Next Article in Journal
Measuring Respiratory Motion for Supporting the Minimally Invasive Destruction of Liver Tumors
Previous Article in Journal
Weighted Iterative CD-Spline for Mitigating Occlusion Effects on Building Boundary Regularization Using Airborne LiDAR Data
Previous Article in Special Issue
Discrete Missing Data Imputation Using Multilayer Perceptron and Momentum Gradient Descent
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

UAV and IoT-Based Systems for the Monitoring of Industrial Facilities Using Digital Twins: Methodology, Reliability Models, and Application

1
School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wuhan 430070, China
2
School of Computer Science, Hubei University of Technology, Wuhan 430068, China
3
Department of Computer Systems, Networks and Cybersecurity, National Aerospace University “KhAI”, 17, Chkalov Str., 61070 Kharkiv, Ukraine
4
Research Institute for Intelligent Computer Systems, West Ukrainian National University, 11, Lvivska Str., 46009 Ternopil, Ukraine
5
Department of Informatics and Teleinformatics, Kazimierz Pulaski University of Technology and Humanities in Radom, ul. Malczewskiego 29, 26-600 Radom, Poland
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(17), 6444; https://doi.org/10.3390/s22176444
Submission received: 28 July 2022 / Revised: 18 August 2022 / Accepted: 22 August 2022 / Published: 26 August 2022

Abstract

:
This paper suggests a methodology (conception and principles) for building two-mode monitoring systems (SMs) for industrial facilities and their adjacent territories based on the application of unmanned aerial vehicle (UAV), Internet of Things (IoT), and digital twin (DT) technologies, and a set of SM reliability models considering the parameters of the channels and components. The concept of building a reliable and resilient SM is proposed. For this purpose, the von Neumann paradigm for the synthesis of reliable systems from unreliable components is developed. For complex SMs of industrial facilities, the concept covers the application of various types of redundancy (structural, version, time, and space) for basic components—sensors, means of communication, processing, and presentation—in the form of DTs for decision support systems. The research results include: the methodology for the building and general structures of UAV-, IoT-, and DT-based SMs in industrial facilities as multi-level systems; reliability models for SMs considering the applied technologies and operation modes (normal and emergency); and industrial cases of SMs for manufacture and nuclear power plants. The results obtained are the basis for further development of the theory and for practical applications of SMs in industrial facilities within the framework of the implementation and improvement of Industry 4.0 principles.

1. Introduction and Related Works

1.1. Motivation

The serviceability of control systems and monitoring of the condition of industrial facilities have emerged as a separate class of complex and ultra-complex systems. This is because of their growing importance in the context of, above all, safety; the efficiency of information; their processing and decision making to minimize the risk of costly equipment failures; the occurrence of emergency or pre-emergency situations and their prevention; and the reduction of the consequences of accidents for enterprises, the environment, as well as the residents of territories.
The relevance of improving the monitoring systems of industrial facilities has grown in recent decades for several reasons:
  • There are a large number of emergency facilities, enterprises, and transport and energy systems that are part of regional, national, and even transnational infrastructures. Thus, their influence grows not only on the continuous and high-quality provision of relevant products, resources, and services, but also on the potential danger of certain territories and regions (more and more dangerous objects) [1,2].
  • These systems are becoming more robotic and lacking in human participation, considering the trends in the development and implementation of the principles of Industry 4.0 [3,4]. As a result, monitoring systems need to develop appropriately, based on digital, mobile, and smart technologies; this is necessary to effectively perform control and monitoring functions on equipment and the surrounding areas; or environmental monitoring tasks, including possible pollution, forest resources, and fires (more and more robotic unmanned industries); and develop facilities for environmental monitoring (forest fires, etc.) [5,6].
  • New technologies (Internet of Things (IoT) and Internet of Everything, big data analytics, digital twins (DTs) and X-reality, and unmanned aerial vehicles (UAVs), commonly known as drones, robotics, etc.) create new opportunities for the creation of monitoring systems; however, they are the cause of challenges related to dependability, functional safety, and cybersecurity components and monitoring systems, which operate in very harsh physical and informational conditions [7,8,9].
Therefore, it is quite important to find a solution for building monitoring systems for industrial facilities in terms of a systems approach, when these facilities, and hence, monitoring systems, are considered in certain interactions with different components (equipment, enterprises, and surrounding areas) and conditions of use.
It is also important to consider and improve the principles of monitoring industrial facilities in terms of the development and use of modern technologies, namely: digitization technologies in the context of implementing the principles of Industry 4.0, mobile and cloud technologies, X-reality technologies, security technologies, and more. A separate factor is the introduction of DT technologies [10], which are used to quickly and conveniently provide information about the status of the monitored object. In addition, the task of ensuring the dependability of monitoring systems, considering the reliability of their channels, software and hardware components, environmental impact, etc. is extremely important. This is due to the importance of the timely and trustworthy provision of information on the state of industrial facilities and their components.

1.2. State of the Art

To analyze the state of monitoring systems for industrial facilities research, let us first consider the monitoring systems based on IoT technologies and their development in the context of Industry 4.0. The Industry 4.0 paradigm encompasses many digital technologies that affect manufacturing enterprises [11]. The term “Industry 4.0” includes several key technologies such as cyber–physical systems, the IoT, artificial intelligence, big data analytics, and DTs, which can be considered the main factors of automated and digital production environments [12].
This direction is developing rapidly, allowing manufacturing companies to take advantage of new opportunities for digital transformation, and the offer products and services, including cloud-based solutions [13], in current and emerging markets at a competitive price [14]. However, there is still a lack of comprehensive research on the application of technologies that allow the utilization of Industry 4.0 in the production life cycle.
Much of the research on this topic focuses on the study of smart enterprise technologies, production planning, and relevant technological processes, and does not consider the possibility of monitoring these systems. Industry 4.0 can be considered as a broad area that includes data management, the competitiveness of production, production processes, and efficiency [13,15].
Technological developments in terms of Industry 4.0 are evolving rapidly, allowing manufacturing companies with new opportunities for digital transformation to offer products and services in current and emerging markets. However, there is a question about the impact of Industry 4.0 on the development of the industry as a whole. In [16], a sustainability-based model to assess the impact of Industry 4.0 technologies on several key performance indicators related to the sustainable development of different areas is proposed. Additionally, in [17], a study of the integration of Industry 4.0 technologies into the practice of full production service in many large manufacturing enterprises is shown.
Secondly, let us consider the introduction of DTs to monitoring systems in industrial facilities and the relevant issues of information integration from different sources and channels of monitoring systems. DT technology is playing an increasingly important role, and is an abstract-level concept between physical devices and external systems with the function of full simulation of the physical device’s workflow and saving the statistics of the device [18,19]. DTs are actively used to solve the problems of building systems for modeling the behavior of real objects [20,21,22]. However, this does not reduce the range of tasks that DTs solve.
The DT as a service (DTaaS) paradigm for digital transformation is proposed in [23], including intelligent scheduled maintenance, real-time monitoring, remote control, and forecasting functionality. Additionally, in [24], research was conducted on the use of DT technology in the context of the services and service systems of industrial products, and the study outlines possible applications for the stages of a closed cycle of the product’s life. In [25], the potential benefits of using the DT for the industry in terms of performance and process quality standards are shown. In addition, [26,27] explores the concept of the DT as a tool for smart services in the context of production certification, as well as real-time monitoring and forecasting. Improvements in machine learning, the IoT, and big data have made a huge contribution to improving the DT in terms of its real-time monitoring and forecasting properties.
Therefore, DT technology is currently becoming the most popular, and is used in combination with other information and communication technologies, such as augmented reality [28,29], artificial intelligence [30,31], and ontological modeling [32,33]. Authors [34,35] have shown that DTs are essential components of the SM in cases where real-time measurements are not feasible due to economical or technological factors. In these cases, DTs can be utilized for predicting such measurements during a change in the conditions of operation/facility and for allowing an operator to check whether all the predictions are in the safe zone. DTs may also be in demand for checking whether the normal operation variables are maintained in the correct range when performing optimization techniques aimed at calculating the optimal economic management of facilities [36,37,38]. Thus, DTs are widely used; however, it is best to employ them for the easy integration of data between a physical and virtual machine in any field.
Currently, the implementation of DT technologies for monitoring systems is underway [39,40,41], which are considered to have three levels: equipment, the building as a whole (several floors with equipment), and the entire adjacent area to the building with equipment. A significant number of tasks are related to the monitoring of logistics and industrial systems [42,43,44].
Along with this, the growing popularity of IoT technology has complemented the use of DT technology [45,46]. As the IoT becomes increasingly popular in intelligent environments, the concept of the DT is evolving as a complement to its physical part. Using IoT sensors, the DT collects information from a real counterpart, and then, simulates a physical object in real time, providing insights into performance and possible problems [47,48]. The digital representation of physical objects is a key component of industrial applications, as they are the basis for decision making. Thus, the conceptual approach to DTs is well-defined software that follows the entire life cycle along with their physical counterparts, from development and operation to unloading; therefore, this approach obtains a description of the type, identity, and life cycle of the object. However, considerable attention must be paid to the security of such systems [49].
Thirdly, let us consider using UAVs and ensuring the dependability of monitoring systems. The results of an analysis of tasks, areas of application of UAVs, and publications related to their use in monitoring systems are described in [50]. Paper [51] describes the use of Internet of Drones (IoD) technologies in UAV fleets. Paper [52] presents the results of using heterogeneous UAV fleets for monitoring in the field of nuclear energy and analyzes the advantages of heterogeneous fleets over homogeneous ones.
In [53,54], the issues of creating UAV-based monitoring systems are considered. However, it discusses the aspects of carrier selection and payload list only, and the general composition of the fleet (number, organization of management, interaction, etc.) is not determined.
Papers [55,56,57,58,59] study the management processes of monitoring systems, which are based on UAVs in various aspects, namely: self-organization in wireless networks [55], flight safety [55,56], the control and coordination of various types of robot [54], and issues of human interaction with UAVs [58,59]. Features of UAV and ground robot planning in monitoring systems and other applications are studied in [60,61,62]. However, these papers pay more attention to the aspect of flight safety, and the construction and maintenance of a given group in the fleet. Planning in UAVs, considering the indicators of their reliability and effectiveness in missions, is presented in [63,64,65]. Security issues regarding the utilization of UAV-based networks in IoT scenarios are considered in [66,67].
The group application of UAVs requires special approaches to the construction of monitoring systems as well as to their management and organization. High efficiency in the creation of such systems is provided by the introduction of multi-agent systems with features [68,69,70].
Although the design of systems with UAVs is described in many works above, their results are separate fragments. So, it cannot be used entirely for developing intelligent systems for monitoring potentially dangerous objects. This makes it necessary to conduct research related to:
  • The development of monitoring system structures considering the different components of industrial facilities and the environment, and the application of technologies such as IoT, DTs, UAVs, etc. [5,71,72].
  • Improving the reliability models of monitoring systems and researching their dependence on the reliability of subsystems, particularly those based on UAV fleets [73,74]; means of measuring, transmitting, and processing the information; as well as their integration using the DT.
  • Monitoring system dependability studies, considering the possible degradation of systems due to channel failures and the corresponding reduction in the “monitoring coverage” of industrial facilities and their surrounding areas. In this case, it is advisable to use models of multi-state systems (MSSs) [75].

1.3. Objectives

Summing up the analysis of related works above, it should be noted that there are challenges of a theoretical and applied nature in creating a single methodology for developing architectures for monitoring systems for complex industrial facilities using UAVs, as well as models and methods for assessing the reliability of such monitoring systems. Hence, the goal of this paper is to develop the methodology for designing (building) two-mode monitoring systems for industrial objects and their adjacent territories based on the application of modern mobile and digital technologies, as well as a set of proper reliability models.
The objectives of the paper are as follows:
  • To develop a methodology for building and creating general models (structures) of UAV-, IoT-, and DT-based monitoring systems in complex industrial facilities as multi-level and multi-state systems;
  • To develop and explore reliability models of the monitoring systems considering applied mobile and digital technologies, operation modes (normal and emergency), etc.;
  • To propose and discuss industrial cases of monitoring systems for manufacturing and nuclear power plants.

1.4. Approach and Structure

The approach to research includes the following provisions.
The conception and principles of the building and general structure of systems for monitoring industrial facilities are proposed; they are:
  • Parts of critical infrastructures such as nuclear power plant utilities, dangerous manufacturers, oil and gas transport communications, etc.
  • Described using a multilevel hierarchy scheme, and based on the application of the technologies:
    (a)
    Digital twins as models of controlled sub-objects;
    (b)
    UAV fleet as an additional channel for collecting information;
    (c)
    A private cloud system as a redundant emergency center for decision-making support.
The monitoring system is analyzed as a complex system in terms of dependability considering:
  • Various monitoring system structures, options for sub-object monitoring, and the configuration of different stationary and mobile centers for collecting information and decision making;
  • Modes of monitoring system operation (normal and emergency modes) that vary in terms of the environment and failure rates of the components;
  • The placement and reliability of digital twins generated by different centers and their influence on decision making;
  • The placement and reliability of decision-making units;
  • The processes of monitoring system degradation caused by components and channels failures. In this case, the monitoring system is addressed as an MSS.
Thus, the overall contribution of this research covers the development of the concept and principles for dependable SM building by using mobile technologies (UAVs and UAV fleets), the Industrial IoT, edge computing, and digital twins. The suggested principles allow us to implement options for the structural organization of SMs for complex industrial facilities, described using a three-tier hierarchy (equipment-utility-zone/adjacent area).
The rest of the paper is structured in the following way. The proposed concepts and principles are described in Section 2. In Section 3, the SM is analyzed and developed as a dependable system. Section 4 contains the two industrial cases: pre- and post-accident nuclear power plant monitoring systems, and a subsystem of monitoring equipment using IoT and private cloud. In Section 5, the results of the research are discussed. Section 6 highlights the conclusion and directions for future work.

2. Methodology for Building SMs

2.1. Concept of SM Building

For critical industrial facilities and monitoring systems, as their key component, there is a contradiction in the context of the development of mobile, information, and smart technologies. On the one hand, there are strict requirements for the reliability, safety, and survival of monitoring systems in industrial facilities in the pre- and post-accident period regarding the failure of sensors, communications, processing equipment, and control points. At the same time, the capabilities of UAVs and the Internet of Drones for measuring, transmitting, and processing information are growing. On the other hand, concepts and methods for creating and using reliable and resilient monitoring systems in industrial facilities under conditions of failure and accidents have not been sufficiently developed.
To resolve this contradiction, the concept of building reliable and resilient monitoring systems is proposed, based on the development of the von Neumann paradigm of the synthesis of reliable systems from unreliable components, further based on the “system components-types of redundancy“ matrix [71,72,73]. For complex monitoring systems in industrial facilities, the concept covers the application of various types of redundancy (structural, version, time, and space) for basic components: sensors and means of converting measurement results, and means of communication, information transmission, and information processing. A UAV fleet is a key component of a redundant, multi-version, and dynamically reconfigurable SM because the application of UAVs allows for the implementation of specific kinds of structural, informational, and version redundancy that can be replenished. This increases the survivability of the SM in extreme conditions. Moreover, an additional kind of information and version redundancy is the presentation of the state of the monitored object in the form of digital twins for decision support centers.
The concept is also complemented by the fact that to ensure the resilience of monitoring systems, the use of diversity and a spatial distribution of decision-making centers with clearly defined functions and priorities are proposed. In addition, the diversity of control methods is due to the use of DTs and cloud data processing, as well as data transfer methods using floating UAVs that form dynamically reconfigurable structures that are resistant to physical and cyber intrusion and can be recovered. The presence of mobile and protected cloud subsystems offers the possibility of dynamic and proactive reconfiguration of assets in the event of failures, physical impacts, and cyberattacks.

2.2. Principles of SM Building

2.2.1. Three-Level Model of Object Monitoring

During the development of the structure and models of the monitoring system, a three-tier model of the presentation of the industrial facility was adopted, which includes:
  • Equipment with sensors and critical-process management devices (equipment that is monitored and controlled, EC). Various systems of such monitoring are used in industrial facilities. They are based on wireless and IoT technologies and do not interfere with technological processes, without creating additional risks from the point of view of ensuring the safety of objects.
  • Several systems and building complexes, within which equipment with sensors and devices for the management of critical processes (the utility that is monitored and controlled, UC) were placed. For example, for a nuclear power plant, this level covers systems and equipment whose condition is monitored by the Post-Accident Monitoring System [76].
  • The territory of the industrial facility, which is limited by the outer perimeter, where monitoring stations (MSs) are located (zones that are monitored, ZC). For a nuclear power plant, this corresponds to the area whose condition is monitored by the Automated Radiation Monitoring System [77].
Next, we consider the option of building an industrial facility, on the territory of which there are several UCis (i = 1…n) and MSs of the same type.

2.2.2. Applied Technologies

In the process of building and operating the monitoring system, the following technologies are expected to be used:
  • DTs, which ensure the creation of digital clones in an industrial facility. This makes it possible to model and determine its state from various data on the state of its component systems and objects. The creation and use of DTs of different complexity for different crisis centers are envisaged. The model uses a digital twin instance which describes a specific object with which the twin remains associated through the life of the object. Duplicates of this type usually contain an annotated 3D model, which takes into account the measurement results received from the sensors, as well as the current and predicted values of the monitoring parameters.
  • IoT and Internet of Flying Things to reserve wired data transmission channels from sensors and critical-process control devices, commonly equipped with previous-generation Post-Accident Monitoring Systems and Automated Radiation Monitoring Systems. Post-Accident Monitoring Systems were created in the first decade after the Fukushima accident [76,77].
  • Edge computing technologies for data pre-processing at every level of the industrial facility monitoring model using edge nodes (EN), which make it possible to reduce data volumes, their transmission speed, and the requirements for the performance of transmission equipment. Data pre-processing also increases the efficiency of decision-making processing in crisis centers. The model of the monitoring system aims to perform boundary calculations and the placement of relevant edge nodes on both UCs and onboard UAVs (flying edge nodes, FENs).

2.2.3. Redundant Centers of Control and Monitoring

To ensure the dependability and resilience of monitoring the condition of the object, crisis centers using the UAV fleet (IoD) and cloud services are utilized. The backup model provides additional centers to the usual (for example, for a nuclear power plant) control room (CR) and emergency control room (ECR):
  • The private cloud crisis group (PCG), which processes monitoring data using cloud services and the Internet of Things;
  • The UAV Fleet and flying control center (FCC), which receive and processes data on the condition of an industrial facility using equipment that can be placed either on one powerful UAV or under a group of UAVs (UAV fleet or IoD), can be distributed. The IoD is a kind of Internet of Flying Things based on a set of interacting drones. For the considered SMs, the IoD is a part of the flying control center (FCC) infrastructure with access to both the Private Cloud and Internet resources. Drone on-board systems collaborate with each other, ground sensors (located at the MSs), and the FCC.
Monitoring systems operate in normal and emergency modes according to the condition of the industrial facility. Additional control and monitoring centers of industrial facilities, namely PCG and FCC, are involved in the emergency mode. Under certain circumstances, they can perform certain monitoring functions in normal mode, but within the framework of this study, they only work in emergency mode.
In this case, the organization and functions of the SM based on CR, ECR, PCG, and FCC are described in Table 1 and Table 2. CR, ECR, PCG, and FCC are separate subsystems of monitoring consisting of sensors (Sen), communication (Com), data processing (Prc), and decision-making support means (DMU). Table 1 describes the functions of these subsystems considering the levels of industrial facility hierarchy (EC, UC, and ZC). Table 2 presents the capacity of monitoring functions in the normal and emergency modes.
The CR subsystem in both modes performs all monitoring functions at all levels of the hierarchy. The ECR subsystem differs in that it does not perform equipment monitoring (EC). The FCC and PCG subsystems provide monitoring at the ZC level only in emergency mode, in full or in part, depending on the sensor coverage of the surrounding areas. The ZC sensors for CR, ECR, PCG, and FCC can be general or separate.

2.2.4. General Model of the Industrial Facility Monitoring System

Thus, the general model of the industrial facility monitoring system can be described as a set GSM = {OM, CM, Sen, Com, DT, DMU}, where:
OM = {EC, UC, ZC}—the set of objects that are monitored or/and controlled;
CM = {CR, ECR, PCG, FCC]—the set of centers of control and monitoring;
Sen = {Sen_EC, Sen_UC, Sen_ZC}—the set of sensors;
Com = {ComEC_CR, ComUC_CR, ComUC_ECR, ComZC_CR, ComZC_ECR, ComZC_PCG, ComZC_FCC}—the set of means of communication;
DT = {Dtw_CR, Dtw_ECR, Dtw_PCG, Dtw_FCC]—the set of digital twins;
DMU = {DMU_CR, DMU_ECR]—the set of decision-making support means.
This GSM model describes the structural components of the SM, the relationships between which are shown in Figure 1. Reliability models of the SMs are described and explored in the next sections.

2.3. Structures of SMs

The structures of industrial facility monitoring systems with different concepts of the use of digital twins are shown in Figure 1 and Figure 2 (types T1 and T2). The first structure (Figure 1) describes the monitoring system using DTs designated as Dtw in each crisis center: Dtw_CR in the CR center, respectively; Dtw_ECR; Dtw_PCG; and Dtw_FCC. The second structure (Figure 2) of the monitoring system involves the use of DTs only in CR and ECR—Dtw_CR and Dtw_ECR, respectively.
In the proposed structures, CR receives data on the monitoring of the condition of all the components of the three-level model of an industrial facility—EC, UC, and ZC. The transmission of monitoring information from equipment ECij, i = {1…, n}, j = {1,…, mi} and stations MS1,…, MSk is performed either by nodes ENi and FEN, respectively, which perform data pre-processing, or directly from several UCi sensors.
ECR receives monitoring data from US1,..., UCn, and ZC. PCG and FCC only process ZC monitoring data. All the shelters have appropriate Prc tools for data processing. The decision on the condition of the facility is made only in CR and ECR; for this purpose, decision-making units (DMU) are provided in their composition: DMU_CR and DMU_ECR. All the centers interact with each other (interaction channels are indicated by a dotted line).
Figure 2. Graphical representation of models for SM option field-monitoring coverage of variants for allocation of monitoring functions among the SM channels (VAMF), as well as RBDs per each of these variants: (a) model for VAMF1, (b) model for VAMF2, (c) model for VAMF3, (d) model for VAMF4, and (e) model for VAMF5.
Figure 2. Graphical representation of models for SM option field-monitoring coverage of variants for allocation of monitoring functions among the SM channels (VAMF), as well as RBDs per each of these variants: (a) model for VAMF1, (b) model for VAMF2, (c) model for VAMF3, (d) model for VAMF4, and (e) model for VAMF5.
Sensors 22 06444 g002
Table 3 provides options for the structures of facility monitoring systems in normal and emergency mode, taking into account data sources, relevant centers, and the type of monitoring system (T1 or T2).
Further details and research on SM structures will be given in Section 3 based on the analysis of various sensor coverage options of the ZC parameter space for PCG and FCC subsystems, and on the development of appropriate reliability models. The presence of two, three, or four monitoring subsystems, i.e., the involvement of PCG and FCC subsystems, refers to the completeness of ZC option field coverage, which may be limited for them (marked with an asterisk). The relevant coverage models are analyzed below.

3. Reliability Models for System of Monitoring

3.1. Models of SM Option Field-Monitoring Coverage

Let us assume that each SM subsystem channel comprises either communications, a processor, and a digital twin (for the type-T1 SM structure) or communications and a processor (for the type-T2 SM structure). DTs’ compatibility with different subsystems is ensured as follows:
  • For the EC, the DTs are formed only in CR, so there is no compatibility problem here.
  • For UC, DTs are formed in CR and ECR from common sensors, so the data for generating DTs are identical, and, therefore, their compatibility is ensured. In addition, these data are corrected by the DMU in cases of failure.
  • For ZC, DTs are formed by all the subsystems (CR, ECR, PCG, and FCC) from sensors located in the ZC zone. If all subsystems use the full amount of monitoring data, both the compatibility and reliability of DT formation are ensured as in the previous case, using the DMU. If PCG and FCC subsystems use a limited data set from sensors, these data are employed to form the corresponding part of DTs and combine it with data from CR and ECR to ensure the DT’s compatibility.
In emergency mode, the SM can utilize either one (PCG/FCC) or two (PCG and FCC) channels in addition to the CR and ECR channels.
Depending on the tasks performed by the SM, the following features of SM channels’ functioning should be considered:
  • Channels can perform the same set of monitoring functions;
  • The set of monitoring functions for some channels can be considered as a subset of monitoring functions for other channels;
  • Sets of monitoring functions for individual channels may overlap.
These features of the SM channels mentioned above can form various variants of allocation for monitoring functions (VAMFs) among the SM channels. Each VAMF allows us to obtain the corresponding model of SM option field-monitoring coverage, as well as forming reliability block diagrams (RBDs). The latter are needed to assess the reliability of SM, which uses such VAMFs.
Let us introduce the following notations: FCR, FECR, FPCG, and FFCC are sets of monitoring functions performed by the CR, ECR, PCG, and FCC channels, respectively.
Considering the presented features of SM channel functioning and the accepted notations, five models of SM option field-monitoring coverage were developed (Figure 2).
As we can see from Figure 2, the largest and lowest numbers of RBDs correspond to VAMF5 (four RBDs, Figure 2e) and VAMF1 (one RBD, Figure 2a), respectively.

3.2. Extended Specification for SM Structures

Considering the specification of the SM structures presented in Table 3 and the features of the models of SM option field-monitoring coverage for VAMF, an extended specification was developed (Table 4).
This specification, in addition to the source of information (EC, UC, or ZC), mode of functioning (N or E), and type of structure (T1 or T2), which are presented in Table 3, provides information on:
The third channel for the three-channel SM structure (PCG or FCC);
The designation of the SM structure;
The reliability block diagram for the SM;
The notations of the SM structure and SM reliability function;
The equation for calculating the SM reliability function.
Table 4. Extended specification of the SM structures.
Table 4. Extended specification of the SM structures.
Source of
Information
ModeNumber of
Channels
Type of StructureThird Channel for
Three-Channel SM structure
Notation
of SM Structure
Reliability Block Diagram for SMNotation
of SM Reliability Function
Equation
for Calculating
SM Reliability
Function
ECNormal1T2- S 1 E C _ N Figure 3 P 1 E C _ N Equation (1)
ECEmergency1T2- S 1 E C _ E Figure 3 P 1 E C _ E Equation (2)
UCNormal2T1- S 2 _ 1 U C _ N Figure 4 P 2 _ 1 U C _ N Equation (3)
UCEmergency2T1- S 2 _ 1 U C _ E Figure 4 P 2 _ 1 U C _ E Equation (4)
UCNormal2T2- S 2 _ 2 U C _ N Figure 5 P 2 _ 2 U C _ N Equation (5)
UCEmergency2T2- S 2 _ 2 U C _ E Figure 5 P 2 _ 2 U C _ E Equation (6)
ZCNormal2T1- S 2 _ 1 Z C _ N Figure 6 P 2 _ 1 Z C _ N Equation (7)
ZCEmergency2T1- S 2 _ 1 Z C _ E Figure 6 P 2 _ 1 Z C _ E Equation (8)
ZCNormal2T2- S 2 _ 2 Z C _ N Figure 7 P 2 _ 2 Z C _ N Equation (9)
ZCEmergency2T2- S 2 _ 2 Z C _ E Figure 7 P 2 _ 2 Z C _ E Equation (10)
ZCEmergency3T1PCG S 3 ( P C G ) _ 1 Z C _ E Figure 8 P 3 ( P C G ) _ 1 Z C _ E Equation (11)
ZCEmergency3T2PCG S 3 ( P C G ) _ 2 Z C _ E Figure 9 P 3 ( P C G ) _ 2 Z C _ E Equation (12)
ZCEmergency3T1FCC S 3 ( F C C ) _ 1 Z C _ E Figure 10 P 3 ( F C C ) _ 1 Z C _ E Equation (13)
ZCEmergency3T2FCC S 3 ( F C C ) _ 2 Z C _ E Figure 11 P 3 ( F C C ) _ 2 Z C _ E Equation (14)
ZCEmergency4T1- S 4 _ 1 Z C _ E Figure 12 S 4 _ 1 Z C _ E Equation (15)
ZCEmergency4T2- S 4 _ 2 Z C _ E Figure 13 P 4 _ 2 Z C _ E Equation (16)

3.3. Reliability Models

3.3.1. Notations and Assumptions

The used notations are as follows:
Comα_β is the communications between α and β, where α = EC, UC, ZC and β = CR, ECR, PCG, FCC.
DMU_γ is the decision-making support means in γ, where γ = CR, ECR.
Dtw_β/Prc_β is the digital twins/data processing means in β, where β = CR, ECR, PCG, FCC.
P i is the reliability function of I, where i = Comα_β, DMU_γ, Dtw_β, Prc_β; α = EC, UC, ZC; β = CR, ECR, PCG, FCC; and γ = CR, ECR.
t is the operating time.
λ is the basic failure rate corresponding to the failure rate of ComFCC.
k i is a coefficient by which the failure rates of Comα_CR and Comψ_ECR must be multiplied to obtain their failure rates for the emergency mode, where α = EC, UC, ZC and ψ = EC, UC, ZC.
k E is the coefficient by which the failure rates of ComEC_CR, ComUC_CR, ComZC_CR, ComUC_ECR, and ComZC_ECR must be multiplied to obtain their failure rates for the emergency mode.
2 k E is the coefficient by which the failure rate of ComZC_ω must be multiplied to obtain its failure rate for the emergency mode, where ω = PCG, FCC.
The used assumptions are as follows:
  • Components of the SM have an exponential time to failure;
  • During the operating time, the SM is considered an unrecoverable system.
Limited computing capabilities and limited battery life are taken into account when choosing a UAV based on the monitoring tasks and operating conditions of the SM. The examples in this Section show how to ensure the reliability of UAVs and their batteries in the case of limited resources.

3.3.2. Description and Simulation of the Reliability Models

Block diagrams and equations for SM reliability assessment (see Table 4) are presented below.
Figure 3. RBD that is utilized to calculate the reliability functions of systems S 1 E C _ N and S 1 E C _ E using Equations (1) and (2), respectively.
Figure 3. RBD that is utilized to calculate the reliability functions of systems S 1 E C _ N and S 1 E C _ E using Equations (1) and (2), respectively.
Sensors 22 06444 g003
P 1 E C _ N = P S e n E C P C o m E C _ C R P P r c _ C R P D t w _ C R P D M U _ C R
where P S e n E C = e λ k S e n E C t , P C o m E C _ C R = e λ k C o m E C _ C R t , P P r c _ C R = e λ k P r c _ C R t , P D t w _ C R = e λ k D t w _ C R t   ,   P D M U _ C R = e λ k D M U _ C R t .
P 1 E C _ E = P S e n E C P C o m E C _ C R E P P r c _ C R P D t w _ C R P D M U _ C R
where P C o m E C _ C R E = e k E λ k C o m E C _ C R t .
Figure 4. RBD that is utilized to calculate the reliability functions of systems S 2 _ 1 U C _ N and S 2 _ 1 U C _ E using Equations (3) and (4), respectively.
Figure 4. RBD that is utilized to calculate the reliability functions of systems S 2 _ 1 U C _ N and S 2 _ 1 U C _ E using Equations (3) and (4), respectively.
Sensors 22 06444 g004
P 2 _ 1 U C _ N = P S e n U C ( 1 ( 1 P C o m U C C R   P P r c C R P D t w C R ) ( 1 P C o m U C _ E C R   P P r c _ E C R P D t w _ E C R ) ) × ( 1 ( 1 P D M U _ C R )   ( 1 P D M U _ E C R ) )
where P S e n U C = e λ k S e n U C t , P C o m U C _ C R = e λ k C o m U C _ C R t , P C o m U C _ E C R = e k E λ k C o m U C _ E C R t , P P r c _ E C R = e k E λ k P r c _ E C R t , P D t w _ E C R = e λ k D t w _ E C R t ,   P D M U _ E C R = e λ k D M U _ E C R t .
P 2 _ 1 U C _ E = P S e n U C E ( 1 ( 1 P C o m U C _ C R E   P P r c _ C R P D t w _ C R ) ( 1 P C o m U C _ E C R E   P P r c _ E C R P D t w _ E C R ) ) × ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P C o m U C _ C R E = e k E λ k C o m U C _ C R t , P C o m U C _ E C R E = e k E λ k C o m U C _ E C R t .
Figure 5. RBD that is utilized to calculate the reliability functions of systems S 2 _ 2 U C _ N and S 2 _ 2 U C _ E using Equations (5) and (6), respectively.
Figure 5. RBD that is utilized to calculate the reliability functions of systems S 2 _ 2 U C _ N and S 2 _ 2 U C _ E using Equations (5) and (6), respectively.
Sensors 22 06444 g005
P 2 _ 2 U C _ N = P S e n U C ( 1 ( 1 P C o m U C _ C R   P P r c _ C R ) ( 1 P C o m U C _ E C R   P P r c _ E C R ) ) ( 1 ( 1 P D M U _ C R P D t w _ C R ) ( 1 P D M U _ E C R P D t w _ E C R ) )
P 2 _ 2 U C _ E = P S e n U C ( 1 ( 1 P C o m U C _ C R E   P P r c _ C R ) ( 1 P C o m U C _ E C R E   P P r c _ E C R ) ) ( 1 ( 1 P D M U _ C R P D t w _ C R ) ( 1 P D M U _ E C R P D t w _ E C R ) )
Figure 6. RBD that is utilized to calculate the reliability functions of systems S 2 _ 1 Z C _ N and S 2 _ 1 Z C _ E using Equations (7) and (8), respectively.
Figure 6. RBD that is utilized to calculate the reliability functions of systems S 2 _ 1 Z C _ N and S 2 _ 1 Z C _ E using Equations (7) and (8), respectively.
Sensors 22 06444 g006
P 2 _ 1 Z C _ N = P S e n Z C ( 1 ( 1 P C o m Z C _ C R   P P r c _ C R P D t w _ C R   ) ( 1 P C o m Z C _ E C R   P P r c _ E C R P D t w _ E C R ) ) × ( 1 ( 1 P D M U _ C R )   ( 1 P D M U _ E C R   )   )
where P S e n Z C = e λ k S e n Z C t , P C o m Z C _ C R = e λ k C o m Z C _ C R t , P C o m Z C _ E C R = e λ k C o m Z C _ E C R t
P 2 _ 1 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R P D t w _ C R   ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R P D t w _ E C R ) ) × ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P C o m Z C _ E C R E = e k E λ k C o m Z C _ E C R t
Figure 7. RBD that is utilized to calculate the reliability functions of systems S 2 _ 2 Z C _ N and S 2 _ 2 Z C _ E using Equations (9) and (10), respectively.
Figure 7. RBD that is utilized to calculate the reliability functions of systems S 2 _ 2 Z C _ N and S 2 _ 2 Z C _ E using Equations (9) and (10), respectively.
Sensors 22 06444 g007
P 2 _ 2 Z C _ N = P S e n Z C ( 1 ( 1 P C o m Z C _ C R   P P r c _ C R ) ( 1 P C o m Z C _ E C R   P P r c _ E C R ) ) ( 1 ( 1 P D M U _ C R P D t w _ C R ) ( 1 P D M U _ E C R P D t w _ E C R )   )
P 2 _ 2 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R ) ) ( 1 ( 1 P D M U _ C R P D t w _ C R ) ( 1 P D M U _ E C R P D t w _ E C R ) )
Figure 8. RBD that is utilized to calculate the reliability function of system S 3 ( P C G ) _ 1 Z C _ E using Equation (11).
Figure 8. RBD that is utilized to calculate the reliability function of system S 3 ( P C G ) _ 1 Z C _ E using Equation (11).
Sensors 22 06444 g008
P 3 ( P C G ) _ 1 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R P D t w _ C R ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R P D t w _ E C R ) × ( 1 P C o m Z C _ P C G E   P P r c _ P C G P D t w _ P C G ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P C o m Z C _ P C G E = e 2 k E λ k C o m Z C _ P C G t , P P r c _ P C G = e λ k P r c _ P C G t , P D t w _ P C G E = e λ k D t w _ P C G t .
Figure 9. RBD that is utilized to calculate the reliability function of system S 3 ( P C G ) _ 2 Z C _ E using Equation (12).
Figure 9. RBD that is utilized to calculate the reliability function of system S 3 ( P C G ) _ 2 Z C _ E using Equation (12).
Sensors 22 06444 g009
P 3 ( P C G ) _ 2 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R ) ( 1 P C o m Z C _ P C G E   P P r c _ P C G ) ) ( 1 ( 1 P D M U _ C R P D t w Z C _ C R ) ( 1 P D M U _ E C R P D t w _ E C R ) )
Figure 10. RBD that is utilized to calculate reliability function of system S 3 ( F C C ) _ 1 Z C _ E using Equation (13).
Figure 10. RBD that is utilized to calculate reliability function of system S 3 ( F C C ) _ 1 Z C _ E using Equation (13).
Sensors 22 06444 g010
P 3 ( F C C ) _ 1 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R P D t w _ C R )   ( 1 P C o m Z C _ E C R E   P P r c _ E C R P D t w _ E C R ) × ( 1 P C o m Z C _ F C C E   P P r c _ F C C P D t w _ F C C ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P C o m Z C _ F C C E = e 2 k E λ k C o m Z C _ F C C t , P P r c _ F C C E = e λ k P r c _ F C C t , P D t w _ F C C E = e λ k D t w _ F C C t
Figure 11. RBD that is utilized to calculate reliability function of system S 3 ( F C C ) _ 2 Z C _ E using Equation (14).
Figure 11. RBD that is utilized to calculate reliability function of system S 3 ( F C C ) _ 2 Z C _ E using Equation (14).
Sensors 22 06444 g011
P 3 ( F C C ) _ 2 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R ) ( 1 P C o m Z C _ F C C E   P P r c _ F C C )   ) ( 1 ( 1 P D M U _ C R P D t w Z C _ C R ) ( 1 P D M U _ E C R P D t w _ E C R )   )
Figure 12. RBD that is utilized to calculate the reliability function of system S 4 _ 1 Z C _ E using Equation (15).
Figure 12. RBD that is utilized to calculate the reliability function of system S 4 _ 1 Z C _ E using Equation (15).
Sensors 22 06444 g012
P 4 _ 1 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R P D t w _ C R ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R P D t w _ E C R ) ( 1 P C o m Z C _ P C G E   P P r c _ P C G P D t w _ P C G ) ( 1 P C o m Z C _ F C C E   P P r c _ F C C P D t w _ F C C ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R )   )
Figure 13. RBD that is utilized to calculate the reliability function of system S 4 _ 2 Z C _ E using Equation (16).
Figure 13. RBD that is utilized to calculate the reliability function of system S 4 _ 2 Z C _ E using Equation (16).
Sensors 22 06444 g013
P 4 _ 2 Z C _ E = P S e n Z C ( 1 ( 1 P C o m Z C _ C R E   P P r c _ C R ) ( 1 P C o m Z C _ E C R E   P P r c _ E C R ) ( 1 P C o m Z C _ P C G E   P P r c _ P C G ) ( 1 P C o m Z C _ F C C E   P P r c _ F C C ) ) ( 1 ( 1 P D M U _ C R P D t w Z C _ C R ) ( 1 P D M U _ E C R P D t w _ E C R ) )
Using Equations (1)–(16), some dependencies were obtained (Figure 14 and Figure 15) where the initial data are as follows: λ = 0.001 1 h , k S e n Z C = 0.0001 , k C o m Z C _ C R = 0.2 , k C o m Z C _ E C R = 0.5 , k C o m Z C _ F C C = 1 , k P r c _ C R = 0.01 , k P r c _ E C R = 0.01 , k P r c _ F C C = 0.1 , k D t w _ C R = 0.001 , k D t w _ E C R = 0.001 , k D t w _ P C G = 0.0003 , k D t w _ F C C = 0.0005 , k D M U _ C R = 0.00001 , and k D M U _ E C R = 0.00001.
Figure 14. Dependency of reliability functions P 2 _ 1 Z C _ E , P 3 ( F C C ) _ 1 Z C _ E , and P 4 _ 1 Z C _ E on the emergency coefficient k E at the operating time t = 6 h.
Figure 14. Dependency of reliability functions P 2 _ 1 Z C _ E , P 3 ( F C C ) _ 1 Z C _ E , and P 4 _ 1 Z C _ E on the emergency coefficient k E at the operating time t = 6 h.
Sensors 22 06444 g014
Figure 15. Dependency of reliability functions P 2 _ 1 Z C _ E , P 3 ( F C C ) _ 1 Z C _ E , and P 4 _ 1 Z C _ E on the operating time t at the emergency coefficient k E = 9.
Figure 15. Dependency of reliability functions P 2 _ 1 Z C _ E , P 3 ( F C C ) _ 1 Z C _ E , and P 4 _ 1 Z C _ E on the operating time t at the emergency coefficient k E = 9.
Sensors 22 06444 g015
The analysis of the dependencies obtained allowed us to draw the following conclusions.
  • At t = 6   h , the increase in the emergency coefficient   k E from 1 to 12 leads to a decrease in the values of the reliability functions P 2 _ 1 Z C _ E , P 3 ( F C C ) _ 1 Z C _ E , and P 4 _ 1 Z C _ E 1.04 (from 0.99961 to 0.95921), 1.03 (from 0.99996 to 0.97409), and 1.02 (from 0.99999 to 0.98019) times, respectively (Figure 14);
  • At k E = 9 , the increase in the operating time   t from 0 to 15 leads to a decrease in the values of the reliability functions P 2 _ 1 Z C _ E , P 3 ( F C C ) _ 1 Z C _ E , and P 4 _ 1 Z C _ E 1.13 (from 1 to 0.88303), 1.12 (from 1 to 0.89077), and 1.1 (from 1 to 0.90725) times, respectively (Figure 15);
  • Among the systems S 2 _ 1 Z C _ E , S 3 ( F C C ) _ 1 Z C _ E , and S 4 _ 1 Z C _ E , the most reliable system is S 4 _ 1 Z C _ E and the most unreliable one is S 2 _ 1 Z C _ E . For example, at k E = 9 and t = 12   h , the value of the reliability function P 4 _ 1 Z C _ E is 1.02 times larger than the value of the reliability function P 3 ( F C C ) _ 1 Z C _ E (0.94358 against 0.92764) and 1.03 times larger than the value of the reliability function P 2 _ 1 Z C _ E (0.94358 against 0.92764) (Figure 15).

3.4. Models of SM as a Multi-State System

3.4.1. Description of SM as a Multi-State System

In the emergency mode, an SM utilizing some VAMFs and the Sen_ZC as a source of information can be in more than one operable state; in other words, it can be considered an MSS [70]. Graphical depictions of operable states of an SM utilizing VAMF2 (system S V A M F 2 Z C _ E ), VAMF3 ( S V A M F 3 Z C _ E ), and VAMF4 ( S V A M F 4 Z C _ E ) are shown further in Figures 23, 24, and 25, respectively.
In Figure 16, Figure 17 and Figure 18, FSM is a set of monitoring functions performed by the SM.
The system S V A M F 2 Z C _ E (Figure 16) has two operable states (the fully operable state (L1) and the partially operable state (L2)), while both S V A M F 3 Z C _ E (Figure 17) and S V A M F 4 Z C _ E (Figure 18) have free operable states (L1, L2, and the partially operable state, L3). Each state can be characterized by an RBD comprising binary-state channels. The operable and non-operable states of the channels are shown in white and gray, respectively.
Figure 16. Graphical depiction of operable states for the system S V A M F 2 Z C _ E : (a) sets of monitoring functions and RBDs which correspond to state L1, (b) sets of monitoring functions and RBDs which correspond to state L2, and (c) SM degradation diagram.
Figure 16. Graphical depiction of operable states for the system S V A M F 2 Z C _ E : (a) sets of monitoring functions and RBDs which correspond to state L1, (b) sets of monitoring functions and RBDs which correspond to state L2, and (c) SM degradation diagram.
Sensors 22 06444 g016
Figure 17. Graphical depiction of operable states for the system S V A M F 3 Z C _ E : (a) sets of monitoring functions and RBDs which correspond to state L1, (b) set of monitoring functions and RBDs which correspond to state L2, (c) set of monitoring functions and RBDs which correspond to state L3, and (d) SM degradation diagram.
Figure 17. Graphical depiction of operable states for the system S V A M F 3 Z C _ E : (a) sets of monitoring functions and RBDs which correspond to state L1, (b) set of monitoring functions and RBDs which correspond to state L2, (c) set of monitoring functions and RBDs which correspond to state L3, and (d) SM degradation diagram.
Sensors 22 06444 g017
Figure 18. Graphical depiction of operable states for the system S V A M F 4 Z C _ E : (a) sets of monitoring functions and RBDs which correspond to state L1, (b) set of monitoring functions and RBDs which correspond to state L2, (c) set of monitoring functions and RBDs which correspond to state L3, and (d) SM degradation diagram.
Figure 18. Graphical depiction of operable states for the system S V A M F 4 Z C _ E : (a) sets of monitoring functions and RBDs which correspond to state L1, (b) set of monitoring functions and RBDs which correspond to state L2, (c) set of monitoring functions and RBDs which correspond to state L3, and (d) SM degradation diagram.
Sensors 22 06444 g018

3.4.2. Reliability Models

Based on Figure 16, the probabilities of the system S V A M F 2 Z C _ E being at the given states can be calculated using Equations (17)–(19).
P V A M F 2 _ L 1 Z C _ E = P S e n Z C ( 1 ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 2 _ L 1 Z C _ E is the probability of the system S V A M F 2 Z C _ E being at state L1, P Z C _ C R E = P C o m Z C _ C R E   P P r c _ C R P D t w _ C R , P Z C _ E C R E = P C o m Z C _ E C R E   P P r c _ E C R P D t w _ E C R .
P V A M F 2 _ L 2 Z C _ E = P S e n Z C ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) ( 1 ( 1 P Z C _ P C G E ) ( 1 P Z C _ F C C E ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 2 _ L 2 Z C _ E is the probability of the system S V A M F 2 Z C _ E being at state L2, P Z C _ P C G E = P C o m Z C _ P C G E   P P r c _ P C G P D t w _ P C G , P Z C _ F C C E = P C o m Z C _ F C C E   P P r c _ F C C P D t w _ F C C .
P V A M F 2 L 2 Z C _ E = P V A M F 2 _ L 1 Z C _ E + P V A M F 2 _ L 2 Z C _ E
where P V A M F 2 _ L 2 Z C _ E is the probability of the system S V A M F 2 Z C _ E being at state L2 or above.
Based on Figure 17, the probabilities of the system S V A M F 3 Z C _ E being at the given states can be calculated using Equations (20)–(24).
P V A M F 3 _ L 1 Z C _ E = P S e n Z C ( 1 ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 3 _ L 1 Z C _ E is the probability of the system S V A M F 3 Z C _ E being at state L1.
P V A M F 3 _ L 2 Z C _ E = P S e n Z C ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) P Z C _ P C G E ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 3 _ L 2 Z C _ E is the probability of the system S V A M F 3 Z C _ E being at state L2.
P V A M F 3 _ L 3 Z C _ E = P S e n Z C ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) ( 1 P Z C _ P C G E ) P Z C _ F C C E ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 3 _ L 3 Z C _ E is the probability of the system S V A M F 3 Z C _ E being at state L3.
P V A M F 3 _ L 2 Z C _ E = P V A M F 3 _ L 1 Z C _ E + P V A M F 3 _ L 2 Z C _ E
where P V A M F 3 _ L 2 Z C _ E is the probability of the system S V A M F 3 Z C _ E being at state L2 or above.
P V A M F 3 _ L 3 Z C _ E = P V A M F 3 _ L 1 Z C _ E + P V A M F 3 _ L 2 Z C _ E + P V A M F 3 _ L 3 Z C _ E
where P V A M F 3 _ L 3 Z C _ E is the probability of the system S V A M F 3 Z C _ E being at state L3 or above.
Based on Figure 18, the probabilities of the system S V A M F 4 Z C _ E being at the given states can be calculated by Equations (25)–(29).
P V A M F 4 _ L 1 Z C _ E = P S e n Z C ( 1 ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) ) ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 4 _ L 1 Z C _ E is the probability of the system S V A M F 4 Z C _ E being at state L1.
P V A M F 4 _ L 2 Z C _ E = P S e n Z C ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) P Z C _ F C C E ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 4 _ L 2 Z C _ E is the probability of the system S V A M F 4 Z C _ E being at state L2.
P V A M F 4 _ L 3 Z C _ E = P S e n Z C E ( 1 P Z C _ C R E ) ( 1 P Z C _ E C R E ) ( 1 P Z C _ F C C E ) P Z C _ P C G E ( 1 ( 1 P D M U _ C R ) ( 1 P D M U _ E C R ) )
where P V A M F 4 _ L 3 Z C _ E is the probability of the system S V A M F 4 Z C _ E being at state L3.
P V A M F 4 _ L 2 Z C _ E = P V A M F 4 _ L 1 Z C _ E + P V A M F 4 _ L 2 Z C _ E
where P V A M F 4 _ L 2 Z C _ E is the probability of the system S V A M F 4 Z C _ E being at state L2 or above.
P V A M F 4 _ L 3 Z C _ E = P V A M F 4 _ L 1 Z C _ E + P V A M F 4 _ L 2 Z C _ E + P V A M F 4 _ L 3 Z C _ E

3.4.3. Simulation and Analysis

For the simulation, the system S V A F 3 Z C _ E (Figure 17) was chosen. Using Equations (17)–(29), some dependencies were obtained (Figure 19, Figure 20 and Figure 21) where the initial data were the same, as they were used for obtaining the dependencies presented in Section 3.1.
The analysis of the dependencies obtained allowed us to draw the following conclusions.
For k E = 12 . (see Figure 19):
  • The increase in the operating t time from 0 to 15 leads to a decrease in the probabilities of P V A M F 3 _ L 3 Z C _ E , P V A M F 3 _ L 2 Z C _ E , and P V A M F 3 _ L 1 Z C _ E by 1.19 (from 1 to 0.83865), 1.20 (from 1 to 0.83419), and 1.21 (from 1 to 0.81969), respectively;
  • At t = 15   h , the probability of P V A M F 3 _ L 3 Z C _ E is 1.01 times larger than the probability of P V A M F 3 _ L 2 Z C _ E , (0.83865 against 0.93633) and 1.02 times larger than the probability of P V A M F 3 _ L 1 Z C _ E (0.83865 against 0.81969);
  • At t = 11   h , the function of P V A M F 3 _ _ L 2 Z C _ E ( t ) has a maximum equal to 0.185 and, at t = 9   h , the function P V A M F 3 _ _ L 3 Z C _ E ( t ) has a maximum equal to 0.008.
For k E = 3   (see Figure 20 and Figure 21):
  • The increase in the operating time t from 0 to 15 leads to an increase in the probabilities of P V A M F 3 _ l 2 Z C _ E and P V A M F 3 _ L 3 Z C _ E from 0 to 0.00945 and from 0 to 0.00333, respectively;
  • At t = 15   h , the probability of P V A M F 3 _ L 2 Z C _ E is 2.84 times larger than the probability of P V A M F 3 _ L 3 Z C _ E (0.00466 against 0.00124);
  • At t = 9   h , the probability of P V A M F 3 _ L 2 Z C _ E is 3.77 times larger than the probability of P V A M F 3 _ L 3 Z C _ E (0.00945 against 0.00333).

4. Case Study

4.1. Drone Fleet and IoD-Based Industrial Facility Monitoring System

4.1.1. Structure of IoD SM

Let us consider the structure of a drone fleet and an IoD-based industrial facility monitoring system utilized in emergency mode (Figure 22). This structure is a special case of the type-T2 SM structure. The difference is that the IoD SM utilizes one UC only. The most vulnerable part of the IoD SM is the ComZC_FCC (a component of the FCC channel) [71,73,74,76,77] comprising drones for transmitting monitoring information from the ZC to the FCC. Thus, methods aimed at increasing the reliability of the ComZC_FCC require consideration.

4.1.2. Reliability Model of FCC Channel

To improve the reliability of the ComZC_FCC, a structure of type ‘k-out-of-n’ [73], was proposed (see the RBD in Figure 23).
A ComZC_FCC with such a structure consists of n = 6 identical drones (DrnZC_FCC1, DrnZC_FCC2, …, DrnZC_FCC6) including four (k = 4) main drones (DrnZC_FCC1, DrnZC_FCC2, …, DrnZC_FCC4) and four (nk = 6 − 4 = 2) standby (redundant) drones (DrnZC_FCC5 and DrnZC_FCC6). The ComZC_FCC remains in an operable state until three (nk + 1 = 6 − 4 + 1 = 3) drones have failed. The ComZC_FCC can be considered as a series system with two (nk = 6 − 4 = 2) redundant drones, each of which can replace any one of the failed operating drones.
Assume that drones have an exponential time to failure. In this case, the reliability function for the ComZC_FCC can be written, considering [78], as
P C o m Z C _ F C C E = i = 0 n k ( k 2 k E λ d r t ) i i ! e k 2 k E λ d r t
where λ d r is the failure rate of the drone.
Thus, the reliability function of the FCC channel can be calculated as:
P F C C E = P C o m Z C _ F C C E P P r c Z C _ F C C = i = 0 n k ( k 2 k E λ d r t ) i i ! e k 2 k E λ d r t   e λ k P r c Z C _ F C C t .
Using Equation (31), some dependencies were obtained (Figure 24 and Figure 25)
The analysis of the dependencies obtained allowed us to draw the following conclusions.
For λ d r = 0.001 1 h (Figure 24):
  • At t = 9   h , t = 12   h , and t = 15 , the increase in the emergency coefficient k E from 1 to 9 leads to a decrease in the value of the reliability function P F C C E from 0.99904 to 0.97100, from 0.99904 to 0.94181, and from 0.99824 to 0.90306, respectively;
  • At k E = 9 , the value of the reliability function P F C C E at t = 9   h is 1.03 times larger than P F C C E at t = 12   h (0.97100 against 0.94181) and 1.08 times larger than P F C C E at t = 15   h (0.97100 against 0.90306).
For t = 12   h (Figure 25):
  • At t = 9   h , t = 12   h , and t = 15 , the increase in the emergency coefficient k E from 1 to 9 leads to a decrease in the value of the reliability function P F C C E from 0.99904 to 0.97100, from 0.99904 to 0.94181, and from 0.99824 to 0.90306, respectively;
  • At k E = 9 , the value of the reliability function P F C C E at t = 9   h is 1.03 times larger than P F C C E at t = 12   h (0.97100 against 0.94181) and 1.08 times larger than P F C C E at t = 15   h (0.97100 against 0.90306).

4.2. The Equipment Monitoring System

4.2.1. Principles and Structure

The equipment monitoring system of one industrial enterprise in Ukraine demonstrates the effect of the use of Industry 4.0 in KOEEBOX devices [72,79]. The KOEEBOX device is located in the middle of the power line and performs analyses of the electricity consumption dynamics. After receiving the data from the electricity grid, the device transmits them to the appropriate edge node for processing and subsequent aggregation and viewing of the PCG or CR. Viewing is possible through a special application for the KOEEBOX device. Table 5 shows the possibility of using the KOEEBOX device as a means of monitoring the different components and levels of the SM as a whole.
The digital twin technology with the IoT establishes a connection between the equipment and the CR. Additionally, it can be connected with cloud applications (PCG level). The energy performance monitoring device is available in the proposed equipment monitoring system. This device must be located in the middle of the power line so that it passes power to the end device. Hence, it performs power difference analysis and obtains status and usage statistics. The device transmits the data, after receiving them from the facilities, to the corresponding web server for further viewing and aggregation. Viewing is possible through a special system application. Figure 26a shows a block diagram explaining the monitoring of the energy consumption using sensors (ECS) for equipment verification (EC1—ECn).
In the proposed equipment energy-efficiency monitoring system, all operations are performed in real time both on the client side and on the device. The cloud part of the equipment energy-efficiency monitoring system should consist of three web services: the storage service; authentication service; and maintenance of client applications. Each service must run in its own isolated space and they must communicate with each other over the Internet. For the development of all services, it is suggested that one should use the JavaScript/TypeScript programming language, as well as WebSocket and HyperText Transfer Protocol (HTTP). The PostgreSQL database management system was chosen as the storage environment. All services must be designed according to the ECMAScript6 standard and SOLID design principles. Additionally, it is necessary to have an authorization mechanism for JavaScript Object Notation Web Token (JWT) [80].

4.2.2. Processes and Algorithms of Monitoring

The storage service receives data from clients using the WebSocket protocol in real time, and also processes requests for statistical data on changes in energy efficiency over a certain period. Figure 26b shows the scheme of integration of the storage service into the overall system of monitoring the energy efficiency of the equipment. In this scheme, the storage service will act as a “digital twin” of the connected device and also reproduce the operation of the device in digital format. This component will have three interfaces for integration:
  • A WebSocket gateway for devices;
  • A WebSocket gateway for clients;
  • An Application Programming Interface (API) gateway for HTTP Representational State Transfer (REST) for clients.
The WebSocket gateway for devices will be used to constantly “talk” to the device and maintain it, and in the future, to control the device through this gateway. The WebSocket gateway for clients is required to instantly transmit data received from a device to the end client, as well as for future device management. The API gateway for HTTP REST for clients will act as an accessible and easy-to-use statistics-generation interface, primarily required for the client application service, and there is a prospect of its integration with other services through this channel.
There are three main algorithms for a system for equipment monitoring. The first algorithm corresponds to the behavior of the service when the client interacts with the provided API gateway HTTP REST. This algorithm is classic for client–server architecture with built-in authorization checks [81], so all private resources will contain middleware that, in case of a mismatch, will return the corresponding error when performing the authorization check action of incoming requests. The second algorithm corresponds to the behavior of the service when the client interacts with the provided WebSocket gateway. The first three steps of the algorithm describe starting the program and reading the configuration files. The service stores the ID of the connected and authorized socket and waits for new data from the client-monitoring object named “device” after it verifies that the connected socket was authorized successfully. This socket ID save action is necessary to group sockets from a single client for the further filtering of client lookups and data transfers.
The next algorithm handled by the storage service is the algorithm that matches the behavior of the service when the device communicates with the provided WebSocket gateway. The first steps remained the same as in the previous two algorithms since these interfaces work in the same service. The next step, “Checking object data”, corresponds to checking the state of the corresponding device, which will be received from the authentication service via the API gateway HTTP REST. If the check is successful, the service stores the connected socket ID and waits for new data. The service performs a data validation process when the device sends data and, if successful, stores the data in the PostgreSQL repository; then, it forwards the data to the appropriate client sockets. Data from the device will be ignored if the verification fails [82,83].

4.2.3. Experiment Results

Two types of system behavior were tested as an experimental task:
  • The display of energy characteristics in real time;
  • The display of energy characteristics in the past.
For the first experiment, a device emulator was used, which sent energy data to the system once every second. The result of this experiment has been described in [72].
For the second experiment, a device emulator was used for an hour, which also sent data every second. Figure 27 shows the result of this experiment. In this figure, the chart has more points due to the larger range of data displayed. Each point corresponds to the two-minute mean value of each parameter.
This system is described by the RBD in Figure 4.

5. Discussion

The distinctive feature of the proposed methodology is that of ensuring the dependability of systems on its developed base, which is achieved by combining the redundancy and diversity of various components and subsystems; these include sensors, means of communication and data processing, digital duplication formation, and decision support centers. The use of diversity reduces the risk of common cause failures, which can be caused by the influence of the external environment and the accumulation of failures, as well as cyberattacks.
The proposed SM structures, in comparison with existing works [53,54,63,71,73,76,84], provide higher reliability, as assessed using the reliability function (see Section 3.3). Additionally, these structures increase the survivability of the SM as an MSS (see Section 3.4). The mentioned benefits are achieved due to utilization of some kinds of redundancy and reconfigurability.
In addition, different structures of monitoring systems are proposed, depending on options for forming the models of digital duplicates using decision-making centers (CP, ECR, PCG, and FCC). It helps to select such structures, taking into account requirements for reliability and dependability, as well as characteristics of industrial facilities.
The set of proposed SM reliability models (Section 3) provides possibilities for the high-level quantitative calculation of indicators, the comparison of structure options, and a choice regarding their use. Moreover, a simulation was performed for selected values of the component reliability parameters. This makes it possible to determine the appropriate areas of the application, taking into account requirements and constraints, as well as the growth of failure rates due to the action of accident factors. One of the features of the proposed models is that they take into account the deterioration of monitoring system channels (at the ZC level) due to failures, and are presented as multi-state systems. The reliability of IoT devices that provide data for the DTs is taken into account in the SM reliability models. Their failure rate and battery life generally depend on the operation modes (including the modes of their possible periodic transfer to sleep mode). These modes are described by the corresponding coefficients when calculating the failure rates. Therefore, the selection of IoT devices is carried out while taking into account the requirements for SM reliability according to the proposed analytical dependencies.
The two examples for the application of monitoring systems complement each other according to the hierarchy levels of their representation in industrial facilities. For the enterprise equipment monitoring level (the first level of the industrial facility hierarchy), the first example of an equipment monitoring system based on the analysis of energy consumption dynamics is given. It can complement the traditional control and management methods in a fairly simple way, as well as form an additional component of the digital twin. This paper represents a significant extension of [72] with deeper details regarding the hierarchical building of monitoring systems.
The second example relates to more complex monitoring systems, which are part of Post-Accident Monitoring System and Automated Radiation Monitoring System. They are implemented using the UAV/FCC mobile subsystem and the PCG private cloud environment. The FCC subsystem redundancy option illustrates how its reliability can be increased and the composition of the UAV fleet can be selected.

6. Conclusions

The solving of research tasks enables us to make decisions about the construction and modernization of monitoring systems for complex industrial facilities, which increase their dependability and safety.
The results obtained are the basis for further developing the theory and practical applications of monitoring systems for industrial facilities within the framework of the implementation and improvement of Industry 4.0 principles.
In our opinion, the following areas of research and development are important and promising:
  • The development of ontological models describing the intelligent UAV- and IoT-based monitoring systems in various situations and environmental conditions;
  • The development of different separate and joint digital twin models for centers of decision making and for the implementation for optimal procedures of critical object recovery;
  • The development and research of SM dependability models considering the extended taxonomy of hardware and software faults, recovery procedures and the location of the SM, as well as automated battery maintenance systems [84];
  • The consideration of the cybersecurity aspects of the Internet of Drones for subsystem FCC and subsystem PCG for the assessment and assurance of SM reliability [85].

Author Contributions

Conceptualization, Y.S., V.K., H.F., and A.S.; methodology, V.K. and I.K.; software, I.K.; validation, L.Z. and O.I.; formal analysis, O.I.; investigation, O.I. and I.K.; resources, O.M.; data curation, H.F. and I.K.; writing—original draft preparation, H.F., I.K., and O.M.; writing—review and editing, O.I. and A.S.; visualization, I.K.; supervision, V.K.; project administration, A.S.; funding acquisition, all authors. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the National Natural Science Foundation of China under Grant No. 61772180, the Key R&D plan of Hubei Province (2020BAB012).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Acknowledgments

The authors appreciate the scientific staff of the Department of Computer Systems, Networks and Cybersecurity of the National Aerospace University “KhAI”, and the Research Institute for Intelligent Computer Systems, West Ukrainian National University for providing invaluable inspiration, hard work, and creative analysis during the preparation of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

Acronyms
APIApplication Programming Interface
CMcenters of control and monitoring
CRcontrol room
DTdigital twin
DTaaSdigital twin as a service
DTIdigital twin instance
ECequipment that is monitored and controlled
ECSenergy consumption with sensors
ECRemergency control room
HTTPHyperText Transfer Protocol
FCCflying control center
FENflying edge node
IoDInternet of Drones
IoTInternet of Things
JWTJavaScript Object Notation Web Token
MSSmulti-state system
OMobjects that are monitored or/and controlled
PCGprivate cloud crisis group
RBDreliability block diagram
SMmonitoring system
UAVunmanned aerial vehicle
UCutility that is monitored and controlled
ZCzones that are monitored
VAMFvariants of allocation of monitoring functions
Notation
Comα_βcommunications between α and β, where α = EC, UC, ZC and β = CR, ECR, PCG, FCC.
DMU_γdecision-making support means in γ, where γ = CR, ECR.
Dtw_β/Prc_βdigital twins/data processing means in β, where β = CR, ECR, PCG, FCC.
k i coefficient by which the basic failure rate must be multiplied to obtain the failure rates of I, where I = Comα_β, DMU_γ, Dtw_β, Prc_β; α = EC, UC, ZC; β = CR, ECR, PCG, FCC; and γ = CR, ECR
k E coefficient by which the failure rates of Comα_CR and Comψ_ECR must be multiplied to obtain their failure rates for the emergency mode, where α = EC, UC, ZC and ψ = EC, UC, ZC
P i reliability function of i, where i = Comα_β, DMU_γ, Dtw_β, Prc_β; α = EC, UC, ZC; β = CR, ECR, PCG, FCC; and γ = CR, ECR
Sen_αsensors in α, where α = EC, UC, ZC
t operating time
λ basic failure rate corresponding to the failure rate of ComFCC_ZC
2 k E coefficient by which the failure rate of ComZC_ω must be multiplied to obtain its failure rate for the emergency mode where ω = PCG, FCC

References

  1. De Felice, F.; Baffo, I.; Petrillo, A. Critical Infrastructures Overview: Past, Present and Future. Sustainability 2022, 14, 2233. [Google Scholar] [CrossRef]
  2. Sonesson, T.R.; Johansson, J.; Cedergren, A. Governance and interdependencies of critical infrastructures: Exploring mechanisms for cross-sector resilience. Saf. Sci. 2021, 142, 105383. [Google Scholar] [CrossRef]
  3. Bigliardi, B.; Bottani, E.; Casella, G. Enabling technologies, application areas and impact of industry 4.0: A bibliographic analysis. Proc. Manuf. 2020, 42, 322–326. [Google Scholar] [CrossRef]
  4. Ng, T.C.; Lau, S.Y.; Ghobakhloo, M.; Fathi, M.; Liang, M.S. The Application of Industry 4.0 Technological Constituents for Sustainable Manufacturing: A Content-Centric Review. Sustainability 2022, 14, 4327. [Google Scholar] [CrossRef]
  5. Al-Kaff, A.; Madridano, Á.; Campos, S.; García, F.; Martín, D.; de la Escalera, A. Emergency Support Unmanned Aerial Vehicle for Forest Fire Surveillance. Electronics 2020, 9, 260. [Google Scholar] [CrossRef]
  6. Chernetskyi, B.; Kharchenko, V.; Orehov, A. Wireless Sensor Network based Forest Fire Early Detection Systems: Development and Implementation. Int. J. Comput. 2022, 21, 92–99. [Google Scholar] [CrossRef]
  7. Berger, C.; Eichhammer, P.; Reiser, H.P.; Domaschka, J.; Hauck, F.J.; Habiger, G. A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms. ACM Comput. Surv. 2022, 54, 147. [Google Scholar] [CrossRef]
  8. Harum, N.; Abidin, Z.; Shah, W.; Hassan, A. Implementation of smart monitoring system with fall dectector for elderly using IoT technology. Int. J. Comput. 2018, 17, 243–249. [Google Scholar] [CrossRef]
  9. Morozova, O.I.; Nicheporuk, A.O.; Tetskyi, A.G.; Tkachov, V.M. Methods and technologies of ensuring cybersecurity of industrial and web-oriented systems and networks. Radioelectron. Comput. Syst. 2021, 4, 145–156. [Google Scholar] [CrossRef]
  10. Agnusdei, G.P.; Elia, V.; Gnoni, M.G. Is Digital Twin Technology Supporting Safety Management? A Bibliometric and Systematic Review. Appl. Sci. 2021, 11, 2767. [Google Scholar] [CrossRef]
  11. Zheng, T.; Ardolino, M.; Bacchetti, A.; Perona, M. The applications of Industry 4.0 technologies in manufacturing context: A systematic literature review. Int. J. Prod. Res. 2021, 59, 1922–1954. [Google Scholar] [CrossRef]
  12. Jamwal, A.; Agrawal, R.; Sharma, M.; Giallanza, A. Industry 4.0 technologies for manufacturing sustainability: A systematic review and future research directions. Appl. Sci. 2021, 11, 5725. [Google Scholar] [CrossRef]
  13. di Capaci, R.B.; Scali, C. A cloud-based monitoring system for performance assessment of industrial plants. Ind. Eng. Chem. Res. 2021, 59, 2341–2352. [Google Scholar] [CrossRef]
  14. Stentoft, J.; Wickstrom, K.A.; Philipsen, K.; Haug, A. Drivers and barriers for Industry 4.0 readiness and practice: Empirical evidence from small and medium-sized manufacturers. Prod. Plan. Control 2021, 32, 811–828. [Google Scholar] [CrossRef]
  15. Meindl, B.; Ayala, N.F.; Mendonca, J.; Frank, A.G. The four smarts of Industry 4.0: Evolution of ten years of research and future perspectives. Technol. Forecast. Soc. Chang. 2021, 168, 120784. [Google Scholar] [CrossRef]
  16. Nara, E.O.B.; da Costa, M.B.; Baierle, I.C.; Schaefer, J.L.; Benitez, G.B.; do Santos, L.M.A.L.; Benitez, L.B. Expected impact of industry 4.0 technologies on sustainable development: A study in the context of Brazil’s plastic industry. Sust. Prod. Consum. 2021, 25, 102–122. [Google Scholar] [CrossRef]
  17. Tortorella, G.L.; Fogliatto, F.S.; Cauchick-Miguel, P.A.; Kurnia, S.; Jurburg, D. Integration of industry 4.0 technologies into total productive maintenance practices. Int. J. Prod. Econ. 2021, 240, 108224. [Google Scholar] [CrossRef]
  18. Industry 4.0 and the Digital Twin. Deloitte University Press Deloitte Development LLC. Available online: https://www2.deloitte.com/content/dam/Deloitte/kr/Documents/insights/deloitte-newsletter/2017/26_201706/kr_insights_deloitte-newsletter-26_report_02_en.pdf (accessed on 20 June 2022).
  19. Singh, M.; Fuenmayor, E.; Hinchy, E.P.; Qiao, Y.; Murray, N.; Devine, D. Digital Twin: Origin to Future. Appl. Syst. Innov. 2021, 4, 36. [Google Scholar] [CrossRef]
  20. da Silva Mendonca, R.; de Oliveira Lins, S.; de Bessa, I.V.; de Carvalho Ayres, F.A., Jr.; de Medeiros, R.L.P.; de Lucena, V.F., Jr. Digital Twin Applications: A Survey of Recent Advances and Challenges. Processes 2022, 10, 744. [Google Scholar] [CrossRef]
  21. van Rooij, F.; Scarf, P.; Do, P. Planning the restoration of membranes in RO desalination using a digital twin. Desalination 2021, 519, 115214. [Google Scholar] [CrossRef]
  22. Yitmen, I.; Alizadehsalehi, S.; Akıner, I.; Akıner, M.E. An Adapted Model of Cognitive Digital Twins for Building Lifecycle Management. Appl. Sci. 2021, 11, 4276. [Google Scholar] [CrossRef]
  23. Aheleroff, S.; Xu, X.; Zhong, R.Y.; Lu, Y. Digital Twin as a Service (DTaaS) in Industry 4.0: An Architecture Reference Model. Adv. Eng. Inform. 2021, 47, 101225. [Google Scholar] [CrossRef]
  24. Zhang, H.; Ma, L.; Sun, J.; Lin, H.; Thurer, M. Digital Twin in Services and Industrial Product Service Systems: Review and Analysis. Proc. CIRP 2019, 83, 57–60. [Google Scholar] [CrossRef]
  25. Padovano, A.; Longo, F.; Nicoletti, L.; Mirabelli, G. A Digital Twin based Service Oriented Application for a 4.0 Knowledge Navigation in the Smart Factory. IFAC-Pap. 2018, 51, 631–636. [Google Scholar] [CrossRef]
  26. Meierhofer, J.; West, S.; Rapaccini, M.; Barbieri, C. The Digital Twin as a Service Enabler: From the Service Ecosystem to the Simulation Model. In Exploring Service Science. IESS 2020. Lecture Notes in Business Information Processing; Nóvoa, H., Drăgoicea, M., Kühl, N., Eds.; Springer: Cham, Switzerland, 2020; Volume 377, pp. 347–359. [Google Scholar] [CrossRef]
  27. Sharma, A.; Kosasih, E.; Zhang, J.; Brintrup, A.; Calinescu, A. Digital Twins: State of the Art Theory and Practice, Challenges, and Open Research Questions. arXiv 2020, arXiv:2011.02833. [Google Scholar] [CrossRef]
  28. He, F.; Ong, S.K.; Nee, A.Y.C. An Integrated Mobile Augmented Reality Digital Twin Monitoring System. Computers 2021, 10, 99. [Google Scholar] [CrossRef]
  29. Fuller, A.; Fan, Z.; Day, C.; Barlow, C. Digital Twin: Enabling Technologies, Challenges and Open Research. IEEE Access 2020, 8, 108952–108971. [Google Scholar] [CrossRef]
  30. Sakhnini, J.; Karimipour, H.; Dehghantanha, A.; Parizi, M.R. AI and Security of Critical Infrastructure. In Handbook of Big Data Privacy; Choo, K.K., Dehghantanha, A., Eds.; Springer: Cham, Switzerland, 2020; pp. 7–36. [Google Scholar] [CrossRef]
  31. Kraidi, L.; Shah, R.; Matipa, W.; Borthwick, F. An investigation of mitigating the safety and security risks allied with oil and gas pipeline projects. J. Pipeline Sci. Eng. 2021, 1, 349–359. [Google Scholar] [CrossRef]
  32. Wang, X.; Wei, H.; Chen, N.; He, X.; Tian, Z. An Observational Process Ontology-Based Modeling Approach for Water Quality Monitoring. Water 2020, 12, 715. [Google Scholar] [CrossRef]
  33. Bragatto, P.A.; Ansaldi, S.M.; Agnello, P.; Di Condina, T.; Zanzotto, F.M.; Milazzo, M.F. Ageing management and monitoring of critical equipment at Seveso sites: An ontological approach. J. Loss Prev. Proc. Ind. 2020, 66, 104204. [Google Scholar] [CrossRef]
  34. Lee, S.; Sharafat, A.; Kim, I.S.; Seo, J. Development and Assessment of an Intelligent Compaction System for Compaction Quality Monitoring, Assurance, and Management. Appl. Sci. 2022, 12, 6855. [Google Scholar] [CrossRef]
  35. Vaccari, M.; Pannocchia, G.; Tognotti, L.; Paci, M.; Bonciani, R. A rigorous simulation model of geothermal power plants for emission control. Appl. Energy 2020, 263, 114814. [Google Scholar] [CrossRef]
  36. Vansovits, V.; Petlenkov, E.; Tepljakov, A.; Vassiljeva, K.; Belikov, J. Bridging the Gap in Technology Transfer for Advanced Process Control with Industrial Applications. Sensors 2022, 22, 4149. [Google Scholar] [CrossRef] [PubMed]
  37. Vaccari, M.; Bacci Di Capaci, R.; Brunazzi, E.; Tognotti, L.; Pierno, P.; Vagheggi, R.; Pannocchia, G. Optimally Managing Chemical Plant Operations: An Example Oriented by Industry 4.0 Paradigms. Ind. Eng. Chem. Res. 2021, 60, 7853–7867. [Google Scholar] [CrossRef]
  38. Vaccari, M.; di Capaci, R.B.; Brunazzi, E.; Tognotti, L.; Pierno, P.; Vagheggi, R.; Pannocchia, G. Implementation of an Industry 4.0 system to optimally manage chemical plant operation. IFAC-Pap. 2020, 53, 11545–11550. [Google Scholar] [CrossRef]
  39. Botín-Sanabria, D.M.; Mihaita, A.-S.; Peimbert-García, R.E.; Ramírez-Moreno, M.A.; Ramírez-Mendoza, R.A.; Lozoya-Santos, J.d.J. Digital Twin Technology Challenges and Applications: A Comprehensive Review. Remote Sens. 2022, 14, 1335. [Google Scholar] [CrossRef]
  40. Salem, T.; Dragomir, M. Options for and Challenges of Employing Digital Twins in Construction Management. Appl. Sci. 2022, 12, 2928. [Google Scholar] [CrossRef]
  41. Choi, S.; Woo, J.; Kim, J.; Lee, J.Y. Digital Twin-Based Integrated Monitoring System: Korean Application Cases. Sensors 2022, 22, 5450. [Google Scholar] [CrossRef]
  42. Soares, R.M.; Camara, M.M.; Feital, T.; Pinto, J.C. Digital Twin for Monitoring of Industrial Multi-Effect Evaporation. Processes 2019, 7, 537. [Google Scholar] [CrossRef]
  43. Kaiblinger, A.; Woschank, M. State of the Art and Future Directions of Digital Twins for Production Logistics: A Systematic Literature Review. Appl. Sci. 2022, 12, 669. [Google Scholar] [CrossRef]
  44. Kampczyk, A.; Dybeł, K. The Fundamental Approach of the Digital Twin Application in Railway Turnouts with Innovative Monitoring of Weather Conditions. Sensors 2021, 21, 5757. [Google Scholar] [CrossRef] [PubMed]
  45. Qian, C.; Liu, X.; Ripley, C.; Qian, M.; Liang, F.; Yu, W. Digital Twin—Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions. Future Internet 2022, 14, 64. [Google Scholar] [CrossRef]
  46. Al-Ali, A.R.; Gupta, R.; Batool, T.Z.; Landolsi, T.; Aloul, F.; Al Nabulsi, A. Digital Twin Conceptual Model within the Context of Internet of Things. Future Internet 2020, 12, 163. [Google Scholar] [CrossRef]
  47. Stojanovic, L.; Uslander, T.; Volz, F.; Weibenbacher, C.; Muller, J.; Jacoby, M.; Bischoff, T. Methodology and Tools for Digital Twin Management—The FA3ST Approach. IoT 2021, 2, 717–740. [Google Scholar] [CrossRef]
  48. Immerman, D. Why IoT is the Backbone for Digital Twin. PTC. Available online: https://www.ptc.com/en/blogs/corporate/iot-digital-twin#:~:text=The%20Internet%20of%20Things%20and,virtually%20represent%20their%20physical%20counterparts (accessed on 22 June 2022).
  49. Lin, H.; Garg, S.; Hu, J.; Wang, X.; Piran, M.J.; Hossain, M.S. Data fusion and transfer learning empowered granular trust evaluation for Internet of Things. Inform. Fusion 2022, 78, 149–157. [Google Scholar] [CrossRef]
  50. Videras Rodríguez, M.; Melgar, S.G.; Cordero, A.S.; Márquez, J.M.A. A Critical Review of Unmanned Aerial Vehicles (UAVs) Use in Architecture and Urbanism: Scientometric and Bibliometric Analysis. Appl. Sci. 2021, 11, 9966. [Google Scholar] [CrossRef]
  51. Abdelmaboud, A. The Internet of Drones: Requirements, Taxonomy, Recent Advances, and Challenges of Research Trends. Sensors 2021, 21, 5718. [Google Scholar] [CrossRef]
  52. Bridgwater, T.J.F. Characterisation of a Nuclear Cave Environment Utilising an Autonomous Swarm of Heterogeneous Robots. University of the West of England and University of Bristol. Available online: https://uwe-repository.worktribe.com/output/1490801 (accessed on 22 June 2022).
  53. Jumaah, H.J.; Kalantar, B.; Halin, A.A.; Mansor, S.; Ueda, N.; Jumaah, S.J. Development of UAV-Based PM2.5 Monitoring System. Drones 2021, 5, 60. [Google Scholar] [CrossRef]
  54. Siwen, L. Development of a UAV-Based System to Monitor Air Quality over an Oil Field. Available online: https://digitalcommons.mtech.edu/grad_rsch/187/ (accessed on 22 June 2022).
  55. Horvath, D.; Gazda, J.; Slapak, E.; Maksymyuk, T.; Dohler, M. Evolutionary Coverage Optimization for a Self-Organizing UAV-Based Wireless Communication System. IEEE Access 2021, 9, 145066–145082. [Google Scholar] [CrossRef]
  56. Elmokadem, T.; Savkin, A.V. A Hybrid Approach for Autonomous Collision-Free UAV Navigation in 3D Partially Unknown Dynamic Environments. Drones 2021, 5, 57. [Google Scholar] [CrossRef]
  57. Stolfi, D.H.; Brust, M.R.; Danoy, G.; Bouvry, P. UAV-UGV-UMV Multi-Swarms for Cooperative Surveillance. Front. Robot. AI 2021, 8, 616950. [Google Scholar] [CrossRef] [PubMed]
  58. Lewis, M. Human Interaction with Multiple Remote Robots. Rev. Human Factors Ergonom. 2013, 9, 131–174. [Google Scholar] [CrossRef]
  59. Hussein, A.; Abbass, H. Mixed Initiative Systems for Human-Swarm Interaction: Opportunities and Challenges. IEEE Xplore 2018, 1–8. [Google Scholar] [CrossRef]
  60. Shubhani, A.; Neeraj, K. Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges. Comput. Commun. 2020, 149, 270–299. [Google Scholar] [CrossRef]
  61. Lee, W.; Lee, J.Y.; Lee, J.; Kim, K.; Yoo, S.; Park, S.; Kim, H. Ground Control System Based Routing for Reliable and Efficient Multi-Drone Control System. Appl. Sci. 2018, 8, 2027. [Google Scholar] [CrossRef]
  62. Shin, M.; Kim, J.; Levorato, M. Auction-based charging scheduling with deep learning framework for multi-drone networks. IEEE Trans. Veh. Technol. 2019, 68, 4235–4248. [Google Scholar] [CrossRef]
  63. Torabbeigi, M.; Lim, G.J.; Kim, S.J. UAV delivery schedule optimization considering the reliability of UAVs. In Proceedings of the International Conference on Unmanned Aircraft Systems (ICUAS), Dallas, TX, USA, 12–15 June 2018; pp. 1048–1053. [Google Scholar]
  64. Hongyan, D.; Chi, Z.; Guanghan, B.; Liwei, C. Mission reliability modeling of UAV swarm and its structure optimization based on importance measure. Rel. Eng. Syst. Saf. 2021, 215, 107879. [Google Scholar] [CrossRef]
  65. Mignardi, S.; Marini, R.; Verdone, R.; Buratti, C. On the Performance of a UAV-Aided Wireless Network Based on NB-IoT. Drones 2021, 5, 94. [Google Scholar] [CrossRef]
  66. Na, Z.; Ji, C.; Lin, B.; Zhang, N. Joint Optimization of Trajectory and Resource Allocation in Secure UAV Relaying Communications for Internet of Things. IEEE IoT J. 2022. [Google Scholar] [CrossRef]
  67. Islam, A.; Al Amin, A.; Shin, S.Y. FBI: A Federated Learning-Based Blockchain-Embedded Data Accumulation Scheme Using Drones for Internet of Things. IEEE Wirel. Commun. Lett. 2022, 11, 972–976. [Google Scholar] [CrossRef]
  68. Li, D.; Ge, S.S.; He, W.; Ma, G.; Xie, L. Multilayer formation control of multi-agent systems. Automatica 2019, 109, 108558. [Google Scholar] [CrossRef]
  69. Herrera, M.; Parlikad, A.K.; Izquierdo, J.; Perez Hernandez, M. Multi-Agent Systems and Complex Networks: Review and Applications in Systems Engineering. Processes 2020, 8, 312. [Google Scholar] [CrossRef]
  70. Shafiq, M.; Ali, Z.A.; Alkhammash, E.H. A Cluster-Based Hierarchical-Approach for the Path Planning of Swarm. Appl. Sci. 2021, 11, 6864. [Google Scholar] [CrossRef]
  71. Fesenko, H.; Kharchenko, V.; Sachenko, A.; Hiromoto, R.; Kochan, V. Chapter 9—An internet of drone-based multi-version post-severe accident monitoring system: Structures and reliability. In Dependable IoT for Human and Industry: Modeling, Architecting, Implementation; Kharchenko, V., Kor, A.L., Rucinski, A., Eds.; River Publishers: Gistrup, Denmark, 2018; pp. 197–217. [Google Scholar]
  72. Abarnikov, Y.; Kharchenko, V.; Morozova, O. Equipment monitoring system with use of Digital Twins and Internet of Things: Algorithms, architecting and experiments. In Proceedings of the 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Krakow, Poland, 22–25 September 2021; Volume 1, pp. 75–80. [Google Scholar]
  73. Kharchenko, V.; Sachenko, A.; Kochan, V.; Fesenko, H. Reliability and survivability models of integrated drone-based systems for post emergency monitoring of NPPs. In Proceedings of the International Conference on Information and Digital Technologies (IDT), Rzeszow, Poland, 5–7 July 2016; pp. 127–132. [Google Scholar] [CrossRef]
  74. Kliushnikov, I.; Fesenko, H.; Kharchenko, V. Scheduling UAV Fleets for The Persistent Operation of UAV-Enabled Wireless Networks During NPP Monitoring. Radioelectron. Comput. Syst. 2020, 1, 29–36. [Google Scholar] [CrossRef]
  75. Lisnianski, A.; Frenkel, I.; Ding, Y. Multi-State System Reliability Analysis and Optimization for Engineers and Industrial Managers; Springer-Verlag: London, UK, 2010; pp. 1–28. [Google Scholar] [CrossRef]
  76. Sachenko, A.; Kochan, V.; Kharchenko, V.; Roth, H.; Yatskiv, V.; Chernyshov, M.; Bykovyy, P.; Roshchupkin, O.; Koval, V.; Fesenko, H. Mobile Post-Emergency Monitoring System for Nuclear Power Plants. In Proceedings of the ICT in Education, Research and Industrial Applications (ICTERI), Kyiv, Ukraine, 21–24 June 2016; pp. 384–398. [Google Scholar]
  77. Yastrebenetsky, M.; Kharchenko, V. Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control; IGI-Global: Hershey, PA, USA, 2020; p. 501. [Google Scholar] [CrossRef]
  78. Ushakov, I. Probabilistic Reliability Models; JohnWiley & Sons: Hoboken, NJ, USA, 2012; pp. 20–22. Available online: https://www.wiley.com/en-us/Probabilistic+Reliability+Models-p-9781118370766 (accessed on 22 June 2022).
  79. A Solution That Turns Ordinary Factories into SMART in 15 Minutes. Available online: https://www.koeebox.com/ (accessed on 22 June 2022).
  80. Siriwardena, P. Message-Level Security with JSON Web Signature. In Advanced API Security; Apress: Berkeley, CA, USA, 2019; pp. 157–184. Available online: https://www.oreilly.com/library/view/advanced-api-security/9781484220504/A323855_2_En_7_Chapter.html (accessed on 22 June 2022).
  81. Fukuda, S.; Kurihara, S.; Hamanaka, S.; Oguchi, M.; Yamaguchi, S. Accelerated test for applications with client application and server software. In Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication (IMCOM), Beppu, Japan, 5–7 January 2017; pp. 1–6. [Google Scholar]
  82. Kesavan, S.; Saravana Kumar, E.; Kumar, A.; Vengatesan, K. An investigation on adaptive HTTP media streaming Quality-of-Experience (QoE) and agility using cloud media services. Int. J. Comput. Appl. 2021, 43, 431–444. [Google Scholar] [CrossRef]
  83. Murley, P.; Ma, Z.; Mason, J.; Bailey, M.; Kharraz, A. WebSocket Adoption and the Landscape of the Real-Time Web. In Proceedings of the Web Conference, Ljubljana, Slovenia, 19–23 April 2021; pp. 1192–1203. [Google Scholar] [CrossRef]
  84. Kliushnikov, I.; Fesenko, H.; Kharchenko, V.; Illiashenko, O.; Morozova, O. UAV fleet based accident monitoring systems with automatic battery replacement systems: Algorithms for justifying composition and use planning. Int. J. Saf. Secur. Eng. 2021, 11, 319–328. [Google Scholar] [CrossRef]
  85. Pevnev, V.; Torianyk, V.; Kharchenko, V. Cyber Security of Wireless Smart Systems: Channels of Intrusions and Radio Frequency Vulnerabilities. Radioelectron. Comput. Syst. 2020, 4, 79–92. [Google Scholar] [CrossRef]
Figure 1. The structures of the industrial facility monitoring system: the T1-type structure which, in addition to the DTs for CR and ECR, requires DTs (depicted as dashed rectangles) for the PCG and FCC, and the T2-type structure which does not require them. The dot-dash arrows are utilized to show the channels for information exchange between the CR and other subsystems.
Figure 1. The structures of the industrial facility monitoring system: the T1-type structure which, in addition to the DTs for CR and ECR, requires DTs (depicted as dashed rectangles) for the PCG and FCC, and the T2-type structure which does not require them. The dot-dash arrows are utilized to show the channels for information exchange between the CR and other subsystems.
Sensors 22 06444 g001
Figure 19. Dependencies of probabilities of P V A M F 3 _ L 3 Z C _ E , P V A M F 3 _ L 2 Z C _ E , and P V A M F 3 _ L 1 Z C _ E on the operating time t at the emergency coefficient k E = 12.
Figure 19. Dependencies of probabilities of P V A M F 3 _ L 3 Z C _ E , P V A M F 3 _ L 2 Z C _ E , and P V A M F 3 _ L 1 Z C _ E on the operating time t at the emergency coefficient k E = 12.
Sensors 22 06444 g019
Figure 20. Dependencies of probabilities of P V A M F 3 _ L 2 Z C _ E and P V A M F 3 _ L 3 Z C _ E on the operating time t at k E = 12.
Figure 20. Dependencies of probabilities of P V A M F 3 _ L 2 Z C _ E and P V A M F 3 _ L 3 Z C _ E on the operating time t at k E = 12.
Sensors 22 06444 g020
Figure 21. Dependencies of probabilities of P V A M F 3 _ L 2 Z C _ E and P V A M F 3 _ L 3 Z C _ E on the operating time t at the emergency coefficient k E = 3.
Figure 21. Dependencies of probabilities of P V A M F 3 _ L 2 Z C _ E and P V A M F 3 _ L 3 Z C _ E on the operating time t at the emergency coefficient k E = 3.
Sensors 22 06444 g021
Figure 22. Structure of the IoD SM.
Figure 22. Structure of the IoD SM.
Sensors 22 06444 g022
Figure 23. RBD of the FCC channel comprising the Prc_FCC and drone-based ComZC_FCC.
Figure 23. RBD of the FCC channel comprising the Prc_FCC and drone-based ComZC_FCC.
Sensors 22 06444 g023
Figure 24. Dependency of the probability of P F C C E on the emergency coefficient k E at a drone failure rate of λ d r = 0.001   h .
Figure 24. Dependency of the probability of P F C C E on the emergency coefficient k E at a drone failure rate of λ d r = 0.001   h .
Sensors 22 06444 g024
Figure 25. Dependence of the probability of P F C C E on the emergency coefficient k E at the operating time t = 12   h .
Figure 25. Dependence of the probability of P F C C E on the emergency coefficient k E at the operating time t = 12   h .
Sensors 22 06444 g025
Figure 26. The flowchart with an explanation of the problem statement (a) and storage service integration scheme (b).
Figure 26. The flowchart with an explanation of the problem statement (a) and storage service integration scheme (b).
Sensors 22 06444 g026
Figure 27. Displaying data for the last hour.
Figure 27. Displaying data for the last hour.
Sensors 22 06444 g027
Table 1. Functions of centers.
Table 1. Functions of centers.
ModeCenters of Control and Monitoring
CRECRFCCPCG
NormalMonitoring EC, UC, ZCMonitoring
UC, ZC
Waiting (self-maintenance)Waiting (self-maintenance)
EmergencyMonitoring EC, UC, ZCMonitoring
UC, ZC
Monitoring ZCMonitoring ZC
Table 2. The capacity of monitoring functions.
Table 2. The capacity of monitoring functions.
ModeLevelCenters of Control and Monitoring
CRECRFCCPCG
NormalECFullNoneNoneNone
UCFullFullNoneNone
ZCFullFullNoneNone
EmergencyECFullNoneNoneNone
UCFullFullNoneNone
ZCFullFullFull/PartialFull/Partial
Table 3. Specification of SM structures and configurations in normal and emergency modes.
Table 3. Specification of SM structures and configurations in normal and emergency modes.
ModeSource of InformationCenters and SubsystemsType of Structure
NormalECCRT1
NormalECCRT2
NormalUCCR, ECRT1
NormalUCCR, ECRT2
NormalZCCR, ECRT1
NormalZCCR, ECRT2
EmergencyECCRT1
EmergencyECCRT2
EmergencyUCCR, ECRT1
EmergencyUCCR, ECRT2
EmergencyZCCR, ECR, PCG*, FCC*T1
EmergencyZCCR, ECR, PCG*, FCC*T2
EmergencyZCCR, ECR, PCG, FCC*T1
EmergencyZCCR, ECR, PCG, FCC*T2
EmergencyZCCR, ECR, FCC, PCG*T1
EmergencyZCCR, ECR, FCC, PCG*T2
EmergencyZCCR, ECR, PCG, FCCT1
EmergencyZCCR, ECR, PCG, FCCT2
Table 5. Use of the KOEEBOX device as a means of monitoring the energy consumption of SM-EC.
Table 5. Use of the KOEEBOX device as a means of monitoring the energy consumption of SM-EC.
NamePossibility of
Using the Device KOEEBOX
How It Can Be UsedWorking Principle
CR/ECR+Control and monitoring of the equipment of the centerCollects and analyzes statistics on power supply of equipment
PCG+Server monitoringMonitors server power status
FCC+Control and monitoring stationMonitors control panels status
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Sun, Y.; Fesenko, H.; Kharchenko, V.; Zhong, L.; Kliushnikov, I.; Illiashenko, O.; Morozova, O.; Sachenko, A. UAV and IoT-Based Systems for the Monitoring of Industrial Facilities Using Digital Twins: Methodology, Reliability Models, and Application. Sensors 2022, 22, 6444. https://doi.org/10.3390/s22176444

AMA Style

Sun Y, Fesenko H, Kharchenko V, Zhong L, Kliushnikov I, Illiashenko O, Morozova O, Sachenko A. UAV and IoT-Based Systems for the Monitoring of Industrial Facilities Using Digital Twins: Methodology, Reliability Models, and Application. Sensors. 2022; 22(17):6444. https://doi.org/10.3390/s22176444

Chicago/Turabian Style

Sun, Yun, Herman Fesenko, Vyacheslav Kharchenko, Luo Zhong, Ihor Kliushnikov, Oleg Illiashenko, Olga Morozova, and Anatoliy Sachenko. 2022. "UAV and IoT-Based Systems for the Monitoring of Industrial Facilities Using Digital Twins: Methodology, Reliability Models, and Application" Sensors 22, no. 17: 6444. https://doi.org/10.3390/s22176444

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop