<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Operation System for Modern Unmanned Aerial Vehicles</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The paper concentrates on the problem of design of operation system for modern UAV based on statistical data processing procedures. Modern UAV is a complex system that contains mechanical, electronic and aerodynamic components. Operation system performs the function of equipment efficiency and reliability providing. In general case, operation system consists of equipment, processes, personnel, documentation, control and measuring devices, etc. This system structure is considered according to adaptability, control and data processing principles. Adaptability is considered as the main property of the operation system that allows providing efficient UAV intended use in priori uncertainty conditions. Authors substantiate the efficiency indicator that takes into account effectiveness, time resources and costs. The three strategies of operation system elements inspection are considered. The first strategy (catchall inspection) is associated with simultaneous inspection of all elements of operation system. The second strategy (sliding window inspection) provides some predetermined elements inspection. The third strategy (random inspection) is associated with random selection of elements for inspection. Analytical formulas for the third strategy are obtained based on Markov circuit tool. Analysis of three strategies for UAV inspection proved the advantages of catchall inspections.</p>
      </abstract>
      <kwd-group>
        <kwd>UAV</kwd>
        <kwd>operation system</kwd>
        <kwd>efficiency</kwd>
        <kwd>adaptability</kwd>
        <kwd>statistical data processing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Today unmanned aerial vehicles (UAVs) are used in different branches of human
activity [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The UAV is technical equipment that contains mechanical, electronic and
aerodynamic components [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. In the literature devoted to the UAV, different authors
consider it hardware and software parts. There are three options of software:
1. Software for UAV control (generation and processing of control signals).
2. Software for implementation of UAV’s functional purpose (signal generation
and processing after observation for the different objects, these signals transmitting
for customer, etc.).
      </p>
      <p>3. Software for UAV’s operational data monitoring (diagnostic variables
monitoring and processing, reliability parameters monitoring and processing, decision making
about preventive and corrective actions, etc.).</p>
      <p>
        The third option of software is included in the operation system (OS) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The OS
plays an important place during UAV efficiency providing [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>Modern UAV is complex technical system that controlled by several operators.
Therefore, the OS of modern UAV should be considered as object of design and
improvement.</p>
      <p>Analysis showed that the modern challenge during UAV operation is artificial
intelligence principles utilization. These principles allow providing efficient intended
use of equipment in conditions that had not been taken into account during design
stage.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Literature Analysis and Problem Statement</title>
      <p>
        Literature [
        <xref ref-type="bibr" rid="ref10 ref5 ref6 ref7 ref8 ref9">5 – 10</xref>
        ] analysis showed that operation system contains the equipment (in
this case UAV), processes, documentation, personnel, measuring equipment,
resources, etc. The main process in OS is UAV intended use [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Other processes are
additional.
      </p>
      <p>
        The OS can be considered as an object of design and improvement especially in
terms of intellectualization [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>The sufficient attention is paid to the first and second option of UAV software [13;
14], but the third software option is not enough considered in scientific literature.</p>
      <p>
        More over, the questions of UAV usage in the airspace are not considered in
Ukrainian domestic regulatory documentations in civil aviation branch. The
standardization issues for maintenance and reliability of UAV and other aviation equipment
are presented in [
        <xref ref-type="bibr" rid="ref15 ref16 ref17 ref18">15 – 18</xref>
        ]. According to these documents, different maintenance
strategies are developed, e.g. MSG-1, MSG-2, MSG-3 [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>
        Methodology of UAV operation system design is considered in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The authors
concentrate on four principles: adaptation, aggregation, system approach and process
approach. According to modern researches in software branch, these principles should
be supplemented by other results associated with intelligence system utilization.
      </p>
      <p>
        The corrective and preventive actions are implemented based on the results of
statistical data processing [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. The origin data for processing are diagnostic variables or
reliability parameters.
      </p>
      <p>
        The technical condition of UAV can change during operation. This change causes
to nonstationarity in trends of diagnostic variables or reliability parameters. Analysis
of such processes can allow predicting residual life time of UAV. In literature these
problems are called changepoint analysis [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. Timely and correct detection of
changepoint increases efficiency of corrective and preventive actions.
      </p>
      <p>
        For comparative analysis of statistical data processing results, it is necessary to
choose the efficiency indicator. Different types of efficiency indicator in OS are
considered in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Efficiency is system property to achieve the aim. So efficiency should
depend on effectiveness, cost, time resources.
      </p>
      <p>The aim of operation system is to provide the required level of efficiency at the
observation time. This aim can be achieved through statistical data processing
procedures usage and corrective and preventive actions generation and implementation.</p>
      <p>The OS efficiency is the following function:</p>
      <p>   </p>
      <p>Ef  f ( A, , R, D / Tobs ) Ef   ,
 
where A is a vector of statistical data processing algorithms,  is a vector of OS
 
components conditions, R is a vector of requirements for OS components, D is a
vector of possible decision making, Tobs is a observation time in sliding window, 
is a range of possible values of efficiency.</p>
      <p>In this paper the dependence of efficiency on vector of statistical data processing
algorithms will be researched. From mathematical point of view this problem can be
solved through choosing the best algorithm A for maximum efficiency providing:
   
f ( A, , R, D / Tobs )  max .
3</p>
    </sec>
    <sec id="sec-3">
      <title>The Operation System Structure</title>
      <p>The structure of OS is shown in Fig. 1.</p>
      <p>Customers
Education
institutions</p>
      <p>International Civil</p>
      <p>Aviation
Organization</p>
      <p>Design
organizations
UAV manufacturers</p>
      <p>Ministry of
infrastructure of</p>
      <p>Ukraine</p>
      <p>Operation
organizations
Control system for</p>
      <p>OS
International civil aviation organization generates standards and recommendations for
national aviation administration in the branch of UAV operation. Ministry of
infrastructure of Ukraine regulates the question of airspace usage by UAV, inspects
aviation organizations from the safety point of view, etc.</p>
      <p>Customers form requirements for types and characteristics of UAVs. These
requirements are taken into account by design and operation organizations. The UAV
specialists are trained in education institutions.</p>
      <p>Operation organization is the main component of OS structure. Control system for
OS inspects UAV components, processes the statistical data, generates and
implements corrective and preventive actions.</p>
      <p>The control system interacts with all elements in Fig. 1 in case of intelligence
principles based mode usage.</p>
      <p>The generalized diagram of processing procedure is shown in Fig. 2.</p>
      <p>Requirements</p>
      <p>UAV
OS components</p>
      <p>Efficiency
estimation for
control actions
The choice of
additional data
processing
procedures</p>
      <p>Conformity
assessment
Is efficiency</p>
      <p>enough?
No</p>
      <p>Is problem
solved?</p>
      <p>Yes</p>
      <p>Yes
No</p>
      <p>Formation and
implementation of
control actions</p>
      <p>Operation
continuation</p>
      <p>Usage of
adaptability
principles
– A3 is an algorithm of parameters stability assessment in case of changepoint;
– A4 is an algorithm of preventive and corrective actions formation;
– A5 is an algorithm of preventive and corrective actions implementation;
– A6 is an algorithm of decision making about efficiency providing after control
actions implementation;</p>
      <p>– A7 is an algorithm of decision making about additional data processing
procedures;</p>
      <p>– A8 is an algorithm of decision making about usage of intelligence based
procedures;
– A9 is an algorithm of statistical processing for diagnostic variables;
– A10 is an algorithm of statistical processing for reliability parameters.</p>
      <p>Algorithms A7 , A8 , A9 , A10 have complex structure and contain the set of
procedures.</p>
      <p>All algorithms are generalized. For detailed description of algorithms, it is
necessary to solve synthesis and analysis problems, to choice best option for criterion of
maximum efficiency, etc. Initial information for synthesis and analysis problems is
measured data trends model.</p>
      <p>
        Considered algorithms contain detection, estimation, filtration, extrapolation,
interpolation, and other procedures. There are algorithms with known sample size, and
sequential algorithms. The sequential procedures have advantages in duration of
decision making [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>Usage of adaptability principles is based on the following approaches:
– logic based solution finding;
– fuzzy logic;
– Bayesian network;
– adaptable learning after observation;
– semantic network;
– neural network, etc [24; 25].</p>
      <p>
        More over, during diagnostic variables measuring, expert evaluation and subjective
probability based estimates can be used [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>There are different types of adaptation:
1) adaptation to the models and models parameters;
2) adaptation to the external conditions;
3) adaptation to internal changes in OS;
4) adaptation to the new requirements of regulatory and normative documents;
5) adaptation to OS aims, etc.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Efficiency of Inspection Strategies</title>
      <p>Let’s consider the problem of efficiency indicator substantiation based on the analysis
of different strategies of UAV OS components inspection. The efficiency indicator
takes into account the probability of correct detection of unconformities in the OS and
operational costs. In the general case, the numerical values of the efficiency indicator
are random variables, so we can use its statistical characteristics, e.g. mean value.</p>
      <p>Let the operation system of UAV contains N components. Each component can
be in one of two conditions: serviceable and failure.</p>
      <p>Serviceable condition corresponds to the case of component compliance with
established requirements. Failure condition corresponds to the case without compliance
with established requirements. Let the quantity of components with failure is n .</p>
      <p>The value n is a discrete random variable in the range [0; N] . The failure can
occur with failure rate (t) . Assume that during the inspection, new failures can’t
occur. The operational cost of one inspection is C .</p>
      <p>The mathematical expectation of the probability of correct detection is defined as:
where m1(n) is a mathematical expectation of detected unconformities number, Тobs
is an observation interval (the sum of OS functioning time TOS and inspection
procedure time t ).</p>
      <p>The mathematical expectation of the efficiency indicator can be represented as:
m1(D) 
(t)Тobs
m1(n)  m1(n) ,</p>
      <p>n
m1(Ef) </p>
      <p>m1(D)
Cmax /(Cmax  C )
,
(1)
(2)
where C is a total cost for OS components inspections, Cmax is a maximum
allowable costs for operation.</p>
      <p>Variables m1(D) and m1(Ef) are in the range [0;1] .</p>
      <p>Let consider three strategies:
1) catchall inspection (all N elements of operation system are simultaneously
inspected during time t ) – CI strategy;</p>
      <p>2) sliding window inspection (all N elements of operation system are inspected
during m inspection procedure each of which is characterized by time t ) – SWI
strategy;</p>
      <p>3) random inspection (at each of m inspections, M components are verified
randomly so that the total number of verified components is a random variable in the
interval [M ; N ] ) – RI strategy.</p>
      <p>In the case of CI strategy mathematical expectation of the probability of correct
detection and the mathematical expectation of the efficiency indicator can be calculated
according to the following equations:</p>
      <p>m1(D / CI) 
m1(Ef / CI) </p>
      <p>n
(t)TOS  t </p>
      <p>,</p>
      <p>In the case of SWI strategy according to equation (1) and (2) the probability of correct
detection and the efficiency can be presented as follows:
m1(D / SWI) </p>
      <p>,
m1(Ef / SWI) </p>
      <p>,
n
(Cmax  NC) jp j(m)</p>
      <p>j0
m(t)TOS  t Cmax
.</p>
      <p>In this equation p j(m) is a final probability that characterize the random selection of
M elements from N among which n elements don’t conform the requirements
during m inspections procedures.</p>
      <p>The system condition for the random inspection can be described using the graph
(see Fig. 3), and the definition of the calculation formulas is carried out using the
Markov model, for which the final probabilities are determined on the basis of the
transition matrix of conditional probabilities.</p>
      <p>The final probability depends on m and can be written as:
 N 
where m  1, 1 , Pi j is a conditional probability of j  i unconformities
detec M 
tion in the next stage of inspection if i unconformities are detected during previous
stages. In this case:</p>
      <p>Pi j </p>
      <p>(n  i)!(N  n  i)!M!(N  M )!
( j  i)!(n  j)!(M  j  i)!N!(N  n  M  j)!</p>
      <p>Comparing obtained equations for different inspection strategies, it can be concluded
that UAV OS efficiency in case of the first strategy of catchall inspection more than
efficiency for both considered the second (SWI) and third (RI) strategies, i.e.
m1(Ef / CI))  (t)TOS  t Cmax  m,
m1(Ef / SWI) n(Cmax  NC)</p>
      <p>(t)mTOS  t Cmax
m1(Ef / CI)) 
m1(Ef / RI)</p>
      <p>n(Cmax  NC )
(t)TOS  t Cmax</p>
      <p>n
(Cmax  NC ) jp j(m)</p>
      <p>j0
m(t)TOS  t Cmax</p>
      <p>nm
 n
 jp j(m)
j0
.</p>
      <p>
        So the first strategy of UAV OS components inspection has efficiency exactly in m
times higher compared with the second strategy and at least in m times compared
n
with the third strategy (as  jp j(m)  n ) [
        <xref ref-type="bibr" rid="ref28 ref29 ref30 ref31 ref32">28-32</xref>
        ].
      </p>
      <p>j0</p>
      <p>Let’s consider the numerical example of different strategies efficiency calculation.
Let UAV OS contains N  50 components with n  10 unconformities among them.
The quantity of inspections m  5 , the time of OS functioning TOS  1000 hours,
inspection duration t  4 hours, total costs Cmax  5000 usd, operational cost
C  10 usd, failure rate (t)  0.01 unconformity per hour.</p>
      <p>So mathematical expectation of detected unconformities number m1(n)  7.051.
According to obtained formulas can be get
m1(D / CI)  0.996 ,
m1(Ef / CI)  0.9 ,</p>
      <p>So in this case the best option is the strategy of catchall inspection.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>Analysis showed that not enough attention is paid to systematic review of UAV OS.
Therefore, the OS structure is proposed based on system approach and control theory.
Authors concentrated on consideration of control system for UAV OS. Control
system collects and processes statistical operational data from all OS components; such
approach allows making decision about corrective and preventive actions.</p>
      <p>The generalized diagram of processing procedure is considered in the paper. This
diagram suggests two modes of OS: regular mode and adaptable mode. The
adaptability principles utilization expands the possibilities of flexible control of UAV
operation. Three strategies of OS components inspection were analyzed. The numerical
example showed advantages of catchall inspection.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Kharchenko</surname>
            ,
            <given-names>V.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuzmenko</surname>
            ,
            <given-names>N.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ostroumov</surname>
            ,
            <given-names>I.V.</given-names>
          </string-name>
          :
          <article-title>Identification of unmanned aerial vehicle flight situation</article-title>
          .
          <source>In: 2017 IEEE 4th International Conference on Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD)</source>
          , pp.
          <fpage>116</fpage>
          -
          <lpage>120</lpage>
          , Kyiv, Ukraine (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Kutsenko</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ilnytska</surname>
            ,
            <given-names>S.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratyuk</surname>
            ,
            <given-names>V.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Konin</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          :
          <article-title>Unmanned aerial vehicle position determination in GNSS landing system</article-title>
          .
          <source>In: 2017 IEEE 4th International Conference on Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD)</source>
          , pp.
          <fpage>79</fpage>
          -
          <lpage>83</lpage>
          , Kyiv, Ukraine (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Barlow</surname>
            ,
            <given-names>R.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Proschan</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <source>Mathematical theory of reliability</source>
          , New York, John Wiley and Sons, 256 p. (
          <year>1965</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Solomentsev</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaliskyi</surname>
            ,
            <given-names>M.Yu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zuiev</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Asanov</surname>
            ,
            <given-names>M.M.</given-names>
          </string-name>
          :
          <article-title>Data processing in exploitation system of unmanned aerial vehicles radioelectronic equipment</article-title>
          .
          <source>In: IEEE 2nd International Conference Actual Problems of Unmanned Air Vehicles Developments (APUAVD)</source>
          , pp.
          <fpage>77</fpage>
          -
          <lpage>80</lpage>
          , Kyiv, Ukraine (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Nakagawa</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Maintenance theory of reliability</article-title>
          , London, Springer-Verlag,
          <volume>270</volume>
          p. (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Solomentsev</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaliskyi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozhokhina</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herasymenko</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Efficiency of data processing for UAV operation system</article-title>
          .
          <source>In: IEEE 4th International Conference on Actual Problems of UAV Developments (APUAVD)</source>
          , pp.
          <fpage>27</fpage>
          -
          <lpage>31</lpage>
          , Kyiv, Ukraine (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Zaliskyi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petrova</surname>
            ,
            <given-names>Yu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Asanov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bekirov</surname>
          </string-name>
          , E.:
          <article-title>Statistical data processing during wind generators operation</article-title>
          .
          <source>International Journal of Electrical and Electronic Engineering &amp; Telecommunications</source>
          , Vol.
          <volume>8</volume>
          , No.
          <issue>1</issue>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>38</lpage>
          , doi:10.18178/ijeetc.8.1.
          <fpage>33</fpage>
          -
          <lpage>38</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Goncharenko</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          :
          <article-title>Optimal UAV maintenance periodicity obtained on the multi-optional basis”</article-title>
          .
          <source>In: IEEE 4th International Conference on Actual Problems of UAV Developments (APUAVD)</source>
          , pp.
          <fpage>65</fpage>
          -
          <lpage>68</lpage>
          , Kyiv, Ukraine (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Timchenko</surname>
            ,
            <given-names>V.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lebedev</surname>
            ,
            <given-names>D.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuklina</surname>
            ,
            <given-names>K.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Timchenko</surname>
            ,
            <given-names>I.V.</given-names>
          </string-name>
          :
          <article-title>Robust-optimal control system of quadrocopter for maritime traffic's monitoring</article-title>
          .
          <source>In: IEEE 4th International Conference on Actual Problems of UAV Developments (APUAVD)</source>
          , pp.
          <fpage>192</fpage>
          -
          <lpage>195</lpage>
          , Kyiv, Ukraine (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Levin</surname>
            ,
            <given-names>B.R.</given-names>
          </string-name>
          :
          <article-title>Theory of reliability of radio engineering systems</article-title>
          , Moscow, Radio,
          <volume>274</volume>
          p.
          <article-title>(in Russian) (</article-title>
          <year>1978</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Hryshchenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Reliability problem of ergatic control systems in aviation</article-title>
          .
          <source>In: IEEE 4th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC)</source>
          , Kyiv, Ukraine, pp.
          <fpage>126</fpage>
          -
          <lpage>129</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Solomentsev</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Melkumyan</surname>
            ,
            <given-names>V.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaliskyik</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Yu</surname>
          </string-name>
          .,
          <string-name>
            <surname>Asanov</surname>
            ,
            <given-names>M.M.:</given-names>
          </string-name>
          <article-title>UAV operation system designing</article-title>
          .
          <source>IEEE 3rd International Conference on Actual Problems of Unmanned Air Vehicles Developments (APUAVD)</source>
          , Kyiv, Ukraine, pp.
          <fpage>95</fpage>
          -
          <lpage>98</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Odarchenko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polihenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kharlai</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tkalich</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Estimation of the communication range and bandwidth of UAV communication systems</article-title>
          .
          <source>In: IEEE 4th International Conference on Actual Problems of UAV Developments (APUAVD)</source>
          , pp.
          <fpage>159</fpage>
          -
          <lpage>162</lpage>
          , Kyiv, Ukraine (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Kuzmenko</surname>
            ,
            <given-names>N.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ostroumov</surname>
            ,
            <given-names>I.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marais</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>An accuracy and availability estimation of aircraft positioning by navigational aids</article-title>
          .
          <source>In: IEEE International Conference on Methods and Systems of Navigation and Motion Control (MSNMC)</source>
          , Kyiv, Ukraine, pp.
          <fpage>36</fpage>
          -
          <lpage>40</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Certification</surname>
          </string-name>
          <article-title>Maintenance Requirements</article-title>
          .
          <source>AC No 25-19A, FAA</source>
          , 15 p. (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. British Standards Institution,
          <source>BS EN 13306: Maintenance Terminology</source>
          ,
          <volume>31</volume>
          p. (
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <article-title>Condition-based Maintenance Recommended Practicies</article-title>
          .
          <source>SAE standard ARP-6204 (Put onto operation 15.09</source>
          .
          <year>2014</year>
          ), 115 p. (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <article-title>Condition-based Maintenance Plus for Material Maintenance</article-title>
          .
          <source>Departament of Defense Instruction 4151.22 (Put onto operation 16.10</source>
          .
          <year>2012</year>
          ), USA, 8 p. (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>SKYbrary</surname>
          </string-name>
          MSG-3 - Maintenance Steering Group, Operator/Manufacturer Scheduled Maintenance Development,
          <source>Accessed September 19</source>
          ,
          <year>2006</year>
          , http://www.skybrary.aero/index.php/MSG-3 (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Solomentsev</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaliskyi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herasymenko</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozhokhina</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petrova</surname>
          </string-name>
          , Yu.:
          <article-title>Data processing in case of radio equipment reliability parameters monitoring</article-title>
          .
          <source>In: Advances in Wireless and Optical Communications (RTUWO</source>
          <year>2018</year>
          ), Riga, Latvia, pp.
          <fpage>219</fpage>
          -
          <lpage>222</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Zhyhlyavskyi</surname>
          </string-name>
          , А.А.,
          <string-name>
            <surname>Kraskovskyi</surname>
            ,
            <given-names>A.E.</given-names>
          </string-name>
          :
          <article-title>Changepoint detection of random processes in problems of radio engineering</article-title>
          , St. Petersburg, LU Publishing,
          <volume>224</volume>
          p.
          <article-title>(in Russian) (</article-title>
          <year>1988</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Zuiev</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Solomentsev</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaliskyi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Questions of radioelectronic equipment diagnostics programs efficiency analysis</article-title>
          .
          <source>In: Signal Processing Symposium 2013 (SPS</source>
          <year>2013</year>
          ), Jachranka Village, Poland, pp.
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Zaliskyi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Solomentsev</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Method of sequential estimation of statistical distribution parameters</article-title>
          .
          <source>In: IEEE 3rd International Conference Methods and Systems of Navigation and Motion Control (MSNMC)</source>
          , Kyiv, Ukraine, pp.
          <fpage>135</fpage>
          -
          <lpage>138</lpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Bessmertnyi</surname>
            ,
            <given-names>I.A.</given-names>
          </string-name>
          :
          <article-title>Artificial intelligent</article-title>
          ,
          <source>St. Petersburg, ETMO</source>
          , 132 p.
          <article-title>(in Russian) (</article-title>
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Migas</surname>
            ,
            <given-names>S.S.:</given-names>
          </string-name>
          <article-title>Intelligence informational systems</article-title>
          , St. Petersburg, SPbGIEU, 160 p.
          <article-title>(in Russian) (</article-title>
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Al-Azzeh</surname>
            <given-names>J.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Al Hadidi</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Odarchenko</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          , Shevchuk
          <string-name>
            <surname>Z.</surname>
          </string-name>
          , Hu
          <string-name>
            <surname>Z.</surname>
          </string-name>
          <article-title>Analysis of self-similar traffic models in computer networks</article-title>
          ,
          <source>International Review on Modelling and Simulations</source>
          , №
          <volume>10</volume>
          (
          <issue>5</issue>
          ), pp.
          <fpage>328</fpage>
          -
          <lpage>336</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Kozlovskyy</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parkhomey</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Odarchenko</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhmurko</surname>
            <given-names>T</given-names>
          </string-name>
          .
          <article-title>Method for UAV trajectory parameters estimation using additional radar data</article-title>
          .
          <source>2016 IEEE 4th International Conference Methods and Systems of Navigation and Motion Control</source>
          ,
          <source>MSNMC 2016 - Proceedings 7783101, с</source>
          .
          <fpage>39</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Fedushko</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Syerov</given-names>
            <surname>Yu</surname>
          </string-name>
          .,
          <string-name>
            <surname>Skybinskyi</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shakhovska</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kunch</surname>
            <given-names>Z.</given-names>
          </string-name>
          (
          <year>2020</year>
          )
          <article-title>Efficiency of Using Utility for Username Verification in Online Community Management</article-title>
          .
          <source>Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN</source>
          <year>2019</year>
          ), Lviv, Ukraine, November
          <volume>29</volume>
          ,
          <year>2019</year>
          .
          <article-title>CEUR-WS.org</article-title>
          , Vol-
          <volume>2588</volume>
          . pp.
          <fpage>265</fpage>
          -
          <lpage>275</lpage>
          . http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2588</volume>
          /paper22.pdf
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kinzeryavyy</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stepanenko</surname>
            <given-names>I.</given-names>
          </string-name>
          et al,
          <source>Code Obfuscation Technique for Enhancing Software Protection Against Reverse Engineering, Advances in Intelligent Systems and Computing</source>
          , Vol.
          <volume>902</volume>
          , pp.
          <fpage>571</fpage>
          -
          <lpage>580</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Odarchenko</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abakumova</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polihenko</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          <article-title>Traffic offload improved method for 4G/5G mobile network operator</article-title>
          ,
          <source>Proceedings of 14th International Conference on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering (TCSET-
          <year>2018</year>
          ), pp.
          <fpage>1051</fpage>
          -
          <lpage>1054</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Abakumova</surname>
          </string-name>
          ,
          <article-title>Security Key Indicators Assessment for Modern Cellular Networks</article-title>
          ,
          <source>Proceedings of the 2018 IEEE First International Conference on System Analysis &amp; Intelligent Computing (SAIC)</source>
          ,
          <source>Kyiv, Ukraine, October</source>
          <volume>8</volume>
          -
          <issue>12</issue>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>M. Zaliskyi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Odarchenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Gnatyuk</surname>
            ,
            <given-names>Yu. Petrova. A.</given-names>
          </string-name>
          <string-name>
            <surname>Chaplits</surname>
          </string-name>
          ,
          <article-title>Method of traffic monitoring for DDoS attacks detection in e-health systems and networks</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          , Vol.
          <volume>2255</volume>
          , pp.
          <fpage>193</fpage>
          -
          <lpage>204</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>