<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Internet of Things Approach for Automation of the Complex Industrial Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yuriy P. Kondratenko</string-name>
          <email>yuriy.kondratenko@chmnu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksiy V. Kozlov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksiy V. Korobko</string-name>
          <email>oleksii.korobko@nuos.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andriy M. Topalov</string-name>
          <email>topalov_ua@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Admiral Makarov National University of Shipbuilding, 9 Heroes of Ukraine Av.</institution>
          ,
          <addr-line>Mykolaiv, 54025</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Petro Mohyla Black Sea National University</institution>
          ,
          <addr-line>10, 68th Desantnykiv Str., Mykolaiv, 54003</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper presents the analysis of the Internet of Things (IoT) approach and its application for the development of embedded monitoring and automatic control systems (EMACS) for technological objects and processes that are included in complex industrial systems. The functional structure and main components of EMACS based on IoT approach are given. The examples of IoT applications in design of specialized EMACS for such complex technical objects as gas turbine engines and floating docks are presented. Considerable attention is given to particular qualities of the functional structures, software and hardware implementation as well as multi-level human-machine interfaces of the EMACS for main process parameters. The developed EMACS provide: (a) high precision control of real-time operating processes of gas turbine engines and floating docks, (b) monitoring and automatic control of current technological parameters with high quality indicators, that leads to significant increasing of energy and economic efficiency of both industrial objects.</p>
      </abstract>
      <kwd-group>
        <kwd>Complex industrial systems</kwd>
        <kwd>automation</kwd>
        <kwd>SCADA</kwd>
        <kwd>Internet of Things</kwd>
        <kwd>embedded monitoring and automatic control systems</kwd>
        <kwd>Key Terms</kwd>
        <kwd>InformationCommunicationTechnology</kwd>
        <kwd>ComputerScience</kwd>
        <kwd>Object</kwd>
        <kwd>Process</kwd>
        <kwd>Industry</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The development of computer aids and modern computer networks has led to the
creation of new types of automated control systems of technological processes
(ACSTP) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Modern information-measuring technical equipment and data
transmission technologies solve many problems associated with collection, conversion,
transmission and storage of various information for technological processes control [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        New ACSTP characterized by the transition to the creating of complex systems in
which information processing is decentralized, and some parts of the ACSTP are
often remote from each other. There is a trend towards increasing use of sensor
networks and appropriate hardware and software means of conjugation at all levels of the
hierarchy [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        In the process of ACSTP creating and using for complex industrial systems, that
include objects of oil and gas, energy, machinery and other types of industry the
following problems are solving: creation of systems for monitoring and control of both
manufactured goods and for certain technological processes, taking into account local
and systemic approaches [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. Providing of an operational monitoring of all
parameters with high accuracy and a timely control of actuators of various kinds of
technological processes is a complex technical task that requires limiting attentiveness of
staff for a long time. Any "human" errors or outdated equipment can lead to an
increase of production time per unit, respectively to the decrease of an economic
efficiency of equipment using, and possibly to emergencies at the facility.
      </p>
      <p>
        The rapid development of computer and information technology contributes to the
creation of effective supervisory control and data acquisition (SCADA) systems in
production sphere [
        <xref ref-type="bibr" rid="ref2 ref5 ref6">2, 5, 6</xref>
        ]. Use of SCADA-systems enables the operator to automate
the control parameters of various kinds of industrial systems and processes, enable or
disable mechanisms and devices, open or close valves on pipelines, monitor any
parameters from a specially equipped console with a centralized or supervisory control.
SCADA systems have a number of components [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ] that facilitate the development
of computerized data acquisition and analysis tools, such as communication protocols
for external devices connection, built in signals filtering, supporting of structured
query language (SQL) data exchange etc. This and many other features make the
SCADA software a perfect tool for implementation of control, data analysis and
information processing algorithms in industry, household and science research [
        <xref ref-type="bibr" rid="ref10 ref5 ref6 ref7 ref8 ref9">5-10</xref>
        ].
      </p>
      <p>
        More actively with modern SCADA-systems the wireless data transmission
technology is implemented [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The combination of SCADA-systems with wireless
technologies and the Internet allows creating the WebSCADA-systems [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The term
WebSCADA, usually refers to the implementation of human-machine interfaces
(HMI) of SCADA-systems based on web-technologies. This allows implementing
monitoring and control of SCADA-systems through a standard browser, acting in this
case as a thin client. The architecture of these systems includes WebSCADA server
and client terminals - personal computers, personal digital assistants or mobile phones
with a Web browser [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">11-13</xref>
        ]. Connecting of customers to the WebSCADA servers via
Internet/Intranet allows them to interact with applied automation tasks as with simple
Web or WAP pages.
      </p>
      <p>
        Even more novel and promising approach for automation of complex industrial
systems as well as for ACSTP creation is the Internet of Things approach [
        <xref ref-type="bibr" rid="ref14 ref15 ref16">14-16</xref>
        ].
      </p>
      <p>
        Internet of Things is the concept of the computer network of physical objects
("things"), equipped with built-in technologies for communication with each other
and with the environment [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The organization of such networks is recently
considered as a phenomenon that can rebuild the economic and social processes as well as
exclude the need for human intervention from the part of actions and operations [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
This concept formulated in 1999 as a comprehension of prospects of wide application
of radio frequency identification (RFID) means for interaction of physical objects
between themselves and with the external environment [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Filling the IoT concept
with multiform technological content and introduction of practical solutions for it
implementation considered to be a stable trend in information technology primarily
due to the widespread dissemination of wireless networks, appearance of cloud
computing, development of machine to machine technology, beginning of active transition
to the new Internet protocols and development of software-configurable networks
[
        <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21 ref22 ref23">18-23</xref>
        ].
      </p>
      <p>
        Examples of IoT concept implementing are systems of “Smart house” [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], “Smart
farm” [
        <xref ref-type="bibr" rid="ref19 ref25">19, 25</xref>
        ], “Smart city” [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], “Smart environment” [
        <xref ref-type="bibr" rid="ref19 ref25">19, 25</xref>
        ], “Smart enterprise”
[
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], “Smart transport” [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], “Smart wearable” [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ] and others.
      </p>
      <p>The main purpose of this work is analysis of the IoT approach and its application
for the development of embedded monitoring and automatic control systems for
technological objects and processes that are included in complex industrial systems.</p>
      <p>Basic features, involved technologies, and main applications of the IoT approach
are given in the paragraph 2. The functional structures, software and hardware
implementation as well as multi-level HMIs of the developed EMACS for complex
technological objects, such as gas turbine engines and floating docks, based on IoT
are presented in the paragraph 3. Paragraph 4, in turn, has conclusions, discussion of
the results and further research on the IoT approach application for the complex
industrial systems, technological objects and processes automation.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Internet of Things Approach</title>
      <p>
        Basically the IoT is a network consisting of interrelated physical objects (“things”) or
devices that have built-in sensors and software that allows you to transfer and
exchange data between the physical world and computer systems by using standard
communications protocols [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. In addition to sensors the network can have actuators
embedded in physical objects and linked together with wired or wireless networks.
These interrelated objects (“things”) have the ability of data reading and actuating
according to the control signals, the functions of programming and identification, as
well as allow excluding the need for human participation by using the intelligent
interfaces [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        The basis of IoT approach is a possibility of connection all kinds of objects
(“things”) that people can use in everyday life, such as refrigerator, car, bicycle,
washing machine, etc. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. All of these objects (“things”) should be equipped with
built-in sensors that are able to process information coming from the environment,
share it and perform different actions depending on the received information. The
ideology of the IoT is aimed at increasing of economic efficiency by processes
automation in various fields of activity and exclusion from them human impact [
        <xref ref-type="bibr" rid="ref14 ref15 ref16 ref17">14-17</xref>
        ].
      </p>
      <p>For the implementation of the IoT approach, the following technologies are used.
2.1</p>
      <sec id="sec-2-1">
        <title>IoT Technologies</title>
        <p>
          Identification tools. The special equipment for information recording and processing
as well as for actuators controlling is involved in any IoT system. Obviously, for the
effective functioning of the IoT system it is necessary to ensure a high level of
network service and consequently the unique identification of software and hardware
elements of the system. The identification problems for connected devices depend on
the number of concurrent connections to the Internet, which the given system can
support, and on the quality of service, which can be guaranteed [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Now the
majority of Internet-connected devices use IPv4 protocol from the family of TCP/IP
protocols, which is based on 32-bit addressing scheme and is limited to 232 (4 294 967 296)
unique addresses [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. Considering that predicted for the IoT possible number of
connected units is 50-100 billion for optimal scalability it is required to move to IPv6
protocol from the family of TCP/IP protocol, which uses 128-bit addressing system
capable of supporting up to 2128 addresses (3,4∙1038 units) [
          <xref ref-type="bibr" rid="ref17 ref21 ref22">17, 21, 22</xref>
          ]. Currently
several initiatives are implementing to influence the development of IPv6 protocol to
support the IoT. One of them is the project IoT6, dedicated to research, design and
development of service-oriented architecture with high level of scalability based on
IPv6.4.
        </p>
        <p>
          Also, identification of network elements of the IoT can be achieved with the help
of RFID chips that can transmit information to reading devices without their own
power source [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. Each chip has a unique number. As an alternative to this
technology for the identification of objects the QR-Codes can be used. Furthermore, to
determine the exact location of IoT objects the GPS technology can be used, which
effectively operates today in smartphones and navigators.
        </p>
        <p>
          Measuring instruments. By measurement means of the object measuring
transducers are generally understood, that are designed to generate measurement data in a
form, suitable for transmission, further transformation, processing and storage [
          <xref ref-type="bibr" rid="ref10 ref7 ref8 ref9">7-10</xref>
          ].
The IoT technology uses a wide class of measurement tools, from the elementary
sensors (temperature, rotation angle, etc.), consumption metering devices (smart
meters) to complex integrated measurement systems [
          <xref ref-type="bibr" rid="ref19 ref23 ref9">9, 19, 23</xref>
          ]. Also, all measuring
devices are combined, as a rule, in the wired/wireless sensor networks, due to what is
possible to build M2M interaction systems. In recent years, the wireless sensor
networks are used due to miniature components, low power consumption, embedded
transceivers, sufficient processing power and relatively low cost [
          <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13">10-13</xref>
          ].
        </p>
        <p>
          Measuring sensors can be fixed permanently, and also have a relative mobility, that
is to move freely relative to each other in a certain space, without breaking the logical
network connectivity. In the latter case, the sensor network has no permanent fixed
topology and its structure changes dynamically over time [
          <xref ref-type="bibr" rid="ref10 ref13">10, 13</xref>
          ].
        </p>
        <p>
          Data processing means. For the processing and storage of data, given from the
sensors, it is advisable to use embedded software and hardware means in the form of
small-sized computers (for example, Raspberry Pi, Intel Edison) with access to the
Internet [
          <xref ref-type="bibr" rid="ref10 ref20 ref7 ref8 ref9">7-10, 20</xref>
          ]. Moreover, the final processing of the data and making an
informed decision on the cloud service is performed with the use of Big Data
technologies [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. For the processing of measurement data today are available for free in the
test mode such cloud services as: Azure, Freeboard, Grovestreams, Developer.ibm,
Thingspeak, Thingworx and other [
          <xref ref-type="bibr" rid="ref19 ref9">9, 19</xref>
          ].
        </p>
        <p>
          Data transmission means. The range of possible data transmission technologies
covers all possible means of wireless and wired networks. For wireless transmission
of data between the software and hardware elements of the IoT networks a
particularly important role play such qualities as efficiency in conditions of low speeds,
resilience, adaptability, the ability to self-organization [
          <xref ref-type="bibr" rid="ref15 ref16 ref18 ref9">9, 15, 16, 18</xref>
          ]. Therefore, the class
of wireless personal area networks (WPAN) is actively used. Currently WPAN can be
with a short range (up to 10 m) and with increased range (up to 100 m), which allows
them to be located on the functional capabilities at the junction with the wireless local
area networks (WLAN). WPAN can be created based on different technologies of the
IEEE 802.15.4 standard: ZigBee, WirelessHart, MiWi, etc. [
          <xref ref-type="bibr" rid="ref14 ref15 ref16">14-16</xref>
          ].
        </p>
        <p>
          Among wired technologies of software and hardware components interaction the
long-established industry network standards are used in the IoT, such as Profibus,
Canbus, LON, Modbus, etc. [
          <xref ref-type="bibr" rid="ref10 ref8 ref9">8-10</xref>
          ]. It should be also noted, that for the software and
hardware elements connection to the Internet the standard family of protocols TCP/IP
is basically used in the IoT. Moreover, today for the networks service development in
the IoT according to the standard IEEE 802.15.4 it is especially important to use the
open 6LoWPAN protocol, standardized by IETF, that allows combining the
intellectual sensors in the Internet with a low data rate [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ].
        </p>
        <p>Using the given above technologies the IoT approach can be applied in various
fields. The main of them are listed below.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>IoT Applications</title>
        <p>
          The possibility of networking of the different types of sensors, actuators, embedded
devices with CPU, memory and power resources indicates that IoT approach finds
applications in almost all spheres [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. The systems based on IoT may be involved in
collecting information and controlling of objects in different settings, buildings,
factories cities, natural ecosystems, etc. [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. The main areas in which the IoT approach is
increasingly applied are as follows.
        </p>
        <p>
          Home automation. In this field the “Smart house” systems are used, that are the
residential extension of building automation and realize the control and automation of
lighting, air conditioning, ventilation, heating and security [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]. Such systems include
different switches and sensors, washers, dryers, ovens, refrigerators and other home
devices, that are connected to a central hub for remote monitoring and control. The
user interface can be interacted with a wall-mounted terminal, tablet, laptop, mobile
phone software or a web interface via internet cloud services [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]. The most popular
communications protocols for such systems are: X10, Ethernet, RS-485, 6LoWPAN,
Bluetooth LE (BLE), ZigBee, Z-Wave and others [
          <xref ref-type="bibr" rid="ref10 ref22 ref8 ref9">8-10, 22</xref>
          ].
        </p>
        <p>
          City infrastructure automation. In this field the “Smart city” systems are used, that
implement monitoring and controlling operations of urban and rural infrastructures
like bridges, railway tracks, on- and offshore- wind-farms etc. [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. The IoT
infrastructure can be used for monitoring and control of any parameters of urban objects
that can increase safety and compromise risk. For example, the IoT system for city
automation can calculate and predict the energy balance point of the city for a certain
period of time, automatically sending the control data to generators, power grids and
smart household devices in order to maintain the required energy balance [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
Municipal companies can save large sums of money, while continuing to maintain the
reliability and integrity of the power supply instead of buying new equipment.
        </p>
        <p>
          Transport automation. The IoT can assist in monitoring, control, and information
processing across various transportation systems [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. IoT systems can help to
configure dynamically switching of traffic lights and adjustable exits from highways,
thereby reducing congestion and improving traffic flow in real-time, rather than in
predictive models. Application of the IoT extends to all aspects of transportation
systems: smart parking, smart traffic control, vehicle control, fleet management and
logistic, electronic toll collection systems, road assistance, etc. [
          <xref ref-type="bibr" rid="ref14 ref15 ref16">14-16</xref>
          ].
        </p>
        <p>
          Environmental monitoring automation. IoT applications for environmental
monitoring use different sensors to aid in the field of environmental protection [
          <xref ref-type="bibr" rid="ref19 ref25">19, 25</xref>
          ].
These IoT systems can implement monitoring of air and water quality [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] as well as
soil and atmospheric conditions [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]. For example, a young Dutch company
"Sparked" implants sensors in the ears of cows, that allows farmers to monitor the
health and movement of cattle. This technology can increase the amount and quality
of produced meat. Also, the IoT applications for tsunami and earthquake
earlywarning systems can be used by emergency services to provide more effective aid.
IoT devices in this application should be enough mobile because they cover a large
geographic area [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
        </p>
        <p>
          Industrial automation. The application of the IoT in the manufacturing industry is
called the Industrial Internet of Things (IIoT) [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]. The IIoT will revolutionize
manufacturing by enabling the acquisition and accessibility of far greater amounts of data,
at far greater speeds, and far more efficiently than before. A number of innovative
companies have started to implement the IIoT [
          <xref ref-type="bibr" rid="ref16 ref26">16, 26</xref>
          ]. The company "Inductive
automation" developed the only IIoT platform “Ignition” with effective MQTT data
transfer protocol and full-featured SCADA functionalities built right in. “Ignition’s”
cross-platform compatibility and flexible modular configurability make it the world’s
first truly universal industrial application platform. “Ignition” empowers you to
connect IIoT data across your entire enterprise, launch clients to any device equipped
with a web browser, rapidly develop automated systems without any limits [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ].
        </p>
        <p>
          The IIoT can greatly improve the efficiency of the industrial renewable resources
installations, for example, windmills and solar panels. Business leaders can use IIoT
data to get a full and accurate view of how their enterprises are doing, which will help
them make better decisions [
          <xref ref-type="bibr" rid="ref16 ref26">16, 26</xref>
          ].
        </p>
        <p>
          The IIoT networks, by definition, cannot be limited by the perimeter of this or that
enterprise. Very important is the interaction with the manufactured product (“thing”)
during its operation, as well as access to cloud services that can be implemented in
data centers, scattered throughout the world [
          <xref ref-type="bibr" rid="ref13 ref26">13, 26</xref>
          ]. Thus, geographically distributed
infrastructure is a key feature of the IIoT.
        </p>
        <p>
          The main complexity of the IoT approach application in the industry is that
“things” in the industrial systems are complex technical objects, such as internal
combustion engines, industrial robots, steam turbines, chemical reactors, cargo cranes,
lathes, etc., that are involved in the performance of complex technological processes.
For the productive carrying out of these technological processes it is necessary to
implement monitoring and automatic control of their technical objects main process
parameters via the internet with high quality indicators in the real time mode [
          <xref ref-type="bibr" rid="ref10 ref7 ref8 ref9">7-10</xref>
          ].
Any technical malfunctions or errors, caused by the incorrect control, slowing down
of the performance, loss of the Internet for some time, etc., can lead to a reduction of
an economic efficiency or serious industrial accidents sometimes even with human
victims.
        </p>
        <p>Thus, the IIoT systems should include highly efficient software and hardware
means for the implementation of specialized algorithms of monitoring and automatic
control. Also, such systems should have an increased level of reliability, performance
and information security.</p>
        <p>Analyzing all the above requirements, we can conclude that at the current stage of
development of the IoT technologies it is advisable to develop and implement the
specialized EMACS for complex industrial technological objects and processes
automation on the basis of the IoT approach. Such systems should have a modular
structure with reliable and highly efficient software and hardware means as well as
industrial communication interfaces, located in close proximity to the technical objects, for
monitoring and automatic control implementation in safe and uninterrupted mode at
the local level. Also, these systems should be easily integrated into existing
largescaled IIoT systems through a wired or wireless Internet connections which cover one
or a group of industrial enterprises for monitoring and automatic control at the remote
level.</p>
        <p>Let us consider the developed by the authors EMACS for complex technological
objects and processes based on IoT approach.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Embedded Monitoring and Automatic Control Systems for</title>
    </sec>
    <sec id="sec-4">
      <title>Complex Technological Objects and Processes Based on IoT</title>
      <p>The basic diagram of the generalized EMACS for complex technological objects and
processes based on IoT approach is presented in Fig. 1, where the following notations
are accepted: PC – personal computer; PLC – programmable logic controller; FPGA –
field-programmable gate array; SBC – single-board computer; SDAM – sensors data
acquisition module; AOM – analog output module; S – sensor; AM – actuating
mechanism; u1, u2, un-1, un – control signals of actuating mechanisms; y1, y2, yn-1, yn – output
variables values of actuating mechanisms; x1, x2, xn-1, xn – technical object process
parameters; uS1, uS2, uSn-1, uSn – sensors output signals.</p>
      <p>The proposed generalized EMACS for complex technological objects and
processes based on IoT approach has two levels of monitoring and automatic control: local
level and remote level. Local level, in turn, is divided into three hierarchical levels of
monitoring and control:</p>
      <p>1) lower level – the level of the sensors and actuating mechanisms of the technical
object, that is involved in the performance of a certain technological process;
2) average level – the level of the peripheral monitoring and control devices
(includes modules for data acquisition and analog output as well as PLC/FPGA/SBC);
3) upper level – the level of HMI (includes industrial PC).</p>
      <p>
        Lower level of the developed EMACS consists of the automatic control
subsystems (ACSS), which perform automatic regulation of the given values of the
technical object major controlled data according to a control program in terms of various
disturbances operation [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8-10</xref>
        ].
      </p>
      <p>Fig. 1. Basic diagram of the generalized EMACS for complex technological objects and
processes based on IoT approach.</p>
      <p>
        Industrial PC of the upper level serves as the operator station. It contains a
specialized HMI in the form of a control panel of the technological process with the image of
the technical object main components and their technical parameters that are
measured by various sensors [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Also, the set values of the control parameters, that are
inputs of the technical object’s ACSS, are established on the industrial PC according
to a control program. PLC/FPGA/SBC of the average level processes the information
received from the sensors and sends it to the industrial PC. Also, it gets the set values
of the technological process control parameters and performs the functions of it
automatic control. Data acquisition modules receive signals from sensors and transmit it to
the PLC/FPGA/SBC in a convenient form for further processing [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Analog output
modules receive digital control signals from the PLC/FPGA/SBC and produce
corresponding analog control signals that go directly to the technical object’s actuators.
      </p>
      <p>
        The monitoring and automatic control operations in the remote level are
implemented by means of powerful web servers, remote computers, tablets and different
types of mobile devices [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. In this case PLC/FPGA/SBC or industrial PC with the
help of wired (Ethernet) or wireless (WiFi, mobile network 3G, 4G and others)
connection technologies and family of protocols TCP/IP exchange data via the Internet
with specialized web server that is placed on a powerful computer. Specialized web
server, in turn, receives data process parameters and provides Web access to other
users (remote computers, tablets, mobile devices). Moreover using the web server the
access to the technological process data can be given from any PC of the enterprise
IIoT system, that is running under any operating system (Windows, Linux, Mac OS,
etc.), and if desired, from any PC in the world connected to the Internet.
      </p>
      <p>In turn, the specialized HMI in the form of a control panel of the technological
process is installed on the server and on the all computers of the enterprise IIoT
system, where it is necessary, with all available functions of monitoring and control.
Also, the specialized server can implement the function of automatic data sending to
all the necessary users of the enterprise IIoT system in case of emergency and include
the online expert system for data analysis and forming the further control goals.</p>
      <p>As a concrete examples of the given above approach implementation let us
consider the developed by the authors highly effective EMACS for such complex technical
objects as gas turbine engines and floating docks.
3.1</p>
      <sec id="sec-4-1">
        <title>Embedded Monitoring and Automatic Control System for Gas Turbine</title>
      </sec>
      <sec id="sec-4-2">
        <title>Engines</title>
        <p>A new high-performance EMACS for a gas turbine engine is implemented with the
modular structure that includes monitoring and automatic control of main parameters
technological parameters in the local and remote levels using powerful data storage
and analysis tools. This system provides execution of the following functional tasks:
monitoring, automatic control and visualization of a gas turbine engine main process
parameters in real time mode at the local level and at the remote level via the internet;
visual display of information about the state of the engine with clear indication of
current states and emergencies; the ability of integration into existing large-scaled
IIoT systems of machine-building plants, enterprises or factories; automatic data
sending in case of emergency to the all users of the enterprise IIoT system. Also, the
developed EMACS for the gas turbine engines has modern and highly integrated
programming environment, that is enough flexible and easy to extend, flexible network
designs and ability of connection to online expert system for more detailed data
analysis.</p>
        <p>The functional structure of the proposed by the authors highly effective EMACS
for a gas turbine engines is shown in Fig. 2.</p>
        <p>As the software facilities of the developed EMACS for a gas turbine engines the
TRACE MODE 6 is used, which belongs to the class of integrated systems that
provide maximum comfort to designers and users. Basing on the system tasks with the
help of TRACE MODE 6 the authors developed the specialized HMI, main screen of
which is shown in Fig. 3.</p>
        <p>The given HMI is intended to indicate the values of the basic parameters and the
position of elements of fuel, oil and air systems, launch systems, and others. Also, the
set values of the control parameters, that are inputs of the ACSSs of the gas turbine
engine EMACS, are established with the help of HMI on the industrial PC. PLC, in
turn, processes the information received from the sensors and sends it to the industrial
PC. Also, it gets the set values of the gas turbine engine control parameters and
performs the functions of it automatic control. Data acquisition modules receive signals
from sensors and transmit it to the PLC in a convenient form for further processing.
Analog output modules receive signals from the PLC and produce corresponding
control signals that go directly to the gas turbine engine actuators.</p>
        <p>The hardware facilities for the EMACS for gas turbine engines implementation are
data acquisition modules, analog output modules and PLC. As a PLC the WP-8131 of
the ICP DAS company is used. To receive signals from sensors of different types in
this EMACS 2 types of the ICP DAS company data acquisition modules are used:
I7018P modules with 8 inputs – for data acquisition from thermocouples; I-7017C
modules with 8 inputs – for data acquisition from sensors with current output
(0...20 mA). To implement the conversion of digital signals from the PLC to analog
ones that directly go to the actuators of the complex parameters ACSS the I-7024
modules with 4 outputs of the ICP DAS company are used.</p>
        <p>In this EMACS the monitoring and automatic control operations in the remote
level are implemented by means of specialized web server, remote computers, tablets
and different types of mobile devices. In this case, PLC with the help of Ethernet
connection and family of protocols TCP/IP exchange data via the Internet with the
enterprise main web server that is placed on a powerful computer. The main server, in
turn, receives the gas turbine engines data process parameters and provides Web
access to other users (remote computers, tablets, mobile devices).
3.2</p>
      </sec>
      <sec id="sec-4-3">
        <title>Embedded Monitoring and Automatic Control System for Floating Docks</title>
        <p>
          The new efficient EMACS for floating docks is designed for implementation of the
main docking operations, monitoring and control of current values of the draft, list
and trim angles, hogging and sagging, input and output valves states, as well as liquid
level, temperature and volume in ballast tanks of floating docks [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. EMACS
modular structure ensures flexibility and scalability of the system, and therefore can be
easily embedded into large-scaled IIoT systems of shipbuilding plants, enterprises and
shipyards. Also, it provides automatic data sending in case of the floating docks
emergency situations to the all users of the ship's enterprise IIoT system.
        </p>
        <p>
          The functional structure of the proposed by the authors highly efficient EMACS
for floating docks docking operations is shown in Fig. 4 [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>
          EMACS for floating docks is divided into local and remote control options of
floating dock. Local control of parameters is made directly on the floating dock,
operator has the ability to monitor all the parameters and control of the dock actuators.
Distance control of parameters required for use from shipbuilding plant, enterprise or
shipyard land office [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. It is implemented via the wireless Internet connection.
        </p>
        <p>
          As the software means of the developed EMACS for floating docks docking
operations also the TRACE MODE 6 is used, with the help of which the specialized HMI
(Fig. 5) is developed by the authors [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. The proposed HMI allows displaying the
basic parameters recorded by the control system of dock operations for floating docks.
        </p>
        <p>As a PLC the WP-8131 of the ICP DAS company is used. For the successful
launch of the given EMACS the industrial PC and all the computers of the ship's
enterprise IIoT system must be equipped with a real-time monitor Trace Mode 6. To
receive signals from the floating dock sensors of different types in this EMACS the
ICP DAS company I-7018P and I-7017C data acquisition modules are used.</p>
        <p>To implement the conversion of digital signals from the PLC to analog ones that
directly go to the floating dock parameters ACSS the I-7061 modules for output are
used. PLC is also connected with industrial and dual-band 3G WCDMA with 4 ranges
GSM/GPRS module I-8212W-3GWA, which enables the creation of wireless
communication to the Internet for remote monitoring and control options of floating dock.</p>
        <p>
          In the developed EMACS the monitoring and automatic control operations in the
remote level are implemented by means of the web servers, remote computers, tablets
and different types of mobile devices [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. In this case, PLC with the help of wireless
mobile network 3G or 4G connection and family of protocols TCP/IP exchange data
via the Internet with specialized web server that is placed on a ship’s enterprise land
office. The main web server, in turn, receives the floating dock data process
parameters and provides Web access to the other users (remote computers, tablets, mobile
devices).
        </p>
        <p>
          One of the most important particularities of the developed by the authors new
highly efficient EMACSs is that they can implement intelligent principles and
technologies of automatic control based on the theory of artificial neural networks and fuzzy
logic [
          <xref ref-type="bibr" rid="ref27 ref28 ref29 ref30">27-30</xref>
          ]. This allows achieving higher quality indicators and accuracy at
automatic control of main process parameters of the complex technical objects with
essentially nonlinear and non-stationary characteristics. The monitoring and automatic
control systems, developed on the basis of artificial neural networks and fuzzy logic,
currently successfully applied in such areas as: technological processes and transport
control, financial management, medical and technical diagnostics, pattern recognition,
stock forecast, etc. [
          <xref ref-type="bibr" rid="ref31 ref32 ref33 ref34 ref35">31-35</xref>
          ].
        </p>
        <p>At the further development and improvement of the IoT technologies it is
reasonable to improve the developed by the authors EMACS in the following way. The main
functions and algorithms of monitoring and automatic control of the technical objects
main process parameters should be transferred from the software and hardware means
of the local level, located in close proximity to the technical objects, to the high
performance servers of the remote level that will be located in the server clusters, data
processing centers or clouds. The main benefit of the new structure is that the total
number of the monitoring and automatic control systems will be significantly
reduced, that simplify the monitoring and control process itself. Moreover, computing
resources using effectiveness will increase and will need less means.</p>
        <p>This transition can be possible only at a significant quality improving of the
network infrastructure, specifically at essential increasing of data transfer performance
and connection reliability as well as eliminating of unexpected delays between local
level devices and their serving servers. These issues are highly relevant and are still
the subject of research for leading scientific and technical teams in different countries.
4</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>The analysis of the IoT approach and its application for the development of embedded
monitoring and automatic control systems for technological objects and processes,
that are included in complex industrial systems, are presented in this paper.</p>
      <p>The IoT information technologies provide unique abilities to the developers of
complex data processing, monitoring and control systems. Range of functions that
they provide eases the creation of distributed computerized systems.</p>
      <p>The examples of IoT applications in design of new effective specialized EMACSs
for such complex technical objects as gas turbine engines and floating docks are
presented. The functional structures, software and hardware implementation as well as
multi-level HMIs of the developed embedded systems for monitoring and automatic
control of main process parameters are given. These systems have the modular
structures with reliable and highly efficient software and hardware means as well as
industrial communication interfaces, located in close proximity to the given technical
objects, for monitoring and automatic control implementation in safe and uninterrupted
mode at the local level. Also, the given systems implement monitoring and automatic
control of the given objects main parameters from the remote servers and clients via
the wired and wireless Internet connections and can be easily integrated into existing
large-scaled IIoT systems of industrial enterprises.</p>
      <p>As a result the developed new efficient EMACS based on IoT approach provide:
high precision control of operating processes of gas turbine engines and floating
docks in the real time mode, monitoring and automatic control of their current
technological parameters with high quality indicators, that leads to significant increasing of
energy and economic efficiency of both given complex technical objects.</p>
      <p>Further research should be conducted towards the development of the IoT based
systems, which main software and hardware means of monitoring and automatic
control functions and algorithms will be transferred from the local level to the high
performance servers of the remote level, located in the server clusters, data processing
centers and clouds. This transition should be followed by improving of the network
infrastructure through increasing of data transfer performance and connection
reliability as well as eliminating of unexpected delays between local level devices and their
serving servers.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Merz</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hansemann</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hübner</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          : Building Automation:
          <article-title>Communication systems with EIB/KNX, LON and BACnet</article-title>
          . Berlin, Heidelberg: Springer-Verlag (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Mehta</surname>
            ,
            <given-names>B.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reddy</surname>
            ,
            <given-names>Y.J.:</given-names>
          </string-name>
          <article-title>Chapter 7 - SCADA systems</article-title>
          .
          <source>Industrial Process Automation Systems</source>
          ,
          <volume>237</volume>
          -
          <fpage>300</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Dulău</surname>
            ,
            <given-names>I.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abrudean</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bică</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>SCADA Simulation of a Distributed Generation System with Storage Technologies</article-title>
          .
          <source>Procedia Technology</source>
          ,
          <volume>19</volume>
          ,
          <fpage>665</fpage>
          -
          <lpage>672</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Tanyi</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Noulamo</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nkenlifack</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsochounie</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>A Multi-agent Design and Implementation of an Internet Based Platform for the Remote Monitoring and Control of the Cameroon Power Network</article-title>
          .
          <source>Engineering Letters</source>
          ,
          <volume>13</volume>
          (
          <issue>2</issue>
          ),
          <fpage>195</fpage>
          -
          <lpage>203</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <article-title>The use of an integrated platform for creating TRACE MODE SCADA and Production Management: Theory and Practice, 5th int</article-title>
          . conf., the conference materials (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Erez</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wool</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems</article-title>
          .
          <source>International Journal of Critical Infrastructure Protection</source>
          <volume>10</volume>
          ,
          <fpage>59</fpage>
          -
          <lpage>70</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korobko</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlov</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          :
          <article-title>Frequency Tuning Algorithm for Loudspeaker Driven Thermoacoustic Refrigerator Optimization</article-title>
          .
          <source>Lecture Notes in Business Information Processing: Modeling and Simulation in Engineering, Economics and Management</source>
          .
          <string-name>
            <surname>- K. J. Engemann</surname>
            ,
            <given-names>A. M.</given-names>
          </string-name>
          <string-name>
            <surname>Gil-Lafuente</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          <string-name>
            <surname>Merigo</surname>
          </string-name>
          (Eds.). - Berlin, Heidelberg: Springer-Verlag,
          <volume>115</volume>
          ,
          <fpage>270</fpage>
          -
          <lpage>279</lpage>
          (
          <year>2012</year>
          ), DOI: 10.1007/978-3-
          <fpage>642</fpage>
          -30433-0_
          <fpage>27</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korobko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gerasin</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Topalov</surname>
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>PLC Based System for Remote Liquids Level Control with Radar Sensor. The crossing point of Intelligent Data Acquisition &amp; Advanced Computing Systems and East &amp; West Scientists</article-title>
          ,
          <source>in Proceedings of the 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)</source>
          , Warsaw, Poland.
          <fpage>47</fpage>
          -
          <lpage>52</lpage>
          (
          <year>2015</year>
          ), DOI: 10.1109/IDAACS.
          <year>2015</year>
          .7340699
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korobko</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlov</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          :
          <article-title>PLC-Based Systems for Data Acquisition and Supervisory Control of Environment-Friendly Energy-Saving Technologies</article-title>
          . In book: Green IT Engineering: Concepts, Models, Complex Systems Architectures. Series:
          <article-title>Studies in Systems, Decision and</article-title>
          <string-name>
            <surname>Control</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Kharchenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Kondratenko</surname>
          </string-name>
          , J.
          <source>Kacprzyk (Eds.)</source>
          , Vol.
          <volume>74</volume>
          . Berlin, Heidelberg: Springer International Publishing,
          <volume>247</volume>
          -
          <fpage>267</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Topalov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Control Processes of Floating Docks Based on SCADA Systems with Wireless Data Transmission</article-title>
          .
          <source>Perspective Technologies and Methods in MEMS Design: Proceedings of the International Conference MEMSTECH</source>
          <year>2016</year>
          ,
          <article-title>LvivPoljana</article-title>
          , Ukraine,
          <fpage>57</fpage>
          -
          <lpage>61</lpage>
          (
          <year>2016</year>
          ), DOI: 10.1109/MEMSTECH.
          <year>2016</year>
          .7507520
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Kim</surname>
          </string-name>
          , H.J.:
          <article-title>Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks</article-title>
          .
          <source>Hindawi Publishing Corporation International Journal of Distributed Sensor Networks</source>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Aydogmus</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aydogmus</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>A Web-Based Remote Access Laboratory Using SCADA</article-title>
          .
          <source>IEEE Transactions on education</source>
          ,
          <volume>52</volume>
          (
          <issue>1</issue>
          ),
          <fpage>126</fpage>
          -
          <lpage>132</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Sulthana</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thatiparthi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gunturi</surname>
            ,
            <given-names>R.S.</given-names>
          </string-name>
          :
          <article-title>Cloud and Intelligent Based SCADA Technology</article-title>
          .
          <source>International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)</source>
          ,
          <volume>2</volume>
          (
          <issue>3</issue>
          ) (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Weber</surname>
            ,
            <given-names>R. H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weber</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <source>Internet of Things</source>
          . Berlin, Heidelberg: Springer-Verlag (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Giusto</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lera</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morabito</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Atzori</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>The Internet of Things</article-title>
          . Berlin, Heidelberg: Springer-Verlag (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Uckelmann</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harrison</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Michahelles</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Architecting the Internet of Things</article-title>
          . Berlin, Heidelberg: Springer-Verlag (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Sarma</surname>
            ,
            <given-names>Sanjay E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stephen</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          . Weis, Daniel W. Engels:
          <article-title>RFID systems and security and privacy implications</article-title>
          .
          <source>In Cryptographic Hardware and Embedded Systems-CHES</source>
          <year>2002</year>
          , Berlin, Heidelberg: Springer-Verlag,
          <fpage>454</fpage>
          -
          <lpage>469</lpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Ovidiu</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Friess</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guillemin</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          et al.:
          <article-title>Internet of things strategic research roadmap</article-title>
          .
          <source>Internet of Things-Global Technological and Societal Trends</source>
          ,
          <fpage>9</fpage>
          -
          <lpage>52</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Vermesan</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Friess</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Internet of Things: Global Technological and Societal Trends from Smart Environments and Spaces to Green ICT</article-title>
          . River Publishers (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Payam</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Henson</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taylor</surname>
          </string-name>
          , K.:
          <article-title>Semantics for the Internet of Things: early progress and back to the future</article-title>
          .
          <source>International Journal on Semantic Web and Information Systems (IJSWIS) 8</source>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>21</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Rellermeyer</surname>
          </string-name>
          , Jan S.,
          <string-name>
            <surname>Duller</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gilmer</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          et al.:
          <article-title>The software fabric for the internet of things</article-title>
          .
          <source>In The Internet of Things</source>
          , Springer Berlin Heidelberg,
          <fpage>87</fpage>
          -
          <lpage>104</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Zach</surname>
          </string-name>
          , Sh.,
          <string-name>
            <surname>Bormann</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          : 6LoWPAN:
          <article-title>The wireless embedded Internet</article-title>
          . John Wiley &amp; Sons,
          <volume>43</volume>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Parikshit</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Babar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prasad</surname>
            ,
            <given-names>N. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prasad</surname>
          </string-name>
          , R.:
          <article-title>Identity Management Framework Towards Internet of Things (IoT): Roadmap</article-title>
          and
          <string-name>
            <given-names>Key</given-names>
            <surname>Challenges</surname>
          </string-name>
          .
          <source>Recent Trends in Network Security and Applications</source>
          , Berlin, Heidelberg: Springer-Verlag,
          <fpage>430</fpage>
          -
          <lpage>439</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>R. Y. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Ch</surname>
          </string-name>
          . Y.,
          <string-name>
            <surname>Mak</surname>
            ,
            <given-names>Ch. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tang</surname>
          </string-name>
          , T. B.:
          <article-title>Sustainable Smart Home and Home Automation: Big Data Analytics Approach</article-title>
          .
          <source>International Journal of Smart Home</source>
          ,
          <volume>10</volume>
          (
          <issue>8</issue>
          ),
          <fpage>177</fpage>
          -
          <lpage>198</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Sh.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhou</surname>
          </string-name>
          , G.:
          <source>Application Study on Internet of Things in Environment Protection Field. Lecture Notes in Electrical Engineering Volume. Lecture Notes in Electrical Engineering</source>
          ,
          <volume>133</volume>
          ,
          <fpage>99</fpage>
          -
          <lpage>106</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bagheri</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kao</surname>
          </string-name>
          , H.:
          <article-title>A cyber-physical systems architecture for industry 4.0-based manufacturing systems</article-title>
          .
          <source>Manufacturing Letters</source>
          ,
          <volume>3</volume>
          ,
          <fpage>18</fpage>
          -
          <lpage>23</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Zadeh</surname>
            ,
            <given-names>L. A.</given-names>
          </string-name>
          :
          <article-title>The role of fuzzy logic in modeling, identification and control</article-title>
          ,
          <source>Modeling Identification and Control</source>
          ,
          <volume>15</volume>
          (
          <issue>3</issue>
          ),
          <fpage>191</fpage>
          -
          <lpage>203</lpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Takagi</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sugeno</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Fuzzy identification of systems and its applications to modeling and control</article-title>
          ,
          <source>IEEE transactions on systems, Man, and Cybernetics</source>
          ,
          <volume>15</volume>
          (
          <issue>1</issue>
          ) (
          <year>1985</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Piegat</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Fuzzy Modeling and Control</article-title>
          , Physica-Verlag, Heidelberg, New York (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Jang</surname>
            ,
            <given-names>J.-S. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sun</surname>
          </string-name>
          , C.-T.,
          <string-name>
            <surname>Mizutani</surname>
          </string-name>
          , E.:
          <article-title>Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning</article-title>
          and Machine Intelligence,'' Prentice Hall (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Hayajneh</surname>
            ,
            <given-names>M. T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Radaideh</surname>
            ,
            <given-names>S. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smadi</surname>
            ,
            <given-names>I. A.</given-names>
          </string-name>
          :
          <article-title>Fuzzy logic controller for overhead cranes</article-title>
          ,
          <source>Engineering Computations</source>
          ,
          <volume>23</volume>
          (
          <issue>1</issue>
          ),
          <fpage>84</fpage>
          -
          <lpage>98</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kazmierski</surname>
          </string-name>
          , T. J.:
          <article-title>VHDL-AMS Based Genetic Optimization of Fuzzy Logic Controllers</article-title>
          ,
          <source>International Journal for Computation and Mathematics in Electrical and Electronic Engineering</source>
          ,
          <volume>26</volume>
          (
          <issue>2</issue>
          ),
          <fpage>447</fpage>
          -
          <lpage>460</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlov</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klymenko</surname>
            ,
            <given-names>L.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>G.V.</given-names>
          </string-name>
          :
          <article-title>Synthesis and Research of Neuro-Fuzzy Model of Ecopyrogenesis Multi-circuit Circulatory System</article-title>
          . In: M.
          <string-name>
            <surname>Jamshidi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Kreinovich</surname>
          </string-name>
          , J. Kazprzyk (Eds)
          <article-title>Advance Trends in Soft Computing</article-title>
          , vol.
          <volume>312</volume>
          , Springer, Series: Studies in Fuzziness and Soft Computing,
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlov</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          :
          <article-title>Mathematical Model of Ecopyrogenesis Reactor with Fuzzy Parametrical Identification. Recent Developments and New Direction in SoftComputing Foundations and Applications</article-title>
          .
          <source>Studies in Fuzziness and Soft Computing</source>
          <volume>342</volume>
          .
          <string-name>
            <surname>Lotfi</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <string-name>
            <surname>Zadeh</surname>
          </string-name>
          et al. (Eds.). Berlin, Heidelberg: Springer-Verlag,
          <fpage>439</fpage>
          -
          <lpage>451</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korobko</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlov</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          :
          <article-title>Synthesis and Optimization of Fuzzy Controller for Thermoacoustic Plant</article-title>
          .
          <article-title>Recent Developments and New Direction in SoftComputing Foundations and Applications</article-title>
          .
          <source>Studies in Fuzziness and Soft Computing</source>
          <volume>342</volume>
          .
          <string-name>
            <surname>Lotfi</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <string-name>
            <surname>Zadeh</surname>
          </string-name>
          et al. (Eds.). Berlin, Heidelberg: Springer-Verlag,
          <fpage>453</fpage>
          -
          <lpage>467</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>