<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Failure Risk Prediction While Processing Defining Parameters of Telecommunication and Radio-Electronic Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Solomentsev</string-name>
          <email>avsolomentsev@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maksym Zaliskyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksiy Zuiev</string-name>
          <email>0801zuiev@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alina Osipchuk</string-name>
          <email>alina.osipchuk2012@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1, Lubomyr Huzar ave., Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>260</fpage>
      <lpage>265</lpage>
      <abstract>
        <p>Effective operation of telecommunications and radio-electronic systems depends on several factors that must be taken into account at all stages of the equipment lifecycle. While using the equipment for its intended purpose, the function of efficiency maintaining is the main task of the operating system. To perform successfully this task, the operating system uses intelligent technologies of statistical data processing. The structure of the data processing is complex and includes procedures of model building, detection, evaluation, prediction, and others. The prediction procedures are very important, as it allows for determining the state of the equipment in the future, in particular, the possibility of failure. The failure risk assessment is usually based on the result of the equipment's defining parameters processing. This paper considers the synthesis of the prediction procedure based on the detection and estimation of changepoint parameters in the observed data trends. This procedure gives the possibility to assess the risk of failure using priori information about the characteristics of the maintenance process. Implementation of the proposed procedure will increase the reliability of telecommunications and radio-electronic systems.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Prediction</kwd>
        <kwd>data processing</kwd>
        <kwd>risks assessment</kwd>
        <kwd>operation system</kwd>
        <kwd>telecommunication system</kwd>
        <kwd>radio-electronic system</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>To provide the efficiency of
telecommunication and radio-electronic systems
(TRSs) functioning, operating systems (OSs) are
usually used, which have a sophisticated structure
of components [1]. These components can change
their states over time. Changes can be controlled
or uncontrolled [2]. In the general case, these
changes are a source of possible risks that can
negatively affect both the effectiveness of
equipment and the technical and economic
characteristics of enterprises [3].</p>
      <p>The OS forms corrective actions regarding the
state of all components to prevent the occurrence
of possible risks [4, 5]. The process of action
formation and implementation is based on the
results of statistical data processing [6].</p>
      <p>The OS can apply various data processing
algorithms for diagnostics and technical condition
monitoring, estimating the level of reliability,
predicting failures, resource consumption,
operational conditions deterioration, and others
[7, 8]. It is advisable to use extrapolation
procedures to predict risks.</p>
      <p>
        The creation of a prediction algorithm includes
synthesis and analysis [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8">9, 10</xref>
        ]. During the
synthesis, the methods of maximum likelihood,
moments, ordinary least squares, spline
approximation, and others can be used. During the
analysis, we can carry out analytical calculations
based on the probabilities theory and
mathematical statistics, as well as statistical
simulation [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">11–13</xref>
        ].
      </p>
      <p>
        Traditional approaches in the field of
prediction are based on the assumption of the
stationarity of the analyzed data model trend for
the future period [
        <xref ref-type="bibr" rid="ref12 ref13">14, 15</xref>
        ]. However, the practice
of operation shows that the real trend models of
the defining parameters and reliable indicators of
the TRS can change at a random moment [
        <xref ref-type="bibr" rid="ref14">16</xref>
        ].
Therefore, the stationarity disturbance in the flow
of processes is observed. The algorithms for
prediction should have a complex structure and
include procedures for detecting the fact of
changepoint and estimating its parameters
(occurrence time and changepoint intensity).
2. Statement of the Problem
      </p>
      <p>Consider the statement of the problem in the
general operator form. Operators will display an
approach to the formation of events that will be
associated with risks during the TRSs operation.</p>
      <p>The main organizational element is the
operation systems, which functioning is described
by the OS(·) operator. We assume that a specific
OS contains u elements, i.e. ⃗O⃗⃗⃗S (∙). Each element
over time T can be in certain states in the space of
phase states that belong to the considered element,
therefore ⃗S⃗⃗t ( / = 1,  ). The number of states
pj is different for each jth element of OS. Suppose
that its group of factors ⃗Φ⃗⃗ determines the state of
each element of OS. Then the OS elements can be
represented in the following form</p>
      <p>⃗O⃗⃗⃗S (⃗S⃗⃗t  ( / = 1,  )/⃗Φ⃗⃗).</p>
      <p>Based on the OS elements states, it is possible
to construct the trajectories of their movement ⃗T⃗⃗⃗r.
Thus, it is possible to define functions for each
element of the OS</p>
      <p>⃗T⃗⃗⃗r(⃗O⃗⃗⃗S (⃗S⃗⃗t  ( / = 1,  )/⃗Φ⃗⃗)).</p>
      <p>The trajectories of individual elements in the
corresponding phase spaces are associated with
the occurrence of possible risks  ⃗ (0, ). Then
 ⃗ (0, )(⃗T⃗⃗⃗r(⃗O⃗⃗⃗S (⃗S⃗⃗t  ( / = 1,  )/⃗Φ⃗⃗))).</p>
      <p>We believe that all the states of individual
elements of OS are associated with risks, because,
resources of various kinds are consumed during
the operation process. At the same time, serious
events (TRS failures, power supply absence,
physical destruction of structures, and others) are
more significant. It should be noted that control
and preventive actions are formed about certain
elements of OS. Data processing algorithms are
used to form these actions. Processing and
decision-making are performed for each element
of OS and the corresponding trajectory in the
space of phase states. The relationship between
control actions ⃗C and processing algorithms ⃗P can
be represented as
⃗C (⃗T⃗⃗⃗r(⃗O⃗⃗⃗S (⃗S⃗⃗t  ( / = 1,  )/⃗Φ⃗⃗))/⃗P).</p>
      <p>Because of the control actions implementation,
potential risks  ⃗ (0, ) become real  ⃗ (r, eal), then
 ⃗ (r, eal) =  ⃗ (0, )(⃗C (⃗T⃗⃗⃗r(⃗O⃗⃗⃗S (⃗S⃗⃗t /⃗Φ⃗⃗))/⃗P)).</p>
      <p>Risks are usually possibilities. Therefore, real
cost functions are formed in a separate way using
the operator Ψ(∙), then</p>
      <p>Cost( )= Ψ ( ⃗ (r, eal)/⃗P , ).</p>
      <p>According to all statements, the problem is to
develop such a set of data processing algorithms
for each element of the OS so that the OS costs
during the observation time  obs will be minimal
or will not exceed a certain value, then</p>
      <p>min(Cost( obs))= Ψ ( ⃗ (r,eal)/ ⃗ (,opt)),
where  ⃗ (opt) is an optimal design solution in
 ,
terms of data processing algorithms for each
trajectory of a certain element of the OS.
3. Materials and Methods</p>
      <p>This section presents the synthesis of two
procedures for the prediction of possible failure of
TRS. To solve this task, we assumed the following
limitations:</p>
      <p>1. The Defining Parameter (DP) is available
for observation. The measurements give the
possibility to create a dataset with discrete values
and constant sampling time Δ. The information
about operating thresholds (upper and lower) VO up
and VO low for this DP is known priori.</p>
      <p>2. The changepoint occurs randomly. The
probability density function of time moment of
changepoint  ( ch)can be arbitrary and unknown.</p>
      <p>3. The DP trend contains informational and
stochastic components. The first component
corresponds to DP model. The second component
is random Gaussian noise with zero means and
known standard deviation σ. According to this
limitation, the DP can be presented as follows
  =  0 + ξ( ∆ −  ch)φ( ∆ −  ch)+   ,
where  0 is a DP value for normal operation
conditions, ξ is the changepoint intensity, φ( )is
a step function,   is the noise. The presented
equation corresponds to the most commonly used
case of degradation according to a linear model.
The changepoint intensity for this case is equal to
the tangent of the trend inclination angle after the
changepoint occurrence.</p>
      <p>4. The probability density function of
changepoint intensity  (ξ) is arbitrary and
unknown.
).
fulfillment
be following
 F = arg(</p>
      <p>5. To prevent the failure of TRS, the
corrective maintenance is carried out. The time for
with a known probability density function.
maintenance implementation  M is random, but</p>
      <p>The prediction procedure aims to determine
the optimal time moment of maintenance in case
of gradual failure prevention. The gradual failure
usually occurs in case of one of the inequalities
  &gt;  O up or   &lt;  O low.</p>
      <p>The operating time to failure, in this case, will
 /(  =  O up ∪   =  O low)).</p>
      <p>If a changepoint is detected, the prediction
procedure will estimate the time of failure and
form a decision to carry out the maintenance. The
corresponding decision is made at the time  D.</p>
      <p>According to mentioned assumptions, the risk
of failure R can be considered as the probability
that time for</p>
      <p>maintenance implementation is
greater than the remaining time to failure, i.e.</p>
      <p>= Pr ( F −  D &lt;  M).</p>
      <sec id="sec-1-1">
        <title>The prediction</title>
        <p>procedure is implemented
based on data processing in a sliding window with
a size of n samples. The processing consists of
four steps.</p>
        <p>The first step. Observed data approximation
using one of two techniques.</p>
        <p>The first approach is associated with Simple
Linear Regression (SLR) usage for data in sliding
windows. For kth iteration of sliding the estimates
of DP are determined according to the equation
 ̂ , =  0, +  1,  ,
where  0,
and  1,</p>
        <p>are coefficients of linear
regression,  ∈ [0;  − 1] is current number of
sample in sliding window. Using the ordinary
least squares method we can easily get
(
 0, ) = (  =−01</p>
        <p>1, ∑
∑</p>
        <p>=−01 
∑
 =−01  2</p>
        <p>−1
)
(  =−01  
∑
∑
 =−01   + ).</p>
        <p>+</p>
        <p>The second approach is associated with Linear
Two-Segmented Regression (LTSR) usage for
data in sliding windows. The point of segment
connection is the middle of the sliding window.
For kth iteration of sliding the estimates of DP are
determined according to the equation
 ̂ , =  0, +  1,  +  2, ( −
)φ ( −
).</p>
        <p>Using the ordinary least squares method we

2

2
can easily get
 0,
 2,
( 1, ) = ℋ −1℘,</p>
        <p>To increase the veracity of prediction for the</p>
      </sec>
      <sec id="sec-1-2">
        <title>LTSR approach, the optimization technique discussed in [17] can be applied.</title>
        <p>The
second</p>
        <p>step. Decision-making about
changepoint.</p>
        <p>The classical methods of the changepoint study
assume complicated calculations associated with
the implementation of the statistical procedure of
detection. For our research, we tried to use the
simple approach; therefore we choose the Fisher
test to check the significance of regression
coefficients. In case of changepoint absence, the
regression coefficients will be insignificant.</p>
        <p>To use the Fisher test, it is necessary to
calculate the determination coefficient
 = 1 −
∑</p>
        <p>=−01(  + −  ̂ , )
∑
 =−01(
 + − ̅̅̅̅̅)2
2
for kth iteration of sliding
where ̅̅̅̅̅ is the mathematical expectation of DP
̅̅̅̅̅ =</p>
        <p>∑   + .

1
 −1
 =0</p>
        <p>The determination coefficient is recalculated
into the value of a decisive statistic using the
following equation
 =
 ( −  − 1)
(1 −  )
where s is the quantity of DP. In our case, we
observe only one DP, so  = 1.</p>
        <p>To
decide
on</p>
        <p>changepoint presence, the
obtained parameter F should be compared with
threshold Ft. In the general case, the threshold
depends on sample size, DP quantity, and the
probability of false alarm α. It should be noted that
the prediction procedure finishes only in case of
decision-making
on</p>
        <p>Therefore, one detection procedure contains a big
number of decisions about the continuation of data
processing and only one decision associated with
the break-in case of the changepoint. Because of
this, the probability of a false alarm should be
close to zero.</p>
        <p>It</p>
        <p>&lt;  t for kth iteration, we will go to the next
iteration. Otherwise, the decision on the change
point is made.
failure.</p>
        <p>Third step. Estimation of operating time to
In the case of SLR usage, the estimate of
operating time to failure can be determined as
follows
 −  0,</p>
        <p>1,
 F =  D + (
−  + 1)Δ,
where N is the number of final iterations, V is the
upper or lower operating threshold.</p>
        <p>In the case of LTSR usage, the estimate of
operating time to failure can be determined as
follows
 F =  D + (
 −  0, + 0.5  2,
 1, +  2,
−  + 1)Δ.</p>
        <p>Fourth step. Failure risk assessment.</p>
        <p>The assessment of the risk is possible based on
the information about the probability density
function of time for maintenance implementation.
In the general case, the risk of failure will be

∞
 = ∫  ( M)  M ,
where in the case of SLR
and in case of LTSR
τ = (
 −  0,
 1,</p>
        <p>−  + 1)Δ,
τ = (
 −  0, + 0.5  2,
 1, +  2,
−  + 1)Δ .</p>
        <p>After the synthesis, it is necessary to analyze
the efficiency of the proposed procedure of data
processing. It will be discussed in the next section.
4. Results and Discussion</p>
        <p>The analysis procedure was carried out based
on statistical simulation. For the convenience of
presenting the material, we will consider specific
examples of the simulation implementation.</p>
        <p>The flowchart of data processing procedures
for the implementation of the prediction algorithm
during simulation is shown in Fig. 1.</p>
        <p>The initial parameters for analysis according to
the introduced limitations are:
1. The sampling time is 1 minute.
2. The</p>
        <p>observation time is  obs = 1440
minutes.
3. The sliding window size is  = 60 minutes.
4. The</p>
        <p>DP
value
for
normal
operating
conditions is  0 = 100 conventional units.
5. The standard deviation of the noise is σ =</p>
      </sec>
      <sec id="sec-1-3">
        <title>8 conditional units.</title>
        <p>6. The operating thresholds are  O up = 150
and  O low = 50 conditional units.
of DP.</p>
        <p>DPi
150
100
50</p>
        <p>0</p>
        <p>Start
Parameters and
models according</p>
        <p>to limitations
Data approximation in</p>
        <p>sliding window
Changepoint detection
based on Fisher test
Prediction of operating
time to failure
Risk calculation</p>
        <p>Estimates of
failure risk</p>
        <p>Finish
8. The changepoint intensity has uniform
distribution in the range [0; 1].
9. The probability density function of time for
maintenance implementation is normal.</p>
        <p>The mean value is 60 minutes; the standard
10.The
number of simulation
procedure
deviation is 20 minutes.</p>
        <p>repetitions is  = 1000.
an
of</p>
        <p>To perform further calculations, we need to
form discrete data arrays containing information
about DP trends. For given numerical values of
initial parameters, such an array will be
twodimensional and have a size ( obs/Δ)×  . Such
array
will
allow
future
calculations to
determine the statistical characteristics of the risk
failure,
up
to
the
most
complete
characteristic—the probability density function.</p>
        <p>Fig. 2 shows examples of two possible trends
Operating threshold
Operating threshold
500
1000
iΔ
1500
parameters: the time of changepoint occurrence is
960-th minute, and the changepoint intensity is
0.279.</p>
        <p>The approximation results using SLR and
LTSR in the sliding window for iteration number
930 (this iteration corresponds to the event when
the real-time changepoint is located at the middle
of the sliding window) can be presented as follows
 ̂ , SLR = 95.677 + 0.192( − 930),</p>
        <p>The next step is a calculation of the remaining
time to failure. For this numerical example, the
SLR method predicts 92 minutes to failure, and
LTSR predicts 121 minutes to failure. According
to the simulation, failure occurs 114 minutes after
the changepoint. Therefore, for this example, the
LTSR method has a more correct estimate but is
slightly greater than the real value.</p>
        <p>The risk of failure is 5.35∙10–2 and 5.77∙10–4 for
SLR and LTSR methods, respectively.</p>
        <p>The simulation repetition gives the possibility
to build the histograms of risk estimates. The
corresponding histograms are shown in Fig. 5.
R
1
R
1
30
20
10</p>
        <p>0
30
20
10</p>
        <p>0
40 F
k + n
k + n</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>5. Conclusions</title>
      <p>The obtained results are relevant for the theory
and practice of design and improvement of TRS
operation systems. The emphasis on statistical
data processing algorithms for timely detection
and prevention of failures and, accordingly,
reducing the risks of possible losses in the TRS
OS is justified. The proposed data processing
methods make it possible to increase the level of
TRS reliability by performing preventive
maintenance.</p>
      <p>The future scope is associated with several
directions. If we assume that the statistical
characteristics of the distributions for defining
parameters are priori unknown, then it is advisable
to develop adaptive algorithms of prediction.
Another direction is connected with taking into
account a large number of OS elements. Such
accounting can allow a more complete assessment
of both possible risks and the consequences of
their occurrence.
6. References</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>D.J. Smith</surname>
          </string-name>
          , Reliability, Maintainability and Risk.
          <source>Practical Methods for Engineers</source>
          , 10th ed.,
          <source>Elsevier</source>
          , London,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Voliansky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pranolo</surname>
          </string-name>
          ,
          <source>Parallel Mathematical Models of Dynamic Objects, Int. J. Adv. Intell. Informs</source>
          .
          <volume>4</volume>
          (
          <issue>2</issue>
          ) (
          <year>2018</year>
          )
          <fpage>120</fpage>
          -
          <lpage>131</lpage>
          . doi:
          <volume>10</volume>
          .26555/ijain.v4i2.229
          <string-name>
            <given-names>D.</given-names>
            <surname>Galar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Sandborn</surname>
          </string-name>
          , U. Kumar,
          <article-title>Maintenance Costs and Life Cycle Cost Analysis</article-title>
          , CRC Press, Boca Raton,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Jardine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.H.C.</given-names>
            <surname>Tsang</surname>
          </string-name>
          , Maintenance, Replacement, and
          <source>Reliability: Theory and Applications</source>
          , 2nd ed., CRC Press, Boca Raton,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Zuiev</surname>
          </string-name>
          , Radioelectronic Equipment Availability Factor Models,
          <source>Signal Processing Symposium (SPS)</source>
          , Serock, Poland,
          <year>2013</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          . doi:
          <volume>10</volume>
          .1109/SPS.
          <year>2013</year>
          .6623616
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          , et al.,
          <source>Data Processing in Exploitation System of Unmanned Aerial Vehicles Radioelectronic Equipment, IEEE 2nd International Conference Actual Problems of Unmanned Air Vehicles Developments (APUAVD)</source>
          , Kyiv, Ukraine,
          <year>2013</year>
          ,
          <fpage>77</fpage>
          -
          <lpage>80</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <source>doi:10</source>
          .1109/APUAVD.
          <year>2013</year>
          .6705288
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          , et al.,
          <article-title>Substantiation of Probability Characteristics for Efficiency Analysis in the Process of Radio Equipment Diagnostics</article-title>
          ,
          <source>IEEE 3rd Ukrainian Conference on Electrical and Computer</source>
          Engineering (UKRCON), Lviv, Ukraine,
          <year>2021</year>
          ,
          <fpage>535</fpage>
          -
          <lpage>540</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>doi:10.1109/UKRCON53503</source>
          .
          <year>2021</year>
          .9575603
          <string-name>
            <given-names>A.</given-names>
            <surname>Cachada</surname>
          </string-name>
          et al.,
          <source>Maintenance</source>
          <volume>4</volume>
          .
          <article-title>0: Intelligent and Predictive Maintenance System Architecture</article-title>
          ,
          <source>IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)</source>
          , Turin, Italy,
          <year>2018</year>
          ,
          <fpage>139</fpage>
          -
          <lpage>146</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>doi:10</source>
          .1109/ETFA.
          <year>2018</year>
          .8502489
          <string-name>
            <given-names>W.</given-names>
            <surname>Cave</surname>
          </string-name>
          ,
          <article-title>Prediction Theory for Control Systems</article-title>
          , PS Inc., New Jersey,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kuhn</surname>
          </string-name>
          , K. Johnson, Applied Predictive Modeling, Springer, New York,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sadykov</surname>
          </string-name>
          , et al.,
          <article-title>Technology of Location Hiding by Spoofing the Mobile Operator IP Address</article-title>
          ,
          <source>in: IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics</source>
          (
          <year>2021</year>
          )
          <fpage>22</fpage>
          -
          <lpage>25</lpage>
          . doi:
          <volume>10</volume>
          .1109/UkrMiCo52950.
          <year>2021</year>
          .9716700
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [12]
          <string-name>
            <surname>M. TajDini</surname>
            , V. Sokolov,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio</article-title>
          ,
          <source>in: IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics</source>
          (
          <year>2021</year>
          )
          <fpage>7</fpage>
          -
          <lpage>11</lpage>
          . doi:
          <volume>10</volume>
          .1109/UkrMiCo52950.
          <year>2021</year>
          .9716665
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <source>Bandwidth Research of Wireless IoT Switches. In 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering</source>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .1109/tcset49122.
          <year>2020</year>
          .2354922
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>I.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Marais</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kuzmenko</surname>
          </string-name>
          ,
          <article-title>Aircraft Positioning Using Multiple Distance Measurements</article-title>
          and
          <string-name>
            <given-names>Spline</given-names>
            <surname>Prediction</surname>
          </string-name>
          , Aviation,
          <volume>26</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . doi:
          <volume>10</volume>
          .3846/aviation.
          <year>2022</year>
          .16589
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>I.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kuzmenko</surname>
          </string-name>
          ,
          <article-title>Statistical Analysis and Flight Route Extraction from Automatic Dependent SurveillanceBroadcast Data, Integrated Communications Navigation</article-title>
          and Surveillance Conference, Dulles, USA,
          <year>2022</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICNS54818.
          <year>2022</year>
          .9771515
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cai</surname>
          </string-name>
          , et al.,
          <source>Adaptive Prediction of Remaining Useful Lifetime for Single Equipment Based on Accelerated Degradation Modeling, Global Reliability and Prognostics and Health Management Conference</source>
          , Shanghai, China,
          <year>2020</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/PHMShanghai49105.
          <year>2020</year>
          .9280996
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Al-Azzeh</surname>
          </string-name>
          , et al.,
          <article-title>A Method of Accuracy Increment Using Segmented Regression</article-title>
          , Algorithms,
          <volume>15</volume>
          (
          <issue>10</issue>
          )
          <fpage>378</fpage>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>24</lpage>
          . doi:
          <volume>10</volume>
          .3390/a15100378
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>