<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Mobile Post-Emergency Monitoring System for Nuclear Power Plants</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Anatoliy Sachenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Kochan</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vyacheslav Kharchenko</string-name>
          <email>v_s_kharchenko@ukr.net</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hubert Roth</string-name>
          <email>hubert.roth@uni-siegen.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl Yatskiv</string-name>
          <email>as@tneu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykhaylo Chernyshov</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff6">6</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavlo Bykovyy</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksiy Roshchupkin</string-name>
          <email>oleksiy.roshchupkin@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl Koval</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Herman Fesenko</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Information Computer Systems and Control, Ternopil National Economic University</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Automatic Control Engineering, Department of Electrical Engineering and Computer Science, University of Siegen</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Key Terms. Data</institution>
          ,
          <addr-line>Integration, Infrastructure, Object, Technology</addr-line>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>National Aerospace University, «Kharkiv Aviation Institute»</institution>
          ,
          <addr-line>KhAI</addr-line>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>O.M. Beketov National University of Urban Economy in Kharkiv</institution>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>Yuriy Fedkovych Chernivtsi National University</institution>
        </aff>
        <aff id="aff6">
          <label>6</label>
          <institution>WESTRON»</institution>
          ,
          <addr-line>Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In this paper, a concept of designing the post-emergency system for monitoring the equipment and territory of nuclear power plant after a severe accident was developed. Power and communications network lines are found out as the most vulnerable ones during the accident monitoring, and selfdescriptiveness and survivability and veracity are recognized as system basic parameters. To ensure the self-descriptiveness it's proposed to equip measurement and control modules with backup wireless communication channels and deploy the repeaters network based on drones. To provide the survivability modules possess the backup power battery, and repeaters appear in the appropriate places after the accident. Moreover an optimization of drone's location is proposed according to the minimum energy consumption criterion. To ensure the veracity it's expected to design the noise-immune protocol for message exchange and archiving and self-diagnostics of all system components. Formulas for estimating the reliability level of the post-emergency monitoring system were obtained.</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>Infrastructure</kwd>
        <kwd>Network</kwd>
        <kwd>Controller</kwd>
        <kwd>NPP</kwd>
        <kwd>Reliability Model</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>- 385</p>
    </sec>
    <sec id="sec-2">
      <title>1 Introduction</title>
      <sec id="sec-2-1">
        <title>Nowadays nuclear power is one of the most powerful and clean energy sources [1].</title>
        <p>
          Constant control and monitoring of the power unit equipment parameters and
components within premises and adjacent areas is held to ensure its stable work. The number
of sensors reached up to several thousand per power unit [
          <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
          ]. Requirements for
reliability and survivability of monitoring tools increased in post-Fukushima period
[
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Paradigm of systems and services providing localization, minimization and crash
recovery is changing. Proper information support is needed for successful and critical
management during and after the accident. It is impossible to provide optimal
decisions before and after the accident without timely and reliable information about the
current state and change dynamics.
        </p>
        <p>
          Almost all power unit sensors and associated equipment are combined into several
networks using measurement modules [
          <xref ref-type="bibr" rid="ref1 ref4 ref5">1, 4, 5</xref>
          ]. Often these networks are based on the
widespread wired serial interfaces [
          <xref ref-type="bibr" rid="ref1 ref4">1, 4</xref>
          ]. It should be noted that data flow in
measuring channels of Nuclear Power Plant (NPP) is relatively small and sufficient to control
and make decisions during normal operation. However, the data flow increases
dramatically in pre-emergency and post-emergency conditions. It is caused by a
significant increase of sensor data acquisition frequency in obtaining information about the
dynamics of the situation. Furthermore, additional data acquisition systems are
activated, the ones that are not involved in NNP regular operation. Therefore, emergency
mode channel capacity is used to design such kind of networks that have duplication
and mechanical protection of data channels to improve the communication reliability.
        </p>
        <p>
          During the accident a part of data channels will inevitably fail. The probability of
the total communication loss (with all data acquisition systems) is low, even in case of
a serious accident. However during the damage of a part of communication channels
the information flows should be redirected to not damage one. Thus the frequency of
collisions increases and the probability of the local networks overload is high [
          <xref ref-type="bibr" rid="ref4 ref6">4, 6</xref>
          ]. It
creates a lack of information when it is most needed. To overcome this situation, the
additional wireless channels may be used [
          <xref ref-type="bibr" rid="ref5 ref7">5, 7</xref>
          ]. It will provide a necessary bandwidth
and restore the connection with the data acquisition modules that are damaged.
        </p>
        <p>The aim of this work is to design a concept of NPP integrated system for both
postemergency monitoring and decision support. It is expected that such integrated system
(infrastructure as a system of systems), despite the injury during the accident, can
ensure a high reliability of data exchange with measurement (and under certain
conditions - control) channels to make correct decisions. Within this study we believe that
such system can monitor the appropriate equipment as well as buildings and
territories nearby.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>2 Basic Requirements for Communication Systems of Post</title>
    </sec>
    <sec id="sec-4">
      <title>Emergency Monitoring</title>
      <p>
        The main characteristics of the post-emergency NPP monitoring system have to be
self-descriptiveness, survivability and veracity [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Thus self-descriptiveness means
that the data flow from data channels and control channels must be timely, sufficient
and stable. The system has to provide necessary bandwidth in the post-emergency
conditions. It is obviously that a high survivability can only provide the required
selfdescriptiveness. Obtained data must be reliable. So in the post-emergency conditions,
when a part of measurement and control modules are damaged, a required veracity
can be provided by self-testing the data acquisition modules. A last one will define the
current metrological characteristics of measurement and control channels.
      </p>
      <p>To ensure the mentioned characteristics above in post-emergency conditions using
wireless communication channels is a difficult problem, because measurement and
control modules can be located indoors or under the rubble, which significantly
reduces the signal level. Thus, the level of electromagnetic interference in
postemergency conditions increases dramatically at NPP. At the same time the emergency
service for localization and minimization of the consequences after the accidents,
should be located in a distance which excludes the emergency service from damage
during the accident. Thus, providing a direct wireless connection between the
measurement and control modules and control center requires significant power
transmitters. However, a probability of the supplying network lines for measurement and
control modules damage is very high in the accident, as well, so those modules and
wireless communication components should be able to use additional emergency battery.</p>
      <sec id="sec-4-1">
        <title>In this case, the usage of powerful transmitters can reduce survivability of the postemergency monitoring system by limiting its working time without battery recovery.</title>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>3 The Basic Principles of Self-Descriptiveness, Survivability and Veracity</title>
      <p>To support the uninterrupted long functioning of the post-emergency monitoring
system on in base of the wireless network within the noise high level environment we are
required to reduce significantly a distance of the wireless communication as well as
increase essentially the noise resistance of such communication. The first requirement
can be satisfied through the usage of intermediate repeater modules. These modules
have to be mobile in order to: (i) be located in the distance before the accident, such
distance practically excludes them from the damage during the accident; (ii) fairly
quickly (within minutes) occupy a proper place according to the accident’s nature, as
well as, noise level and the distance to the serviced measurement and control
modules; (iii) move (change the dislocation place) according to the environment changes,
specified in point (ii).</p>
      <sec id="sec-5-1">
        <title>The mentioned above requirements can be easily implemented, when repeater</title>
        <p>
          modules are moved by air. Recently drones became to be used widely [
          <xref ref-type="bibr" rid="ref10 ref11 ref9">9-11</xref>
          ].
Nowadays, they are the most profitable platform where repeater modules can be placed.
        </p>
      </sec>
      <sec id="sec-5-2">
        <title>Such solution provides the maximum access to the required location as well as high</title>
        <p>speed movement. Network of repeaters based on drones, which are located at the
considerable distance from NPP and fly to locations after the accident, is able to
provide the necessary data flow in minutes after the accident occurred.</p>
        <p>
          To increase the wireless communication resistibility to noises, it is necessary to
implement error correction and detection codes [
          <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
          ]. However, for such
environments it is required to provide noise immunity for data and instructions, as well as, for
all communication systems. Existing protocols are designed for the normal noise level
[
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] only, and they may not function properly during the accident at NPP. It is
necessary therefore to develop a communication protocol able to function at the allowable
noise level that corresponds to the most severe post-emergency conditions in NPP. On
other hand, the high noise immunity requires using the redundant codes, therefore it is
necessary to archive essentially the sensor data before coding that enables to reduce a
traffic [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
      </sec>
      <sec id="sec-5-3">
        <title>To ensure the sufficient bandwidth of communication channels it should be possi</title>
        <p>
          ble to provide a parallelization of data streams [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] i.e. a distribution of measurement
and control modules between different repeater modules. However, to maintain the
self-descriptiveness of the post-emergency monitoring system at a sufficient level it’s
necessary to provide the dynamic adaptation of repeater modules and the
softwaretechnical reconfiguration of the structure according to system functioning conditions.
        </p>
      </sec>
      <sec id="sec-5-4">
        <title>Some repeaters may be damaged in the post-emergency conditions or may return to</title>
        <p>the place of deployment for the battery recharging. In such cases their traffic must be
taken by other repeaters.</p>
        <p>Survivability of the post-emergency monitoring system is ensured, firstly, by
providing the additional battery for a consumption of measurement and control
channels. Thus, it is necessary to save the battery charge for the longer system
operation. For this purpose, besides of using the energy-efficient hardware, the
wireless transmitter’s power should be reduced as much as possible. This can be
achieved by reducing the distance between repeaters from one side, and served by
them measurement and control modules from other side. It is possible to do that by
optimizing the distribution of the serviced measurement and control modules between
different repeaters. However, to minimize the energy consumption, it is possible to
use a dynamic evaluation of errors level during the data exchange as well as
adaptation of transmitter’s capacity to such level.</p>
        <p>Secondly, a high survivability of the post-emergency monitoring system is
provided by different features of network repeaters. They appear on the place of accident
after its occurrence (they cannot be damaged during the accident) and must be able to
reallocate data streams dynamically, and optimize the own position regarding the
serviced measurement and control modules, as well as a configuration of the territory
and occurrence of mechanical obstacles. Drone-repeaters have to restore the battery
charge during the temporary return to the service base. It should be possible to have
additional drones replacing the damaged ones.</p>
        <p>The high veracity of the data flow should be ensured by the constant self-testing of
channel repeaters. Thus, it is not necessary to provide by default a frequent
selftesting procedure. The usage of noise immunity codes with errors correction will
allow running a current control of communication channels for errors level. At the same
time, the errors level reflects the level of noise and generates information for a
subsystem of drones’ optimal placement. Thus, it is possible to choose the location and
transmitting power within the high level of errors. However, such level has to be
acceptable for a given system of noise-immune coding.</p>
        <p>
          Ensuring the self-testing procedure for the measurement and control modules
should be considered as a separate problem. Those modules can be damaged during
the accident or after it, for example, due to the penetrating radiation. Hence data
reliability can be achieved by introducing the metrological support autonomous
subsystems for the measurement and control modules [
          <xref ref-type="bibr" rid="ref17 ref18 ref19">17-19</xref>
          ]. These subsystems must be
resistant to errors of its components which can increase rapidly in the post-emergency
conditions, for example, due to the penetrating radiation.
        </p>
        <p>Thus, the following principles of the system functioning are proposed:
 A communication network of the system for the NPP post-emergency condition
monitoring is put in the drones group (fleet), that located permanently at a
considerable distance from the NPP. The communication network is deployed after the
accident, when drones are flying into the accident zone.
 Drones fleet is divided by the role and equipment into: repeaters, observers
(equipped with a TV camera) and additional sensors (they can be located in drones
or be dropped down in certain places). Drones should be able to change their role
by upgrading equipment at the location base.
 Drone-repeaters work together on a principle of “one leader”. This principle
ensures a maximum reliability of the wireless communication system (a minimum of
collisions). If the “leading drone-repeater” (Master) is damaged then other
dronerepeater takes Master functions, for example, drone with the smallest working
time(among all involved ones) at the accident place.
 The Master drone-repeater determines the location zone per each drone-repeater
and measurement modules which will interact with Master, or some other task.
 Each drone-repeater independently selects a location with the minimum noise (as
given areas by Master), and the necessary transmitter power for measurement
modules (in terms of errors in transmitted data), and the possibility of landing (with
the permission of the Accident Liquidation Centre, according to the accident
assessment using drones observers).
 Drone-observers enable to run the continuous visual monitoring of the accident
location for: actions assessing the drones of other purpose, selecting the safe
places for drone-repeater landing, assessing the trajectory of drone-sensors and
their location.
 Measurement and control modules are equipped with backup batteries, blocks of
wireless communication, as well as, self-testing and self-diagnostic systems.
 To meet the system requirements the self-adaptability, self-testing and self-healing
procedures are used.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>4 Structure of the System</title>
      <sec id="sec-6-1">
        <title>The constantly active wire network of the measurement and control modules and its</title>
        <p>
          wireless extension [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] includes sensors and actuators from 1 to n which are
connected to m traditional measurement and control modules (Fig. 1). Each of them
includes the multichannel analog to digital converter ADC or digital to analog converter
DAC, microcontroller of the traditional data processing and an adapter of the wired
interface. Through this interface the measurement and control modules interact with
the control and decision making center receiving commands and sending
measurement results. To provide the work of those modules within the system of
postemergency monitoring each module is equipped with an additional wireless
microcontroller which receives data from the wireless network, or prepares data for the
transmission through wireless network. This microcontroller operates only in
preemergency and post-emergency modes. It receives measurement results (from the
measuring module microcontroller or adapter of wired interface), then compresses,
encodes and transmits it through the wireless interface. Measurement and control
modules, with the absence of network power, are charged from the independent
accumulator unit (it is not presented on Fig 1).
        </p>
        <p>In the normal exploitation mode the data and commands exchange is running
through the wired network. If it is damaged during an accident, another wireless
network is created on the basis of drones. Due to “Master’s” commands drones are
situated in the air in a way to run following functions: to cover all measuring modules
which are equipped with the wireless connection; to distribute data streams through
drones as evenly as possible; to secure the highest possible veracity of the
transmission for sensor data and controlling commands; to avoid obstacles and making no
obstacles per each other.</p>
      </sec>
      <sec id="sec-6-2">
        <title>In the independent power supply of the measurement and control modules (from the</title>
        <p>backup accumulators only) it is very important to minimize their power consumption.
For this purpose all possibilities have to be explored including a limitation of the
wireless interface power, and drones must be placed in the appropriate zones close
enough to the signal sources. Error level during the message exchange can be
considered as one of the important criteria for the effective energy-saving. If the error level
is acceptable for the selected coding method then it is enabled to try decreasing the
transmitter’s power of the wireless interface both as a part of measuring modules and
a part of drones.</p>
        <sec id="sec-6-2-1">
          <title>Sensor and control Wired Network – before emergency</title>
        </sec>
        <sec id="sec-6-2-2">
          <title>Sensor 1</title>
        </sec>
        <sec id="sec-6-2-3">
          <title>Sensor n</title>
        </sec>
        <sec id="sec-6-2-4">
          <title>Actuat.1</title>
        </sec>
        <sec id="sec-6-2-5">
          <title>Actuat.n ADC DAC</title>
        </sec>
        <sec id="sec-6-2-6">
          <title>Measurement module</title>
        </sec>
        <sec id="sec-6-2-7">
          <title>Micro- Wired controller Interface</title>
        </sec>
        <sec id="sec-6-2-8">
          <title>Wireless</title>
        </sec>
        <sec id="sec-6-2-9">
          <title>Interface</title>
        </sec>
        <sec id="sec-6-2-10">
          <title>Wireless</title>
        </sec>
        <sec id="sec-6-2-11">
          <title>Microcontroller</title>
        </sec>
        <sec id="sec-6-2-12">
          <title>Control module</title>
        </sec>
        <sec id="sec-6-2-13">
          <title>Micro- Wired controller Interface</title>
        </sec>
        <sec id="sec-6-2-14">
          <title>Wireless</title>
        </sec>
        <sec id="sec-6-2-15">
          <title>Interface</title>
        </sec>
        <sec id="sec-6-2-16">
          <title>Wireless Microcontroller</title>
          <p>k
r
o
w
t
e
N
s
s
e
l
e
r
i
W
e
l
u
d
o
M</p>
          <p>Drone Master
Control &amp; Navigation</p>
        </sec>
        <sec id="sec-6-2-17">
          <title>Wireless Interface 1</title>
        </sec>
        <sec id="sec-6-2-18">
          <title>Wireless Interface 2</title>
        </sec>
        <sec id="sec-6-2-19">
          <title>Wireless Interface 3</title>
          <p>Drone Slave
Control &amp; Navigation</p>
        </sec>
        <sec id="sec-6-2-20">
          <title>Wireless Interface 1</title>
        </sec>
        <sec id="sec-6-2-21">
          <title>Wireless Interface 2</title>
        </sec>
        <sec id="sec-6-2-22">
          <title>Wireless Interface 3</title>
          <p>Drone Slave
Control &amp; Navigation</p>
        </sec>
        <sec id="sec-6-2-23">
          <title>Wireless Interface 1</title>
        </sec>
        <sec id="sec-6-2-24">
          <title>Wireless Interface 2 Wireless Interface 3</title>
          <p>k
r
o
w
t
e
N
s
s
e
l
e
r
i
W
l
o
r
t
n
o
C</p>
        </sec>
        <sec id="sec-6-2-25">
          <title>Control &amp;</title>
        </sec>
        <sec id="sec-6-2-26">
          <title>Decision Making</title>
        </sec>
        <sec id="sec-6-2-27">
          <title>Center</title>
        </sec>
        <sec id="sec-6-2-28">
          <title>Mobile Phone Station</title>
          <p>k
r
o
w
t
e
N
s
s
e
l
e
r
i
W
a
t
aD Sensor and control</p>
        </sec>
        <sec id="sec-6-2-29">
          <title>Wireless Network – post-emergency state</title>
          <p>
            In its turn the request to draw closer to the signal sources is connected closely with
the running the principles 4 and 5 above. Hence all drones have to be equipped with
rather the high quality navigation system. Such system must provide different types of
navigation below:
 Using the existing system of the global navigation (GPS) [
            <xref ref-type="bibr" rid="ref21">21</xref>
            ]. Note the level of
noises is increasing rapidly in post-emergency conditions at the NPP. At the same
time the signal from the GPS satellite is rather weak. So a probability is very high
that such signal cannot be able for a reliable navigation;
 Using the local system of beacons similar to the GPS [
            <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25">22 – 25</xref>
            ]. A distance to the
local beacons (sources of the individual signals which location is tied to the local
terrain map) may be even thousand times smaller. Ensuring the required signal
level, even if it being powered from the accumulators, won’t be a problem;
 Protection from collisions with the local obstacles is better performed using the
ultrasound location [
            <xref ref-type="bibr" rid="ref25 ref26">25, 26</xref>
            ]. But the ultrasound probing impulses must have the
unique individual coding. Otherwise the impulses from the other drones will be
accepted as native ones, hence the defense system against the collision with the
obstacles will be out of an order;
 The previous analysis showed the ultrasound locating system is extremely
inaccurate, and it is too slow in dynamic conditions. It will not be able therefore to
prevent a collision of the drones between each other. The assessment of the protection
variants against such collisions showed that the better variant would be considered
when positions of all drones are taking into account by the “leading” one (Master)
with its following delivering commands about the positions and movement vectors
per each subordinate (Master –Slave principle). However, when the Master is
damaged, the system becomes inoperable. Hence it is necessary to try predicting a
possibility with commands absence from the Master when its function may be
replaced by each (or assigned one) drone [
            <xref ref-type="bibr" rid="ref27 ref28">27, 28</xref>
            ]. To avoid the collisions, such kind
of replacement should be organised according to the hierarchical principle.
          </p>
          <p>Note that sensor data collection and actuators control (exchange in the network of
measurement and control modules), and retransmitting of these data (message
exchange with the center of decision making and control), and drones control (following
the “Master’s” commands) are different tasks which have very little in common.
Except while running the exchange task in the network of the measurement and control
modules, the errors level may be defined and this information should be included
when selecting the place for drone’s dislocation. That’s why to increase the reliability
of the post-emergency monitoring system’s functioning it is reasonable to divide the
solution of these tasks above on the hardware level. Those tasks must be run by
different microcontrollers equipped with their own peripheral devices. During this it is
expedient to form the three independent wireless networks of data exchange
(measurement and control modules, retransmitted data and drones control networks) with
will not conflict with each other, create queues, and etc.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>5 Reliability Models</title>
      <sec id="sec-7-1">
        <title>According to the proposed concept the three systems of post-emergency monitoring</title>
        <p>systems (S1, S2, S3) and reliability block diagrams (correspondingly: RBD1 (Fig. 2),</p>
      </sec>
      <sec id="sec-7-2">
        <title>RBD2 (Fig. 3) and RBD3 (Fig. 4)) have been developed.</title>
      </sec>
      <sec id="sec-7-3">
        <title>Each system has a general way for increasing the system reliability, which includes</title>
        <p>sliding redundancy in SS, DR and DM – any failed element of the main chain
((S1S2-···-Sk) for SS, (R1- R2-···-Rq) for DR and (M1- M2-···-Mg) for DM) can be
replaced by means of any element of the redundancy chain ((Sr1- Sr2-···-Srm) for SS,
(Rr1- Rr2-···-Rrp) for DR and (Mr1- Mr2-···-Mrp) for DM). Moreover, each system
has a possibility to replace the failed main chain by means of the redundancy chain:
(DR-DM) by means of (CW-WS) for S1, (CD-DR-DM) by means of (CW-WS) for
S2, (WS1-WS2- ···-WSn) by means of ((DR-DM)1-(DR-DM)2 -···-(DR-DM)m) for S3.</p>
      </sec>
      <sec id="sec-7-4">
        <title>Based on the proposed reliability block diagrams we can obtain the following formulas for calculating the reliability function (RF) per each of these systems:</title>
        <p>PS1(t )  pSS(t ) pCS(t )1(1 pCD(t ) pDR(t ) pDM(t ))(1 pCW(t ) pWS(t )) pCC(t ) , (1)
where
pSS ( t )  ekS t  m k S  t</p>
        <p>;
i0</p>
        <p>i!
pDR( t )  eqR t  p q R  t
j0 j!</p>
        <p>;
pWS ( t )  eWS t ; pCC ( t )  eCC t .
pCS ( t )  eCS t ;</p>
        <p>pCD( t )  eCD t ;
h g M  t ;
pDM ( t )  egM t  
l 0 l!
pCW ( t )  eCW t ;
PS2( t )  pSS ( t )  pCU ( t )  1  ( 1  pDR( t )  pDM ( t )) ( 1  pWS( t ))n  pCC( t ) ,
(2)
where pCU ( t )  eCU t .</p>
        <p>n 
PS3(t )  ( pSS( t ) pCU( t ))n  1 (1  pWSi ( t ))(1( pDR(t ) pDM(t ))m  pCC(t ) (3)
 i1 </p>
      </sec>
      <sec id="sec-7-5">
        <title>The fact, that each of the systems has devices with redundancy elements, enables to consider both those devices separately as well as systems with a multi-level degradation [29, 30]. For example, in the Table 1-3 the degradation levels with corresponding characteristics for the systems SS, DR, DM are shown</title>
        <p>pSS ( t )  ekS t  m k S  t
m1 k S  t
pSS ( t )  ekS t  
i!
i!
…
i0
i0
Number of
the
degradation level</p>
        <p>1
Number of
the
degradation level
p+1
0
p
All elements of the main chain
(S1- S2-···-Sk) are functioning,
m elements of the redundancy
chain (Sr1- Sr2-···-Srm) are failed,
or they are functioning instead of
failed elements for the main chain
At least one of the elements of the
main chain (S1- S2-···-Sk) is
failed,
m elements of the redundancy
chain (Sr1- Sr2-···-Srm) are failed
or they are functioning instead of
failed elements for the main chain
eqR t  0 q R  t eqR t</p>
        <p>Condition that determines
the degradation level
All elements of the main
chain (M1- M2-···-Mg) are
functioning,
all elements of the
redundancy chain (Mr1-
Mr2-···Mrp) are functioning
All elements of the main
chain (M1- M2-···-Mg) are
functioning,
one element of the
redundancy chain (Mr1-
Mr2-···Mrp) is failed, or it’s
functioning instead of a failed
element for the main chain</p>
        <p>…
All elements of the main
chain (M1- M2-···-Mg) are
functioning,
h elements of the redundancy
chain (Mr1- Mr2-···-Mrp)
are failed, or they are
functioning instead of failed
elements for the main chain
At least one of the elements
of the main chain (M1-
M2···-Mg) is failed,
h elements of the redundancy
chain (Mr1- Mr2-···-Mrp)
are failed, or they are
functioning instead of failed
elements for the main chain</p>
        <p>l!
…
hh g M  t
pDM( d 1 )( t )  egM t  
</p>
      </sec>
      <sec id="sec-7-6">
        <title>Using the data from Tables 1-3 and assuming that devices CS, CD, CW, WS, CC are characterized by a two-level degradation (these devices have only 1 and 0 degradation level), we can determine levels and provide characteristics per each of them per each of the systems S1, S2, S3 correspondingly.</title>
      </sec>
      <sec id="sec-7-7">
        <title>For example, in the table 4 the characteristics of the given degradation level a for the system with common sensors S1 are shown, and in Table 5 the characteristics of the lowest degradation level for the system S1 are shown too.</title>
        <p>1
i!
l!
pS1( d a )( t )  ekS t  m1 k S  t  eqR t 
j0</p>
        <p>j!
 p q R  t  e gM t  h g M  t

 eCS t  eCD t  eCC t
0</p>
        <p>WS
0</p>
        <p>CC
1
WS
1</p>
        <p>CC
1</p>
        <p>PS1( d 1 )( t )  ekS t  eCS t  eCD t  eSW t  eWS t  eCC t</p>
      </sec>
      <sec id="sec-7-8">
        <title>Similar tables are available for systems S2 and S3 too. For example, the characteristics of their lowest degradation levels are given in Tables 6 and 7 correspondingly.</title>
        <p>pS 2( d 1 )( t )  ( ek  S t  eCUt  eWS t )n  eCC t
pS 3( d 1 )( t )  ( ekS t  eCU t )n  ( eqS t  e gS t )m
 eCC t</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>6 Conclusions</title>
      <p>A proposed concept of NPP post-emergency monitoring based on drones satisfies
requirements to self-descriptiveness and survivability and veracity. Such approach
enables: (i) to avoid the unacceptable damage and fatal failure of post-emergency
monitoring system during the accident (ii) to ensure the minimal time of system
deployment (iii) to provide the sufficient bandwidth of communication channels with
possible (if needed) extension (iv) to employ the recovery operation if components
are damaged(v) to ensure the ability of flexible usage for other problems solving
(delivery of sensors and other needed equipment to the certain location).</p>
      <sec id="sec-8-1">
        <title>Proposed framework models of assessing the reliability and survivability enable to</title>
        <p>compare the output options for its further selection. Future studies should be related to
the specification of output parameters as well as detailed analysis of their values for
fixed solutions of systems design. Moreover it is necessary to specify the models of
failures due to accidents for survivability computing.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Morichi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Toubon</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Bronson</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Venkataraman</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ; Beaujoin,
          <string-name>
            <surname>J.</surname>
          </string-name>
          ; Dubart,
          <string-name>
            <surname>P.</surname>
          </string-name>
          : Nuclear Measurement Technologies &amp;
          <article-title>Solutions Implemented During Nuclear Accident at Fukushima</article-title>
          .
          <source>In: Advancements in Nuclear Instrumentation Measurement Methods and their Applications (ANIMMA)</source>
          ,
          <year>2013</year>
          3rd International Conference. doi:
          <volume>10</volume>
          .1109/ANIMMA.
          <year>2013</year>
          .
          <volume>6727908</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Hashemian</surname>
            ,
            <given-names>H. M.:</given-names>
          </string-name>
          <article-title>Maintenance of Process Instrumentation in Nuclear Power Plants</article-title>
          . Springer, p.
          <fpage>304</fpage>
          . (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bandstra</surname>
          </string-name>
          , Mark S.;
          <string-name>
            <surname>Vetter</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Chivers</surname>
            ,
            <given-names>D.H.</given-names>
          </string-name>
          ; Aucott,
          <string-name>
            <given-names>T.</given-names>
            ;
            <surname>Bates</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ;
            <surname>Coffer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ;
            <surname>Curtis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ;
            <surname>Hogan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ;
            <surname>Iyengar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ;
            <surname>Looker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            ;
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ;
            <surname>Negut</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            ;
            <surname>Plimley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ;
            <surname>Satterlee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ;
            <surname>Supic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ;
            <surname>Yee</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          :
          <article-title>Measurements of Fukushima fallout by the Berkeley Radiological Air and Water Monitoring project</article-title>
          .
          <source>In: Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC)</source>
          , DOI: 10.1109/NSSMIC.
          <year>2011</year>
          .6154316. IEEE, pp.
          <fpage>18</fpage>
          -
          <lpage>24</lpage>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kulakov</surname>
            ,
            <given-names>Yu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kochan</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bykovyy</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maykiv</surname>
            ,
            <given-names>I.: Computer</given-names>
          </string-name>
          <string-name>
            <surname>Networks</surname>
          </string-name>
          . P.
          <volume>476</volume>
          ,
          <string-name>
            <surname>Ternopil.</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Hashemian</surname>
            ,
            <given-names>H.M.</given-names>
          </string-name>
          :
          <article-title>Wireless Sensors for Predictive Maintenance of Rotating Equipment in Research Reactors</article-title>
          .
          <source>In: Annals of Nuclear Energy</source>
          , Volume
          <volume>38</volume>
          ,
          <string-name>
            <surname>Issues</surname>
          </string-name>
          2-3, ISSN 0306- 4549, http://dx.doi.org/10.1016/j.anucene.
          <year>2010</year>
          .
          <volume>09</volume>
          .012, pp.
          <fpage>665</fpage>
          -
          <lpage>680</lpage>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Ryan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Tisdale</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ; Godwin,
          <string-name>
            <given-names>M.</given-names>
            ;
            <surname>Coatta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ;
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ;
            <surname>Spry</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          ; Sengupta, Raja; Hedrick,
          <string-name>
            <surname>J.K.</surname>
          </string-name>
          :
          <article-title>Decentralized Control of Unmanned Aerial Vehicle Collaborative Sensing Missions</article-title>
          . In: American Control Conference,
          <year>2007</year>
          . ACC '07 , DOI: 10.1109/ACC.
          <year>2007</year>
          .
          <volume>4282397</volume>
          , pp.
          <fpage>4672</fpage>
          -
          <lpage>4677</lpage>
          . (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Daniel</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Rohde</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Wietfeld</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Leveraging Public Wireless Communication Infrastructures for UAV-based sensor networks</article-title>
          .
          <source>In: Technologies for Homeland Security (HST)</source>
          ,
          <year>2010</year>
          IEEE International Conference, DOI: 10.1109/THS.
          <year>2010</year>
          .
          <volume>5655064</volume>
          , pp.
          <fpage>179</fpage>
          -
          <lpage>184</lpage>
          . (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Yastrebenetsky</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kharchenko</surname>
          </string-name>
          , V. (editors):
          <article-title>Nuclear Power Plant Instrumentation and Control Systems for Safety and Security</article-title>
          , IGI-Global, USA,
          <year>472p</year>
          . (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Nikolakopoulos</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alexis</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Switching Networked Attitude Control of an Unmanned Quadrotor</article-title>
          .
          <source>In: International Journal of Control, Automation, and Systems</source>
          .
          <volume>11</volume>
          (
          <issue>2</issue>
          ).
          <source>DOI 10.1007/s12555-011-0132-4</source>
          . pp.
          <fpage>389</fpage>
          -
          <lpage>397</lpage>
          . (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Ryan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Hedrick</surname>
            ,
            <given-names>J.K.</given-names>
          </string-name>
          :
          <article-title>A Mode-Switching Path Planner for UAV-assisted Search and Rescue</article-title>
          .
          <source>In: Decision and Control</source>
          ,
          <source>2005 and 2005 European Control Conference. CDCECC '05. 44th IEEE Conference. DOI: 10</source>
          .1109/CDC.
          <year>2005</year>
          .
          <volume>1582366</volume>
          . pp.
          <fpage>1471</fpage>
          -
          <lpage>1476</lpage>
          , (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>McCune</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ; Purta,
          <string-name>
            <surname>R.</surname>
          </string-name>
          ; Dobski,
          <string-name>
            <given-names>M.</given-names>
            ;
            <surname>Jaworski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ;
            <surname>Madey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ;
            <surname>Madey</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          ; Yi Wei; Blake,
          <string-name>
            <surname>M.B.</surname>
          </string-name>
          :
          <article-title>Investigations of DDDAS for Command and Control of UAV Swarms with Agentbased modeling</article-title>
          .
          <source>In: Simulation Conference (WSC)</source>
          ,
          <source>DOI: 10.1109/WSC</source>
          .
          <year>2013</year>
          .
          <volume>6721531</volume>
          , pp.
          <fpage>1467</fpage>
          -
          <lpage>1478</lpage>
          . (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Zhengbing</surname>
            , Hu, Yatskiv,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Increasing the Data Transmission Robustness in WSN Using the Modified Error Correction Codes on Residue Number System</article-title>
          .
          <source>In: Elektronika ir Elektrotechnika</source>
          , Vol
          <volume>21</volume>
          . № 1, pp.
          <fpage>76</fpage>
          -
          <lpage>81</lpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Oualha</surname>
          </string-name>
          , N.;
          <string-name>
            <surname>Olivereau</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Sensor and Data Privacy in Industrial Wireless Sensor Networks</article-title>
          .
          <source>In: Network and Information Systems Security (SAR-SSI)</source>
          , Conference, DOI: 10.1109/SAR-SSI.
          <year>2011</year>
          .
          <volume>5931357</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Gomaa</surname>
            , R.; Adly,
            <given-names>I.</given-names>
          </string-name>
          ; Sharshar,
          <string-name>
            <given-names>K.</given-names>
            ;
            <surname>Safwat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ;
            <surname>Ragai</surname>
          </string-name>
          , H.:
          <article-title>ZigBee wireless sensor network for radiation monitoring at nuclear facilities</article-title>
          .
          <source>In: Wireless and Mobile Networking Conference (WMNC)</source>
          ,
          <year>2013</year>
          6th
          <string-name>
            <surname>Joint</surname>
            <given-names>IFIP</given-names>
          </string-name>
          , DOI: 10.1109/WMNC.
          <year>2013</year>
          .
          <volume>6548954</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Jun</surname>
            , Su, Yatskiv,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Method and Device for Image Coding &amp; Transferring Based on Residue Number System</article-title>
          .
          <source>In: Sensors &amp; Transducers Journal</source>
          , Vol.
          <volume>18</volume>
          ,
          <string-name>
            <given-names>Special</given-names>
            <surname>Issue</surname>
          </string-name>
          . pp.
          <fpage>60</fpage>
          -
          <lpage>65</lpage>
          , (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Jun</surname>
            , Su, Yatskiv,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yatskiv</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Improved Method of Ant Colonies to Search Independent Data Transmission Routes in WSN</article-title>
          .
          <source>In: Proceedings 2012 IEEE 1st International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems. IDAACS-SWS-2012</source>
          . Offenburg, Germany, pp.
          <fpage>52</fpage>
          -
          <lpage>57</lpage>
          . (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Kochan</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Kochan, О.:
          <article-title>Method of ADC's Nonlinearity Identification</article-title>
          .
          <source>In: Proc. of the IEEE International Workshop on Intelligent Data Acquisition and Advancing Computing Systems (IDAACS'</source>
          <year>2007</year>
          ), Dortmund, Germany, pp.
          <fpage>14</fpage>
          -
          <lpage>17</lpage>
          . (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Kochan</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Kochan, О. Klym,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Osolinskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            ,
            <surname>Bykovyy</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          :
          <article-title>Integral Nonlinearity Correction of ADC Using Multi-Resistors Voltage Divider</article-title>
          .
          <source>In: Proc. of the IEEE International Workshop on Intelligent Data Acquisition and Advancing Computing Systems (IDAACS'2015)</source>
          , Warsaw, Poland, pp.
          <fpage>14</fpage>
          -
          <lpage>17</lpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Hashemian</surname>
            ,
            <given-names>H. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kerlin</surname>
            ,
            <given-names>T. W.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Upadhyaya</surname>
            ,
            <given-names>B. R.</given-names>
          </string-name>
          :
          <article-title>Apparatus for Measuring the Degradation of a Sensor Time Constant</article-title>
          . U.S. Patent No.
          <volume>4</volume>
          ,
          <issue>295</issue>
          ,
          <fpage>128</fpage>
          . Washington, DC: U.S. Patent and
          <string-name>
            <given-names>Trademark</given-names>
            <surname>Office</surname>
          </string-name>
          . (
          <year>1981</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Hiromoto</surname>
            ,
            <given-names>R.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kochan</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koval</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roshchupkin</surname>
            ,
            <given-names>O. V.</given-names>
          </string-name>
          <string-name>
            <surname>Yatskiv</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalok</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Mobile Ad Hoc Wireless Network for Pre- and Post-Emergency Situations in Nuclear Power Plant</article-title>
          .
          <source>In: The 2nd IEEE International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems</source>
          , Offenburg, Germany, pp.
          <fpage>92</fpage>
          -
          <lpage>96</lpage>
          . (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Ryan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ; Zennaro, Marco; Howell,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Sengupta</surname>
          </string-name>
          , Raja; Hedrick,
          <string-name>
            <surname>J.K.</surname>
          </string-name>
          :
          <article-title>An Overview of Emerging Results in Cooperative UAV Control</article-title>
          .
          <source>In: Decision and Control</source>
          ,
          <year>2004</year>
          . CDC.
          <source>43rd IEEE Conference</source>
          , vol.
          <volume>1</volume>
          . DOI:
          <volume>10</volume>
          .1109/CDC.
          <year>2004</year>
          .
          <volume>1428700</volume>
          , pp.
          <fpage>602</fpage>
          -
          <lpage>607</lpage>
          . (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Rudol</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Wzorek</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Doherty</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Vision-Based Pose Estimation for Autonomous Indoor Navigation of Micro-scale Unmanned Aircraft Systems</article-title>
          .
          <source>In: Robotics and Automation (ICRA)</source>
          ,
          <source>2010 IEEE International Conference. DOI: 10.1109/ROBOT</source>
          .
          <year>2010</year>
          .
          <volume>5509203</volume>
          . pp.
          <fpage>1913</fpage>
          -
          <lpage>1920</lpage>
          . (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Kim</surname>
            , J.; Sukkarieh,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Autonomous Airborne Navigation in Unknown Terrain Environments</article-title>
          . In: Aerospace and
          <string-name>
            <given-names>Electronic</given-names>
            <surname>Systems</surname>
          </string-name>
          , IEEE Transactions, vol.
          <volume>40</volume>
          , no.3. DOI:
          <volume>10</volume>
          .1109/TAES.
          <year>2004</year>
          .
          <volume>1337472</volume>
          , pp.
          <fpage>1031</fpage>
          -
          <lpage>1045</lpage>
          . (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Tisdale</surname>
          </string-name>
          , J.;
          <string-name>
            <surname>Ryan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ; Zu Kim; Tornqvist,
          <string-name>
            <given-names>D.</given-names>
            ;
            <surname>Hedrick</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.K.</surname>
          </string-name>
          :
          <article-title>A Multiple UAV System for Vision-based Search and Localization</article-title>
          . In: American Control Conference. DOI:
          <volume>10</volume>
          .1109/ACC.
          <year>2008</year>
          .
          <volume>4586784</volume>
          , pp.
          <fpage>1985</fpage>
          -
          <lpage>1990</lpage>
          . (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Girard</surname>
            ,
            <given-names>A.R.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Howell</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Hedrick</surname>
            ,
            <given-names>J.K.</given-names>
          </string-name>
          :
          <article-title>Border Patrol and Surveillance Missions using Multiple Unmanned Air Vehicles</article-title>
          .
          <source>In: Decision and Control</source>
          ,
          <year>2004</year>
          . CDC.
          <source>43rd IEEE Conference</source>
          , vol.
          <volume>1</volume>
          , DOI: 10.1109/CDC.
          <year>2004</year>
          .
          <volume>1428713</volume>
          , pp.
          <fpage>620</fpage>
          -
          <lpage>625</lpage>
          . (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Jong-Hyuk</surname>
            <given-names>Kim</given-names>
          </string-name>
          ; Sukkarieh,
          <string-name>
            <surname>S.</surname>
          </string-name>
          :
          <article-title>Airborne Simultaneous Localisation and Map Building</article-title>
          .
          <source>In: Robotics and Automation</source>
          ,
          <year>2003</year>
          . Proceedings. ICRA '03. IEEE International Conference, vol.
          <volume>1</volume>
          . DOI:
          <volume>10</volume>
          .1109/ROBOT.
          <year>2003</year>
          .
          <volume>1241629</volume>
          , pp.
          <fpage>406</fpage>
          -
          <lpage>411</lpage>
          . (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Rogers</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ; Corkill, Daniel D.;
          <string-name>
            <surname>Jennings</surname>
            ,
            <given-names>N.R.</given-names>
          </string-name>
          :
          <article-title>Agent Technologies for Sensor Networks</article-title>
          .
          <source>In: Intelligent Systems, IEEE</source>
          , vol.
          <volume>24</volume>
          , no.
          <issue>2</issue>
          , DOI: 10.1109/MIS.
          <year>2009</year>
          .
          <volume>22</volume>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>17</lpage>
          . (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <given-names>Delle</given-names>
            <surname>Fave</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.M.</given-names>
            ;
            <surname>Rogers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ;
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            ;
            <surname>Sukkarieh</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          ; Jennings,
          <string-name>
            <surname>N.R.</surname>
          </string-name>
          :
          <article-title>Deploying the Maxsum Algorithm for Decentralized Coordination and Task Allocation of Unmanned Aerial Vehicles for Live Aerial Imagery Collection</article-title>
          .
          <source>In: Robotics and Automation (ICRA)</source>
          , IEEE International Conference. DOI:
          <volume>10</volume>
          .1109/ICRA.
          <year>2012</year>
          .
          <volume>6225053</volume>
          , pp.
          <fpage>469</fpage>
          -
          <lpage>476</lpage>
          . (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Kharchenko</surname>
          </string-name>
          , V. (ed.):
          <article-title>Fundamentals of Digital Systems Reliability</article-title>
          . National Aerospace University KhAI,
          <year>421p</year>
          . (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Kharchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The Probabilistic Assessment of Survivability and Safety of an Unmanned Control Systems with Multistage Degradation by Use of QD-diagrams</article-title>
          .
          <source>In: Proceeding of International Conference PSAM'5</source>
          , vol.
          <volume>1</volume>
          ,
          <string-name>
            <surname>Osaka</surname>
          </string-name>
          , Japan, pp.
          <fpage>525</fpage>
          -
          <lpage>531</lpage>
          . (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>