facilities as multi-level systems; reliability models for SMs considering the applied technologies and operation modes (normal and emergency); and industrial cases of SMs for manufacture and nuclear power plants. The results obtained are the basis for further development of the theory and for practical applications of SMs in industrial facilities within the framework of the implementation and improvement of Industry 4.0 principles.

2. Methodology for Building SMs

2.1. Concept of SM Building

For critical industrial facilities and monitoring systems, as their key component, there is a contradiction in the context of the development of mobile, information, and smart technologies. On the one hand, there are strict requirements for the reliability, safety, and survival of monitoring systems in industrial facilities in the pre- and post-accident period regarding the failure of sensors, communications, processing equipment, and control points. At the same time, the capabilities of UAVs and the Internet of Drones for measuring, transmitting, and processing information are growing. On the other hand, concepts and methods for creating and using reliable and resilient monitoring systems in industrial facilities under conditions of failure and accidents have not been sufficiently developed.
To resolve this contradiction, the concept of building reliable and resilient monitoring systems is proposed, based on the development of the von Neumann paradigm of the synthesis of reliable systems from unreliable components, further based on the “system components-types of redundancy“ matrix [,,]. For complex monitoring systems in industrial facilities, the concept covers the application of various types of redundancy (structural, version, time, and space) for basic components: sensors and means of converting measurement results, and means of communication, information transmission, and information processing. A UAV fleet is a key component of a redundant, multi-version, and dynamically reconfigurable SM because the application of UAVs allows for the implementation of specific kinds of structural, informational, and version redundancy that can be replenished. This increases the survivability of the SM in extreme conditions. Moreover, an additional kind of information and version redundancy is the presentation of the state of the monitored object in the form of digital twins for decision support centers.
The concept is also complemented by the fact that to ensure the resilience of monitoring systems, the use of diversity and a spatial distribution of decision-making centers with clearly defined functions and priorities are proposed. In addition, the diversity of control methods is due to the use of DTs and cloud data processing, as well as data transfer methods using floating UAVs that form dynamically reconfigurable structures that are resistant to physical and cyber intrusion and can be recovered. The presence of mobile and protected cloud subsystems offers the possibility of dynamic and proactive reconfiguration of assets in the event of failures, physical impacts, and cyberattacks.

2.2. Principles of SM Building

2.2.1. Three-Level Model of Object Monitoring

During the development of the structure and models of the monitoring system, a three-tier model of the presentation of the industrial facility was adopted, which includes:
  • Equipment with sensors and critical-process management devices (equipment that is monitored and controlled, EC). Various systems of such monitoring are used in industrial facilities. They are based on wireless and IoT technologies and do not interfere with technological processes, without creating additional risks from the point of view of ensuring the safety of objects.
  • Several systems and building complexes, within which equipment with sensors and devices for the management of critical processes (the utility that is monitored and controlled, UC) were placed. For example, for a nuclear power plant, this level covers systems and equipment whose condition is monitored by the Post-Accident Monitoring System [].
  • The territory of the industrial facility, which is limited by the outer perimeter, where monitoring stations (MSs) are located (zones that are monitored, ZC). For a nuclear power plant, this corresponds to the area whose condition is monitored by the Automated Radiation Monitoring System [].
Next, we consider the option of building an industrial facility, on the territory of which there are several UCis (i = 1…n) and MSs of the same type.

2.2.2. Applied Technologies

In the process of building and operating the monitoring system, the following technologies are expected to be used:
  • DTs, which ensure the creation of digital clones in an industrial facility. This makes it possible to model and determine its state from various data on the state of its component systems and objects. The creation and use of DTs of different complexity for different crisis centers are envisaged. The model uses a digital twin instance which describes a specific object with which the twin remains associated through the life of the object. Duplicates of this type usually contain an annotated 3D model, which takes into account the measurement results received from the sensors, as well as the current and predicted values of the monitoring parameters.
  • IoT and Internet of Flying Things to reserve wired data transmission channels from sensors and critical-process control devices, commonly equipped with previous-generation Post-Accident Monitoring Systems and Automated Radiation Monitoring Systems. Post-Accident Monitoring Systems were created in the first decade after the Fukushima accident [,].
  • Edge computing technologies for data pre-processing at every level of the industrial facility monitoring model using edge nodes (EN), which make it possible to reduce data volumes, their transmission speed, and the requirements for the performance of transmission equipment. Data pre-processing also increases the efficiency of decision-making processing in crisis centers. The model of the monitoring system aims to perform boundary calculations and the placement of relevant edge nodes on both UCs and onboard UAVs (flying edge nodes, FENs).

2.2.3. Redundant Centers of Control and Monitoring

To ensure the dependability and resilience of monitoring the condition of the object, crisis centers using the UAV fleet (IoD) and cloud services are utilized. The backup model provides additional centers to the usual (for example, for a nuclear power plant) control room (CR) and emergency control room (ECR):
  • The private cloud crisis group (PCG), which processes monitoring data using cloud services and the Internet of Things;
  • The UAV Fleet and flying control center (FCC), which receive and processes data on the condition of an industrial facility using equipment that can be placed either on one powerful UAV or under a group of UAVs (UAV fleet or IoD), can be distributed. The IoD is a kind of Internet of Flying Things based on a set of interacting drones. For the considered SMs, the IoD is a part of the flying control center (FCC) infrastructure with access to both the Private Cloud and Internet resources. Drone on-board systems collaborate with each other, ground sensors (located at the MSs), and the FCC.
Monitoring systems operate in normal and emergency modes according to the condition of the industrial facility. Additional control and monitoring centers of industrial facilities, namely PCG and FCC, are involved in the emergency mode. Under certain circumstances, they can perform certain monitoring functions in normal mode, but within the framework of this study, they only work in emergency mode.
In this case, the organization and functions of the SM based on CR, ECR, PCG, and FCC are described in Table 1 and Table 2. CR, ECR, PCG, and FCC are separate subsystems of monitoring consisting of sensors (Sen), communication (Com), data processing (Prc), and decision-making support means (DMU). Table 1 describes the functions of these subsystems considering the levels of industrial facility hierarchy (EC, UC, and ZC). Table 2 presents the capacity of monitoring functions in the normal and emergency modes.
Table 1. Functions of centers.
Table 2. The capacity of monitoring functions.
The CR subsystem in both modes performs all monitoring functions at all levels of the hierarchy. The ECR subsystem differs in that it does not perform equipment monitoring (EC). The FCC and PCG subsystems provide monitoring at the ZC level only in emergency mode, in full or in part, depending on the sensor coverage of the surrounding areas. The ZC sensors for CR, ECR, PCG, and FCC can be general or separate.

2.2.4. General Model of the Industrial Facility Monitoring System

Thus, the general model of the industrial facility monitoring system can be described as a set GSM = {OM, CM, Sen, Com, DT, DMU}, where:
OM = {EC, UC, ZC}—the set of objects that are monitored or/and controlled;
CM = {CR, ECR, PCG, FCC]—the set of centers of control and monitoring;
Sen = {Sen_EC, Sen_UC, Sen_ZC}—the set of sensors;
Com = {ComEC_CR, ComUC_CR, ComUC_ECR, ComZC_CR, ComZC_ECR, ComZC_PCG, ComZC_FCC}—the set of means of communication;
DT = {Dtw_CR, Dtw_ECR, Dtw_PCG, Dtw_FCC]—the set of digital twins;
DMU = {DMU_CR, DMU_ECR]—the set of decision-making support means.
This GSM model describes the structural components of the SM, the relationships between which are shown in Figure 1. Reliability models of the SMs are described and explored in the next sections.
Figure 1. The structures of the industrial facility monitoring system: the T1-type structure which, in addition to the DTs for CR and ECR, requires DTs (depicted as dashed rectangles) for the PCG and FCC, and the T2-type structure which does not require them. The dot-dash arrows are utilized to show the channels for information exchange between the CR and other subsystems.

2.3. Structures of SMs

The structures of industrial facility monitoring systems with different concepts of the use of digital twins are shown in Figure 1 and Figure 2 (types T1 and T2). The first structure (Figure 1) describes the monitoring system using DTs designated as Dtw in each crisis center: Dtw_CR in the CR center, respectively; Dtw_ECR; Dtw_PCG; and Dtw_FCC. The second structure (Figure 2) of the monitoring system involves the use of DTs only in CR and ECR—Dtw_CR and Dtw_ECR, respectively.
In the proposed structures, CR receives data on the monitoring of the condition of all the components of the three-level model of an industrial facility—EC, UC, and ZC. The transmission of monitoring information from equipment ECij, i = {1…, n}, j = {1,…, mi} and stations MS1,…, MSk is performed either by nodes ENi and FEN, respectively, which perform data pre-processing, or directly from several UCi sensors.
ECR receives monitoring data from US1,..., UCn, and ZC. PCG and FCC only process ZC monitoring data. All the shelters have appropriate Prc tools for data processing. The decision on the condition of the facility is made only in CR and ECR; for this purpose, decision-making units (DMU) are provided in their composition: DMU_CR and DMU_ECR. All the centers interact with each other (interaction channels are indicated by a dotted line).
Figure 2. Graphical representation of models for SM option field-monitoring coverage of variants for allocation of monitoring functions among the SM channels (VAMF), as well as RBDs per each of these variants: (a) model for VAMF1, (b) model for VAMF2, (c) model for VAMF3, (d) model for VAMF4, and (e) model for VAMF5.
Table 3 provides options for the structures of facility monitoring systems in normal and emergency mode, taking into account data sources, relevant centers, and the type of monitoring system (T1 or T2).
Table 3. Specification of SM structures and configurations in normal and emergency modes.
Further details and research on SM structures will be given in Section 3 based on the analysis of various sensor coverage options of the ZC parameter space for PCG and FCC subsystems, and on the development of appropriate reliability models. The presence of two, three, or four monitoring subsystems, i.e., the involvement of PCG and FCC subsystems, refers to the completeness of ZC option field coverage, which may be limited for them (marked with an asterisk). The relevant coverage models are analyzed below.

3. Reliability Models for System of Monitoring

3.1. Models of SM Option Field-Monitoring Coverage

Let us assume that each SM subsystem channel comprises either communications, a processor, and a digital twin (for the type-T1 SM structure) or communications and a processor (for the type-T2 SM structure). DTs’ compatibility with different subsystems is ensured as follows:
  • For the EC, the DTs are formed only in CR, so there is no compatibility problem here.
  • For UC, DTs are formed in CR and ECR from common sensors, so the data for generating DTs are identical, and, therefore, their compatibility is ensured. In addition, these data are corrected by the DMU in cases of failure.
  • For ZC, DTs are formed by all the subsystems (CR, ECR, PCG, and FCC) from sensors located in the ZC zone. If all subsystems use the full amount of monitoring data, both the compatibility and reliability of DT formation are ensured as in the previous case, using the DMU. If PCG and FCC subsystems use a limited data set from sensors, these data are employed to form the corresponding part of DTs and combine it with data from CR and ECR to ensure the DT’s compatibility.
In emergency mode, the SM can utilize either one (PCG/FCC) or two (PCG and FCC) channels in addition to the CR and ECR channels.
Depending on the tasks performed by the SM, the following features of SM channels’ functioning should be considered:
  • Channels can perform the same set of monitoring functions;
  • The set of monitoring functions for some channels can be considered as a subset of monitoring functions for other channels;
  • Sets of monitoring functions for individual channels may overlap.
These features of the SM channels mentioned above can form various variants of allocation for monitoring functions (VAMFs) among the SM channels. Each VAMF allows us to obtain the corresponding model of SM option field-monitoring coverage, as well as forming reliability block diagrams (RBDs). The latter are needed to assess the reliability of SM, which uses such VAMFs.
Let us introduce the following notations: FCR, FECR, FPCG, and FFCC are sets of monitoring functions performed by the CR, ECR, PCG, and FCC channels, respectively.
Considering the presented features of SM channel functioning and the accepted notations, five models of SM option field-monitoring coverage were developed (Figure 2).
As we can see from Figure 2, the largest and lowest numbers of RBDs correspond to VAMF5 (four RBDs, Figure 2e) and VAMF1 (one RBD, Figure 2a), respectively.

3.2. Extended Specification for SM Structures

Considering the specification of the SM structures presented in Table 3 and the features of the models of SM option field-monitoring coverage for VAMF, an extended specification was developed (Table 4).
This specification, in addition to the source of information (EC, UC, or ZC), mode of functioning (N or E), and type of structure (T1 or T2), which are presented in Table 3, provides information on:
The third channel for the three-channel SM structure (PCG or FCC);
The designation of the SM structure;
The reliability block diagram for the SM;
The notations of the SM structure and SM reliability function;
The equation for calculating the SM reliability function.
Table 4. Extended specification of the SM structures.
Table 4. Extended specification of the SM structures.
Source of
Information
ModeNumber of
Channels
Type of StructureThird Channel for
Three-Channel SM structure
Notation
of SM Structure
Reliability Block Diagram for SMNotation
of SM Reliability Function
Equation
for Calculating
SM Reliability
Function
ECNormal1T2- S 1 E C _ N Figure 3 P 1 E C _ N Equation (1)
ECEmergency1T2- S 1 E C _ E Figure 3 P 1 E C _ E Equation (2)
UCNormal2T1- S 2 _ 1 U C _ N Figure 4 P 2 _ 1 U C _ N Equation (3)
UCEmergency2T1- S 2 _ 1 U C _ E Figure 4 P 2 _ 1 U C _ E Equation (4)
UCNormal2T2- S 2 _ 2 U C _ N Figure 5 P 2 _ 2 U C _ N Equation (5)
UCEmergency2T2- S 2 _ 2 U C _ E Figure 5 P 2 _ 2 U C _ E Equation (6)
ZCNormal2T1- S 2 _ 1 Z C _ N Figure 6 P 2 _ 1 Z C _ N Equation (7)
ZCEmergency2T1- S 2 _ 1 Z C _ E Figure 6 P 2 _ 1 Z C _ E Equation (8)
ZCNormal2T2- S 2 _ 2 Z C _ N Figure 7 P 2 _ 2 Z C _ N Equation (9)
ZCEmergency2T2- S 2 _ 2 Z C _ E Figure 7 P 2 _ 2 Z C _ E Equation (10)
ZCEmergency3T1PCG S 3 ( P C G ) _ 1 Z C _ E Figure 8 P 3 ( P C G ) _ 1 Z C _ E Equation (11)
ZCEmergency3T2PCG S 3 ( P C G ) _ 2 Z C _ E Figure 9 P 3 ( P C G ) _ 2 Z C _ E Equation (12)
ZCEmergency3T1FCC S 3 ( F C C ) _ 1 Z C _ E Figure 10 P 3 ( F C C ) _ 1 Z C _ E Equation (13)
ZCEmergency3T2FCC S 3 ( F C C ) _ 2 Z C _ E Figure 11 P 3 ( F C C ) _ 2 Z C _ E Equation (14)
ZCEmergency4T1- S 4 _ 1 Z C _ E Figure 12 S 4 _ 1 Z C _ E Equation (15)
ZCEmergency4T2- S 4 _ 2 Z C _ E Figure 13 P 4 _ 2 Z C _ E Equation (16)

3.3. Reliability Models

3.3.1. Notations and Assumptions

The used notations are as follows:
Comα_β is the communications between α and β, where α = EC, UC, ZC and β = CR, ECR, PCG, FCC.
DMU_γ is the decision-making support means in γ, where γ = CR, ECR.
Dtw_β/Prc_β is the digital twins/data processing means in β, where β = CR, ECR, PCG, FCC.
P i is the reliability function of I, where i = Comα_β, DMU_γ, Dtw_β, Prc_β; α = EC, UC, ZC; β = CR, ECR, PCG, FCC; and γ = CR, ECR.
t is the operating time.
λ is the basic failure rate corresponding to the failure rate of ComFCC.
k i is a coefficient by which the failure rates of Comα_CR and Comψ_ECR must be multiplied to obtain their failure rates for the emergency mode, where α = EC, UC, ZC and ψ = EC, UC, ZC.
k E is the coefficient by which the failure rates of ComEC_CR, ComUC_CR, ComZC_CR, ComUC_ECR, and ComZC_ECR must be multiplied to obtain their failure rates for the emergency mode.
2 k E is the coefficient by which the failure rate of ComZC_ω must be multiplied to obtain its failure rate for the emergency mode, where ω = PCG, FCC.
The used assumptions are as follows:
  • Components of the SM have an exponential time to failure;
  • During the operating time, the SM is considered an unrecoverable system.
Limited computing capabilities and limited battery life are taken into account when choosing a UAV based on the monitoring tasks and operating conditions of the SM. The examples in this Section show how to ensure the reliability of UAVs and their batteries in the case of limited resources.

3.3.2. Description and Simulation of the Reliability Models

Block diagrams and equations for SM reliability assessment (see Table 4) are presented below.
Figure 3. RBD that is utilized to calculate the reliability functions of systems S 1 E C _ N and S 1 E C _ E using Equations (1) and (2), respectively.
P 1 E C _ N = P S e n E C P C o m E C _ C R P P r c _ C R P D t w _ C R P D M U _ C R
where P S e n E C = e λ k S e n E C t , P C o m E C _ C R = e λ k C o m E C _ C R t , P P r c _ C R = e λ k P r c _ C R t , P D t w _ C R = e λ k D t w _ C R t   ,   P D M U _ C R = e λ k D M U _ C R t .
P 1 E C _ E = P S e n E C P C o m E C _ C R E P P r c _ C R P D t w _ C R P D M U _ C R
where P C o m E C _ C R E = e k E λ k C o m E C _ C R t .
Figure 4. RBD that is utilized to calculate the reliability functions of systems S 2 _ 1 U C _ N and S 2 _ 1 U C _ E using Equations (3) and (4), respectively.
P 2 _ 1 U C _ N = P S e n U C ( 1 ( 1 P C o m U C C R   P P r c C R P D t w C R ) ( 1 P C o m U C _ E C R   P P r c _ E C R P D t w _ E C R ) ) × ( 1 ( 1 P D M U _ C R )   ( 1 P D M U _ E C R ) )
where P S e n U C = e λ k S e n U C t , P C o m U C _ C R = e λ k C o m U C _ C R t , P C o m U C _ E C R = e k E λ k C o m U C _ E C R t , P P r c _ E C R = e k E λ k P r c _ E C R t , P D t w _ E C R = e λ k D t w _ E C R t ,   P D M U _ E C R = e λ k D M U _ E C R t .
P 2 _ 1 U C _ E = P S e n U C E ( 1 ( 1 P C o m U C _ C R E   P P r c _ C R P D t w _ C R ) ( 1 P C o m U C _ E C R E   P P r c _ E C R P D t w _ E C R ) ) × ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P C o m U C _ C R E = e k E λ k C o m U C _ C R t , P C o m U C _ E C R E = e k E λ k C o m U C _ E C R t .
Figure 5. RBD that is utilized to calculate the reliability functions of systems S 2 _ 2 U C _ N and S 2 _ 2 U C _ E using Equations (5) and (6), respectively.
P 2 _ 2 U C _ N = P S e n U C ( 1 ( 1 P C o m U C _ C R   P P r c _ C R ) ( 1 P C o m U C _ E C R   P P r c _ E C R ) ) ( 1 ( 1 P D M U _ C R P D t w _ C R ) ( 1 P D M U _ E C R P D t w _ E C R ) )
P 2 _ 2 U C _ E = P S e n U C ( 1 ( 1 P C o m U C _ C R E   P P r c _ C R ) ( 1 P C o m U C _ E C R E   P P r c _ E C R ) ) ( 1 ( 1 P D M U _ C R P D t w _ C R ) ( 1 P D M U _ E C R P D t w _ E C R ) )
Figure 6. RBD that is utilized to calculate the reliability functions of systems S 2 _ 1 Z C _ N and S 2 _ 1 Z C _ E using Equations (7) and (8), respectively.
P 2 _ 1 Z C _ N = P S e n Z C ( 1 ( 1 P C o m Z C _ C R   P P r c _ C R P D t w _ C R   ) ( 1 P C o m Z C _ E C R   P P r c _ E C R P D t w _ E C R ) ) × ( 1 ( 1 P D M U _ C R )   ( 1 P D M U _ E C R   )   )
where P S e n Z C = e λ k S e n Z C t , P C o m Z C _ C R = e λ k C o m Z C _ C R t , P C o m Z C _ E C R = e λ k C o m Z C _ E C R t
P 2 _ 1 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R P D t w _ C R   ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R P D t w _ E C R ) ) × ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P C o m Z C _ E C R E = e k E λ k C o m Z C _ E C R t
Figure 7. RBD that is utilized to calculate the reliability functions of systems S 2 _ 2 Z C _ N and S 2 _ 2 Z C _ E using Equations (9) and (10), respectively.
P 2 _ 2 Z C _ N = P S e n Z C ( 1 ( 1 P C o m Z C _ C R   P P r c _ C R ) ( 1 P C o m Z C _ E C R   P P r c _ E C R ) ) ( 1 ( 1 P D M U _ C R P D t w _ C R ) ( 1 P D M U _ E C R P D t w _ E C R )   )
P 2 _ 2 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R ) ) ( 1 ( 1 P D M U _ C R P D t w _ C R ) ( 1 P D M U _ E C R P D t w _ E C R ) )
Figure 8. RBD that is utilized to calculate the reliability function of system S 3 ( P C G ) _ 1 Z C _ E using Equation (11).
P 3 ( P C G ) _ 1 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R P D t w _ C R ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R P D t w _ E C R ) × ( 1 P C o m Z C _ P C G E   P P r c _ P C G P D t w _ P C G ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P C o m Z C _ P C G E = e 2 k E λ k C o m Z C _ P C G t , P P r c _ P C G = e λ k P r c _ P C G t , P D t w _ P C G E = e λ k D t w _ P C G t .
Figure 9. RBD that is utilized to calculate the reliability function of system S 3 ( P C G ) _ 2 Z C _ E using Equation (12).
P 3 ( P C G ) _ 2 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R ) ( 1 P C o m Z C _ P C G E   P P r c _ P C G ) ) ( 1 ( 1 P D M U _ C R P D t w Z C _ C R ) ( 1 P D M U _ E C R P D t w _ E C R ) )
Figure 10. RBD that is utilized to calculate reliability function of system S 3 ( F C C ) _ 1 Z C _ E using Equation (13).
P 3 ( F C C ) _ 1 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R P D t w _ C R )   ( 1 P C o m Z C _ E C R E   P P r c _ E C R P D t w _ E C R ) × ( 1 P C o m Z C _ F C C E   P P r c _ F C C P D t w _ F C C ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P C o m Z C _ F C C E = e 2 k E λ k C o m Z C _ F C C t , P P r c _ F C C E = e λ k P r c _ F C C t , P D t w _ F C C E = e λ k D t w _ F C C t
Figure 11. RBD that is utilized to calculate reliability function of system S 3 ( F C C ) _ 2 Z C _ E using Equation (14).
P 3 ( F C C ) _ 2 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R ) ( 1 P C o m Z C _ F C C E   P P r c _ F C C )   ) ( 1 ( 1 P D M U _ C R P D t w Z C _ C R ) ( 1 P D M U _ E C R P D t w _ E C R )   )
Figure 12. RBD that is utilized to calculate the reliability function of system S 4 _ 1 Z C _ E using Equation (15).
P 4 _ 1 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R P D t w _ C R ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R P D t w _ E C R ) ( 1 P C o m Z C _ P C G E   P P r c _ P C G P D t w _ P C G ) ( 1 P C o m Z C _ F C C E   P P r c _ F C C P D t w _ F C C ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R )   )
Figure 13. RBD that is utilized to calculate the reliability function of system S 4 _ 2 Z C _ E using Equation (16).
P 4 _ 2 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R ) ( 1 P C o m Z C _ P C G E   P P r c _ P C G ) ( 1 P C o m Z C _ F C C E   P P r c _ F C C ) ) ( 1 ( 1 P D M U _ C R P D t w Z C _ C R ) ( 1 P D M U _ E C R P D t w _ E C R ) )
Using Equations (1)–(16), some dependencies were obtained (Figure 14 and Figure 15) where the initial data are as follows: λ = 0.001 1 h , k S e n Z C = 0.0001 , k C o m Z C _ C R = 0.2 , k C o m Z C _ E C R = 0.5 , k C o m Z C _ F C C = 1 , k P r c _ C R = 0.01 , k P r c _ E C R = 0.01 , k P r c _ F C C = 0.1 , k D t w _ C R = 0.001 , k D t w _ E C R = 0.001 , k D t w _ P C G = 0.0003 , k D t w _ F C C = 0.0005 , k D M U _ C R = 0.00001 , and k D M U _ E C R = 0.00001.
Figure 14. Dependency of reliability functions P 2 _ 1 Z C _ E , P 3 ( F C C ) _ 1 Z C _ E , and P 4 _ 1 Z C _ E on the emergency coefficient k E at the operating time t = 6 h.
Figure 15. Dependency of reliability functions P 2 _ 1 Z C _ E , P 3 ( F C C ) _ 1 Z C _ E , and P 4 _ 1 Z C _ E on the operating time t at the emergency coefficient k E = 9.
The analysis of the dependencies obtained allowed us to draw the following conclusions.
  • At t = 6   h , the increase in the emergency coefficient   k E from 1 to 12 leads to a decrease in the values of the reliability functions P 2 _ 1 Z C _ E , P 3 ( F C C ) _ 1 Z C _ E , and P 4 _ 1 Z C _ E 1.04 (from 0.99961 to 0.95921), 1.03 (from 0.99996 to 0.97409), and 1.02 (from 0.99999 to 0.98019) times, respectively (Figure 14);
  • At k E = 9 , the increase in the operating time   t from 0 to 15 leads to a decrease in the values of the reliability functions P 2 _ 1 Z C _ E , P 3 ( F C C ) _ 1 Z C _ E , and P 4 _ 1 Z C _ E 1.13 (from 1 to 0.88303), 1.12 (from 1 to 0.89077), and 1.1 (from 1 to 0.90725) times, respectively (Figure 15);
  • Among the systems S 2 _ 1 Z C _ E , S 3 ( F C C ) _ 1 Z C _ E , and S 4 _ 1 Z C _ E , the most reliable system is S 4 _ 1 Z C _ E and the most unreliable one is S 2 _ 1 Z C _ E . For example, at k E = 9 and t = 12   h , the value of the reliability function P 4 _ 1 Z C _ E is 1.02 times larger than the value of the reliability function P 3 ( F C C ) _ 1 Z C _ E (0.94358 against 0.92764) and 1.03 times larger than the value of the reliability function P 2 _ 1 Z C _ E (0.94358 against 0.92764) (Figure 15).

3.4. Models of SM as a Multi-State System

3.4.1. Description of SM as a Multi-State System

In the emergency mode, an SM utilizing some VAMFs and the Sen_ZC as a source of information can be in more than one operable state; in other words, it can be considered an MSS []. Graphical depictions of operable states of an SM utilizing VAMF2 (system S V A M F 2 Z C _ E ), VAMF3 ( S V A M F 3 Z C _ E ), and VAMF4 ( S V A M F 4 Z C _ E ) are shown further in Figures 23, 24, and 25, respectively.
In Figure 16, Figure 17 and Figure 18, FSM is a set of monitoring functions performed by the SM.
The system S V A M F 2 Z C _ E (Figure 16) has two operable states (the fully operable state (L1) and the partially operable state (L2)), while both S V A M F 3 Z C _ E (Figure 17) and S V A M F 4 Z C _ E (Figure 18) have free operable states (L1, L2, and the partially operable state, L3). Each state can be characterized by an RBD comprising binary-state channels. The operable and non-operable states of the channels are shown in white and gray, respectively.
Figure 16. Graphical depiction of operable states for the system S V A M F 2 Z C _ E : (a) sets of monitoring functions and RBDs which correspond to state L1, (b) sets of monitoring functions and RBDs which correspond to state L2, and (c) SM degradation diagram.
Figure 17. Graphical depiction of operable states for the system S V A M F 3 Z C _ E : (a) sets of monitoring functions and RBDs which correspond to state L1, (b) set of monitoring functions and RBDs which correspond to state L2, (c) set of monitoring functions and RBDs which correspond to state L3, and (d) SM degradation diagram.
Figure 18. Graphical depiction of operable states for the system S V A M F 4 Z C _ E : (a) sets of monitoring functions and RBDs which correspond to state L1, (b) set of monitoring functions and RBDs which correspond to state L2, (c) set of monitoring functions and RBDs which correspond to state L3, and (d) SM degradation diagram.

3.4.2. Reliability Models

Based on Figure 16, the probabilities of the system S V A M F 2 Z C _ E being at the given states can be calculated using Equations (17)–(19).
P V A M F 2 _ L 1 Z C _ E = P S e n Z C ( 1 ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 2 _ L 1 Z C _ E is the probability of the system S V A M F 2 Z C _ E being at state L1, P Z C _ C R E = P C o m Z C _ C R E   P P r c _ C R P D t w _ C R , P Z C _ E C R E = P C o m Z C _ E C R E   P P r c _ E C R P D t w _ E C R .
P V A M F 2 _ L 2 Z C _ E = P S e n Z C ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) ( 1 ( 1 P Z C _ P C G E ) ( 1 P Z C _ F C C E ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 2 _ L 2 Z C _ E is the probability of the system S V A M F 2 Z C _ E being at state L2, P Z C _ P C G E = P C o m Z C _ P C G E   P P r c _ P C G P D t w _ P C G , P Z C _ F C C E = P C o m Z C _ F C C E   P P r c _ F C C P D t w _ F C C .
P V A M F 2 L 2 Z C _ E = P V A M F 2 _ L 1 Z C _ E + P V A M F 2 _ L 2 Z C _ E
where P V A M F 2 _ L 2 Z C _ E is the probability of the system S V A M F 2 Z C _ E being at state L2 or above.
Based on Figure 17, the probabilities of the system S V A M F 3 Z C _ E being at the given states can be calculated using Equations (20)–(24).
P V A M F 3 _ L 1 Z C _ E = P S e n Z C ( 1 ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 3 _ L 1 Z C _ E is the probability of the system S V A M F 3 Z C _ E being at state L1.
P V A M F 3 _ L 2 Z C _ E = P S e n Z C ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) P Z C _ P C G E ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 3 _ L 2 Z C _ E is the probability of the system S V A M F 3 Z C _ E being at state L2.
P V A M F 3 _ L 3 Z C _ E = P S e n Z C ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) ( 1 P Z C _ P C G E ) P Z C _ F C C E ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 3 _ L 3 Z C _ E is the probability of the system S V A M F 3 Z C _ E being at state L3.
P V A M F 3 _ L 2 Z C _ E = P V A M F 3 _ L 1 Z C _ E + P V A M F 3 _ L 2 Z C _ E
where P V A M F 3 _ L 2 Z C _ E is the probability of the system S V A M F 3 Z C _ E being at state L2 or above.
P V A M F 3 _ L 3 Z C _ E = P V A M F 3 _ L 1 Z C _ E + P V A M F 3 _ L 2 Z C _ E + P V A M F 3 _ L 3 Z C _ E
where P V A M F 3 _ L 3 Z C _ E is the probability of the system S V A M F 3 Z C _ E being at state L3 or above.
Based on Figure 18, the probabilities of the system S V A M F 4 Z C _ E being at the given states can be calculated by Equations (25)–(29).
P V A M F 4 _ L 1 Z C _ E = P S e n Z C ( 1 ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 4 _ L 1 Z C _ E is the probability of the system S V A M F 4 Z C _ E being at state L1.
P V A M F 4 _ L 2 Z C _ E = P S e n Z C ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) P Z C _ F C C E ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 4 _ L 2 Z C _ E is the probability of the system S V A M F 4 Z C _ E being at state L2.
P V A M F 4 _ L 3 Z C _ E = P S e n Z C E ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) ( 1 P Z C _ F C C E ) P Z C _ P C G E ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 4 _ L 3 Z C _ E is the probability of the system S V A M F 4 Z C _ E being at state L3.
P V A M F 4 _ L 2 Z C _ E = P V A M F 4 _ L 1 Z C _ E + P V A M F 4 _ L 2 Z C _ E
where P V A M F 4 _ L 2 Z C _ E is the probability of the system S V A M F 4 Z C _ E being at state L2 or above.
P V A M F 4 _ L 3 Z C _ E = P V A M F 4 _ L 1 Z C _ E + P V A M F 4 _ L 2 Z C _ E + P V A M F 4 _ L 3 Z C _ E

3.4.3. Simulation and Analysis

For the simulation, the system S V A F 3 Z C _ E (Figure 17) was chosen. Using Equations (17)–(29), some dependencies were obtained (Figure 19, Figure 20 and Figure 21) where the initial data were the same, as they were used for obtaining the dependencies presented in Section 3.1.
Figure 19. Dependencies of probabilities of P V A M F 3 _ L 3 Z C _ E , P V A M F 3 _ L 2 Z C _ E , and P V A M F 3 _ L 1 Z C _ E on the operating time t at the emergency coefficient k E = 12.
Figure 20. Dependencies of probabilities of P V A M F 3 _ L 2 Z C _ E and P V A M F 3 _ L 3 Z C _ E on the operating time t at k E = 12.
Figure 21. Dependencies of probabilities of P V A M F 3 _ L 2 Z C _ E and P V A M F 3 _ L 3 Z C _ E on the operating time t at the emergency coefficient k E = 3.
The analysis of the dependencies obtained allowed us to draw the following conclusions.
For k E = 12 . (see Figure 19):
  • The increase in the operating t time from 0 to 15 leads to a decrease in the probabilities of P V A M F 3 _ L 3 Z C _ E , P V A M F 3 _ L 2 Z C _ E , and P V A M F 3 _ L 1 Z C _ E by 1.19 (from 1 to 0.83865), 1.20 (from 1 to 0.83419), and 1.21 (from 1 to 0.81969), respectively;
  • At t = 15   h , the probability of P V A M F 3 _ L 3 Z C _ E is 1.01 times larger than the probability of P V A M F 3 _ L 2 Z C _ E , (0.83865 against 0.93633) and 1.02 times larger than the probability of P V A M F 3 _ L 1 Z C _ E (0.83865 against 0.81969);
  • At t = 11   h , the function of P V A M F 3 _ _ L 2 Z C _ E ( t ) has a maximum equal to 0.185 and, at t = 9   h , the function P V A M F 3 _ _ L 3 Z C _ E ( t ) has a maximum equal to 0.008.
For k E = 3   (see Figure 20 and Figure 21):
  • The increase in the operating time t from 0 to 15 leads to an increase in the probabilities of P V A M F 3 _ l 2 Z C _ E and P V A M F 3 _ L 3 Z C _ E from 0 to 0.00945 and from 0 to 0.00333, respectively;
  • At t = 15   h , the probability of P V A M F 3 _ L 2 Z C _ E is 2.84 times larger than the probability of P V A M F 3 _ L 3 Z C _ E (0.00466 against 0.00124);
  • At t = 9   h , the probability of P V A M F 3 _ L 2 Z C _ E is 3.77 times larger than the probability of P V A M F 3 _ L 3 Z C _ E (0.00945 against 0.00333).

4. Case Study

4.1. Drone Fleet and IoD-Based Industrial Facility Monitoring System

4.1.1. Structure of IoD SM

Let us consider the structure of a drone fleet and an IoD-based industrial facility monitoring system utilized in emergency mode (Figure 22). This structure is a special case of the type-T2 SM structure. The difference is that the IoD SM utilizes one UC only. The most vulnerable part of the IoD SM is the ComZC_FCC (a component of the FCC channel) [,,,,] comprising drones for transmitting monitoring information from the ZC to the FCC. Thus, methods aimed at increasing the reliability of the ComZC_FCC require consideration.
Figure 22. Structure of the IoD SM.

4.1.2. Reliability Model of FCC Channel

To improve the reliability of the ComZC_FCC, a structure of type ‘k-out-of-n’ [], was proposed (see the RBD in Figure 23).
Figure 23. RBD of the FCC channel comprising the Prc_FCC and drone-based ComZC_FCC.
A ComZC_FCC with such a structure consists of n = 6 identical drones (DrnZC_FCC1, DrnZC_FCC2, …, DrnZC_FCC6) including four (k = 4) main drones (DrnZC_FCC1, DrnZC_FCC2, …, DrnZC_FCC4) and four (nk = 6 − 4 = 2) standby (redundant) drones (DrnZC_FCC5 and DrnZC_FCC6). The ComZC_FCC remains in an operable state until three (nk + 1 = 6 − 4 + 1 = 3) drones have failed. The ComZC_FCC can be considered as a series system with two (nk = 6 − 4 = 2) redundant drones, each of which can replace any one of the failed operating drones.
Assume that drones have an exponential time to failure. In this case, the reliability function for the ComZC_FCC can be written, considering [], as
P C o m Z C _ F C C E = i = 0 n k ( k 2 k E λ d r t ) i i ! e k 2 k E λ d r t
where λ d r is the failure rate of the drone.
Thus, the reliability function of the FCC channel can be calculated as:
P F C C E = P C o m Z C _ F C C E P P r c Z C _ F C C = i = 0 n k ( k 2 k E λ d r t ) i i ! e k 2 k E λ d r t   e λ k P r c Z C _ F C C t .
Using Equation (31), some dependencies were obtained (Figure 24 and Figure 25)
Figure 24. Dependency of the probability of P F C C E on the emergency coefficient k E at a drone failure rate of λ d r = 0.001   h .
Figure 25. Dependence of the probability of P F C C E on the emergency coefficient k E at the operating time t = 12   h .
The analysis of the dependencies obtained allowed us to draw the following conclusions.
For λ d r = 0.001 1 h (Figure 24):
  • At t = 9   h , t = 12   h , and t = 15 , the increase in the emergency coefficient k E from 1 to 9 leads to a decrease in the value of the reliability function P F C C E from 0.99904 to 0.97100, from 0.99904 to 0.94181, and from 0.99824 to 0.90306, respectively;
  • At k E = 9 , the value of the reliability function P F C C E at t = 9   h is 1.03 times larger than P F C C E at t = 12   h (0.97100 against 0.94181) and 1.08 times larger than P F C C E at t = 15   h (0.97100 against 0.90306).
For t = 12   h (Figure 25):
  • At t = 9   h , t = 12   h , and t = 15 , the increase in the emergency coefficient k E from 1 to 9 leads to a decrease in the value of the reliability function P F C C E from 0.99904 to 0.97100, from 0.99904 to 0.94181, and from 0.99824 to 0.90306, respectively;
  • At k E = 9 , the value of the reliability function P F C C E at t = 9   h is 1.03 times larger than P F C C E at t = 12   h (0.97100 against 0.94181) and 1.08 times larger than P F C C E at t = 15   h (0.97100 against 0.90306).

4.2. The Equipment Monitoring System

4.2.1. Principles and Structure

The equipment monitoring system of one industrial enterprise in Ukraine demonstrates the effect of the use of Industry 4.0 in KOEEBOX devices [,]. The KOEEBOX device is located in the middle of the power line and performs analyses of the electricity consumption dynamics. After receiving the data from the electricity grid, the device transmits them to the appropriate edge node for processing and subsequent aggregation and viewing of the PCG or CR. Viewing is possible through a special application for the KOEEBOX device. Table 5 shows the possibility of using the KOEEBOX device as a means of monitoring the different components and levels of the SM as a whole.
Table 5. Use of the KOEEBOX device as a means of monitoring the energy consumption of SM-EC.
The digital twin technology with the IoT establishes a connection between the equipment and the CR. Additionally, it can be connected with cloud applications (PCG level). The energy performance monitoring device is available in the proposed equipment monitoring system. This device must be located in the middle of the power line so that it passes power to the end device. Hence, it performs power difference analysis and obtains status and usage statistics. The device transmits the data, after receiving them from the facilities, to the corresponding web server for further viewing and aggregation. Viewing is possible through a special system application. Figure 26a shows a block diagram explaining the monitoring of the energy consumption using sensors (ECS) for equipment verification (EC1—ECn).
Figure 26. The flowchart with an explanation of the problem statement (a) and storage service integration scheme (b).
In the proposed equipment energy-efficiency monitoring system, all operations are performed in real time both on the client side and on the device. The cloud part of the equipment energy-efficiency monitoring system should consist of three web services: the storage service; authentication service; and maintenance of client applications. Each service must run in its own isolated space and they must communicate with each other over the Internet. For the development of all services, it is suggested that one should use the JavaScript/TypeScript programming language, as well as WebSocket and HyperText Transfer Protocol (HTTP). The PostgreSQL database management system was chosen as the storage environment. All services must be designed according to the ECMAScript6 standard and SOLID design principles. Additionally, it is necessary to have an authorization mechanism for JavaScript Object Notation Web Token (JWT) [].

4.2.2. Processes and Algorithms of Monitoring

The storage service receives data from clients using the WebSocket protocol in real time, and also processes requests for statistical data on changes in energy efficiency over a certain period. Figure 26b shows the scheme of integration of the storage service into the overall system of monitoring the energy efficiency of the equipment. In this scheme, the storage service will act as a “digital twin” of the connected device and also reproduce the operation of the device in digital format. This component will have three interfaces for integration:
  • A WebSocket gateway for devices;
  • A WebSocket gateway for clients;
  • An Application Programming Interface (API) gateway for HTTP Representational State Transfer (REST) for clients.
The WebSocket gateway for devices will be used to constantly “talk” to the device and maintain it, and in the future, to control the device through this gateway. The WebSocket gateway for clients is required to instantly transmit data received from a device to the end client, as well as for future device management. The API gateway for HTTP REST for clients will act as an accessible and easy-to-use statistics-generation interface, primarily required for the client application service, and there is a prospect of its integration with other services through this channel.
There are three main algorithms for a system for equipment monitoring. The first algorithm corresponds to the behavior of the service when the client interacts with the provided API gateway HTTP REST. This algorithm is classic for client–server architecture with built-in authorization checks [], so all private resources will contain middleware that, in case of a mismatch, will return the corresponding error when performing the authorization check action of incoming requests. The second algorithm corresponds to the behavior of the service when the client interacts with the provided WebSocket gateway. The first three steps of the algorithm describe starting the program and reading the configuration files. The service stores the ID of the connected and authorized socket and waits for new data from the client-monitoring object named “device” after it verifies that the connected socket was authorized successfully. This socket ID save action is necessary to group sockets from a single client for the further filtering of client lookups and data transfers.
The next algorithm handled by the storage service is the algorithm that matches the behavior of the service when the device communicates with the provided WebSocket gateway. The first steps remained the same as in the previous two algorithms since these interfaces work in the same service. The next step, “Checking object data”, corresponds to checking the state of the corresponding device, which will be received from the authentication service via the API gateway HTTP REST. If the check is successful, the service stores the connected socket ID and waits for new data. The service performs a data validation process when the device sends data and, if successful, stores the data in the PostgreSQL repository; then, it forwards the data to the appropriate client sockets. Data from the device will be ignored if the verification fails [,].

4.2.3. Experiment Results

Two types of system behavior were tested as an experimental task:
  • The display of energy characteristics in real time;
  • The display of energy characteristics in the past.
For the first experiment, a device emulator was used, which sent energy data to the system once every second. The result of this experiment has been described in [].
For the second experiment, a device emulator was used for an hour, which also sent data every second. Figure 27 shows the result of this experiment. In this figure, the chart has more points due to the larger range of data displayed. Each point corresponds to the two-minute mean value of each parameter.
Figure 27. Displaying data for the last hour.
This system is described by the RBD in Figure 4.

5. Discussion

The distinctive feature of the proposed methodology is that of ensuring the dependability of systems on its developed base, which is achieved by combining the redundancy and diversity of various components and subsystems; these include sensors, means of communication and data processing, digital duplication formation, and decision support centers. The use of diversity reduces the risk of common cause failures, which can be caused by the influence of the external environment and the accumulation of failures, as well as cyberattacks.
The proposed SM structures, in comparison with existing works [,,,,,,], provide higher reliability, as assessed using the reliability function (see Section 3.3). Additionally, these structures increase the survivability of the SM as an MSS (see Section 3.4). The mentioned benefits are achieved due to utilization of some kinds of redundancy and reconfigurability.
In addition, different structures of monitoring systems are proposed, depending on options for forming the models of digital duplicates using decision-making centers (CP, ECR, PCG, and FCC). It helps to select such structures, taking into account requirements for reliability and dependability, as well as characteristics of industrial facilities.
The set of proposed SM reliability models (Section 3) provides possibilities for the high-level quantitative calculation of indicators, the comparison of structure options, and a choice regarding their use. Moreover, a simulation was performed for selected values of the component reliability parameters. This makes it possible to determine the appropriate areas of the application, taking into account requirements and constraints, as well as the growth of failure rates due to the action of accident factors. One of the features of the proposed models is that they take into account the deterioration of monitoring system channels (at the ZC level) due to failures, and are presented as multi-state systems. The reliability of IoT devices that provide data for the DTs is taken into account in the SM reliability models. Their failure rate and battery life generally depend on the operation modes (including the modes of their possible periodic transfer to sleep mode). These modes are described by the corresponding coefficients when calculating the failure rates. Therefore, the selection of IoT devices is carried out while taking into account the requirements for SM reliability according to the proposed analytical dependencies.
The two examples for the application of monitoring systems complement each other according to the hierarchy levels of their representation in industrial facilities. For the enterprise equipment monitoring level (the first level of the industrial facility hierarchy), the first example of an equipment monitoring system based on the analysis of energy consumption dynamics is given. It can complement the traditional control and management methods in a fairly simple way, as well as form an additional component of the digital twin. This paper represents a significant extension of [] with deeper details regarding the hierarchical building of monitoring systems.
The second example relates to more complex monitoring systems, which are part of Post-Accident Monitoring System and Automated Radiation Monitoring System. They are implemented using the UAV/FCC mobile subsystem and the PCG private cloud environment. The FCC subsystem redundancy option illustrates how its reliability can be increased and the composition of the UAV fleet can be selected.

6. Conclusions

The solving of research tasks enables us to make decisions about the construction and modernization of monitoring systems for complex industrial facilities, which increase their dependability and safety.
The results obtained are the basis for further developing the theory and practical applications of monitoring systems for industrial facilities within the framework of the implementation and improvement of Industry 4.0 principles.
In our opinion, the following areas of research and development are important and promising:
  • The development of ontological models describing the intelligent UAV- and IoT-based monitoring systems in various situations and environmental conditions;
  • The development of different separate and joint digital twin models for centers of decision making and for the implementation for optimal procedures of critical object recovery;
  • The development and research of SM dependability models considering the extended taxonomy of hardware and software faults, recovery procedures and the location of the SM, as well as automated battery maintenance systems [];
  • The consideration of the cybersecurity aspects of the Internet of Drones for subsystem FCC and subsystem PCG for the assessment and assurance of SM reliability [].

Author Contributions

Conceptualization, Y.S., V.K., H.F., and A.S.; methodology, V.K. and I.K.; software, I.K.; validation, L.Z. and O.I.; formal analysis, O.I.; investigation, O.I. and I.K.; resources, O.M.; data curation, H.F. and I.K.; writing—original draft preparation, H.F., I.K., and O.M.; writing—review and editing, O.I. and A.S.; visualization, I.K.; supervision, V.K.; project administration, A.S.; funding acquisition, all authors. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the National Natural Science Foundation of China under Grant No. 61772180, the Key R&D plan of Hubei Province (2020BAB012).

Institutional Review Board Statement

Not applicable.

Acknowledgments

The authors appreciate the scientific staff of the Department of Computer Systems, Networks and Cybersecurity of the National Aerospace University “KhAI”, and the Research Institute for Intelligent Computer Systems, West Ukrainian National University for providing invaluable inspiration, hard work, and creative analysis during the preparation of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

Acronyms
APIApplication Programming Interface
CMcenters of control and monitoring
CRcontrol room
DTdigital twin
DTaaSdigital twin as a service
DTIdigital twin instance
ECequipment that is monitored and controlled
ECSenergy consumption with sensors
ECRemergency control room
HTTPHyperText Transfer Protocol
FCCflying control center
FENflying edge node
IoDInternet of Drones
IoTInternet of Things
JWTJavaScript Object Notation Web Token
MSSmulti-state system
OMobjects that are monitored or/and controlled
PCGprivate cloud crisis group
RBDreliability block diagram
SMmonitoring system
UAVunmanned aerial vehicle
UCutility that is monitored and controlled
ZCzones that are monitored
VAMFvariants of allocation of monitoring functions
Notation
Comα_βcommunications between α and β, where α = EC, UC, ZC and β = CR, ECR, PCG, FCC.
DMU_γdecision-making support means in γ, where γ = CR, ECR.
Dtw_β/Prc_βdigital twins/data processing means in β, where β = CR, ECR, PCG, FCC.
k i coefficient by which the basic failure rate must be multiplied to obtain the failure rates of I, where I = Comα_β, DMU_γ, Dtw_β, Prc_β; α = EC, UC, ZC; β = CR, ECR, PCG, FCC; and γ = CR, ECR
k E coefficient by which the failure rates of Comα_CR and Comψ_ECR must be multiplied to obtain their failure rates for the emergency mode, where α = EC, UC, ZC and ψ = EC, UC, ZC
P i reliability function of i, where i = Comα_β, DMU_γ, Dtw_β, Prc_β; α = EC, UC, ZC; β = CR, ECR, PCG, FCC; and γ = CR, ECR
Sen_αsensors in α, where α = EC, UC, ZC
t operating time
λ basic failure rate corresponding to the failure rate of ComFCC_ZC
2 k E coefficient by which the failure rate of ComZC_ω must be multiplied to obtain its failure rate for the emergency mode where ω = PCG, FCC

References

  1. De Felice, F.; Baffo, I.; Petrillo, A. Critical Infrastructures Overview: Past, Present and Future. Sustainability 2022, 14, 2233. [Google Scholar] [CrossRef]
  2. Sonesson, T.R.; Johansson, J.; Cedergren, A. Governance and interdependencies of critical infrastructures: Exploring mechanisms for cross-sector resilience. Saf. Sci. 2021, 142, 105383. [Google Scholar] [CrossRef]
  3. Bigliardi, B.; Bottani, E.; Casella, G. Enabling technologies, application areas and impact of industry 4.0: A bibliographic analysis. Proc. Manuf. 2020, 42, 322–326. [Google Scholar] [CrossRef]
  4. Ng, T.C.; Lau, S.Y.; Ghobakhloo, M.; Fathi, M.; Liang, M.S. The Application of Industry 4.0 Technological Constituents for Sustainable Manufacturing: A Content-Centric Review. Sustainability 2022, 14, 4327. [Google Scholar] [CrossRef]
  5. Al-Kaff, A.; Madridano, Á.; Campos, S.; García, F.; Martín, D.; de la Escalera, A. Emergency Support Unmanned Aerial Vehicle for Forest Fire Surveillance. Electronics 2020, 9, 260. [Google Scholar] [CrossRef]
  6. Chernetskyi, B.; Kharchenko, V.; Orehov, A. Wireless Sensor Network based Forest Fire Early Detection Systems: Development and Implementation. Int. J. Comput. 2022, 21, 92–99. [Google Scholar] [CrossRef]
  7. Berger, C.; Eichhammer, P.; Reiser, H.P.; Domaschka, J.; Hauck, F.J.; Habiger, G. A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms. ACM Comput. Surv. 2022, 54, 147. [Google Scholar] [CrossRef]
  8. Harum, N.; Abidin, Z.; Shah, W.; Hassan, A. Implementation of smart monitoring system with fall dectector for elderly using IoT technology. Int. J. Comput. 2018, 17, 243–249. [Google Scholar] [CrossRef]
  9. Morozova, O.I.; Nicheporuk, A.O.; Tetskyi, A.G.; Tkachov, V.M. Methods and technologies of ensuring cybersecurity of industrial and web-oriented systems and networks. Radioelectron. Comput. Syst. 2021, 4, 145–156. [Google Scholar] [CrossRef]
  10. Agnusdei, G.P.; Elia, V.; Gnoni, M.G. Is Digital Twin Technology Supporting Safety Management? A Bibliometric and Systematic Review. Appl. Sci. 2021, 11, 2767. [Google Scholar] [CrossRef]
  11. Zheng, T.; Ardolino, M.; Bacchetti, A.; Perona, M. The applications of Industry 4.0 technologies in manufacturing context: A systematic literature review. Int. J. Prod. Res. 2021, 59, 1922–1954. [Google Scholar] [CrossRef]
  12. Jamwal, A.; Agrawal, R.; Sharma, M.; Giallanza, A. Industry 4.0 technologies for manufacturing sustainability: A systematic review and future research directions. Appl. Sci. 2021, 11, 5725. [Google Scholar] [CrossRef]
  13. di Capaci, R.B.; Scali, C. A cloud-based monitoring system for performance assessment of industrial plants. Ind. Eng. Chem. Res. 2021, 59, 2341–2352. [Google Scholar] [CrossRef]
  14. Stentoft, J.; Wickstrom, K.A.; Philipsen, K.; Haug, A. Drivers and barriers for Industry 4.0 readiness and practice: Empirical evidence from small and medium-sized manufacturers. Prod. Plan. Control 2021, 32, 811–828. [Google Scholar] [CrossRef]
  15. Meindl, B.; Ayala, N.F.; Mendonca, J.; Frank, A.G. The four smarts of Industry 4.0: Evolution of ten years of research and future perspectives. Technol. Forecast. Soc. Chang. 2021, 168, 120784. [Google Scholar] [CrossRef]
  16. Nara, E.O.B.; da Costa, M.B.; Baierle, I.C.; Schaefer, J.L.; Benitez, G.B.; do Santos, L.M.A.L.; Benitez, L.B. Expected impact of industry 4.0 technologies on sustainable development: A study in the context of Brazil’s plastic industry. Sust. Prod. Consum. 2021, 25, 102–122. [Google Scholar] [CrossRef]
  17. Tortorella, G.L.; Fogliatto, F.S.; Cauchick-Miguel, P.A.; Kurnia, S.; Jurburg, D. Integration of industry 4.0 technologies into total productive maintenance practices. Int. J. Prod. Econ. 2021, 240, 108224. [Google Scholar] [CrossRef]
  18. Industry 4.0 and the Digital Twin. Deloitte University Press Deloitte Development LLC. Available online: https://www2.deloitte.com/content/dam/Deloitte/kr/Documents/insights/deloitte-newsletter/2017/26_201706/kr_insights_deloitte-newsletter-26_report_02_en.pdf (accessed on 20 June 2022).
  19. Singh, M.; Fuenmayor, E.; Hinchy, E.P.; Qiao, Y.; Murray, N.; Devine, D. Digital Twin: Origin to Future. Appl. Syst. Innov. 2021, 4, 36. [Google Scholar] [CrossRef]
  20. da Silva Mendonca, R.; de Oliveira Lins, S.; de Bessa, I.V.; de Carvalho Ayres, F.A., Jr.; de Medeiros, R.L.P.; de Lucena, V.F., Jr. Digital Twin Applications: A Survey of Recent Advances and Challenges. Processes 2022, 10, 744. [Google Scholar] [CrossRef]
  21. van Rooij, F.; Scarf, P.; Do, P. Planning the restoration of membranes in RO desalination using a digital twin. Desalination 2021, 519, 115214. [Google Scholar] [CrossRef]
  22. Yitmen, I.; Alizadehsalehi, S.; Akıner, I.; Akıner, M.E. An Adapted Model of Cognitive Digital Twins for Building Lifecycle Management. Appl. Sci. 2021, 11, 4276. [Google Scholar] [CrossRef]
  23. Aheleroff, S.; Xu, X.; Zhong, R.Y.; Lu, Y. Digital Twin as a Service (DTaaS) in Industry 4.0: An Architecture Reference Model. Adv. Eng. Inform. 2021, 47, 101225. [Google Scholar] [CrossRef]
  24. Zhang, H.; Ma, L.; Sun, J.; Lin, H.; Thurer, M. Digital Twin in Services and Industrial Product Service Systems: Review and Analysis. Proc. CIRP 2019, 83, 57–60. [Google Scholar] [CrossRef]
  25. Padovano, A.; Longo, F.; Nicoletti, L.; Mirabelli, G. A Digital Twin based Service Oriented Application for a 4.0 Knowledge Navigation in the Smart Factory. IFAC-Pap. 2018, 51, 631–636. [Google Scholar] [CrossRef]
  26. Meierhofer, J.; West, S.; Rapaccini, M.; Barbieri, C. The Digital Twin as a Service Enabler: From the Service Ecosystem to the Simulation Model. In Exploring Service Science. IESS 2020. Lecture Notes in Business Information Processing; Nóvoa, H., Drăgoicea, M., Kühl, N., Eds.; Springer: Cham, Switzerland, 2020; Volume 377, pp. 347–359. [Google Scholar] [CrossRef]
  27. Sharma, A.; Kosasih, E.; Zhang, J.; Brintrup, A.; Calinescu, A. Digital Twins: State of the Art Theory and Practice, Challenges, and Open Research Questions. arXiv 2020, arXiv:2011.02833. [Google Scholar] [CrossRef]
  28. He, F.; Ong, S.K.; Nee, A.Y.C. An Integrated Mobile Augmented Reality Digital Twin Monitoring System. Computers 2021, 10, 99. [Google Scholar] [CrossRef]
  29. Fuller, A.; Fan, Z.; Day, C.; Barlow, C. Digital Twin: Enabling Technologies, Challenges and Open Research. IEEE Access 2020, 8, 108952–108971. [Google Scholar] [CrossRef]
  30. Sakhnini, J.; Karimipour, H.; Dehghantanha, A.; Parizi, M.R. AI and Security of Critical Infrastructure. In Handbook of Big Data Privacy; Choo, K.K., Dehghantanha, A., Eds.; Springer: Cham, Switzerland, 2020; pp. 7–36. [Google Scholar] [CrossRef]
  31. Kraidi, L.; Shah, R.; Matipa, W.; Borthwick, F. An investigation of mitigating the safety and security risks allied with oil and gas pipeline projects. J. Pipeline Sci. Eng. 2021, 1, 349–359. [Google Scholar] [CrossRef]
  32. Wang, X.; Wei, H.; Chen, N.; He, X.; Tian, Z. An Observational Process Ontology-Based Modeling Approach for Water Quality Monitoring. Water 2020, 12, 715. [Google Scholar] [CrossRef]
  33. Bragatto, P.A.; Ansaldi, S.M.; Agnello, P.; Di Condina, T.; Zanzotto, F.M.; Milazzo, M.F. Ageing management and monitoring of critical equipment at Seveso sites: An ontological approach. J. Loss Prev. Proc. Ind. 2020, 66, 104204. [Google Scholar] [CrossRef]
  34. Lee, S.; Sharafat, A.; Kim, I.S.; Seo, J. Development and Assessment of an Intelligent Compaction System for Compaction Quality Monitoring, Assurance, and Management. Appl. Sci. 2022, 12, 6855. [Google Scholar] [CrossRef]
  35. Vaccari, M.; Pannocchia, G.; Tognotti, L.; Paci, M.; Bonciani, R. A rigorous simulation model of geothermal power plants for emission control. Appl. Energy 2020, 263, 114814. [Google Scholar] [CrossRef]
  36. Vansovits, V.; Petlenkov, E.; Tepljakov, A.; Vassiljeva, K.; Belikov, J. Bridging the Gap in Technology Transfer for Advanced Process Control with Industrial Applications. Sensors 2022, 22, 4149. [Google Scholar] [CrossRef] [PubMed]
  37. Vaccari, M.; Bacci Di Capaci, R.; Brunazzi, E.; Tognotti, L.; Pierno, P.; Vagheggi, R.; Pannocchia, G. Optimally Managing Chemical Plant Operations: An Example Oriented by Industry 4.0 Paradigms. Ind. Eng. Chem. Res. 2021, 60, 7853–7867. [Google Scholar] [CrossRef]
  38. Vaccari, M.; di Capaci, R.B.; Brunazzi, E.; Tognotti, L.; Pierno, P.; Vagheggi, R.; Pannocchia, G. Implementation of an Industry 4.0 system to optimally manage chemical plant operation. IFAC-Pap. 2020, 53, 11545–11550. [Google Scholar] [CrossRef]
  39. Botín-Sanabria, D.M.; Mihaita, A.-S.; Peimbert-García, R.E.; Ramírez-Moreno, M.A.; Ramírez-Mendoza, R.A.; Lozoya-Santos, J.d.J. Digital Twin Technology Challenges and Applications: A Comprehensive Review. Remote Sens. 2022, 14, 1335. [Google Scholar] [CrossRef]
  40. Salem, T.; Dragomir, M. Options for and Challenges of Employing Digital Twins in Construction Management. Appl. Sci. 2022, 12, 2928. [Google Scholar] [CrossRef]
  41. Choi, S.; Woo, J.; Kim, J.; Lee, J.Y. Digital Twin-Based Integrated Monitoring System: Korean Application Cases. Sensors 2022, 22, 5450. [Google Scholar] [CrossRef]
  42. Soares, R.M.; Camara, M.M.; Feital, T.; Pinto, J.C. Digital Twin for Monitoring of Industrial Multi-Effect Evaporation. Processes 2019, 7, 537. [Google Scholar] [CrossRef]
  43. Kaiblinger, A.; Woschank, M. State of the Art and Future Directions of Digital Twins for Production Logistics: A Systematic Literature Review. Appl. Sci. 2022, 12, 669. [Google Scholar] [CrossRef]
  44. Kampczyk, A.; Dybeł, K. The Fundamental Approach of the Digital Twin Application in Railway Turnouts with Innovative Monitoring of Weather Conditions. Sensors 2021, 21, 5757. [Google Scholar] [CrossRef] [PubMed]
  45. Qian, C.; Liu, X.; Ripley, C.; Qian, M.; Liang, F.; Yu, W. Digital Twin—Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions. Future Internet 2022, 14, 64. [Google Scholar] [CrossRef]
  46. Al-Ali, A.R.; Gupta, R.; Batool, T.Z.; Landolsi, T.; Aloul, F.; Al Nabulsi, A. Digital Twin Conceptual Model within the Context of Internet of Things. Future Internet 2020, 12, 163. [Google Scholar] [CrossRef]
  47. Stojanovic, L.; Uslander, T.; Volz, F.; Weibenbacher, C.; Muller, J.; Jacoby, M.; Bischoff, T. Methodology and Tools for Digital Twin Management—The FA3ST Approach. IoT 2021, 2, 717–740. [Google Scholar] [CrossRef]
  48. Immerman, D. Why IoT is the Backbone for Digital Twin. PTC. Available online: https://www.ptc.com/en/blogs/corporate/iot-digital-twin#:~:text=The%20Internet%20of%20Things%20and,virtually%20represent%20their%20physical%20counterparts (accessed on 22 June 2022).
  49. Lin, H.; Garg, S.; Hu, J.; Wang, X.; Piran, M.J.; Hossain, M.S. Data fusion and transfer learning empowered granular trust evaluation for Internet of Things. Inform. Fusion 2022, 78, 149–157. [Google Scholar] [CrossRef]
  50. Videras Rodríguez, M.; Melgar, S.G.; Cordero, A.S.; Márquez, J.M.A. A Critical Review of Unmanned Aerial Vehicles (UAVs) Use in Architecture and Urbanism: Scientometric and Bibliometric Analysis. Appl. Sci. 2021, 11, 9966. [Google Scholar] [CrossRef]
  51. Abdelmaboud, A. The Internet of Drones: Requirements, Taxonomy, Recent Advances, and Challenges of Research Trends. Sensors 2021, 21, 5718. [Google Scholar] [CrossRef]
  52. Bridgwater, T.J.F. Characterisation of a Nuclear Cave Environment Utilising an Autonomous Swarm of Heterogeneous Robots. University of the West of England and University of Bristol. Available online: https://uwe-repository.worktribe.com/output/1490801 (accessed on 22 June 2022).
  53. Jumaah, H.J.; Kalantar, B.; Halin, A.A.; Mansor, S.; Ueda, N.; Jumaah, S.J. Development of UAV-Based PM2.5 Monitoring System. Drones 2021, 5, 60. [Google Scholar] [CrossRef]
  54. Siwen, L. Development of a UAV-Based System to Monitor Air Quality over an Oil Field. Available online: https://digitalcommons.mtech.edu/grad_rsch/187/ (accessed on 22 June 2022).
  55. Horvath, D.; Gazda, J.; Slapak, E.; Maksymyuk, T.; Dohler, M. Evolutionary Coverage Optimization for a Self-Organizing UAV-Based Wireless Communication System. IEEE Access 2021, 9, 145066–145082. [Google Scholar] [CrossRef]
  56. Elmokadem, T.; Savkin, A.V. A Hybrid Approach for Autonomous Collision-Free UAV Navigation in 3D Partially Unknown Dynamic Environments. Drones 2021, 5, 57. [Google Scholar] [CrossRef]
  57. Stolfi, D.H.; Brust, M.R.; Danoy, G.; Bouvry, P. UAV-UGV-UMV Multi-Swarms for Cooperative Surveillance. Front. Robot. AI 2021, 8, 616950. [Google Scholar] [CrossRef] [PubMed]
  58. Lewis, M. Human Interaction with Multiple Remote Robots. Rev. Human Factors Ergonom. 2013, 9, 131–174. [Google Scholar] [CrossRef]
  59. Hussein, A.; Abbass, H. Mixed Initiative Systems for Human-Swarm Interaction: Opportunities and Challenges. IEEE Xplore 2018, 1–8. [Google Scholar] [CrossRef]
  60. Shubhani, A.; Neeraj, K. Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges. Comput. Commun. 2020, 149, 270–299. [Google Scholar] [CrossRef]
  61. Lee, W.; Lee, J.Y.; Lee, J.; Kim, K.; Yoo, S.; Park, S.; Kim, H. Ground Control System Based Routing for Reliable and Efficient Multi-Drone Control System. Appl. Sci. 2018, 8, 2027. [Google Scholar] [CrossRef]
  62. Shin, M.; Kim, J.; Levorato, M. Auction-based charging scheduling with deep learning framework for multi-drone networks. IEEE Trans. Veh. Technol. 2019, 68, 4235–4248. [Google Scholar] [CrossRef]
  63. Torabbeigi, M.; Lim, G.J.; Kim, S.J. UAV delivery schedule optimization considering the reliability of UAVs. In Proceedings of the International Conference on Unmanned Aircraft Systems (ICUAS), Dallas, TX, USA, 12–15 June 2018; pp. 1048–1053. [Google Scholar]
  64. Hongyan, D.; Chi, Z.; Guanghan, B.; Liwei, C. Mission reliability modeling of UAV swarm and its structure optimization based on importance measure. Rel. Eng. Syst. Saf. 2021, 215, 107879. [Google Scholar] [CrossRef]
  65. Mignardi, S.; Marini, R.; Verdone, R.; Buratti, C. On the Performance of a UAV-Aided Wireless Network Based on NB-IoT. Drones 2021, 5, 94. [Google Scholar] [CrossRef]
  66. Na, Z.; Ji, C.; Lin, B.; Zhang, N. Joint Optimization of Trajectory and Resource Allocation in Secure UAV Relaying Communications for Internet of Things. IEEE IoT J. 2022. [Google Scholar] [CrossRef]
  67. Islam, A.; Al Amin, A.; Shin, S.Y. FBI: A Federated Learning-Based Blockchain-Embedded Data Accumulation Scheme Using Drones for Internet of Things. IEEE Wirel. Commun. Lett. 2022, 11, 972–976. [Google Scholar] [CrossRef]
  68. Li, D.; Ge, S.S.; He, W.; Ma, G.; Xie, L. Multilayer formation control of multi-agent systems. Automatica 2019, 109, 108558. [Google Scholar] [CrossRef]
  69. Herrera, M.; Parlikad, A.K.; Izquierdo, J.; Perez Hernandez, M. Multi-Agent Systems and Complex Networks: Review and Applications in Systems Engineering. Processes 2020, 8, 312. [Google Scholar] [CrossRef]
  70. Shafiq, M.; Ali, Z.A.; Alkhammash, E.H. A Cluster-Based Hierarchical-Approach for the Path Planning of Swarm. Appl. Sci. 2021, 11, 6864. [Google Scholar] [CrossRef]
  71. Fesenko, H.; Kharchenko, V.; Sachenko, A.; Hiromoto, R.; Kochan, V. Chapter 9—An internet of drone-based multi-version post-severe accident monitoring system: Structures and reliability. In Dependable IoT for Human and Industry: Modeling, Architecting, Implementation; Kharchenko, V., Kor, A.L., Rucinski, A., Eds.; River Publishers: Gistrup, Denmark, 2018; pp. 197–217. [Google Scholar]
  72. Abarnikov, Y.; Kharchenko, V.; Morozova, O. Equipment monitoring system with use of Digital Twins and Internet of Things: Algorithms, architecting and experiments. In Proceedings of the 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Krakow, Poland, 22–25 September 2021; Volume 1, pp. 75–80. [Google Scholar]
  73. Kharchenko, V.; Sachenko, A.; Kochan, V.; Fesenko, H. Reliability and survivability models of integrated drone-based systems for post emergency monitoring of NPPs. In Proceedings of the International Conference on Information and Digital Technologies (IDT), Rzeszow, Poland, 5–7 July 2016; pp. 127–132. [Google Scholar] [CrossRef]
  74. Kliushnikov, I.; Fesenko, H.; Kharchenko, V. Scheduling UAV Fleets for The Persistent Operation of UAV-Enabled Wireless Networks During NPP Monitoring. Radioelectron. Comput. Syst. 2020, 1, 29–36. [Google Scholar] [CrossRef]
  75. Lisnianski, A.; Frenkel, I.; Ding, Y. Multi-State System Reliability Analysis and Optimization for Engineers and Industrial Managers; Springer-Verlag: London, UK, 2010; pp. 1–28. [Google Scholar] [CrossRef]
  76. Sachenko, A.; Kochan, V.; Kharchenko, V.; Roth, H.; Yatskiv, V.; Chernyshov, M.; Bykovyy, P.; Roshchupkin, O.; Koval, V.; Fesenko, H. Mobile Post-Emergency Monitoring System for Nuclear Power Plants. In Proceedings of the ICT in Education, Research and Industrial Applications (ICTERI), Kyiv, Ukraine, 21–24 June 2016; pp. 384–398. [Google Scholar]
  77. Yastrebenetsky, M.; Kharchenko, V. Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control; IGI-Global: Hershey, PA, USA, 2020; p. 501. [Google Scholar] [CrossRef]
  78. Ushakov, I. Probabilistic Reliability Models; JohnWiley & Sons: Hoboken, NJ, USA, 2012; pp. 20–22. Available online: https://www.wiley.com/en-us/Probabilistic+Reliability+Models-p-9781118370766 (accessed on 22 June 2022).
  79. A Solution That Turns Ordinary Factories into SMART in 15 Minutes. Available online: https://www.koeebox.com/ (accessed on 22 June 2022).
  80. Siriwardena, P. Message-Level Security with JSON Web Signature. In Advanced API Security; Apress: Berkeley, CA, USA, 2019; pp. 157–184. Available online: https://www.oreilly.com/library/view/advanced-api-security/9781484220504/A323855_2_En_7_Chapter.html (accessed on 22 June 2022).
  81. Fukuda, S.; Kurihara, S.; Hamanaka, S.; Oguchi, M.; Yamaguchi, S. Accelerated test for applications with client application and server software. In Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication (IMCOM), Beppu, Japan, 5–7 January 2017; pp. 1–6. [Google Scholar]
  82. Kesavan, S.; Saravana Kumar, E.; Kumar, A.; Vengatesan, K. An investigation on adaptive HTTP media streaming Quality-of-Experience (QoE) and agility using cloud media services. Int. J. Comput. Appl. 2021, 43, 431–444. [Google Scholar] [CrossRef]
  83. Murley, P.; Ma, Z.; Mason, J.; Bailey, M.; Kharraz, A. WebSocket Adoption and the Landscape of the Real-Time Web. In Proceedings of the Web Conference, Ljubljana, Slovenia, 19–23 April 2021; pp. 1192–1203. [Google Scholar] [CrossRef]
  84. Kliushnikov, I.; Fesenko, H.; Kharchenko, V.; Illiashenko, O.; Morozova, O. UAV fleet based accident monitoring systems with automatic battery replacement systems: Algorithms for justifying composition and use planning. Int. J. Saf. Secur. Eng. 2021, 11, 319–328. [Google Scholar] [CrossRef]
  85. Pevnev, V.; Torianyk, V.; Kharchenko, V. Cyber Security of Wireless Smart Systems: Channels of Intrusions and Radio Frequency Vulnerabilities. Radioelectron. Comput. Syst. 2020, 4, 79–92. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.