<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Model of the Application of IoT Devices Based on RFID to Ensure the Safety of the Military and Civilian Population under War Conditions</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Myroslava Gladka</string-name>
          <email>gladkam@fit.knu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alexander Kuchansky</string-name>
          <email>kuchansky@knu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykola Kostikov</string-name>
          <email>kostikov@knu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rostyslav Lisnevskyi</string-name>
          <email>lisnevskyir@fit.knu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National University of Food Technologies</institution>
          ,
          <addr-line>68 Volodymyrska Str., Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska Str., Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>269</fpage>
      <lpage>278</lpage>
      <abstract>
        <p>IoT devices using radio-frequency identification (RFID) systems are becoming more popular in many fields where clear identification and affiliation of a specific person to a specific activity is important. These are various branches of industry, banking, the economic sector, medicine, etc. However, creating and using an IoT model for the protection and security of the military and civilian population in wartime has not yet gained widespread use. It is in the conditions of combat actions, where there is a need to identify each person, and their movement within the scope of military operations, conducting or participating in evacuation procedures, involvement in various types of military or humanitarian missions, prompt provision of medical assistance, etc. In all these situations, issues of identification are of vital importance, because not only security but also the lives of the military and civilian population may depend on it. The purpose of this study is to investigate the features and prove the advantages of applying an IoT model based on RFID in the conditions of martial law to ensure the safety of the health and life of the military and the civilian population. The paper considers the use of RFID tags to ensure the safety of movement, and personal identification for those who need medical assistance or are in danger on the territory of combat operations or occupied territories.</p>
      </abstract>
      <kwd-group>
        <kwd>1 IoT</kwd>
        <kwd>model</kwd>
        <kwd>RFID</kwd>
        <kwd>identification</kwd>
        <kwd>war</kwd>
        <kwd>military</kwd>
        <kwd>civilian population</kwd>
        <kwd>protection</kwd>
        <kwd>safety</kwd>
        <kwd>security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In the conditions of conducting military operations, there arises an urgent need for personal
identification of military personnel, medics, volunteers, civilians, etc. Personal identification is the
mechanism that enables the implementation of movement control mechanisms to ensure the security
of the military and civilian population; prompt provision of medical care in accordance with the
personal data of the injured; movement adjustments in evacuation missions; assisting victims in
accordance with the territorial availability of medical workers.</p>
      <p>
        Modern trends in managing the movement of military personnel, medics, volunteers, and the
civilian population under martial law have a common problem – increasing the risks for movement
due to the lack of up-to-date coordination depending on the current state of threats [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Another
important component of personal identification is the ability to obtain up-to-date information when
there is a need to provide decent medical assistance to people in the combat zone [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        IoT devices are widespread in all areas of human life. Therefore, using such technology for
protecting the military and the civilian population under war conditions is of vital importance. One of
the approaches to using IoT for protection may be creating a model using radio frequency
identification (RFID) – a wireless technology that implements a mechanism capable of automatic and
unambiguous identification of objects that can be out of sight. It is achieved by extracting a unique
identifier from microelectronic tags attached to objects [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        RFID is a technology for object identification and tracking that uses radio waves to transmit data.
A special reader gets the data from an electronic label (RFID tag) attached to the object [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. With the
help of an IoT model based on RFID, we can track and monitor the movements of people. Data can be
collected in real-time and be immediately available for military, humanitarian or volunteer missions,
providing medical care, which increases security and minimizes travel time thanks to RFID.
      </p>
      <p>
        Data can be collected in real-time and have live access thanks to RFID. Response teams in
command posts, medics, humanitarian missions managers, and other people involved in solving
problems under martial law can access the data of subjects who own an RFID tag via a computer
database [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The lack of up-to-date information about a person in need of medical assistance can
significantly reduce the level of such assistance or even cause harm. The inability to promptly manage
the movement of people in areas of increased danger can have disastrous consequences for the life
and health of such people. The use of modern information technologies, software, and hardware in the
territories of active combats, where there is a constant threat to the life and health of military
personnel or other people, stimulates the use of all available algorithms and mechanisms in IT, as well
as the development new ones [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. It is the technologies that will reduce the possible risks of people
who are in the combat areas, through the optimization of communications, prompt access to
information, assistance in decision-making, etc., that should have a prominent place in the current
conditions of our and other countries suffering from war.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Methods for Solving the Problem</title>
      <p>
        A model of an IoT system using RFID is a complex of hardware and software. Its basic elements
are tags attached to objects that need to be identified. There may be name tags for military personnel,
medics, and volunteers, or individual tags for the civilian population that can be fixed on a person's
identity card or other belongings. Each such tag has an internal memory sufficient to record a limited
amount of data. This memory may be read-only for use in name tags, or rewritable if the tags are used
for variable subjects, such as civilians undergoing evacuation. Accordingly, recording in such
memory is carried out once or repeatedly with the help of special software [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        The memory of each RFID tag stores information about the subject as a unique identifier, such as
date of birth, personal number, etc. To receive stored data, the RFID reader generates magnetic fields
that search for all RFID tags placed within its range. High-frequency electromagnetic energy
generated in the process of creating a request activates tags to receive a response from the RFID
memory [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Depending on the speed of changes in the information flow, such requests can be
updated up to 50 times per second [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. When the reader receives an RFID response from the RFID
tag, a connection is created to receive data. Further, the data is sent to data processing servers and the
results can be returned to any convenient mobile device for making necessary decisions [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] (Fig. 1).
2.1.
      </p>
    </sec>
    <sec id="sec-3">
      <title>RFID System Structure</title>
      <p>
        An RFID system includes a set of elements united by a single radio frequency communication
algorithm for the exchange of information flows. The system constantly monitors the presence of
RFID tags in the range of the RFID scanner for further processing depending on the given work
scenarios [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The RFID system may include the following elements (Fig. 1):
 The tag which is placed on the subject and has a unique identification;
 Antenna – activates the magnetic field intended for data transmission between the tag and
the reader; depending on the antenna power, the area of operation of the RFID tag detector
can be expanded;
 Reader – for reading information from RFID tags;
 Communication infrastructure – for data exchange between readers, the database, and
other smart devices that receive a response from the database;
 Database – contains all the necessary information about subjects related to a specific
identifier recorded in the RFID tag;
 Software – an information system with a convenient user interface for receiving and
processing information obtained from the database via RFID tags. Such programs can be
implemented to work with both the web interface and mobile applications.
2.2.
      </p>
    </sec>
    <sec id="sec-4">
      <title>RFID tags</title>
      <p>
        RFID tags are small objects consisting of a microcircuit – a chip and an antenna [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] (Fig. 2). The
microcircuit includes a receiver, a transmitter, and a memory block for data storage. The composition
of active RFID tags can also include a power element. Passive tags receive power from the radio
signal of the reader's antenna. The main difference between active and passive tags is their range of
action, in active tags this range can be several times greater.After receiving a signal from the RFID
reader, the tag activates a response in the form of a signal containing identification information [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        The following types of RFID tags can be used to implement military missions [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]:
 R/O (Read Only) – the data is recorded at the tag manufacturing stage, and is immutable.
Such tag should be used on military weapons and equipment;
      </p>
      <p> WORM (Write Once Read Many) – tags for one-time recording and multiple reading. No
data is entered on such tag during the production process. The information is recorded by the user
once, and then it can be read multiple times. Such tags should be used to identify military personnel or
other people involved in military operations;</p>
      <p> R/W (Read/Write) – rewritable tags that can be written and read multiple times. Such tags
may be used for subjects undergoing evacuation.</p>
      <p>
        The key factor in the RFID tag radius range is the design of the antenna, which must take into
account the following parameters: resistance to radiation, bandwidth, and efficiency. Meanwhile,
RFID antennas are tuned to resonate only in a narrow range of radio frequencies that work according
to the rules defined by RFID [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The RFID antenna spreads the wave in horizontal and vertical
dimensions. For the identification of subjects in war conditions, it becomes necessary to spread the
wave at an angle, which causes a loss of signal strength, so the question of increasing the power of the
antenna arises. An increase in antenna power is achieved by increasing its area, and using special
materials for its manufacture [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ]. Increasing the range of the RFID tag antenna can be achieved
by increasing the turns [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] (Fig. 3).
      </p>
      <p>To calculate the antenna power, it is necessary to take into account the width of the lines of turns t
and the material from which they are made, the number of turns i increasing their size from the inner
to the outer turn. Then the power of each i-th turn of the antenna can be written as
where I is the current, and Ri is the resistance on the i-th turn.</p>
      <p>
        To determine the magneto-inductive losses on each turn i, it is necessary to take into account the
size of each turn D (length and width), the total number of turns n, the resistance of the base where the
antenna is located μ, the conductivity of the material ρ and the thickness of the antenna tape t. [
        <xref ref-type="bibr" rid="ref20 ref5">5, 20</xref>
        ]:
Pi  I 2Ri
      </p>
      <p>D2
Q   t i (i  n)I</p>
      <p>P
i
(1)
(2)</p>
      <p>
        By making calculations, you can get an antenna of such power that will be necessary for use in the
conditions of warfare. Of course, the complexity of the design and the use of materials with higher
conductivity increases the cost of the antenna, but life and health safety are important factors in
increasing the cost of development [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
2.3.
      </p>
    </sec>
    <sec id="sec-5">
      <title>Advantages of Creating and Using an IoT Model Based on RFID</title>
      <p>
        In information technologies, there are quite a lot of identification mechanisms: optical identifiers
(barcodes, QR codes), biometrics (fingerprints, face recognition, voice identification), etc. [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
However, in the time of combat actions, it may be necessary to recognize a person who needs medical
intervention, has a psychological shock, and does not respond to external factors. In such cases,
biometric identifiers may not work. Therefore the use of identifiers that do not depend on the state of
the person is quite critical. The proposed IoT model uses RFID tags that have a fairly small size but
can store a large amount of information. Thanks to this, such tags can be placed in the individual
tokens of military personnel or other people involved in military operations. This will allow
additionally protect the identifier from the influence of external factors. It will also ensure the
durability of the tag, which is impossible to implement for graphic identifiers.
      </p>
      <p>
        It is reasonable to use rewritable RFID tags in personal protection systems (helmets, armored
vests) for people undergoing evacuation from the zone of combat actions. After the successful
completion of the operation, the data is erased, and the tags are prepared for recording the data of
people from the next mission [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The reuse of RFID tags with other information is easily
implemented by the rewriting mechanism. Readers can simultaneously receive information from a
large number of tags, thanks to the implemented anti-collision mechanism.
      </p>
      <p>
        Hidden tags can only be recognized if information about their placement is available. Additionally,
the data recorded on the tag can be protected by a password or identified only by a trust system, to
which only specific people involved in military operations have access [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
2.4.
      </p>
    </sec>
    <sec id="sec-6">
      <title>Standards in Radio-Frequency Identification</title>
      <p>
        Among the current ISO standards, there are separate sections regulating tracking system standards
(ISO 11784, ISO 11785), standards for identifying RFID tags (ISO 10536, ISO 14443, ISO 15693),
standards for RFID AIDC and control technologies (ISO 15961, ISO 15962, ISO 15963, ISO 18001).
The ISO 18000 standard is used to control the elements of RFID systems. It regulates the use of
common communication protocols in accordance with the norms of international use of RFID. This
standard covers the entire spectrum of the RFID frequency range (LF, HF, UHF, and microwaves).
The specifications of this standard are presented in seven parts (Table 1) [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>
        The current EPC Gen 2 standard has more advanced functionality for UHF-RFID operation, which
allows for even distribution between different RFIDs. This standard provides an option of "tag
destruction" for additional protection against unauthorized reading when there is a need to protect the
subject that owns the RFID tag and ensure its privacy [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
    </sec>
    <sec id="sec-7">
      <title>3. Practical Implementation</title>
      <p>
        Modern wars are wars of technology and equipment. The paths of troop movement, the equipment
locations, and the conduct of military operations are constantly tracked. In such conditions, there is a
need to accurately and promptly determine the position of subjects with RFID tags, therefore it is
appropriate to use a real-time locating system [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
      </p>
    </sec>
    <sec id="sec-8">
      <title>3.1. A Model of an IoT Real-Time Locating System (RTLS) for RFID Tag</title>
    </sec>
    <sec id="sec-9">
      <title>Detection</title>
      <p>
        A real-time locating System (RTLS) is an IoT system that implements identification with the
determination of location and exact coordinates according to the territory plan within the monitoring
zone [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. An IoT model using RTLS makes it possible to get and process information about the
subject location: monitor the movement of people in evacuation missions, monitor military
operations, search for the wounded and dead, and organize rescue missions by teams that have the
closest location to the affected subjects. Thanks to the introduction of RTLS into the IoT model, the
received information about military operations can be coordinated in real time according to the
current state of threats and dangers [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. Another key advantage of RTLS with the characteristic
accuracy of ultrasonic positioning is the possibility of mining territories with the accuracy of laying
routes up to ten centimeters [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>
        Locating accuracy depends both on the quality of the radio frequency signal from the tag and on
the influence of interference, as well as the number of responses to the signal (print fading), so these
characteristics must be taken into account when designing RFID tags (antenna power, antenna
material, type of microprocessor, type of tag). The polling frequency to obtain real-time locating
should be based on the speed of movement of the subjects. Accordingly, the higher the speed of
movement, the more frequent the survey should be so that the accuracy of the indicators is sufficiently
high [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. To determine coordinates more accurately, each active tag can interact with several readers
in fixed locations at the same time. From this data, the locating of the RFID tag is calculated. Such
coordinate calculations can be based on key locating algorithms: trilateration or multilateration (based
on measuring the distances from the readers to the tag), and triangulation (based on measuring the
direction angles from the readers to the tag). When making such calculations, it is necessary to take
into account the map of the area: the location of buildings, the presence of plantations, additional
permanent and variable obstacles, and interferences [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>When organizing the control of identifiable entities on the territory controlled by the RTLS
infrastructure, packets are exchanged between RFID tags and software. Thanks to this tracking, it is
possible to create maps of military movements, and execution of military or other operations. If it is
necessary to receive help for the wounded or search for the dead, we can identify the precise location
of the subject. To perform missions, medical workers must synchronize the location of individual
teams that are closest to the victims. When carrying out humanitarian and evacuation missions, we
should monitor deviations from routes, the trajectory of movement, violation of traffic columns in
convoys, speed of movement, etc.
3.2.</p>
    </sec>
    <sec id="sec-10">
      <title>Radio Frequency Identification Range</title>
      <p>
        The main feature of military operations is a large territory, therefore, when choosing an
environment for data exchange, you need to take this factor into account. The use of RFID systems in
ultra-high-frequency mode – Microwave (from 2.45 GHz) may be recommended in this case. The
range of such tags can be from 300 meters to several kilometers while maintaining a fairly high
reading speed. Of course, when accounting for military weapons and equipment, you can use
lowfrequency tags, which will be much cheaper to develop and use. But the emphasis of our work is
precisely on the development of mechanisms for the identification of military personnel and other
people in the combat zone [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>To ensure the operation of high-frequency identification for the safety of military personnel and
other people in the conditions of martial law, it is advisable to use communication devices with a
long-field strategy implemented in a UHF-RFID reader. A feature of UHF-RFID is work with
standard tags with a large reading range and the possibility of limiting the electric field. This allows
you to distinguish between the reading range and the types of tags that are scanned. Thanks to this, it
is possible to perform various tasks of locating and identifying certain subjects.</p>
      <p>
        To increase the operating range, it is necessary to use antennas with a wave loop, a traveling wave,
which is faster in space [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. To analyze lossless range scanning in a one-dimensional metamaterial
structure M, we determine the parameter λ, which corresponds to the phase constant value of the
signal passing through this structure, the radio frequency signal propagating in space – l0, lх, and lу –
its projection in the x and y planes (Fig. 3). Depending on the method of developing the structure of
the metamaterial M, it is possible to adjust the wave λ by adjusting the effective dielectric permittivity
ρ and magnetic permeability φ of the metamaterial M [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. The range of the identifier l0 directly
depends on the environment surrounding the metamaterial structure. Therefore, the more obstructions
and obstacles in the way of the identifier's actions, the more the reading range is reduced [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]. The
ideal environment is air when there are no more restraining factors in the obstacle. Then to ensure the
continuous interconnection of RFID elements at the boundary of the distribution of the metamaterial
structure and the environment, the vectors λ and l0 must coincide. Then the ratio between the values of
the vectors λ and l can be determined from the standard distribution
l x
(3)
(4)
(5)
(6)
(7)
      </p>
      <p>Therefore:</p>
      <p>ly  l02  2</p>
      <p>If conditions are created in the active antenna when it is possible to control the direction of the
wave signal λ, then we level the value of ly , and lx will correspond to the wavelength. Such conditions
can be created for multi-turn antennas, which were discussed above.</p>
      <p>
        We describe the designed communication network for locating subjects as a graph G(V, H) where
V is a set of vertices – RFID tags and readers, and H is a set of arcs operating within the antenna
bandwidth. Accordingly, with proper communication between the system devices within the working
range, each arc h ∈ H of graph G is characterized by ch. We denote all the possible paths for
connecting tags with readers as LT [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>The logical structure LS of the network communication can be presented as:
which is represented by a set of paths for communication of network elements as vertices in graph G
indicating communication lines xt in each path.</p>
      <p>We present a logical function for any path t ∈ LT and any arc h ∈ H as</p>
      <p>LS  LS (LT , xt ,t  LT )</p>
      <p>1, h  t
 {t,h}  </p>
      <p>0, h  t
 xt  dk , k  1,..., D
tLT (sk ,rk )</p>
      <p>The set of requests from readers to RFID tags will be represented by R, then the logical structure
LS that satisfies this set can be presented as
where dk, k = 1, ..., |D| are values of requests between tags and readers sk, rk from the set V, i.e.
dk = dk(sk,rk).</p>
      <p>As mentioned above, when determining the location of RFID tags, there is communication with
several readers. Therefore, it is important to analyze the communication between IoT elements in a
case when one of the readers fails or there are problems with the signal transmission. In such an
unstable situation NS, each element n ∈ NS, r = 1, ..., |NS|, may be an element of the list of
components q(r) – arcs hi1...hiq(r) that failed in an unstable situation r.</p>
      <p>In such situations, a set of communications between readers and tags h ∈ LT in a logical structure
LS(qr) will be</p>
      <p>LT(qr ) </p>
      <p> LT(i, j, qr )
i, jV ,i j</p>
      <p> qr 
 {h, qr}  min    {h, xi j },1
 j1 
(8)
(9)</p>
      <p>Accordingly, the failure of any IoT element for identification increases the risks in data transfer
and proper communication between devices which reduces the accuracy of locating the tags.</p>
    </sec>
    <sec id="sec-11">
      <title>4. Result</title>
      <p>
        In the conditions of warfare, IoT systems using RFID technology can be used for the following
purposes: tracking the progress of military missions, managing the movement of soldiers and medics,
coordinating the movement of evacuation convoys, and monitoring and checking the identification
data of subjects. Each of these characteristics provides the main values of humanity: the life and
health of individuals due to prompt adjustments of movement, or the ability to receive/provide
medical assistance to the injured [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ].
      </p>
      <p>RFID in IoT is used to track movement and relocations on the territory of combat actions. Due to
such tracking, it is possible to monitor and control the location of subjects on the terrain in real-time
in the area of operation of the readers, to coordinate their movement based on operational intelligence
data on the state and actions of the enemy, which increases security.</p>
      <p>It is possible to identify subjects in danger outside the range of readers with the help of drones
equipped with special readers. Based on the received data, we can create rescue battalions, and
organize medical assistance. When using RFID tags in IoT, it is possible to identify the subject and
obtain its individual data (blood group and Rh factor, indications and contraindications, chronic
diseases, etc.), which significantly increases the quality and efficiency of providing medical care.</p>
      <p>
        Of course, the use of RFID in IoT systems can be used in various areas, e.g. for checking the
availability of equipment and weapons, which must be inventoried, accounted for, and controlled
[
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]. The use of RFID tags for the identification of mines allows the development of maps of
minefields to create mined areas safe for military personnel equipped with appropriate readers.
      </p>
      <p>
        There is an obstacle to the high-quality work of IoT systems based on RFID technology which is
the enemy's use of electronic warfare (EW), radio-electronic suppression, and radio-electronic
reconnaissance. Those methods are used in military operations by our enemies, in particular, such EW
systems as Borisoglebsk-2, the UAV Shipovnik-Aero, the satellite EW complex "Tirada", and others
[
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]. However, RFID tags, depending on their purpose, work at frequencies that are not prioritized for
suppression by EW systems, but work in case of muted signals of command communication points,
signals of cellular networks, Wi-Fi, WiMAX, and DECT networks. Individual stations, such as
"Station R-934B", carry out automatic search and analysis of emitted signals, and detect coordinates
of aviation UHF radio communication and tactical aviation guidance systems in the range of 100–150
MHz and 220–400 MHz. Accordingly, the use of RFID tags and readers in the range over 2.45 GHz
defines them as an additional advantage in a military campaign.
      </p>
      <p>All factors of the use of RFID in IoT systems contribute to increasing the safety of military
personnel and the civilian population, the quality, and efficiency of receiving assistance (medical,
coordination), and improving the operations of military, medical and humanitarian missions.</p>
    </sec>
    <sec id="sec-12">
      <title>5. Conclusions</title>
      <p>According to the results of the conducted research, it can be concluded that tags operating in the
ultra-high frequency range are the most promising today for improving the security and protection of
the military and other people in the area of combat actions. For the development of RFID tag
antennas, it is necessary to use highly conductive materials with low resistance for an increased range
antenna, which will provide coverage of large areas of identification and real-time locating.</p>
      <p>
        The introduction of the model of IoT systems based on RFID for military campaigns increases the
accuracy of task performance due to the monitoring and coordination of movements according to the
change in the state of the troops [
        <xref ref-type="bibr" rid="ref33 ref34">33, 34</xref>
        ]. Synchronization of RFID with modern military navigation
systems will improve the conduct of military campaigns [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ].
      </p>
      <p>Search and identification of the dead and wounded based on RFID ensures the precise locating of
the subject. If the provision of medical assistance is necessary, it eliminates the issue of medical
contraindications to treatment based on the received identification data, which will significantly
reduce the risks associated with the administration of medications.</p>
      <p>An obstacle to the implementation of RFID for the identification of the military and other people
in the combat zone is the cost of implementation, since long-range RFID tags have a higher
manufacturing cost compared to short-range ones; and the insufficient budget for the army, the
complexity of systems and technologies may be an additional restraining factor.</p>
    </sec>
    <sec id="sec-13">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Military</given-names>
            <surname>Doctrine</surname>
          </string-name>
          of Ukraine, in: Presidential Bulletin,
          <year>2004</year>
          , vol.
          <volume>14</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>[2] About the internal and external situation of Ukraine in 2015, National Institute for Strategic Studies</article-title>
          , Kyiv,
          <year>2015</year>
          , 684 p.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Nikiforenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vikhtiuk</surname>
          </string-name>
          ,
          <article-title>Main threats to the national security of Ukraine on the state border and trends in their development, in: Collection of scientific works of the National Academy of the State Border Guard Service of Ukraine</article-title>
          , series: Military and
          <string-name>
            <given-names>Technical</given-names>
            <surname>Sciences</surname>
          </string-name>
          ,
          <year>2021</year>
          , vol.
          <volume>85</volume>
          , no.
          <issue>2-3</issue>
          , pp.
          <fpage>202</fpage>
          -
          <lpage>221</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ajami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rajabzadeh</surname>
          </string-name>
          ,
          <article-title>Radio Frequency Identification (RFID) technology and patient safety</article-title>
          ,
          <source>in: J Res Med Sci.</source>
          ,
          <source>2013 Sep</source>
          ,
          <volume>18</volume>
          (
          <issue>9</issue>
          ):
          <fpage>809</fpage>
          -
          <lpage>13</lpage>
          . PMID: 24381626. PMCID:
          <fpage>PMC3872592</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. C.</given-names>
            <surname>Ranasinghe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q. Z.</given-names>
            <surname>Sheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zeadally</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Yu,</surname>
          </string-name>
          <article-title>RFID enabled traceability networks: a survey</article-title>
          ,
          <source>in: Distributed and Parallel Databases</source>
          ,
          <year>2011</year>
          ,
          <volume>29</volume>
          :
          <fpage>397</fpage>
          -
          <lpage>443</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Landt</surname>
          </string-name>
          ,
          <article-title>The history of RFID</article-title>
          , in: IEEE Potentials, New York, NY,
          <year>2005</year>
          ,
          <volume>24</volume>
          (
          <issue>4</issue>
          ):
          <fpage>8</fpage>
          -
          <lpage>11</lpage>
          . DOI:
          <volume>10</volume>
          .1109/MP.
          <year>2005</year>
          .
          <volume>1549751</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Shport</surname>
          </string-name>
          ,
          <article-title>Procedure of building a wave algorithm mask in order to find rational routes while solving the emergency service tasks of the State Border Guard Service of Ukraine</article-title>
          , in: Scientific Works of Vinnytsia National Technical University,
          <year>2014</year>
          , no.
          <issue>2</issue>
          , 4 p.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D. W.</given-names>
            <surname>Bates</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Gawande</surname>
          </string-name>
          .
          <article-title>Improving safety with information technology</article-title>
          ,
          <source>in: N Engl J Med</source>
          .,
          <year>2003</year>
          ,
          <volume>348</volume>
          :
          <fpage>2526</fpage>
          -
          <lpage>34</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>K.</given-names>
            <surname>Finkenzeller</surname>
          </string-name>
          , RFID Handbook,
          <article-title>Radio-Frequency Identification Fundamentals</article-title>
          and Applications, Wiley, New York, NY, USA, 2nd edition,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>F. J.</given-names>
            <surname>Herraiz-Martínez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Paredes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Zamora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Martín</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bonache</surname>
          </string-name>
          ,
          <article-title>Printed magnetoinductivewave (MIW) delay lines for chipless RFID applications</article-title>
          ,
          <source>in: IEEE Transactions on antennas and propagation</source>
          ,
          <year>2012</year>
          , vol.
          <volume>60</volume>
          , no.
          <issue>11</issue>
          , pp.
          <fpage>5075</fpage>
          -
          <lpage>5082</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>B.</given-names>
            <surname>Glover</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Bhatt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>RFID</given-names>
            <surname>Essentials</surname>
          </string-name>
          ,
          <string-name>
            <surname>O</surname>
          </string-name>
          'Reilly, Sebastopol, Calif, USA,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>H.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuchansky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gladka</surname>
          </string-name>
          ,
          <article-title>Development of individually-oriented method of selection of scientific activity subjects for scientific projects implementation based on scientometric analysis</article-title>
          ,
          <source>in: East</source>
          .
          <article-title>-</article-title>
          <string-name>
            <given-names>Eur. J.</given-names>
            <surname>Enterp</surname>
          </string-name>
          . Technol.,
          <year>2021</year>
          ,
          <volume>6</volume>
          (
          <issue>3</issue>
          (
          <issue>114</issue>
          )),
          <fpage>93</fpage>
          -
          <lpage>100</lpage>
          . DOI: https://doi.org/10.15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2021</year>
          .
          <volume>248040</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Nambiar</surname>
          </string-name>
          ,
          <article-title>RFID technology: A review of its applications, in: Proceeding of the World Congress on Engineering</article-title>
          and Computer Science Oct.
          <volume>20</volume>
          -
          <fpage>22</fpage>
          , San Francisco, USA,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>K.</given-names>
            <surname>Ahsan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Shah</surname>
          </string-name>
          , P. Kingston,
          <article-title>RFID applications: An introductory and exploratory study</article-title>
          ,
          <source>in: IJCSI Int J Comput Sci Issues</source>
          ,
          <year>2010</year>
          ,
          <volume>7</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>N. C.</given-names>
            <surname>Karmakar</surname>
          </string-name>
          ,
          <article-title>Handbook of Smart Antennas for RFID Systems</article-title>
          , John Wiley and Sons, NJ,
          <year>2010</year>
          ,
          <volume>218</volume>
          р.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>X.</given-names>
            <surname>Qing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. K.</given-names>
            <surname>Goh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. N.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <article-title>Segmented loop antenna for UHF near-field RFID applications</article-title>
          , in: Electronics Letters,
          <year>2009</year>
          , vol.
          <volume>45</volume>
          , no.
          <issue>17</issue>
          , pp.
          <fpage>872</fpage>
          -
          <lpage>873</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>X. Z.</given-names>
            <surname>Lai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. M.</given-names>
            <surname>Xie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q. Q.</given-names>
            <surname>Xie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Chao</surname>
          </string-name>
          ,
          <article-title>A Srr-based near field RFID antenna</article-title>
          , in: Progress in Electromagnetics Research C,
          <year>2012</year>
          , vol.
          <volume>33</volume>
          , pp.
          <fpage>133</fpage>
          -
          <lpage>144</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>C. F.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. F.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <article-title>Design of RFID reader antenna for exclusively reading single one in tag assembling production</article-title>
          ,
          <source>in: Int J Antennas Propag</source>
          ,
          <year>2012</year>
          , vol.
          <year>2012</year>
          ,
          <string-name>
            <surname>Article</surname>
            <given-names>ID</given-names>
          </string-name>
          162684, 5 p.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>B.</given-names>
            <surname>Shrestha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Elsherbeni</surname>
          </string-name>
          , L. Ukkonen,
          <string-name>
            <surname>UHF</surname>
          </string-name>
          <article-title>RFID reader antenna for near-field and far-field operations</article-title>
          ,
          <source>in: IEEE Antennas and Wireless Propagation Letters</source>
          ,
          <year>2011</year>
          , vol.
          <volume>10</volume>
          , pp.
          <fpage>1274</fpage>
          -
          <lpage>1277</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Xing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Zhang, Characteristics and application of a novel loop antenna to UHF RFID receivers</article-title>
          ,
          <source>in: Int J Antennas Propag</source>
          ,
          <year>2011</year>
          , vol.
          <year>2011</year>
          ,
          <string-name>
            <surname>Article</surname>
            <given-names>ID</given-names>
          </string-name>
          480717, 7 p.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>R.</given-names>
            <surname>Boyko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Shumyhai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gladka</surname>
          </string-name>
          . Сoncept,
          <article-title>Definition and Use of an Agent in the Multi-agent Information Management Systems at the Objects of Various Nature</article-title>
          .
          <source>Recent Advances in Systems, Control and Information Technology, in: Proceedings of the International Conference SCIT 2016, May 20-21</source>
          ,
          <year>2016</year>
          , Warsaw, Poland, pp.
          <fpage>59</fpage>
          -
          <lpage>63</lpage>
          . Series ISSN:
          <fpage>2194</fpage>
          -
          <lpage>5357</lpage>
          . DOI: https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -48923-0.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22] ISO/IEC 18000 Information technology
          <article-title>- Radio frequency identification for item management</article-title>
          ,
          <year>2004</year>
          . URL: https://iso.org.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>P. V.</given-names>
            <surname>Nikitin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. V. S.</given-names>
            <surname>Rao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lazar</surname>
          </string-name>
          ,
          <article-title>An overview of near field UHF RFID</article-title>
          ,
          <source>in: Proceedings of the IEEE International Conference on RFID, Grapevine</source>
          , Tex, USA,
          <year>March 2007</year>
          , pp.
          <fpage>166</fpage>
          -
          <lpage>174</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ajami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Arab-Chadegani</surname>
          </string-name>
          ,
          <article-title>What are the most important barriers to implement Radio Frequency Identification Device (RFID) in healthcare system?</article-title>
          ,
          <source>in: J Inform Tech Soft Eng.</source>
          ,
          <year>2013</year>
          , S7:
          <fpage>e004</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>J.</given-names>
            <surname>Slovák</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Melicher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Šimovec</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Vachálek</surname>
          </string-name>
          ,
          <article-title>Vision and RTLS Safety Implementation in an Experimental Human-Robot Collaboration Scenario</article-title>
          . Sensors,
          <year>2021</year>
          ,
          <volume>21</volume>
          (
          <issue>7</issue>
          ):
          <fpage>2419</fpage>
          . DOI: https://doi.org/10.3390/s21072419.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>G. Z.</given-names>
            <surname>González</surname>
          </string-name>
          ,
          <source>Radio Frequency Identification (RFID) Tags and Reader Antennas Based on Conjugate Matching and Metamaterial Concepts</source>
          ,
          <source>Bellaterra (Cerdanyola del Vallès)</source>
          ,
          <source>July</source>
          <year>2013</year>
          ,
          <volume>130</volume>
          p.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>T.</given-names>
            <surname>Kokkinos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. D.</given-names>
            <surname>Sarris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. V.</given-names>
            <surname>Eleftheriades</surname>
          </string-name>
          ,
          <article-title>Periodic FDTD analysis of leaky-wave structures and applications to the analysis of negativerefractive-index leaky-wave antennas</article-title>
          ,
          <source>in: IEEE Trans. Microw. Theory Tech., Jun</source>
          .
          <year>2006</year>
          , vol.
          <volume>54</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>1619</fpage>
          -
          <lpage>1630</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>G.</given-names>
            <surname>Zamora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zuffanelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Paredes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. J.</given-names>
            <surname>Herraiz-Martinez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Martín</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bonache</surname>
          </string-name>
          ,
          <article-title>Fundamental mode leaky-wave antenna (LWA) using slot line and split-ring-resonator (SRR) based metamaterial</article-title>
          ,
          <source>in: IEEE Antennas and Wireless Propagation Letters, May</source>
          <year>2013</year>
          , vol.
          <volume>12</volume>
          , pp.
          <fpage>1424</fpage>
          -
          <lpage>1427</lpage>
          . DOI:
          <volume>10</volume>
          .1109/LAWP.
          <year>2013</year>
          .
          <volume>2287525</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>N.</given-names>
            <surname>Shor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Serhiienko</surname>
          </string-name>
          [et al.
          <article-title>], Problems of optimal design of reliable networks</article-title>
          ,
          <source>Naukova Dumka, Kyiv</source>
          ,
          <year>2005</year>
          , 230 p.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ajami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Akbari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. H.</given-names>
            <surname>Yarmohammadian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hejazi</surname>
          </string-name>
          ,
          <article-title>Evaluation Usage of “Radio Frequency Identification” in Earthquake's victims tracking Information Management System through viewpoint of Relief Experts</article-title>
          , Isfahan, Iran: Isfahan University of Medical Sciences;
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gladka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kravchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hladkyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Borashova</surname>
          </string-name>
          ,
          <article-title>Qualification and appointment of staff for project work in implementing IT systems under conditions of uncertainty</article-title>
          ,
          <source>in: 2021 IEEE International Conference on Smart Information Systems and Technologies</source>
          . Astana IT University. Nur-Sultan, Kazakhstan,
          <source>April 28-30</source>
          ,
          <year>2021</year>
          . DOI:
          <volume>10</volume>
          .1109/SIST50301.
          <year>2021</year>
          .9465897
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>B.</given-names>
            <surname>Prykhodko</surname>
          </string-name>
          .
          <article-title>How to determine the radio electronic warfare and intelligence systems of the Russian Federation - photos and characteristics of the occupiers' equipment, 2022</article-title>
          . URL: https://ukraine.segodnya.ua/ua/ukraine/kak-opredelit
          <article-title>-sistemy-radioelektronnoy-borby-i-razvedkirf-foto-i-harakteristika-tehniki-okkupantov-1608046</article-title>
          .html.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>E.</given-names>
            <surname>Bergeret</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gaubert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Pannier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Gaultier</surname>
          </string-name>
          ,
          <article-title>Modeling an design of CMOS UHF voltage multiplier for RFID in a EEPROM compatible process</article-title>
          ,
          <source>in: IEEE Trans. Circuits and Systems</source>
          , Oct.
          <year>2007</year>
          , vol.
          <volume>54</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>833</fpage>
          -
          <lpage>837</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gladka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuchansky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lisnevskyi</surname>
          </string-name>
          ,
          <article-title>Teams formation for IT projects implementation on the basis of the model of limited rationality</article-title>
          ,
          <source>in: Management of Development of Complex Systems</source>
          ,
          <year>2021</year>
          , vol.
          <volume>48</volume>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>23</lpage>
          . DOI:
          <volume>10</volume>
          .32347/
          <fpage>2412</fpage>
          -
          <lpage>9933</lpage>
          .
          <year>2021</year>
          .
          <volume>48</volume>
          .
          <fpage>17</fpage>
          -
          <lpage>23</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>R.</given-names>
            <surname>Lisnevskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kostikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gladka</surname>
          </string-name>
          ,
          <article-title>Analysis of integrations of software tools for project management and their use for the needs of the Armed Forces of Ukraine, in: Collection of the Scientific Papers of the Centre for Military and Strategic Studies of the National Defence University of Ukraine named after Ivan Cherniakhovskyi</article-title>
          ,
          <year>2020</year>
          , vol.
          <volume>3</volume>
          (
          <issue>70</issue>
          ), pp.
          <fpage>107</fpage>
          -
          <lpage>112</lpage>
          . ISSN 2304-2699.
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hladkyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gladka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kostikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lisnevskyi</surname>
          </string-name>
          ,
          <article-title>An IoT Solution: A Fitness Trainer</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          ,
          <year>2021</year>
          ,
          <volume>3179</volume>
          , pp.
          <fpage>215</fpage>
          -
          <lpage>226</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>M.</given-names>
            <surname>Shport</surname>
          </string-name>
          ,
          <article-title>Consideration of supply of radio communication while constructing rational routes in the process of solving of tasks of operation and service activity of the State Border Guard Service of Ukraine, in: Collection of scientific works of the National Academy of the State Border Guard Service of Ukraine</article-title>
          , series: Military and
          <string-name>
            <given-names>Technical</given-names>
            <surname>Sciences</surname>
          </string-name>
          ,
          <year>2013</year>
          , vol.
          <volume>59</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>312</fpage>
          -
          <lpage>320</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>