<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Multi-Criteria Decision Making Approaches for Choice of Wireless Communication Technologies for IoT-Based Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>pivin</string-name>
          <email>anya.krapivina@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuriy Kon</string-name>
          <email>halyna.kondratenko@chmnu.edu.ua</email>
          <email>yuriy.kondratenko@chmnu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Intelligent Information Systems Department, Petro Mohyla Black Sea National University</institution>
          ,
          <addr-line>68th Desantnykiv Str., 10, Mykolaiv, 54003</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>In this paper, several methods and approaches for multi-criteria selection of wireless communication technologies for Internet of Things (IoT) systems are analyzed. Their comparative analysis allows to choose the most appropriate multi-criteria method for increasing the efficiency of decision-making for different input data and various functioning conditions of IoT-based systems. The multi-criteria task of choosing a wireless communication technologies is definitely complicated and important because the decision-making process can be influenced by various types of criteria. Authors discuss in detail the simulation results and advantages of multi-criteria selection of wireless communication technologies based on the methods of linear, Max-Min and multiplicative convolution and the ideal point method with different metrics (Euclidean, Hamming and Chebyshev) with the study of the influence of current methods on the decision making efficiency.</p>
      </abstract>
      <kwd-group>
        <kwd>wireless communication technology</kwd>
        <kwd>IoT</kwd>
        <kwd>decision-making</kwd>
        <kwd>multicriteria approach</kwd>
        <kwd>ideal point method</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Decision-making always involves choosing one of the possible options making
decisions. These possible options are called alternatives. Problem situations must have at
least two options. That is, at least two alternatives are needed to create a
decisionmaking task. Independent alternatives are alternatives, actions which do not affect the
quality of other alternatives. Dependent alternatives are decisions on one of them
affect the other [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
        ].
      </p>
      <p>
        Sometimes all alternatives are given in advance and you just have to select from
them. The peculiarity of such tasks lies in a closed and non-expanded number of
alternatives. But there are tasks in which all alternatives or part of them are not formed
before the decision is made. Often on the basis of such alternatives in the process of
selection, new alternatives or a set of requirements to existing alternatives arise. This
task class calls tasks with constructive alternatives [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        When there are many alternatives, the decision maker (DМ) cannot devote enough
time and attention to analyze each of them. So there is a need for tools to support
choosing (making) decisions. In the modern decision-making theory, it is considered
that variants of solutions are characterized by various types of their attractiveness for
DM [
        <xref ref-type="bibr" rid="ref1 ref2 ref4">1, 2, 4</xref>
        ]. These indicators are called attributes, factors or quality metrics. All of
them serve as criteria for choosing a solution. The number of criteria are usually more
than one in different theoretical constructions and decision methods. Modern methods
of decision-making take into account all the special qualities of alternatives that
significantly brings formal schemes to the real world. Therefore, now a multi-criteria
description is becoming more popular in use. Usually, evaluation criteria are not given
at the beginning of the analysis of the problem. They are established by DM and
experts [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Related Works and Problem Statement</title>
      <p>
        Recently, wireless data transmission has become increasingly popular. The
widespread use of wireless networks is due to the fact that they can be used not only on
personal computers, but also on phones, tablets and laptops, at a reasonable price,
convenience and provide sufficient data transfer speeds for most applications. The
main advantage of wireless networks is the permission to implement a network project
in the short term and reduce the cost of creating a system [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
      </p>
      <p>
        The task of choosing a wireless data transfer (communication) technology is
definitely relevant as the decision-making process can be influenced by various types of
criteria, in particular, the quality and power of the data signal, the security of the
technology, energy efficiency, etc. In most cases, the choice of wireless data technology is
reduced to a comparative analysis of their capabilities and pricing policies. In this
case, IoT developers often prefer well-known wireless data technologies, without
taking into account the criteria (factors) that may affect the development,
maintenance, updating, reliability, security and scaling of developed IoT systems in the
future. Incorrectly selected technology can lead to various losses [
        <xref ref-type="bibr" rid="ref5 ref7 ref8">5, 7, 8</xref>
        ].
      </p>
      <p>Let's consider several wireless communication technologies: ZigBee ( E1 ), Wi-Fi
( E2 ), Bluetooth ( E3 ), Z-Wave ( E4 ), WiMAX ( E5 ), Classic WaveLAN ( E6 ). Each of
these technologies has its advantages and disadvantages.</p>
      <p>
        ZigBee ( E1 ) technology for wireless sensory and personal networks. The ZigBee
technology provides low power consumption and data transfer at a non-licensed 2.4
GHz frequency (different countries may vary in frequency) up to 250 KB / s, up to 75
meters in direct line of sight. One of the advantages and disadvantages of technology
at the same time is its complexity [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ].
      </p>
      <p>
        Wi-Fi ( E2 ) is a trademark of the Wi-Fi Alliance association, which is a standard
set of standards for IEEE 802.11 for broadband radio communications. Depending on
the standard, Wi-Fi uses a data bandwidth of 2.4 GHz or 5 GHz. The main
disadvantage of Wi-Fi compared with competitors is relatively higher power consumption
[
        <xref ref-type="bibr" rid="ref11 ref12 ref5">5, 11, 12</xref>
        ].
      </p>
      <p>
        Bluetooth ( E3 ) low-bandwidth radio communication technology (typically up to
200 meters) in the unlicensed frequency band (ISM range: 2.4-2.4835 GHz). One of
the easiest ways to connect two devices. To communicate between devices, only a
Bluetooth adapter is required. Relative versatility is both an advantage and a lack of
Bluetooth [
        <xref ref-type="bibr" rid="ref13 ref14 ref15 ref6">6, 13-15</xref>
        ].
      </p>
      <p>
        Z-Wave ( E4 ) is a compatible wireless technology for managing and monitoring
applications for residential and commercial environments [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The main purpose of
Z - Wave is to provide reliable transmission of short messages from the control unit
to other network nodes [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The Z-Wave network allows you to use the full-type
topology without the need for a coordinator [
        <xref ref-type="bibr" rid="ref17 ref18 ref5">5, 17, 18</xref>
        ].
      </p>
      <p>
        LTE ( E5 ) is a standard for wireless broadband communication, based on the
GSM/EDGE and UMTS/HSPA technologies. It increases the capacity and speed using
a different radio interface together with core network improvements. Its main features
are peak download rates up to 299.6 Mbit/s and upload rates up to 75.4 Mbit/s
depending on the user equipment category (with 4×4 antennas using 20 MHz of
spectrum); five different terminal classes have been defined from a voice-centric class up
to a high-end terminal that supports the peak data rates; all terminals will be able to
process 20 MHz bandwidth; support of at least 200 active data clients in every 5 MHz
cell [
        <xref ref-type="bibr" rid="ref10 ref5 ref6">5, 6, 10</xref>
        ].
      </p>
      <p>Classic WaveLAN ( E6 ) is used to organize local networks (a wireless alternative
to wired networks Ethernet and Token Ring). Data transmission is carried out in the
frequency range of 900 MHz or 2.4 GHz, while the transmission speed is up to 2
Mbps [19-21].</p>
      <p>The following criteria for choosing a wireless data technology were selected.</p>
      <p>
        Data transfer rate ( Q1 ). The average number of bits, characters, or units
transmitted per unit time between two corresponding data transfer system devices [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Frequency Range ( Q2 ). Frequency band limited by certain values [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        Technology Definition ( Q3 ). Alert for unauthorized access or damage to IoT
devices using a wireless network [
        <xref ref-type="bibr" rid="ref10 ref8">8, 10</xref>
        ].
      </p>
      <p>
        Number of nodes ( Q4 ). The typical wireless network infrastructure consists of
several access nodes. These nodes are connected to the network by means of wires
and form the hidden-minded users of cities for wireless clients. Wireless clients are
client devices (say, laptops, desktops, or pocket computers) [
        <xref ref-type="bibr" rid="ref11 ref5">5, 11</xref>
        ].
      </p>
      <p>
        Range of action ( Q5 ). Maximum distance between transmitter and receiver [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        Energy Efficiency ( Q6 ). Effective (rational) use of energy reserves. Wireless
sensor networks can be used to monitor energy efficiency [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        The multi-criteria problem can be formulated on the basis of developed criteria
and a set of alternative solutions, and can be solved by one of the appropriate methods
of multi-acceptance of pinning, in particular by the methods of coagulation (linear,
Max-Min, multiplicative) and the ideal point method [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3, 22, 23</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>Methods of Multi-criteria Selection of Wireless</title>
    </sec>
    <sec id="sec-4">
      <title>Communication Technology</title>
      <p>
        The analysis of many real practical problems naturally led to the emergence of a class
of multi-criteria problems. The solution of the corresponding problems is through the
use of such methods as selection of the main criterion, linear, multiplicative and
MaxMin convolutions, the ideal point method, the method of sequential concessions,
lexicographic optimization. Most of the methods of multi-criteria decision-making
provide a multi-criteria problem for a one-tiered one, which greatly simplifies the
decision-making process [
        <xref ref-type="bibr" rid="ref1">1, 24-26</xref>
        ].
      </p>
      <p>The task of choosing a wireless data technology can be presented in the following
form (decision matrix):
 Q1  E1   Q1  E2    Q1  Em  
 
Q  Ei    Q2 E1       Q   2   E  2            Q   2 Em  ; Ei  E;i  1, 2,, m; j  1, 2,, n ,
 
 Qn  E1   Qn  E2    Qn  Em  </p>
      <p>
        All methods for solving multi-criteria optimization problems are based on the
construction of an initial problem with a vector criterion to an optimization problem with
a scalar criterion. The methods themselves differ only by the mechanism of realization
of such an assembly. Let's consider the convolution methods: linear, max-min, and
multiplicative of partial criteria [
        <xref ref-type="bibr" rid="ref1 ref3">1, 3, 27-29</xref>
        ].
      </p>
      <p>
        The simplest and most widespread way of combining the original criteria is based
on the use of a linear convolution that has the form [
        <xref ref-type="bibr" rid="ref1">1, 30</xref>
        ]:
      </p>
      <p>n n
Q  Ei    jQj  Ei    Max; Ei  E; j  0;  j  1; i  1, 2,, m ,</p>
      <p>j1 j1
where Q  Ei  is the vector criterion of quality of the i-th alternative; Qj  Ei  is the
j-th component of the vector criterion of quality Q  Ei  .</p>
      <p>
        The evaluation of the i-th alternative for the j-th criterion Qj  Ei  has a
welldefined scale of evaluation and is formed by experts based on their experience,
knowledge and experimental research in the field of wireless data transfer technology
between devices in IoT networks [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3, 25, 27</xref>
        ].
      </p>
      <p>To solve the problem of choosing a wireless data technology, you need to find the
best alternative E* based on the input data (1):</p>
      <p>E*  Arg max Q  Ei  , Ei  E;i  1, 2,..., 6 .</p>
      <p>i1,2,,m
(1)
(2)
(3)
where  j is the weight coefficient reflecting the relative importance of the j-th
criterion Qj  Ei  .</p>
      <p>
        Another variant of the scalarization of the criteria is the multiplicative convolution
[
        <xref ref-type="bibr" rid="ref1 ref3">1, 3, 25, 30</xref>
        ]:
      </p>
      <p>n n
Q  Ei    Qj  Ei  j  Max; Ei  E; j  0;  j  1; i  1, 2,, m .</p>
      <p>j1   j1</p>
      <p>In this case, the main feature of the application of these methods is the choice of a
method for the formation of weight coefficients  j . This significantly influences the
choice of the optimal solution E* [30-32].</p>
      <p>
        The name of the method of an ideal point is due to the fact that when it
implements, the DM specifies certain target values for each partial criterion. Within the
framework of the method, the assumption is made that the so-called "ideal point"
exists in the space of the criteria [
        <xref ref-type="bibr" rid="ref1 ref3">1, 3, 30</xref>
        ]:
      </p>
      <p>Q*j   im1,2a,x,m Qj  Ei ; Ei  E;i  1, 2,m; j  1, 2,n ,
where Q *j is the optimal solution of the j-th criterion.</p>
      <p>
        These optimal solutions will serve as coordinates of the ideal point in the criteria
space [
        <xref ref-type="bibr" rid="ref1">1, 30</xref>
        ]:
(4)
(5)
(6)
(7)
      </p>
      <p>
        Most methods of multi-criteria decision-making are based precisely on the
application of this method. The reasons for this are the simplicity and visibility of the
method. Weights can be considered as indicators of the relative importance of each
criterion [
        <xref ref-type="bibr" rid="ref1">1, 25, 29, 30</xref>
        ].
      </p>
      <p>
        More versatile, from the point of view of the application area is the Max-Min
convolution, which has the form [
        <xref ref-type="bibr" rid="ref1">1, 25</xref>
        ]:
n
Q  Ei   im1,2i,..n.,m  jQj  Ei    Max; Ei  E; j  0; j1 j  1 .
      </p>
      <p>Q*  Q1* , Q2* , , Qn*   ,
where Q* is an ideal point.</p>
      <p>
        If the ideal point is permissible (but this happens very rarely), the decision is
considered to be received. Otherwise, it is necessary to determine the distance to the ideal
point. To do this, you need to select a metric, and finally solve one criterion problem
of finding a point from the set of permissible solutions, which is closest to the ideal
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The optimization task looks like this:
d p  Ei   p Q  Ei   Q*   Min; Ei  E;i  1, 2,m, 
 
(8)
where d p  Ei  is the distance between the ideal point and the i-th alternative Q  Ei  ;
p is the metric of distance measurement.
      </p>
      <p>
        If the Euclidean metric is chosen, then distance (8) has the form [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]:
d p  Ei  
n
j1 Qj  Ei   Q*j 2   Min; Ei  E;i  1, 2,m, j  1, 2,n .
      </p>
      <p>
        If the Heming Metric is selected, then distance (8) has the form [
        <xref ref-type="bibr" rid="ref1 ref4">1, 4</xref>
        ]:
n
d p  Ei    Qj  Ei   Q*j   Min; Ei  E;i  1, 2,m, j  1, 2,n .
      </p>
      <p>
        j1
If the Chebyshev metric is chosen, then distance (8) has the form [
        <xref ref-type="bibr" rid="ref1">1, 30</xref>
        ]:
d p  Ei  
max
i1,2,,m
      </p>
      <p>Qj  Ei   Q*j   Min; Ei  E;i  1, 2,m, j  1, 2,n .</p>
      <p>(9)
(10)
(11)
4</p>
    </sec>
    <sec id="sec-5">
      <title>An Example of Multi-criteria Choice of Wireless</title>
    </sec>
    <sec id="sec-6">
      <title>Communication Technology Using Convolution Methods and</title>
    </sec>
    <sec id="sec-7">
      <title>Ideal Point Method</title>
      <p>Experts are encouraged to evaluate alternative solutions according to the indicated
criteria using the 10-point rating scale (from 1 to 10), where 10 points correspond to
the largest (better) value of the alternative solution by the criterion [30]. Consider an
example of expert assessments for this task in Table 1.</p>
      <p>
        For this example, we use the direct evaluation method, that is, the expert himself
determines the importance of each criterion. Table 2 shows the weight coefficients for
each criterion using simple ranking method [
        <xref ref-type="bibr" rid="ref1">1, 30</xref>
        ].
Calculate with a linear convolution method (3):
      </p>
      <p>Calculate using multiplicative convolution (5). In this case (Table 4), the best
alternative is E5 (LTE).</p>
      <p>In this way (12), the best alternative is E5 (LTE).</p>
      <p>Calculate with Max-Min convolution (4). In this case (Table 3), the best
alternative is E6 (Classic WaveLAN).</p>
      <p>Q*  Q1*,Q2*,Q3*,Q4*,Q5*,Q6*   10, 9,8, 9,10,10 .</p>
      <p>The ideal point is not equivalent to any of the alternative solutions; therefore, it is
necessary to find the distance between the alternatives and the ideal point (8) using the
different metrics. An alternative with the smallest distance will be optimal.</p>
      <p>Calculate the distance using the Euclidean metric (9) from the E1 to Q* :
d p  E1   6 102  8  92  7  82  9  92  10 102  8 102  4, 69 .</p>
      <p>Calculate the distance using the Heming metric (10) from the E1 to Q* :</p>
      <p>Calculate the distance using the Chebyshev Metric (11) from the E1 to Q* :
d p  E1   Max  6 10 , 8  9 , 7  8 , 9  9 , 10 10 , 8 10   4.0 .</p>
      <p>The distances for all alternatives are given in Table 4.</p>
      <p>So, the results by the convolution methods (3), (4), (5) and the ideal point method
with different metrics (9), (10), (11) lead to the optimal alternative E5 (LTE).
5</p>
    </sec>
    <sec id="sec-8">
      <title>Conclusions</title>
      <p>Nowadays, there are many varieties of wireless communication technologies, both
in terms of typology and in terms of their personal capabilities, characteristics. There
is a problem of rational choice of technology for a certain IoT system taking into
account the criteria (factors) that affect the result of the evaluation. This technique
avoids various losses in the subsequent work of the IoT system due to improperly
chosen technology.</p>
      <p>In this paper, such methods as linear, Max-Min, and multiplicative convolutions
and the ideal point method with different metrics (Euclidean, Hamming and
Chebyshev) were considered.
plications (ICTERI’2017), CCIS 826, pp. 164-187. Springer, Cham (2018). DOI
10.1007/978-3-319-76168-8_8.
19. Palagin, A.V., Opanasenko, V.N.: Design and application of the PLD-based reconfigurable
devices. In: Adamski, M., Barkalov, A., Wegrzyn, M. (eds.) Design of Digital Systems and
Devices, Lecture Notes in Electrical Engineering, vol. 79, pp. 59-91. Springer, Berlin,
Heidelberg (2011).
20. Maevsky, D., Bojko, A., Maevskaya, E., Vinakov, O., Shapa, L.: Internet of Things:
Hierarchy of Smart Systems. In: The 9th IEEE International Conference on Intelligent Data
Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS),
pp. 821-827. Bucharest, Romania (2017). DOI: 10.1109/IDAACS.2017.8095202.
21. Nicoletseas, S., Yang, Y., Georgiadis, A.: Wireless Power Transfer Algorithms,
Technologies and Applications in Ad Hoc Communication Networks. Springer, Cham (2016). DOI:
10.1007/978-3-319-46810-5.
22. Majumder, M.: Multi Criteria Decision Making. In: Impact of Urbanization on Water
Shortage in Face of Climatic Aberrations. SpringerBriefs in Water Science and
Technology, pp. 331-344. Springer, Singapore (2015). DOI: 10.1007/978-981-4560-73-3_2.
23. Kondratenko, Y.P., Kondratenko, N.Y.: Reduced Library of the Soft Computing Analytic
Models for Arithmetic Operations with Asymmetrical Fuzzy Numbers. Int. J. of Computer
Research 23(4), 349-370 (2016).
24. Govindann, G., Rajendran, S., Sarkis, J., Murugesan, P.: Multi criteria decision making
approaches for green supplier evaluation and selection: a literature review. Journal of Cleaner
Production 98, 66-83 (2015). DOI: 10.1016/j.jclepro.2013.06.046.
25. Leitmann, G., Marzollo, A.: Multicriteria decision making. Springer, Cham (2014).
26. Atamanyuk, I., Kondratenko, Y.: Computer's analysis method and reliability assessment of
fault-tolerance operation of information systems. In: Batsakis, S. et al. (eds.) Intern. Conf.</p>
      <p>ICTERI-2015, vol. 1356, pp. 507-522. Lviv, Ukraine (2015).
27. Rezaei, J.: Best-worst multi-criteria decision-making method. Omega 53, 49-57 (2015).</p>
      <p>DOI: 10.1016/j.omega.2014.11.009.
28. Shukla, G., Hota, H.S., Sharma, A.S.: Multicriteria decision making based solution to
location selection for modern agri-warehouses. In: Intern. Conf. on Inventive Communication
and Computational Technologies (ICICCT), pp. 460-464. Coimbatore, India (2017). DOI:
10.1109/ICICCT.2017.7975240.
29. Kozina, G., Kudermetov, R.: Computer network design under uncertain input parameters.</p>
      <p>In: The 7th International Conference on Experience of Designing and Application of CAD
Systems in Microelectronics (CADSM), pp. 202-203. Slavske, Ukraine (2003).</p>
      <p>DOI: 10.1109/CADSM.2003.1255030.
30. Kondratenko, Y., Kondratenko, G., Sidenko, I. Multi-criteria Decision Making and Soft
Computing for the Selection of Specialized IoT Platform. In: Chertov, O., Mylovanov, T.,
Kondratenko, Y., Kacprzyk, J., Kreinovich, V., Stefanuk, V. (eds.) Recent Developments
in Data Science and Intelligent Analysis of Information. Proceedings of the XVIII
International Conference on Data Science and Intelligent Analysis of Information, pp. 71-80.
Kyiv, Ukraine (2019). DOI: 10.1007/978-3-319-97885-7_8.
31. Kochenderfer, M.J.: Decision Making Under Uncertainty. The MIT Press, Cambridge
(2015).
32. Yoe, C.: Principles of Risk Analysis: Decision Making Under Uncertainty. CRC Press,
Boca Raton (2016).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Katrenko</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasichnyk</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pas</surname>
            'ko,
            <given-names>V.P.</given-names>
          </string-name>
          :
          <article-title>Decision making theory</article-title>
          . Publ. Group BHV,
          <string-name>
            <surname>Kyiv</surname>
          </string-name>
          (
          <year>2009</year>
          ).
          <article-title>(in Ukrainian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Zgurovsky</surname>
            ,
            <given-names>M.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaychenko</surname>
            ,
            <given-names>Y.P.:</given-names>
          </string-name>
          <article-title>The fundamentals of computational intelligence: system approach</article-title>
          . Springer, Cham (
          <year>2017</year>
          ). DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -35162-9.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Munier</surname>
          </string-name>
          , N.:
          <article-title>A Strategy for Using Multicriteria Analysis in Decision-Making</article-title>
          . Springer, Dordrecht (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klymenko</surname>
            ,
            <given-names>L.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sidenko</surname>
            ,
            <given-names>I.V.</given-names>
          </string-name>
          :
          <article-title>Comparative Analysis of Evaluation Algorithms for Decision-Making in Transport Logistics</article-title>
          . In: Jamshidi,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Kreinovich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            ,
            <surname>Kacprzyk</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <article-title>Advance Trends in Soft Computing</article-title>
          .
          <source>Studies in Fuzziness and Soft Computing</source>
          , vol.
          <volume>312</volume>
          , pp.
          <fpage>203</fpage>
          -
          <lpage>217</lpage>
          . Springer, Cham (
          <year>2014</year>
          ). DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          - 03674-8_
          <fpage>20</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Uckelmann</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harrison</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Michahelles</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <source>Architecting the Internet of Things</source>
          . Springer-Verlag, Berlin (
          <year>2011</year>
          ). DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -19157-2.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Razzaque</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Milojevic-Jevric</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Palade</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Clarke</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Middleware for Internet of Things: A Survey</article-title>
          .
          <source>IEEE Internet of Things Journal</source>
          <volume>3</volume>
          (
          <issue>1</issue>
          ),
          <fpage>70</fpage>
          -
          <lpage>95</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlov</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korobko</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Topalov</surname>
            ,
            <given-names>A.M.:</given-names>
          </string-name>
          <article-title>Internet of Things approach for automation of the complex industrial systems</article-title>
          .
          <source>In: Intern. Conf. ICTERI-2017</source>
          , CEUR Workshop Proceedings Open Access, vol.
          <year>1844</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>18</lpage>
          . Kyiv,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          (
          <year>2017</year>
          ). https://pdfs.semanticscholar.org/3ff6/4e4a07be1e8c2f0b16f4736397be1405218a.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Johari</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>The security of communication protocols used for Internet of Things</article-title>
          . Lund University, Sweden (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Ghamari</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arora</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sherratt</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harwin</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Comparison of low-power wireless communication technologies for wearable health-monitoring applications</article-title>
          .
          <source>In: Inter. Conf. on Computer, Communications and Control Technology</source>
          , pp.
          <fpage>92</fpage>
          -
          <lpage>106</lpage>
          . Kuching,
          <string-name>
            <surname>Malaysia</surname>
          </string-name>
          (
          <year>2015</year>
          ).
          <source>DOI: 10.1109/I4CT</source>
          .
          <year>2015</year>
          .
          <volume>7219525</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Gomez</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Paradells</surname>
          </string-name>
          , J.:
          <article-title>Wireless home automation networks: A survey of architectures and technologies</article-title>
          .
          <source>IEEE Communications Magazine</source>
          <volume>48</volume>
          (
          <issue>6</issue>
          ),
          <fpage>92</fpage>
          -
          <lpage>101</lpage>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Hussain</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <source>Internet of Things: Building Blocks and Business Models</source>
          . Springer, Cham (
          <year>2017</year>
          ). DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -55405-1.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Huynh</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Robu</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flynn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rowland</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Coapes</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Design and demonstration of a wireless sensor network platform for substation asset management</article-title>
          .
          <source>Open Access Proceedings Journal 2017(1)</source>
          ,
          <fpage>105</fpage>
          -
          <lpage>108</lpage>
          (
          <year>2017</year>
          ). DOI:
          <volume>10</volume>
          .1049/oap-cired.
          <year>2017</year>
          .
          <volume>0273</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , Zhang, Y., Han,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Hong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            ,
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Jiang</surname>
          </string-name>
          , E.:
          <article-title>Design of a Real-Time Emergency Monitoring Platform Based on Wireless Communication Technology</article-title>
          .
          <source>In: Intern. Conf. on Intelligent Human-Machine Systems and Cybernetics (IHMSC)</source>
          ,
          <source>vol. 1</source>
          , pp.
          <fpage>191</fpage>
          -
          <lpage>194</lpage>
          . Hangzhou,
          <string-name>
            <surname>China</surname>
          </string-name>
          (
          <year>2016</year>
          ). DOI:
          <volume>10</volume>
          .1109/IHMSC.
          <year>2016</year>
          .
          <volume>197</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Solesvik</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borch</surname>
            ,
            <given-names>O.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Joint Digital Simulation Platforms for Safety and Preparedness</article-title>
          . In: Luo,
          <string-name>
            <given-names>Y</given-names>
            . (eds.) Cooperative Design, Visualization, and
            <surname>Engineering</surname>
          </string-name>
          (CDVE
          <year>2018</year>
          ),
          <source>Lecture Notes in Computer Science</source>
          , vol.
          <volume>11151</volume>
          , pp.
          <fpage>118</fpage>
          -
          <lpage>125</lpage>
          . Springer, Cham (
          <year>2018</year>
          ). DOI: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -00560-3_
          <fpage>16</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Gursu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vilgelm</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kellerer</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fazli</surname>
          </string-name>
          , E.:
          <article-title>A wireless technology assessment for reliable communication in aircraft</article-title>
          .
          <source>In: Intern. Conf. on Wireless for Space and Extreme Environments (WiSEE)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . Orlando, USA (
          <year>2015</year>
          ). DOI:
          <volume>10</volume>
          .1109/WiSEE.
          <year>2015</year>
          .
          <volume>7392987</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Topalov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Control Processes of Floating Docks Based on SCADA Systems with Wireless Data Transmission. Perspective Technologies and Methods in MEMS Design</article-title>
          .
          <source>In: The International Conference MEMSTECH-2016</source>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>61</lpage>
          . Lviv-Poljana,
          <source>Ukraine</source>
          (
          <year>2016</year>
          ). DOI:
          <volume>10</volume>
          .1109/MEMSTECH.
          <year>2016</year>
          .
          <volume>7507520</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Nesterov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Skarga-Bandurova</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Troubleshooting and performance methodology for business critical systems</article-title>
          .
          <source>In: IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT</source>
          <year>2018</year>
          ), pp.
          <fpage>521</fpage>
          -
          <lpage>524</lpage>
          . Kiev, Ukraine (
          <year>2018</year>
          ). DOI:
          <volume>10</volume>
          .1109/DESSERT.
          <year>2018</year>
          .
          <volume>8409188</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korobko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Topalov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Complex Industrial Systems Automation Based on the Internet of Things Implementation</article-title>
          . In: Bassiliades,
          <string-name>
            <surname>N.</surname>
          </string-name>
          et al. (eds.) Information and Communication Technologies in Education, Research, and Industrial Ap-
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>