<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Optimization Algorithms of Smart City Wireless Sensor Network Control</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mykyta Moshenchenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bohdan Zhurakovskyi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vadym Poltorak</string-name>
          <email>andr.vadym.2012@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Bondarchuk</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Korshun</string-name>
          <email>n.korshun@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute</institution>
          ,”
          <addr-line>37 Peremogy ave., Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>State University of Telecommunications</institution>
          ,
          <addr-line>7 Solomenska str., Kyiv, 03110</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>32</fpage>
      <lpage>42</lpage>
      <abstract>
        <p>The technology of wireless sensor networks (WSN) and the main problems that accompany this technology are considered. Based on the analysis, the requirements for solving problems to optimize the work of WSN were formed. A simulation model of WSN was built, with the help of which we were able to investigate and reproduce a wireless sensor network and conduct research on the feasibility of the proposed algorithms. According to the theoretical assessment, it was determined that these algorithms will increase the lifetime of the network several times, depending on the parameters and topology of the network. A role distribution algorithm has been developed to equate network operation time to end device operation time. To increase the speed of delivery of messages from the device to the coordinator, an algorithm for allocating superframe slots is given. According to the results of experimental studies, it was found that the average delivery time of messages can be reduced up to 4 times, also, depending on the network topology and its parameters.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Wireless sensor network</kwd>
        <kwd>power consumption of the sensor device</kwd>
        <kwd>role distribution algorithm</kwd>
        <kwd>lifetime of the end device</kwd>
        <kwd>message delivery time</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>1. Introduction</p>
      <p>Of the above factors that affect the stable operation of the WSN, the limited capacity of the power
supply can be noted in the network and, accordingly, reduce this impact.</p>
      <p>Thus, improving the energy efficiency of wireless sensor networks is a topical issue for many
researchers, and the analysis of energy consumption and its optimization - a promising direction not
only in WSN, but also in many other wireless networks.
1.1.</p>
    </sec>
    <sec id="sec-2">
      <title>Use of WSN in Climate Control Systems</title>
      <p>A typical climate control system (Heating Ventilationand Air Conditioning - HVAC) consists of
functionally and / or geographically distributed controllers capable of controlling various processes in a
building or group of buildings both from a central host computer and via the Internet, by a unit that
combines the functions of a host computer and a web server. Today's controllers have a wide range of
computing capabilities and can generally control processes such as anomalous alarms, event-driven
programs, time-based programs, and energy management programs. Through the communication
protocol, the controllers exchange data with each other and with the host computer. Many of today's
controllers can operate as stand-alone control systems in the absence of a host computer.</p>
      <p>The basic classification of HVAC is a central system or a decentralized / local system. The type of
system depends on the address of the main equipment, which should be centralized for air conditioning
of the building as a whole, or decentralized for individual air conditioning of a particular area of the
building [3].</p>
      <p>Although WSNs can be easily integrated into HVAC control by replacing existing wired sensors
without much refinement of the original control design, the technological requirements for WSN will
differ when it is used for control compared to monitoring. In general, a higher refresh rate and greater
reliability of data transmission are necessary to ensure the developed management functions and
acceptable management efficiency. For example, a delay in data transmission will not cause monitoring
problems, but may lead to instability of closed-loop management.</p>
      <p>In our work we will consider the local type of climate control system and methods of data
transmission management in it.
1.2.</p>
    </sec>
    <sec id="sec-3">
      <title>Main Technical Characteristics of WSN</title>
      <p>One of the main problems in WSN is the creation of low-cost and tiny touch nodes. The main
operation of a modern sensor network is the use of very low power methods for radio communication
and data collection.</p>
      <p>In many applications, WSN communicates with a local area network or broadband network through
a gateway. The gateway acts as a bridge between the WSN and another network. This allows you to
store and process data with devices that have more resources, such as a remote server. A wide area
wireless network used mainly for low power devices is known as a low power wide area network
(LPWAN) [4].</p>
      <p>There are several wireless standards and solutions for connecting touch nodes. The most well-known
technologies Thread and ZigBee can connect sensors operating at a frequency of 2.4 GHz with a data
rate of 250 kbit / s. The IEEE 802.15.4 working group provides a standard for connecting low-power
devices, and typically sensors and smart meters use one of these standards for connection [5]. These
standards were designed to be simpler and cheaper than other personal networks, such as Bluetooth and
Wi-Fi.</p>
      <p>Energy is the smallest resource of WSN nodes and it determines the service life of WSN. Wireless
sensor networks can be deployed in large numbers in a variety of environments, including remote ones,
where adhoc communications (communications in wireless dynamic networks) are a key component.
For this reason, algorithms and protocols need to address the following issues:
- Extended service life;
- Strength and resistance to failures;
- Self-configuration.</p>
      <p>The main energy consumption and power consumption of the sensor device should be minimized,
and the sensor units should be energy efficient, as their limited energy resource determines the service
life [6]. To save energy, wireless sensor units usually turn off the radio when they are not in use.</p>
      <p>It has recently been observed that by periodically switching on and off the sensing and
communication capabilities of sensor nodes, we can significantly reduce the active time and thus extend
the life of the network.</p>
      <p>However, this duty cycle can lead to high network delays, route collisions, and delays in detecting
neighboring devices for asynchronous sleep and scheduling [7].</p>
      <p>These restrictions, which operate during WSN operation, require countermeasures for wireless sensor
networks that should minimize traffic routing and power consumption information.</p>
    </sec>
    <sec id="sec-4">
      <title>2. Problem Statement 2.1.</title>
    </sec>
    <sec id="sec-5">
      <title>General Requirements for Solving Problems</title>
      <p>We need to define the basic requirements for the structure of the network with which we will work
[8]:
- The amount of information transmitted by the network per unit time does not exceed the maximum
limit.
- Signals are transmitted from the node to the coordinator and back.
- There is no network configuration change.</p>
      <p>To begin with, we will assume that a significant difference in the power consumption of end devices
and routers can be achieved by the maximum possible number of sets of routers that do not intersect and
have some properties:
- Each of these sets is connected.
- No two sets have common points.
- Each set is connected to all network nodes.</p>
      <p>Once a set of appropriate routers has been selected, the routing task should be solved as follows:
minimize the maximum amount of data packet transmission between nodes required to deliver the
message to the endpoint coordinator.
2.2.</p>
    </sec>
    <sec id="sec-6">
      <title>The Task of Minimizing Energy Consumption</title>
      <p>Based on the requirements for the tasks, we can divide the devices, the power consumption of which
differs, by roles—the end device, router and coordinator. The difference comes from the number of
devices that are distributed across roles in the network.</p>
      <p>Due to the fact that there are no changes in the configuration, when the network is turned on, the
coordinator receives information about the number of all devices [9]. Some devices are assigned to
endpoints that do not have child nodes, and the other part - routers - parent devices. At the hardware
level, this means that end devices no longer have to pass on a beacon frame followed by a superframe,
and this reduces their power consumption by almost half.</p>
      <p>Next, consider a situation where the end device can “fall asleep” as soon as it receives the beacon
from the parent device. However, it will not listen to the superframe if no data has been addressed to it,
and it also has no data to send. The device determines the absence of sent data in the parent beacon
according to the content of the received signal.</p>
      <p>This optimization allows you to reduce energy consumption by another 3–4 times.</p>
      <p>The faster the network, the more efficient the optimizations. In fast networks, the operating time will
be determined by the charge of the routers' batteries, because they will be discharged up to 10 times
faster than the end devices. To solve this problem, we build a mathematical model using a graph.</p>
      <p>Suppose that a wireless sensor network is represented as a coherent undirected graph:
 = { ,  }
(1)
where vertices are nodes -   ∈  , edges are pairs of adjacent nodes - (  ,   ) ∈  , where  =
{ 1,  2, … . ,   } is the set of all nodes, and node  0is called the network coordinator .
Nodes are considered adjacent if there is a physical possibility of data transmission over the air in at
least one direction between nodes [10]. The topology of the network will be called the subtree of the
graph  = { ,  }, which has a vertex in the node  0.</p>
      <p>Construct all subgraphs of the graph G. This can be done, for example, as follows: assume that   is
a set of all routers of the graph   ,, where  ∈ 1,  .</p>
      <p>It is possible to construct the corresponding graph in other ways, so we use the indices  ∈ 1,  .</p>
      <p>If the roles of the nodes change dynamically, it is possible to equate the operating time of the network
as a whole to the operating time of the end devices. This can be achieved by the fact that each of the
nodes will play the role of the end device, and less likely to act as a router, which is discharged very
quickly, as mentioned above.</p>
      <p>The decision to change the network topology is made by the network coordinator, but the sets of
simultaneously running routers change each other cyclically, for example during operation [11].</p>
      <p>Next, we solve the problem of maximizing the operation time of the network.</p>
      <p>Consider a subset of the sets {   } =1

from the set {  }

 =1. We have the number of sets   _with
{   } =1</p>
      <p>, which include nodes   . Then the average current in the node   will be:
current in the node that acts as the end device, also during the superframe.</p>
      <p>If at the initial time all devices are equally charged  , then:</p>
      <p>Here   is the average current in the node that acts as a router during the superframe,   is the average
it turns out that:</p>
      <p>Where   is the battery charge of the device   . Since the batteries are charged in the same way, then
are independent, then it turns out that   = 1. And then it remains that
Thus, in order to maximize the operation time of the entire network, you need to find the maximum
  =   ( 

) +   (
 −  

) =   + (
 −   )  .</p>
      <p>→ max.</p>
      <p>If the router sets {   } =1
number of independent sets of routers.
2.3.</p>
    </sec>
    <sec id="sec-7">
      <title>Algorithm of Role Distribution</title>
      <p>= min  → max</p>
      <p />
      <p>Max  =   + (  −   )</p>
      <p>→ min.
max</p>
      <p>{   } =1
of routers [12]:
algorithm.
points.
(2)
(3)
(4)
It is necessary to solve the problem of finding the maximum number M of independent sets of routers
We will use the following algorithm on the graph, which allows us to find a sufficient number of sets
from the graph  = { ,  }, and from the subtrees {  }
2. Paint all adjacent vertices of red vertices in black.
1. At the beginning, the vertex (coordinator)  0is painted red.
3. In the case when none of the neighboring vertices was painted black, we complete the
4. We will consider a set of black vertices. Select the vertex from it that has the largest number
5. If all the vertices are painted, then we go further. If not - repeat the steps, starting with 2
of unpainted adjacent vertices, repaint it red.</p>
      <p>6. The tops, which are painted red, are the desired sets. Paint them green, then leave  0 red,
make the latter unpainted. Then repeat all the steps, starting from the second point.</p>
      <p>This algorithm is "greedy" because it tries to paint the maximum number of vertices at each step.
After successful operation of the algorithm, we are able to obtain 
independent sets of routers and
the sets of routers   . Now, to get the corresponding subtree   , we first connect the coordinator to all
its neighboring nodes, which become routers. Then we connect their neighboring vertices accordingly,
and thus repeat the second point of the algorithm until all the nodes are connected.</p>
      <p>In order for us to be able to manage the network using the algorithm described above, we need to
determine exactly how the topologies will switch. Also, it is necessary to determine the order of selecting
the topology from the list that was generated by the algorithm.</p>
      <p>It should be noted that the change of topologies should not occur often, because in this case the
delivery time of messages between nodes increases.</p>
      <p>One of the optimal solutions is cyclic topology switching. One cycle will then include sequential
switching of topologies, starting with 
= 1, ending with 
=  , where</p>
      <p>=  ( ) − is the number
of the topology at a given time. The lifetime of the network in each of the topologies is different, and
the sum will be equal to the length of one cycle.</p>
      <p>Each topology receives its own part of the time from the loop, and the parts are selected in relation
to the decision made by the coordinator [13]. The sum of such time intervals must be equal to 1.</p>
      <p>To optimally allocate time intervals between topologies, keep in mind that each of the sets of routers
  has one device that limits the ability to use the entire set of routers. The limiting device has the
smallest energy reserve</p>
      <p>and, as a result, fails first. Also, it is possible to have an end device that is
to function normally because it did not act as a router.
not included in any of the sets of routers   . When its battery life drops to zero, the network continues</p>
      <p>The ability to select time intervals for topologies is used in order to spend the energy of each limiting
device in the set in proportion to the energy reserve.</p>
      <p>The remaining
tops are unpainted</p>
      <p>Paint the red
vertices green
Another set of
routers - red tops</p>
      <p>Start</p>
      <p>Paint the
coordinator in red</p>
      <p>Paint all
neighboring
vertices with black
Paint the selected</p>
      <p>vertex in red
Select the black
vertex with the
largest number of
unpainted
neighbors</p>
      <p>Stop
Have at least one vertex
been painted over?</p>
      <p>No
Yes</p>
      <p>Yes
No</p>
      <p>Are all the vertices
painted over?</p>
    </sec>
    <sec id="sec-8">
      <title>Modification of the network layer protocol</title>
      <p>network topology to be built.
dependent nodes  .</p>
      <p>In order for us to be able to optimally change the network topologies, we need to provide access to
the data of column  to the coordinator who participates in the distribution of roles. Due to the fact that
the standard mode of the ZigBee protocol assumes that each device constantly sends beacons to show
whether it is free for data transmission or not, it is possible to construct an adjacent graph 
matrix [14].</p>
      <p>It will be represented as a square matrix  of size  , in which the value of the element   is equal to the
number of edges from the  vertex of the graph to the  vertex.</p>
      <p>As a result, the coordinator runs the role allocation algorithm described above, which indicates the
With this algorithm, the router now has a set of nodes  to be connected to it and a set of existing
Of these two sets, the router considers 4 categories of nodes:</p>
      <p>- nodes that need to be connected
 - nodes that need to be disconnected</p>
      <sec id="sec-8-1">
        <title>The rest of the nodes that should not be connected</title>
        <p>∩  - nodes that remain connected
beacon.
Nodes from the set  ∩  receive a message from the router at the same time as the subtree structure
they need to build. By the way, the same message is received by nodes from the set
.</p>
        <p>When a node receives a message with a new structure, the same algorithm extends beyond it, until a
given topology tree is constructed [15].
2.5.</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>The Task of Minimizing the Time of Delivery of Event Messages to the</title>
    </sec>
    <sec id="sec-10">
      <title>Coordinator</title>
      <p>Now you need to calculate the delivery time of messages from any node a. By default, messages are
sent from child nodes to parent nodes. Let the messaging chain be:</p>
      <p>{  } =1, де  0 =  0,   =  .</p>
      <p>Part of the delivery time is determined by the delays on the router, which are due to the superframe
of the router itself and the superframe of the parent device. The set of routers {  } =1
2 elements [16]. The delay on each of the routers is the number    from the interval [
 −1 consists of  −
, 
− 
).</p>
      <p>Then the delivery time of messages will be equal to a random variable that is evenly distributed on
the interval, the mathematical expectation of which is equal to the interval between the beacons divided
by two, add the sum of the delays on each of them [17]:</p>
      <p>Next, calculate the average for all nodes message delivery time   for a random tree topology  .
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
Where  ( ,  )is the size of the subtree at the root of which is the node  .</p>
      <p>Thus, the task of minimizing the time of delivery of event messages to the coordinator can be reduced
to minimizing the value of   , when the interval between the beacons remains fixed [18].
2.6.</p>
    </sec>
    <sec id="sec-11">
      <title>Algorithm for Allocating Superframe Slots</title>
      <p>length of the superframe. Let the number:</p>
      <p>Let the interval between 
beacons be divided by S = 2BO-SO slots. Each of them will be equal to the
 =

2</p>
      <p>−1
+ ∑ =1    .
  =

2</p>
      <p>1
+</p>
      <p>−1 ∑ ∈  ( ,  )  .
∑ ∈  ( ,  )  →</p>
      <p>.
 =  ( ) ∈ 1, 
 =</p>
      <p>∗  ,
 ( 0) = 0.</p>
      <sec id="sec-11-1">
        <title>Equality must be met:</title>
        <p>If we have the  , function, we can set the delay values on the coordinator as:
- is the slot number of the superframe of node a, and it determines the time interval t between the
beginning of the own beacon and the beginning of the beacon, which belongs to the coordinator [19]:
 ( ) −  ( ), where  - is the parent node to the node  .</p>
        <p>Based on the previous solutions, we can reduce the problem to the selection of the condition for
finding  :
 ( ) ≠  ( ), if  is the parent node to 
 ( ) ≠  ( ), if  is a neighbor to 
 ( ) ≠  (ℎ)if ℎ is the parent node of neighbor 
 ( ) ≠  ( ), if  is a neighbor of the child node  ,
and minimizing   .</p>
        <p>Next, we will sequentially assign the values of the function  to each router so that the above
restrictions are met at each step [20]. From the allowable values of the function we choose a value that
minimizes the value of the delay   on this router. We will start to bypass vertices from the coordinator
in descending order of values of  ( ,  ).
2.7.</p>
      </sec>
    </sec>
    <sec id="sec-12">
      <title>Measurement of Power Consumption of Devices</title>
      <p>The following are calculations of the operating time of the end device and router from different types
of batteries.</p>
      <sec id="sec-12-1">
        <title>Average current, мА</title>
      </sec>
      <sec id="sec-12-2">
        <title>Life time from 2*АА, years</title>
      </sec>
      <sec id="sec-12-3">
        <title>Lifetime from a miniature galvanic cell CR2450, years</title>
        <p>In Tables 1 and 2:  - is the interval between beacons.</p>
        <p>The table 3 shows a comparison of theoretical calculations and experimental data based on 
beacon pointer.
In Table 3, R is ratio of average currents in the router and the end device.</p>
        <p>Thus, the calculations confirm that the impact of traffic on the lifetime of devices in a stable network
is quite small [21]. Also, the ratio of currents in different devices, distributed by roles, is about 13% less
than theoretical. This confirms the feasibility of the previously constructed algorithm for the distribution
of roles.
1.8
1.6</p>
      </sec>
    </sec>
    <sec id="sec-13">
      <title>Measurement of Message Delivery Time</title>
      <p>Several studies have been performed using the NS-2 network simulator to determine the delivery
time of messages.</p>
      <p>Different variants of schedules were used—optimal (which is determined by the algorithm of
minimizing delivery time) and random [22–26].</p>
      <p>For this study, channel-level error simulation was disabled so that data packets were delivered in one
wave [27]. 4 BO parameters with optimal and random schedule were selected.</p>
      <p>For a simple experiment, it turns out that the average message delivery time is reduced by about four
times. This will depend directly on the characteristics of the network topology and its construction [28].
The data obtained experimentally for the optimal decomposition are consistent with the theoretical
estimate.</p>
    </sec>
    <sec id="sec-14">
      <title>3. Acknowledgements</title>
      <p>The work is devoted to solving the problem of optimizing the wireless sensor network, which is
based on the climate control system in a smart home.</p>
      <p>The analysis of modern climate control systems and technologies used in them is carried out. Also,
the technology of wireless sensor networks was considered, and, as a result, the main problems that
accompany this technology. Based on the analysis, the requirements for solving problems to optimize
the work of WSN were formed.</p>
      <p>A simulation model of WSN was built, with the help of which we were able to investigate and
reproduce a wireless sensor network and conduct research on the feasibility of the proposed algorithms.
According to the theoretical assessment, it was determined that these algorithms will increase the
lifetime of the network up to seven times, depending on the parameters and topology of the network.
The theoretical estimate was overestimated by 13%.</p>
      <p>A role distribution algorithm has been developed to equate network operation time to end device
operation time. According to the results of the built optimization algorithms, the network operation time
can be increased approximately 6–7 times, and the message delivery time can be reduced 2–4 times.
The conducted experiments prove the optimality of the given algorithms.</p>
    </sec>
    <sec id="sec-15">
      <title>4. References</title>
      <p>[18] Zhurakovskyi B. Processing of information in sensory framing / B.Yu. Zhurakovskyi, І. R.</p>
      <p>Parkhomey, V. A. Druzhinin // Adaptive systems and automatic control. - 2018. - No. 1. - P.
4257. - Access mode: http://nbuv.gov.ua/UJRN/asau_2018_1_7
[19] Callaway E., Gorday P., Hester L., Gutierrez J., Naeve M., Heile В., and Bahl V. Home networking
with IEEE 802.15.4: a developing standard for low-rate wireless personal area networks. IEEE
Communications Magazine, vol. 40, no. 8, pp. 70-77, Aug. 2002.
[20] Hempstead, Michael J. Lyons, David Brooks, and Gu-Yeon Wei, Survey of Hardware Systems for</p>
      <p>Wireless Sensor Networks, Mark, Journal of Low Power Electronics Vol.4, 2008
[21] Wireless Sensor Networks Security: State of the Art – Access mode:
https://arxiv.org/ftp/arxiv/papers/1808/1808.05272.pdf
[22] TajDini, M., et al., Wireless Sensors for Brain Activity—A Survey. In Electronics, Vol. 9, Issue
12, 2092. MDPI AG., 2020. https://doi.org/10.3390/electronics9122092
[23] Bogachuk, I., Sokolov, V., Buriachok, V., Monitoring subsystem for wireless systems based on
miniature spectrum analyzers, in: International Scientific-Practical Conference Problems of
Infocommunications. Science and Technology, 2018.
https://doi.org/10.1109/infocommst.2018.8632151.
[24] Kipchuk, F., et al. Investigation of Availability of Wireless Access Points based on Embedded
Systems. 2019 IEEE International Scientific-Practical Conference Problems of
Infocommunications, Science and Technology (PICS&amp;T), 2019. https://doi.org/10.1109/
picst47496.2019.9061551
[25] Buriachok, V., Sokolov, V., Skladannyi, P., Security rating metrics for distributed wireless systems,
in: Workshop of the 8th International Conference on "Mathematics. Information Technologies.
Education": Modern Machine Learning Technologies and Data Science (MoMLeT and DS), vol.
2386, 222–233, 2019.
[26] Bernard P. Zeigler; Herbert Praehofer; Tag Gon Kim (2000). Theory of modeling and simulation:
Integrating discrete event and continuous complex dynamic systems – second edition. Academic
Press.
[27] Mathematical support for automated design systems for passive optical networks based on the
βparametric approximation formula / [Nedashkivskiy O, Havrylko Y, Zhurakovskyi B et al.] //
International Journal of Advanced Trends in Computer Science and Engineering (2020) 9(5) Pages
8207-8212. DOI: 10.30534/ijatcse/2020/186952020.
[28] Limitations of efficiency of wireless systems of telecommunications 5G and methods of their
compensation. / [Kremenetskaya, Y., Makarenko, A., Markov, S., Koval, V.] // 2019 IEEE
International Scientific-Practical Conference: Problems of Infocommunications Science and
Technology, PIC S and T, 2019 - Proceedings, 2019. Pages 493–496, 9061493.</p>
    </sec>
  </body>
  <back>
    <ref-list />
  </back>
</article>