<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Majorov International Conference on Software Engineering and Computer Systems, December</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Two-phase Model of Information Interaction in a Heterogeneous Internet of Things Network at the Last Mile</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Natalya Verzun</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mikhail Kolbanev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anna Romanova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>St. Petersburg State Electrotechnical University “LETI”</institution>
          ,
          <addr-line>5 Professora Popova, St. Petersburg, 197376, Russian Federation</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>1</volume>
      <fpage>0</fpage>
      <lpage>11</lpage>
      <abstract>
        <p>A protocol for information interaction of IoT sensors on the last mile is proposed. The developed access protocol takes into account the peculiarities of cyber-physical systems: heterogeneity of supported applications, superdensity of networks, the need to save resources of network components (frequency resource of the channel, energy intensity of smart things). A scenario of access to the resources of the over-the-air access network at the last mile is described, using a two-phase service model for heterogeneous data streams from smart things. The first phase: managing the volume of trafic going to global infocommunication resources. The second phase is the transmission of blocks of data in accordance with a controlled time-synchronous multiple access method. A mathematical model is proposed that makes it possible to assess the quality of transmission in the considered Internet of things network. Expressions are obtained for calculating the probabilistic-temporal characteristics of the transmission process of various types of data: the average time and the probability of timely delivery of data blocks generated by smart things, and the information rate of real time. A numerical calculation and analysis of the influence of trafic volume control procedures and multiple access parameters on the probabilistic-temporal characteristics of the transmission process on the last mile networks is carried out.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Internet of things</kwd>
        <kwd>smart things</kwd>
        <kwd>last mile</kwd>
        <kwd>managed multiple access</kwd>
        <kwd>two-phase service model</kwd>
        <kwd>probabilistic time characteristics</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The infrastructure base for IoT applications in many subject areas is over-the-air sensor networks.
Their use, when creating cyber-physical systems [1, 2] to support any economic activity, requires
taking into account the following aspects:
• autonomy of power supply of smart things (ST) and, accordingly, the limitedness of their
resources (primarily energy resources that determine the life of ST) and the need to save
them [3, 4, 5];
• a large number of ST and the formation of so-called superdense networks [6, 7], for which
the rational distribution of limited resources (available transmission channels) between
data sources becomes an urgent task;
• the number of ST providing coverage of any space with an information grid and collecting
the same type of information about their environment is initially redundant, sensors
collect and transmit duplicate information. Therefore, a partial loss of information from a
group of sensors of the same type monitoring one space will not significantly afect the
adequacy of the assessment of the situation in this space;
• a variety of supported applications of the Internet of Things, which may have diferent
requirements for the quality [8] and reliability of data transmission [9, 10] required
for their functioning. For example, in medicine: readings from sensors measuring the
patient’s body temperature can be transmitted much less often than readings from sensors
measuring his pulse rate.</p>
      <p>The combination of the above features led to an increase in the load on the last mile networks.
The shortage of the available frequency resource of the air network leads to situations of
overload and the impossibility of full service of all ST. To minimize the negative impact of
overloads on the functioning of the infrastructure of the cyber-physical system, supported
applications of the Internet of Things, it is necessary:
• firstly, when organizing data collection at the last mile, provide mechanisms for limiting
(or discarding) part of the trafic coming from smart things [11];
• secondly, take into account the heterogeneous nature of the supported IoT applications
(for example, the sensitivity of applications to transmission delays [12]).</p>
    </sec>
    <sec id="sec-2">
      <title>2. Physical network structure and multiple access protocol</title>
      <p>An urgent task is to develop new protocols for access to global information and communication
resources that would take into account all the listed features of modern networks and would
allow adaptively managing the volume of incoming trafic [ 13] to eliminate network congestion
on the last mile, as well as provide the required transmission quality for various types of Internet
applications things [12].</p>
      <p>The base station (BS) provides multiple access of smart things to global information and
communication resources. The zone of its action covers the space on which smart things of 
types are located. In fig. 1 there are three types of such things (  = 3,  = 1, 2, ..., ,). The base
station uses a fixed number ( ) of the same type of radio channels. Each such radio channel, in
turn, represents a common resource for a number of smart things. To share the channel resource,
multiple access algorithms are used. It is assumed that smart things of each type support the
operation of applications of the same kind. Each of the  of such applications imposes specific
requirements for the transmission quality, which are described by the function of distributing
the delivery time of data blocks from smart things to the resources of the global network. Within
the framework of this study, we will assume that for each type of smart things, an exponential
time of the admissible delay of a data block with an average value [],  = 1, 2, ...,  is set.</p>
      <p>
        One transmitted message from a smart thing of all types is one data block of length  [bits],
so the time windows for the transmission of these blocks have the same duration. This allows
using controlled synchronous-time access to organize  time windows in each of the  radio
channels. Thus, the total number of time windows available for smart things is:
 =  · 
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
      </p>
      <p>When administering the operation of such a network, it is possible in diferent ways to
distribute the bandwidth of radio channels between smart things of diferent types.</p>
      <p>When administering the operation of such a network, it is possible in diferent ways to
distribute the bandwidth of radio channels between smart things of diferent types. Fig. 2 (a)
shows an example (for  = 3), when one fixed radio channel is assigned to a smart thing of
each type. In Fig. 2 (b), the bandwidth of each radio channel is equally distributed among smart
things of all types (for  = 3).</p>
      <p>In this study, it is proposed to use a more general, regulated multiple access, in accordance
with which any smart thing has access to any radio channel, and the bandwidth of each radio
channel is divided among smart things in unequal proportions, which makes it possible to
provide diferent quality of service for trafic diferent types. Smart things of each type are
allocated a diferent number of time windows in each cycle.</p>
      <p>– the number of time windows that are available to smart things of the -th type
( = 1, 2, ..., ).</p>
      <p>If a smart thing of one type admits a greater time delay in the transmission of a data block
than a smart thing of another type, then in the cycle they are allocated a smaller number of
time windows. The fixing of time windows for things of diferent types should be carried out in
such a way that all time windows are used. Figure 3 below shows an example of the structure
of a transmission cycle when using variable synchronous-time multiple access for the case
 = 12,  = 3, 1 = 2, 2 = 4, 3 = 6. This approach allows flexible sharing of the
common resource of radio channels in the last mile network.</p>
      <p>To reduce the load on the channel resources of the last mile network, it is proposed
dynamically, depending on the volume of trafic coming from the ST, to discard that part of it for which
there are not enough free channels of the corresponding type. In this case, the transmission of
data blocks arriving from the ST is carried out in 2 phases:</p>
      <p>The 1-st phase – trafic volume limitation. Lossy service mode is assumed, i.e. in the case
when a request is received for the transmission of a data block from an ST, and there are no
free channels of the corresponding type, then the request is discarded.</p>
      <p>In the 2nd phase, there are parameters that the limiting mechanism of the 1st phase can
influence and there are parameters that it cannot influence. The independent ones include: the
duration of the time window, the duration of the cycle, the service time for the thing of the
-th type (the time of transmission of one data block). The number of dependent include the
probability of packet loss due to late delivery of the data block, the average transmission delay
time, and channel loading.</p>
      <p>In this article, we will consider the case when the limiting mechanism takes into account
only the service time for the -th item (the time of transmission of one data block).</p>
      <p>The 2-nd phase – transmission of data blocks in accordance with the regulated
synchronoustime method of multiple access, which provides for the regulation of ST access to the transmission
channel: the stricter the requirements for the permissible delay time of the data block over the
network, imposed by the Internet of Things application, the more often the ST supporting the
operation of this application gets the right to transmit and the shorter the interval of a single
transmission of the data block for the ST of this type.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Mathematical model</title>
      <p>When developing a mathematical model, we will assume the following:</p>
      <p>– the number of ST types, ( = 1, 2, ..., ). ST with a lower number require a lower data
transfer rate, and the lowest speed is required for STs of the 1st type - and, accordingly, the
value of the average permissible data aging time  [s] is maximum.</p>
      <p>
        – total number of windows in one transmission channel:
 = 1 + 2 + 3
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
      </p>
      <p>Items of the same type use the resources allocated to them in the first and second phases.
The blocks of data they generate form a Poisson stream.</p>
      <p>– the speed of data transmission over the radio channel in the second phase [bit/s]. We
assume that the speeds of all radio channels are the same.</p>
      <p>=  · ,  = 1, 2, ...,</p>
      <p>It is assumed that all RF channels are identical in their logical structure (see, for example,
Fig. 3).</p>
      <p>Λ –flow rate of incoming data blocks [block/s]. Λ –the rate of receipt of data blocks from the
-type HC ( = 1, 2, ..., ).</p>
      <p>– the proportion of data blocks of the -th type in the total stream of data blocks Λ .
–the intensity of the load created by the -type ST:</p>
      <p>= Λ ·  ·  
1st phase
–the probability of blocking a data block from an -type ST in the first phase due to the
absence of free time channels in the second phase. The probability  can be calculated using
the first Erlang formula:</p>
      <p>The entire time of using one channel is divided into cycles, which, in turn, are divided into
time windows. Window duration for the transmission of one data block  =  .</p>
      <p>The window duration is suficient for the transmission of a data block and is the same for all
types of ST.</p>
      <p>– average service time of a data block for an -th type ST (time of transmission of one data
block received from items of -th type):
  =  ·  ,  = 1, 2, ...,</p>
      <p>
        · 
 the number of time windows in the second phase that are available for the -type ST:
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
(8)
 =
 ⌈︃∑︁  ⌉︃− 1
!
=0 !
,  = 1, 2, ..., 
2nd phase
 – the intensity of the arrival of data blocks of the -th type of ST to one arbitrary radio
channel of the second phase. It is assumed that the data blocks arriving at the second phase are
evenly distributed between all radio frequency channels and therefore the intensity of their
arrival in the multiple access system of one radio channel is determined as follows:
  = Λ (1−  ) (
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
() –Laplace-Stieltjes transform (PST) of the transmission time of a data block of the -type
ST ( = 1, 2, ..., ):
() = 
− · · 

()–Laplace-Stieltjes transform waiting time for the start of data block transmission from
the -type ST ( = 1, 2, ..., ):
 –loading the transmission medium with data blocks of the -th type:
Ergodicity condition for the second phase: 0 &lt;   &lt; 1,  = 1, 2, ..., .
      </p>
      <p>Probability-time characteristics of the process of servicing requests.</p>
      <p>Average delay time of transmission of data blocks coming from -type ST. As a result of
diferentiation, we obtain expressions for calculating ¯:</p>
      <p>Probability of timely delivery of data blocks from  type ST. As a result of diferentiation, we
obtain expressions for calculating :
() =</p>
      <p>· (1 −  )
 −   +   · ()
  =   ·  
¯ =
  · (  − 2)
2 · (  − 1)
 =</p>
      <p>(1 −  ) ·</p>
      <p>· ( 1</p>
      <p>−   +   ·   )
where – average admissible delay time of data block transmission from -type ST ( = 1, 2, ..., ).</p>
      <p>The information speed of the real-time network for each type of ST shows the amount of
information of the corresponding type actually transmitted in time (in bits) per unit of time (s).
Losses in the simulated system can occur on: 1st phase. Losses are characterized by  – the
probability of blocking a data block from an -type ST in the first phase due to the absence of
free time channels in the second phase; 2 phase. Losses are characterized by  – the probability
of timely delivery of data blocks coming from the -th ST.</p>
      <p>Accordingly, the expression for calculating the real-time information rate for the -th type ST
will be:
  = Λ  ·  ·  · 
(13)</p>
    </sec>
    <sec id="sec-4">
      <title>4. Results of numerical experiments</title>
      <p>Numerical experiments were carried out - the calculation of the probabilistic-temporal
characteristics of the transmission of data blocks from three types of ST (i.e.,  = 3) in the wireless
sensor network of the Internet of things.</p>
      <p>Initial data for calculations:  = 2, 1 = 1, 2 = 2, 3 = 3,  = 1024 [bit],  = 210000
1 1 3
[bit/s], 1 = , 2 = , 3 = , 1 = 0.1 [s], 2 = 0.3 [s], 3 = 0.6 [s].</p>
      <p>15 3 5</p>
      <p>The Fig. 5–7 are graphs illustrating the results of numerical experiments. The influence of the
intensity of the arrival of data blocks on transmission, as well as the introduction of a restriction
on the volume of incoming trafic (i.e., the first phase of service), on the probabilistic-temporal
(9)
(10)
(11)
(12)
characteristics of the process of transmitting data blocks from three types of ST in the last mile
access network was studied.</p>
      <p>Figure 5 (a) is a graph of the dependence of the probabilities of blocking data blocks in the
ifrst phase on the intensity of their receipt from hydrocarbons of all types. It shows that for
diferent types of things, the blocking will be diferent depending on the ratio of the intensity
of the load and the number of time channels allocated for things of the corresponding type in
the second phase.</p>
      <p>Figure 5 (b) is a graph of the dependence of the intensity of the arrival of data blocks in
the second phase on the intensity of the arrival of data blocks in the first phase. This graph
illustrates the process of rejection in the first phase of a part of blocks arriving from the ST –
the part that will not receive quality service in the second phase. For example, for blocks of the
second type, taking into account the presence of two frequency channels ( = 2) and the share
in the total flow of blocks at an intensity Λ = 250 block/s 2 = 1/3, 95% of the trafic will be
passed to the second phase.</p>
      <p>Figure 5 (c) is a graph of the dependence of the load of the temporary channels allocated for
the transmission of data blocks of each type in the second phase of service on the intensity of
the arrival of the data blocks. The selected controlled access method allows serving blocks of
one type even in a situation of loss of ergodicity in temporary channels of other types. This
circumstance is illustrated in Fig. 5 (d), Fig. 6 (a) and Fig. 6 (b), which show the graphs of the
dependence: the average delay time – Fig. 5 (d), probabilities of timely delivery - Fig. 6 (a) and
information speed of the real-time network – Fig. 6 (b) data blocks on the intensity of their
receipt for transmission.</p>
      <p>In Fig. 6 (c), Fig. 6 (d) and Fig. 7 shows the same characteristics only for the second type of ST:
2(Λ) – in Fig. 6 (c), 2(Λ) – in Fig. 6 (d) and  2(Λ) – in Fig. 7 for two cases – the presence
and absence of the first phase (i.e., the presence and absence of trafic volume limitation). As
can be seen from the graphs of dependencies, the introduction of the limitation procedure in
the first phase allows increasing the stability of the network as the intensity of the incoming
data blocks increases.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>The article proposes a protocol of regulated multiple access to radio resources of the Internet of
Things network at the last mile, which takes into account the peculiarities of cyber-physical
systems: heterogeneity of supported applications, superdensity of networks, the need to save
resources of network components.</p>
      <p>A scenario of access to network resources at the last mile is described, which uses a two-phase
service model for heterogeneous data streams coming from diferent types of ST. In the first
phase, an adaptive limitation of the volume of trafic received for service is provided. There are
two options for organizing regulation in the first phase: service with obvious losses and service
with waiting. The article discusses in more detail the first version of the mode - with obvious
losses of data blocks arriving for transmission, in the absence of free channels in the network.
In the second phase of the service, data blocks are transmitted in accordance with a controlled
time-synchronous multiple access method..</p>
      <p>A queuing model has been obtained that describes the process of data transmission from
diferent types of ST in the form of a two-phase QS, which makes it possible to estimate the
probabilistic-temporal characteristics of the data transmission process of things of diferent
types.</p>
      <p>Numerical experiments were carried out to assess the efect of the trafic volume limitation
procedure in the first phase of service on the transmission quality in the last mile access network
- on the probabilistic-temporal characteristics of the process of transmitting data blocks from
three types of ST, which illustrated the eficiency of using the proposed protocol and the
controlled multiple access scenario. The introduction of a procedure for filtering out a part of
the trafic in the first phase makes it possible to increase the range of operating intensity of
data blocks arriving for transmission.
tekhnologiy v zavisimosti ot plotnosti polzovateley i ustroystv [Features of using D2D
communication at various subscriber densities]// Elektrosvyaz. 10 pp. 40-45, (2018)
[8] Kucheryavyy, A. Ye., Makolkina, M. A., Kirichek, R. V. Taktilnyy Internet. Seti svyazi so
sverkhmalymi zaderzhkami [Tactile internet. Ultra-low latency networks] // Elektrosvyaz.
1. pp. 44-46, (2016)
[9] Bogatyrev, V.A. Exchange of duplicated computing complexes in fault-tolerant systems //</p>
      <p>
        Automatic Control and Computer Sciences, Vol. 45, No. 5, pp. 268–276, (2011)
[10] Bogatyrev, V.A. Fault Tolerance of Clusters Configurations with Direct Connection of
Storage Devices // Automatic Control and Computer Sciences 2011, Vol. 45, No. 6, pp.
330-337, (2011)
[11] Verzun, N., Kolbanev, M., Shamin, A. The Architecture of the Access
Protocols of the Global Infocommunication Resources Computers 2020, 9, 49;
https://doi.org/10.3390/computers9020049
[12] Verzun, N. A., Kolbanov, M. O., Omelyan, A. V. Reguliruyemyy mnozhestvennyy dostup
v besprovodnoy seti umnykh veshchey [Controlled multiple access in wireless network
of smart things]// Omskiy nauch. vestn. Ser. Informatika, vychislitel’naya tekhnika i
upravleniye. 4(148). pp. 147–151, (2016)
[13] Bogatyrev, V.A., Protocols for dynamic distribution of requests through a bus with variable
logic ring for reception authority transfer /Automatic Control and Computer Sciences v33(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ).
pp. 57-63, (1999)
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Kupriyanovskiy</surname>
            ,
            <given-names>V. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Namiot</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Ye</surname>
          </string-name>
          .,
          <string-name>
            <surname>Sinyagov</surname>
            ,
            <given-names>S. A.</given-names>
          </string-name>
          <article-title>Kiber-fizicheskiye sistemy kak osnova tsifrovoy ekonomiki [Cyber-physical systems as a base for digital economy] //</article-title>
          <source>International Journal of Open Information Technologies</source>
          , vol.
          <volume>4</volume>
          , no.
          <issue>2</issue>
          . pp.
          <fpage>18</fpage>
          -
          <lpage>25</lpage>
          , (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Astakhova</surname>
            ,
            <given-names>T. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolbanev</surname>
            ,
            <given-names>M. O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romanova</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shamin</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          . A. Model of digital agriculture //
          <source>International Journal of Open Information Technologies</source>
          , Vol.
          <volume>7</volume>
          . no.
          <issue>12</issue>
          , (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Roslyakov</surname>
            ,
            <given-names>A. V.</given-names>
          </string-name>
          <article-title>Otsenka energopotrebleniya budushchikh setey [Measuring of energy consumption of future networks] //</article-title>
          <source>Elektrosvyaz'.8</source>
          . pp.
          <fpage>43</fpage>
          -
          <lpage>50</lpage>
          , (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Astakhova</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kirilova</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shamin</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolbanev</surname>
            <given-names>M.</given-names>
          </string-name>
          <article-title>Research on the energy characteristics of routing in wireless sensor net-works /</article-title>
          <source>/ CEUR Workshop Proceedings. 11. MICSECS 2019 - Proceedings of the 11th Majorov International Conference on Software Engineering and Computer Systems</source>
          , (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Astakhova</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kirilova</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolbanev</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maslov</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shamin</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Criterion for choosing the optimal message transmission route in wireless sensor networks</article-title>
          // Telekommunikatsii [Telecommunications],
          <source>no.7</source>
          , pp.
          <fpage>6</fpage>
          -
          <lpage>12</lpage>
          , (
          <year>2020</year>
          )
          <article-title>(In Russian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Zakharov</surname>
            ,
            <given-names>M. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kirichek</surname>
            ,
            <given-names>R. V.</given-names>
          </string-name>
          <article-title>Metody postroyeniya sverkhplotnoy seti e-health s ispol zovaniyem granichnykh vychisleniy [Methods for building a super-dense e-health network using edge computing]// SPbNTORS: trudy yezhegodnoy NTK</article-title>
          .
          <source>SPbGETU «LETI»</source>
          .
          <volume>1</volume>
          (
          <issue>75</issue>
          ). pp.
          <fpage>145</fpage>
          -
          <lpage>147</lpage>
          , (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Borodin</surname>
            ,
            <given-names>A. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kucheryavyy</surname>
            ,
            <given-names>A. Ye.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Paramonov</surname>
            ,
            <given-names>A. I.</given-names>
          </string-name>
          <article-title>Osobennosti ispol zovaniya D2D-</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>