<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>ORCID</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Based on RFID Tags for Mine Defense under War Conditions and in the Post-War Period</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kateryna Kolesnikova</string-name>
          <email>kkolesnikova@iitu.edu.kz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Myroslava Gladka</string-name>
          <email>gladkam@fit.knu.ua</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykola Kostikov</string-name>
          <email>kostikov@knu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Natalia Myronova</string-name>
          <email>natalia.myronova@zp.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>International IT University</institution>
          ,
          <addr-line>34/1 Manas str, Almaty, 050040</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National University "Zaporizhzhia Polytechnic"</institution>
          ,
          <addr-line>Zhukovskogo, 64, Zaporizhzhya, 69063</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National University of Food Technologies</institution>
          ,
          <addr-line>Volodymyrska Street, 68, Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska Street, 60, Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>Radio frequency identification (RFID) technology is widely used in various industries, including logistics, retail, healthcare, and agriculture. In recent years, RFID has also been explored for military and civilian applications, especially in wartime. RFID tags can be used to protect military and civilian population during war by providing real-time tracking of people, vehicles and equipment. The use of RFID tags in the military and defense complex is gaining great popularity [1, 2, 3], however, the use of RFID tags for mine security has not yet been fully explored. A separate important task under war conditions is the mine defense of territories where combat actions are taking place. The use of various mines to create blocking effects from the enemy ensures the security of territories in wartime and postwar times. The use of mines for the security of territories is known as "mine defense". This includes the placement of mines or explosive devices in a certain area or around important objects in order to protect these objects from possible threats. The main aspects of using mines for the security of territories include: the creation of minefields (placement of mines or explosive devices in a certain area to create a minefield that can become an obstacle for potential invaders or enemies); creation of maps of minefields (designation of minefields to inform own troops and the civilian population about their presence and location, to avoid danger). It is important to note that the use of mines for the security of territories must comply with international norms and conventions regarding the prohibition of the use of anti-personnel mines, and must also comply with the principles of humanitarian law to protect the civilian Workshop Proceedings</p>
      </abstract>
      <kwd-group>
        <kwd>1</kwd>
        <kwd>safety</kwd>
        <kwd>IoT</kwd>
        <kwd>RFID</kwd>
        <kwd>identification</kwd>
        <kwd>defense</kwd>
        <kwd>war</kwd>
        <kwd>military</kwd>
        <kwd>civilian population</kwd>
        <kwd>mine defense</kwd>
        <kwd>security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>and
minimize humanitarian
consequences. The use of RFID tags on
mines is a solution that fully ensures the
implementation of these norms and conventions.</p>
      <p>This article considers the use of RFID tags in wartime, the advantages of using RFID
technology for the implementation of mine defense of territories, the rules for the protection
of RFID tags used to ensure the safety of the military and civilian population.</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        Radio frequency identification (RFID) is a technology that uses radio waves for object
identification and tracking. RFID tags are small electronic devices that can be attached to objects or
implanted in living beings. Each of these tags contains a unique identifier that can be read by an
RFIDreader. The use of RFID tags can have significant advantages for protecting the military and
civilians during wartime. In this article, we will investigate the use of RFID tags for this purpose
and provide some calculations and formulas to illustrate their effectiveness [
        <xref ref-type="bibr" rid="ref1 ref6">1, 6</xref>
        ]. RFID technology
      </p>
      <p>2023 Copyright for this paper by its authors.</p>
      <p>
        ceur-ws.org
is widely implemented all over the world, and its impact on our daily life is very diverse and
massive [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. The most relevant studies on the use of RFID for our country in today's conditions
are security studies in wartime conditions [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. RFID tags can be used to track the movement of
military personnel, vehicles and equipment, and to monitor the location and condition of critical
infrastructure such as power grids, water purification facilities and hospitals. This information can
be used to help military commanders make informed decisions about where to deploy resources,
how to allocate troops and supplies, and how to respond tothreats [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. One of the key advantages
of RFID tags is that they can be read remotely, without line of sight or physical contact [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. This
means they can be used in situations when traditional identification methods such as barcodes or
QR codes may not be applicable. The relevance of this article is justified by the need to use reliable
and simple mechanisms that can be easily implemented in a short time to ensure the security of
territories and the population in the territories of combat actions in military and post-war times.
      </p>
    </sec>
    <sec id="sec-3">
      <title>2. RFID Tags in Mine Defense and Combating Mine Threats</title>
      <p>
        RFID tags can be important components in mine defense and countering mine threats [
        <xref ref-type="bibr" rid="ref1 ref12">1, 12</xref>
        ]. Here
are some ways they can be used in this field.
      </p>
      <p>1. Mine identification and tracking. RFID tags can be embedded in or placed next to mines. This
allows you to create a system for identifying and tracking mines in real time. Operators can use
special RFID readers to detect and identify mines, making it easier to destroy or defuse them.</p>
      <p>2. Ensuring the safety of minesweepers. Specialists in demining can wear RFID tags on their
uniforms or equipment. This allows you to track their location and, in case of an emergency, quickly
determine their position for assistance.</p>
      <p>3. Identification of safe areas. RFID tags can be placed in certain areas that have already been
cleared of mines. This helps prevent the re-emergence of mines or indicates safe routes and areas.</p>
      <p>4. Inventory of equipment and resources. RFID tags can be used to keep records and track various
types of equipment and resources used in mining operations, helping to maintain inventory and
control access to these resources.</p>
      <p>5. Reporting and analytics. Data collected from RFID tags can be used to analyze and generate
reports on mining operations performance and risks. It helps to plan future operations and make
informed decisions.</p>
      <p>RFID technology can improve the efficiency and safety of mine defense, as well as contribute to
the protection of life and health of deminers and other workers in this field.</p>
      <p>When using RFID tags on mines, you can create and visualize maps of minefields, which will
ensure the relevance of data at any moment in time.</p>
    </sec>
    <sec id="sec-4">
      <title>2.1. Algorithm for Designing Active RFID Tags for Use in IoT Mine Safety</title>
    </sec>
    <sec id="sec-5">
      <title>Systems</title>
      <p>
        The calculation for designing active RFID tags for use in mine safety systems consists of several
steps. Active RFID tags have their own power sources and can transmit signals over much longer
distances than passive tags, making them efficient for use in such tasks [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ].
      </p>
      <p>The general algorithm for creating an IoT tag system consists of the following steps (fig. 1):
1. Determination of needs and requirements. First, it is necessary to determine what requirements
regarding active RFID tags exist in a specific case of mine safety. This may include reading range,
battery life, power consumption, and other technical parameters.</p>
      <p>2. Frequency (RFID band) choice. Defining a radio frequency that meets military needs. RFID
tags can use different frequency bands such as LF (Low Frequency), HF (High Frequency), UHF
(Ultra-High Frequency) or SHF (Super-High Frequency) depending on the distance and signal
strength.</p>
      <p>3. Power source. Determining the power source for active RFID tags. These are usually batteries
or accumulators. This is done by calculating how long the tag can operate without replacing the power
supply based on the needs and service life requirements, taking into account the conditions of use of
these tags.
4. Energy-saving algorithms. Development of effective algorithms for the operation of active tags
that allow them to enter the sleep mode and efficiently use energy in the active state. This includes the
calculation of activity times and periods of sleep.</p>
      <p>5. Calculation of the reading range. Empirical data and Friis equation or formulas for signal loss
over distance are used to determine the reading range of active tags.</p>
      <p>6. Antennas and communication units. Development of antennas and communication modules for
tags that meet military requirements. They must be efficient in the selected frequency range.</p>
      <p>7. Protection against exposure to dangerous factors. In mine safety, active RFID tags must be
resistant to explosions and other dangerous conditions. Here it is necessary to distinguish whether it is
required to keep a tag on a mine that has already detonated, or only to protect against explosions that
are far from an active mine.</p>
      <p>8. Testing and validation. Testing the created tags in real mine safety conditions to make sure they
meet all requirements and function properly.</p>
      <p>9. Production and deployment. After successful validation, production of active RFID tags can be
started. After that, the tags are deployed in the mine environment.</p>
      <p>10.Support and updates. The support process, including battery replacement and tag software
updates, is as important to the quality of tag performance as development and implementation.</p>
      <p>This process of calculating and developing an IoT system based on active RFID tags in mine
safety requires a lot of engineering work and specialized knowledge in the field of RFID technology,
as well as military security. In practice, this can be challenging and resource-intensive, but it can
significantly improve the safety and efficiency of operations in a mine environment.
2.2.</p>
    </sec>
    <sec id="sec-6">
      <title>Calculation of RFID Tags Range</title>
      <p>
        The range (or radius) of active RFID tags on rough terrain can be determined using various factors
such as signal strength, reader sensitivity, tag antenna characteristics, and environment conditions [
        <xref ref-type="bibr" rid="ref1 ref15">1,
15</xref>
        ]. Considering the key factors that influence the range of active RFID tags, you can use the Friis
formula for calculations [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The Friis formula is used to determine signal loss over distance as a
function of signal frequency, absorption loss, and signal propagation loss. The formula is as follows:
L  20  log10 (d )  20  log10 ( f )  K
(1)
where:
      </p>
      <p>L is the signal loss (dB); d is the distance between the tag and the reader (m); f is the signal
frequency (Hz); K is correction factor that takes into account other signal losses (dB).</p>
    </sec>
    <sec id="sec-7">
      <title>2.2.1. Reader Sensitivity and Tag Transmission Power</title>
      <p>
        Reader sensitivity and tag transmission power are also important factors. The greater the
transmission power of the tag and the sensitivity of the reader, the greater is the possible range.
Usually, these values are indicated in the equipment specifications [
        <xref ref-type="bibr" rid="ref1 ref17">1, 17</xref>
        ].
      </p>
    </sec>
    <sec id="sec-8">
      <title>2.2.2. Characteristics of the tag antenna</title>
      <p>
        The size and characteristics of the antenna on the tag can also affect the range. A larger antenna
usually provides a longer communication range [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
    </sec>
    <sec id="sec-9">
      <title>2.2.3. Environmental Conditions and Obstacles</title>
      <p>
        The environmental conditions such as humidity, surface type, metal obstructions, vegetation and
other factors can also affect the signal range (fig. 2) [
        <xref ref-type="bibr" rid="ref19 ref20">19, 20</xref>
        ].
      </p>
      <p>Please note that in real conditions, the range of active RFID tags can fluctuate significantly due to
the influence of various factors. A key indicator for determining the range of RFID tags is the
influence of terrain, as it is envisaged to install tags on mines located close to the surface of the earth,
and not on a raised antenna above the earth's surface.</p>
    </sec>
    <sec id="sec-10">
      <title>The Effect of Terrain on the Range of RFID Tags</title>
      <p>
        Determining the range of active RFID tags on cross-country terrain includes a number of factors
that can be taken into account in calculations [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. The main factors that affect the range of active
RFID tags include:
      </p>
      <p> Transmitter power (Tx): The signal strength emitted by the active tag. Measured in decibel
milliwatts (dBm).</p>
      <p> Receiver sensitivity (Rx): The sensitivity of the RFID reader to weak signals from tags. It is also
measured in decibel milliwatts (dBm).</p>
      <p> Antenna height (H): The height of the location of the antenna on the tag and the height of the
location of the antenna on the reader above ground level. It is measured in meters (m).</p>
      <p> Frequency (f): The operating frequency of the RFID system which is measured in gigahertz
(GHz).</p>
      <p> Barriers (path loss): Signal loss caused by various obstacles such as trees, buildings, soil, etc.
 Location of antennas (d): The distance between the tag antenna and the reader antenna.
 Reader transmitter power (Effective Isotropic Radiated Power – EIRP): The reader's effective
transmitter power, which includes the transmitter and amplifier power. It is measured in decibel
milliwatts (dBm).</p>
      <p>
        The range can be calculated using the formula for determining the communication in the radio
frequency range (RF link budget) [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]:
      </p>
      <p>L  EIRP  (Tx  Rx )  20  log10 ( f )  20  log10 (d )  PL
(2)
where:</p>
      <p>
        L is the communication range (m); EIRP is the effective power of the reader transmitter (dBm);
Tx is the tag transmitter power (dBm); Rx is the reader receiver sensitivity (dBm); f is the operating
frequency of the RFID system (GHz); d is the distance between the tag antenna and the reader
antenna (m); PL is the signal loss caused by barriers and other factors (dB). This formula allows
you to calculate the approximate range of active RFID tags in specific terrain conditions. These
parameters can be measured or defined in the RFID equipment specification data [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
    </sec>
    <sec id="sec-11">
      <title>2.3.1. Peculiarities of Measuring the Distance to RFID Tags on Cross-Country</title>
    </sec>
    <sec id="sec-12">
      <title>Terrain</title>
      <p>
        The location of the tags on the earth surface is less than or equal to L which is the distance of
the wireless transmission of the equipment and devices fixing the position location. When
installing the tag directly on the mine itself, tag detection substations can be placed above the
surface, both on moving (drones) and non-moving objects. This will allow to quickly determine
maps of tag locations on the basis of data exchange [
        <xref ref-type="bibr" rid="ref24 ref25">24, 25</xref>
        ]. A feature of such measurements is the
establishment of calibration points [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] and the use of two or more substations (S1, S2, S3) for tag
readers. Then the process of detecting the tag (M) on the mine is as follows:
      </p>
      <p>1. Measuring the calibration point at a distance d(S1, M) from substation S1, d(S2, M) from S2,
d(S3, M) from S3.</p>
      <p>2. In case of absence of a signal from one of the calibration points, it is rational to use an
additional substation or perform calculations based on signal data from at least two substations. As the
accuracy improves, the number of reader substations increases (S4, S5, …).</p>
      <p>3. Record the absolute strength of the tag detection signal received by substations S1, S2, S3
during signal transmission as P(S1, M), P(S2, M), P(S3, M).</p>
      <p>4. According to the received data, generate data for the table of distances to the substation that
generates detection data corresponding to the absolute signal strength.</p>
      <p>5. Calculate the absolute signal strength of each substation and the absolute signal strength and
the ratio of two remote substations, the generation from Table 1 according to the relative signal
intensity.
The process of calculating the position of the tag on the mine is as follows:
1. Synchronization of equipment on site, data exchange, transmission of device numbering
information, location and time stamp information detection signal to neighboring substations with
readers.</p>
      <p>2. Each substation receives a tag detection signal, data on the intensity of this signal, numbering
of the location determination device, information about the time stamp and its own ground location
determination (for mobile or stationary receivers).</p>
      <p>3. After the reader receives data about the location of the tag placed on the mine, we receive the
information transmitted in the reverse direction. Different substations can be distinguished according
to the numbering of devices, location determination and time stamp. It is necessary to clearly
distinguish individual tags placed on individual mines, since the reader range can see more than one
such tag within its range. The absolute signal power P of the same detection signal received by the
location equipment is P(S1, M), P(S2, M), P(S3, M).</p>
      <p>4. The IoT positioning system analyzes according to the numbering of each substation and the
maximal absolute signal strength, how far away is the tag M in the maximum absolute degree of the
signal to the substations S1, S2 and S3, and if the two substations S1, S2 are equidistant from the tag,
then the alternative substation S3 can determine correction angles to determine the distance to a tag
located between two substations placed in the middle.</p>
      <p>5. The absolute signal power of the tag M to two substations S1, S3 is the absolute signal power of
each substation, which is obtained by calculating the shortest distance from the absolute signal
powers.</p>
      <p>6. According to the table of distances (Table 1), which corresponds to the relative intensity of the
tag signal by the relative intensity of the substation signal, we will obtain the location location for
each tag at a distance (S1, М), (S2, М), (S3, М). If one of the substations did not receive a distance
result, the calculations are based on the direct values of the two relative signals for d(S1) and d(S2).</p>
      <p>7. We calculate the linear interpolation of the angle value. If the relative signal intensity of the
current substation S1 to the tag M is equal to Mx, then the two closest relative coordinate points to the
distance from the substation to the tag are M1, M2. Accordingly, M1 &lt; Mx &lt; M2.</p>
      <p>8. The distance corresponding to the distance between the tag and the substation S1 is dm1, dm2
respectively. Then we get:
(3)
(4)
(5)
(dm1  dm2 )  ( M 2  M1)  d
d (S1, M ) </p>
      <p>2</p>
      <p>M 2  M1
(xS2,M , yS2,M , zS2,M ), (xS3,M , yS3,M , zS3,M )
9. The distances d(S1, М), d(S2, М), d(S3, М) distances are calculated similarly. They give us 3
values of distance between the tag and each substation with readers. We get the corresponding
coordinate values (xS1,M, yS1,M, zS1,M),</p>
      <p>10. To calculate the distances determined by the line with two points, we will use the segment
distance formula to achieve a linear equation in the form of two points. The group of equations for all
determined location points will have the following form:
d (S1, M )  ( xS1,M  xS1 )2  ( yS1,M  yS1 )2  ( zS1,M  zS1 )2

 xS1,M  xS1  yS1,M  yS1  zS1,M  zS1
 xS 2  xS1 yS 2  yS1 zS 2  zS1
( xS1,M , yS1,M , zS1,M )  
 min( xS1 , xS2 )  xS1,M  max( xS1 , xS2 )
 min( yS1 , yS2 )  yS1,M  max( yS1 , yS2 )
 min( zS1 , zS2 )  zS1,M  max( zS1 , zS2 )
11. The latter three formulas the latter three formulas consist in the fact that a group of equations
solves the qualification of the ratio of the location of the tag x, in accordance with the location of the
points xS1,M, yS1,M, zS1,M, relative to the location of the substation S1.</p>
      <p>12. The coordinates (xS2,M, yS2,M, zS2,M), (xS3,M, yS3,M, zS3,M) of the tag location relatively to other
reader substations are calculated similarly.</p>
      <p>13. The found results (xS2,M, yS2,M, zS2,M) and (xS3,M, yS3,M, zS3,M) determine the distance d, d(S2, М)
and d(S3, М).</p>
      <p>14. Calculating (xS1,M, yS1,M, zS1,M), (xS2,M, yS2,M, zS2,M), (xS3,M, yS3,M, zS3,M) allows us to find each
reference axis value and gives the coordinates of the tag location point on the mine:
 ( xS1,M  xS2,M  xS3,M )
 xM 
 3
 ( yS1,M  yS2,M  yS3,M )
( xM , yM , zM )   yM  (6)
 3
 zM  (zS1,M  zS23,M  zS3,M )</p>
      <p>
        When calculating all three positions of the distance between the tag and the reader, we get the
positional physical location of the tag to determine the location of the mine. It is rational to use
additional substation readers, and in the case of weak signals to ignore the location data of
substations that have the maximal distance to the tag, taking into account the arithmetic mean
values for the group of each reference axis with the value of the residual location point [
        <xref ref-type="bibr" rid="ref27 ref28">27, 28</xref>
        ].
Therefore, the coordinate points become the physical location of the equipment for determining the
location.
2.4.
      </p>
    </sec>
    <sec id="sec-13">
      <title>Security of RFID-Based IoT Systems</title>
      <p>
        Military IoT systems based on RFID must be especially reliable and secure, as they are used in
high-risk and conflict conditions [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. Key aspects of the security system for the use of RFID in
military applications include:
      </p>
      <p> Data encryption: It is important to use encryption to protect data transmitted between RFID
tags and readers. Encrypted data makes it difficult to intercept and have an unauthorized access to
information;</p>
      <p> Authentication: To ensure the security of an RFID network, it is important to use authentication
procedures to ensure that only authorized users have access to the system. This may include the use of
passwords or other methods of identification;</p>
      <p> Physical security: The use of integrated tags and readers must be subject to physical control and
protection to prevent physical break-in or theft of the equipment;</p>
      <p> Protection against interference: In military operations, there can be a lot of electromagnetic and
radio frequency interference. RFID systems must be perfectly protected against such interference to
ensure reliable operation;</p>
      <p> Audit and monitoring: It is important to have an auditing and monitoring system that keeps logs
of actions and events in the system. This helps to identify potential threats and attacks and take
appropriate action;</p>
      <p> Protection against cloning: RFID tags must have protection against cloning to prevent the
creation of counterfeit tags that can be used for unauthorized access;</p>
      <p> Tactical Security: In military operations, RFID systems must be adapted to tactical needs,
including the ability to operate under conditions of an electronic warfare and provide protection from
adversary detection;</p>
      <p> Physical security of tags: Military tags must be additionally protected against physical damage
or destruction;</p>
      <p> Protection against interception of communications: Communication between readers and tags
must be protected from interception or intrusion;</p>
      <p> Anti-spoofing: Providing protection against spoofing attacks, when an attacker can send false
signals to the system.</p>
      <p>
        These measures will ensure the reliable and secure functionality of the RFID system in military
environments where confidentiality and reliability are very important [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. It is also important to
remember that security standards and technology are constantly evolving, and systems must be
updated and modernized to meet modern requirements.
      </p>
    </sec>
    <sec id="sec-14">
      <title>3. Conclusions</title>
      <p>The development and application of RFID-based IoT devices has a great potential to improve
the security of military and civilian population in wartime. Using this technology can help track
resources, monitor infrastructure and ensure the safety of facilities and personnel in real time,
which solves important tasks in the context of military conflicts.</p>
      <p>The prospect of using RFID-based IoT devices in military operations promises many
opportunities to improve security, efficiency and command. The development and improvement of
this technology requires research and innovation in many directions.</p>
      <p>
        Using the technology based on RFID tags for creation of an IoT mine safety system allows
monitoring the condition of mine fortifications in the territory without saving mine maps or using
barrage mines for fortifications and protection of territories [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]. The article emphasizes that the
exact range for the identification of a mine tag will depend on the specific conditions of the area,
and it directly depends on the terrain relief. Therefore, when calculating by the theoretical
formulas, a number of factors must be taken into account due to signal loss in terrain conditions.
The actual range should be determined by on-site measurements using RFID equipment. The use of
RFID tags for the positioning of mines in the territories of combat actions, or in territories that need
protection from invasions, is an urgent task for the safety of the military and the population staying
in these territories
      </p>
      <p>
        In military applications, information security is crucial. IoT systems open up new opportunities
for collecting and sharing information, but at the same time they are becoming more vulnerable to
cyberattacks [
        <xref ref-type="bibr" rid="ref32 ref33">32, 33</xref>
        ]. Protection of IoT information systems includes data encryption,
authentication and access control, as well as network reliability and monitoring systems.
      </p>
    </sec>
    <sec id="sec-15">
      <title>4. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gladka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuchansky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kostikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lisnevskyi</surname>
          </string-name>
          ,
          <article-title>A Model of the Application of IoT Devices Based on RFID to Ensure the Safety of the Military and Civilian Population under War Conditions, in: Selected Papers of the IX International Scientific Conference “Information Technology and Implementation" (IT&amp;I-</article-title>
          <year>2022</year>
          ).
          <source>Workshop Proceedings</source>
          , Kyiv, Ukraine, November 30 - December 02,
          <year>2022</year>
          . https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3347</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Deng</surname>
          </string-name>
          , P. Feng,
          <source>Research Status on RFID System Authentication Protocol, in: AICS 2019: Proceedings of the 2019 International Conference on Artificial Intelligence and Computer Science</source>
          ,
          <year>July 2019</year>
          , pp.
          <fpage>432</fpage>
          -
          <lpage>438</lpage>
          . URL: https://doi.org/10.1145/3349341.3349446.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Lj</surname>
          </string-name>
          . Bogićević,
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Tot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. I.</given-names>
            <surname>Prodanović</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. J.</given-names>
            <surname>Todorović</surname>
          </string-name>
          .
          <article-title>Identification of soldiers and weapons in military armory based on comparison image processing and RFID tag</article-title>
          , in: Vojnotehnički glasnik,
          <year>January 2021</year>
          , vol.
          <volume>69</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>179</fpage>
          -
          <lpage>195</lpage>
          . DOI:
          <volume>10</volume>
          .5937/vojtehg69-
          <fpage>28114</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Hema</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sankar</surname>
          </string-name>
          ,
          <article-title>Collision Mitigation Algorithm for Tracking of RFID Based Assets in Defence, in: EAI Endorsed Transactions on Energy Web</article-title>
          , vol.
          <volume>8</volume>
          , no. 36. DOI: https://doi.org/10.4108/eai.9-3-
          <year>2021</year>
          .168963.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Chmielewski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kukiełka</surname>
          </string-name>
          ,
          <article-title>Applications of RFID technology in dismounted soldier solution systems - study of mCOP system capabilities</article-title>
          ,
          <source>in: MATEC Web of Conferences</source>
          , vol.
          <volume>76</volume>
          , p.
          <fpage>04014</fpage>
          . DOI: https://doi.org/10.1051/matecconf/20167604014.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Bamidele</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. N.</given-names>
            <surname>Sur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Aderinto</surname>
          </string-name>
          , T. Gaber,
          <article-title>RFID-Based Student Identification Card Attendance Monitoring System</article-title>
          , in: Advances in Communication, Devices and Networking,
          <string-name>
            <surname>July</surname>
          </string-name>
          <year>2023</year>
          . DOI:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-
          <fpage>99</fpage>
          -1983-3_
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. K.</given-names>
            <surname>Visich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. M.</given-names>
            <surname>Khumawala</surname>
          </string-name>
          ,
          <string-name>
            <surname>C. Zhang,</surname>
          </string-name>
          <article-title>Radio frequency identification technology: applications, technical challenges and strategies</article-title>
          , in: Sensor Review,
          <year>2006</year>
          , vol.
          <volume>26</volume>
          , pp.
          <fpage>193</fpage>
          -
          <lpage>202</lpage>
          . DOI:
          <volume>10</volume>
          .1108/02602280610675474.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D. C.</given-names>
            <surname>Wyld</surname>
          </string-name>
          ,
          <string-name>
            <surname>RFID:</surname>
          </string-name>
          <article-title>The right frequency for government, Washington DC: IBM Center for the Business of Government</article-title>
          , IBM Center;
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>[9] RFID Applications for National Defense, National defense made more secure with military-grade RFID solutions</article-title>
          . URL: https://www.hidglobal.com/solutions/rfid-applications
          <string-name>
            <surname>-</surname>
          </string-name>
          national-defense
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Nikiforenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vikhtiuk</surname>
          </string-name>
          ,
          <article-title>Main threats to the national security of Ukraine on the state border and trends in their development, in: Collection of scientific works of the National Academy of the State Border Guard Service of Ukraine</article-title>
          , series: Military and
          <string-name>
            <given-names>Technical</given-names>
            <surname>Sciences</surname>
          </string-name>
          ,
          <year>2021</year>
          , vol.
          <volume>85</volume>
          , no.
          <issue>2-3</issue>
          , pp.
          <fpage>202</fpage>
          -
          <lpage>221</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>F.</given-names>
            <surname>Babaeian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. C.</given-names>
            <surname>Karmakar</surname>
          </string-name>
          ,
          <article-title>Development of cross-polar orientation-insensitive chipless RFID tags</article-title>
          ,
          <source>in: IEEE Transactions on Antennas and Propagation</source>
          ,
          <year>2020</year>
          , vol.
          <volume>68</volume>
          , no.
          <issue>7</issue>
          , pp.
          <fpage>5159</fpage>
          -
          <lpage>5170</lpage>
          . DOI:
          <volume>10</volume>
          .1109/TAP.
          <year>2020</year>
          .2975639
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ajami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rajabzadeh</surname>
          </string-name>
          ,
          <article-title>Radio Frequency Identification (RFID) technology and patient safety</article-title>
          ,
          <source>in: J Res Med Sci.</source>
          ,
          <source>2013 Sep</source>
          ,
          <volume>18</volume>
          (
          <issue>9</issue>
          ):
          <fpage>809</fpage>
          -
          <lpage>13</lpage>
          . PMID: 24381626. PMCID:
          <fpage>PMC3872592</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Nambiar</surname>
          </string-name>
          ,
          <article-title>RFID technology: A review of its applications</article-title>
          ,
          <source>in: Proceeding of the World Congress on Engineering and Computer Science</source>
          , Oct.
          <volume>20</volume>
          -
          <fpage>22</fpage>
          , San Francisco, USA,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>B.</given-names>
            <surname>Shrestha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Elsherbeni</surname>
          </string-name>
          , L. Ukkonen,
          <string-name>
            <surname>UHF</surname>
          </string-name>
          <article-title>RFID reader antenna for near-field and far-field operations</article-title>
          ,
          <source>in: IEEE Antennas and Wireless Propagation Letters</source>
          ,
          <year>2011</year>
          , vol.
          <volume>10</volume>
          , pp.
          <fpage>1274</fpage>
          -
          <lpage>1277</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>N. C.</given-names>
            <surname>Karmakar</surname>
          </string-name>
          ,
          <article-title>Handbook of Smart Antennas for RFID Systems</article-title>
          , John Wiley and Sons, NJ,
          <year>2010</year>
          ,
          <volume>218</volume>
          р.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Shaw</surname>
          </string-name>
          ,
          <article-title>Radiometry and the Friis transmission equation</article-title>
          ,
          <source>in: American Journal of Physics</source>
          ,
          <year>2013</year>
          , vol.
          <volume>81</volume>
          , no.
          <issue>33</issue>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>37</lpage>
          . DOI:
          <volume>10</volume>
          .1119/1.4755780.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>X. Z.</given-names>
            <surname>Lai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. M.</given-names>
            <surname>Xie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q. Q.</given-names>
            <surname>Xie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Chao</surname>
          </string-name>
          ,
          <article-title>A Srr-based near field RFID antenna</article-title>
          , in: Progress in Electromagnetics Research C,
          <year>2012</year>
          , vol.
          <volume>33</volume>
          , pp.
          <fpage>133</fpage>
          -
          <lpage>144</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>R.</given-names>
            <surname>Abdulghafor</surname>
          </string-name>
          et al.,
          <article-title>Recent advances in passive UHF-RFID tag antenna design for improved read range in product packaging applications: A comprehensive review</article-title>
          ,
          <source>in: IEEE Access</source>
          ,
          <year>2021</year>
          , vol.
          <volume>9</volume>
          , pp.
          <fpage>63611</fpage>
          -
          <lpage>63635</lpage>
          . DOI:
          <volume>10</volume>
          .1109/access.
          <year>2021</year>
          .
          <volume>3074339</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>G.</given-names>
            <surname>Baldini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Oliveri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Braun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Seuschek</surname>
          </string-name>
          , E. Hess,
          <article-title>Securing disaster supply chains with cryptography enhanced RFID</article-title>
          ,
          <source>in: Disaster Prevention and Management: An International Journal</source>
          ,
          <year>2012</year>
          , vol.
          <volume>21</volume>
          ,
          <issue>iss</issue>
          . 1, pp.
          <fpage>51</fpage>
          -
          <lpage>70</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tzitzis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Megalou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Siachalou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. G.</given-names>
            <surname>Emmanouil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Filotheou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. V.</given-names>
            <surname>Yioultsis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Dimitriou</surname>
          </string-name>
          ,
          <article-title>Trajectory planning of a moving robot empowers 3D localization of RFID tags with a single antenna</article-title>
          ,
          <source>in: IEEE Journal of Radio Frequency Identification</source>
          ,
          <year>2020</year>
          , vol.
          <volume>4</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>283</fpage>
          -
          <lpage>299</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>C. F.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. F.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <article-title>Design of RFID reader antenna for exclusively reading single one in tag assembling production</article-title>
          ,
          <source>in: Int. J. Antennas Propag</source>
          .,
          <year>2012</year>
          , vol.
          <year>2012</year>
          ,
          <string-name>
            <surname>Article</surname>
            <given-names>ID</given-names>
          </string-name>
          162684, 5 p.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>G. Z.</given-names>
            <surname>González</surname>
          </string-name>
          ,
          <source>Radio Frequency Identification (RFID) Tags and Reader Antennas Based on Conjugate Matching and Metamaterial Concepts: Ph.D. thesis, Bellaterra (Cerdanyola del Vallès)</source>
          ,
          <source>July</source>
          <year>2013</year>
          ,
          <volume>130</volume>
          p.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>J.</given-names>
            <surname>Landt</surname>
          </string-name>
          ,
          <article-title>The history of RFID</article-title>
          , in: IEEE Potentials, New York, NY,
          <year>2005</year>
          ,
          <volume>24</volume>
          (
          <issue>4</issue>
          ):
          <fpage>8</fpage>
          -
          <lpage>11</lpage>
          . DOI:
          <volume>10</volume>
          .1109/MP.
          <year>2005</year>
          .
          <volume>1549751</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>G.</given-names>
            <surname>Zamora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zuffanelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Paredes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. J.</given-names>
            <surname>Herraiz-Martinez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Martín</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bonache</surname>
          </string-name>
          ,
          <article-title>Fundamental mode leaky-wave antenna (LWA) using slot line and split-ring-resonator (SRR) based metamaterial</article-title>
          ,
          <source>in: IEEE Antennas and Wireless Propagation Letters, May</source>
          <year>2013</year>
          , vol.
          <volume>12</volume>
          , pp.
          <fpage>1424</fpage>
          -
          <lpage>1427</lpage>
          . DOI:
          <volume>10</volume>
          .1109/LAWP.
          <year>2013</year>
          .
          <volume>2287525</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gladka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuchansky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lisnevskyi</surname>
          </string-name>
          ,
          <article-title>Teams formation for IT projects implementation on the basis of the model of limited rationality</article-title>
          ,
          <source>in: Management of Development of Complex Systems</source>
          ,
          <year>2021</year>
          , vol.
          <volume>48</volume>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>23</lpage>
          . DOI:
          <volume>10</volume>
          .32347/
          <fpage>2412</fpage>
          -
          <lpage>9933</lpage>
          .
          <year>2021</year>
          .
          <volume>48</volume>
          .
          <fpage>17</fpage>
          -
          <lpage>23</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S.</given-names>
            <surname>Barone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Neri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Paoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Razionale</surname>
          </string-name>
          ,
          <article-title>3D acquisition and stereo-camera calibration by active devices: A unique structured light encoding framework</article-title>
          , in: Optics and Lasers in Engineering,
          <year>2020</year>
          , vol.
          <volume>127</volume>
          , pp.
          <fpage>105989</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>C.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Easy-to-use spatial random-forest-based downscaling-calibration method for producing precipitation data with high resolution and high accuracy</article-title>
          ,
          <source>in: Hydrology and Earth System Sciences</source>
          ,
          <year>2021</year>
          , vol.
          <volume>25</volume>
          , no.
          <issue>11</issue>
          , pp.
          <fpage>5667</fpage>
          -
          <lpage>5682</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>E.</given-names>
            <surname>Bergeret</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gaubert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Pannier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Gaultier</surname>
          </string-name>
          ,
          <article-title>Modeling an design of CMOS UHF voltage multiplier for RFID in a EEPROM compatible process</article-title>
          ,
          <source>in: IEEE Trans. Circuits and Systems</source>
          , Oct.
          <year>2007</year>
          , vol.
          <volume>54</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>833</fpage>
          -
          <lpage>837</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gladka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kravchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hladkyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Borashova</surname>
          </string-name>
          ,
          <article-title>Qualification and appointment of staff for project work in implementing IT systems under conditions of uncertainty</article-title>
          ,
          <source>in: 2021 IEEE International Conference on Smart Information Systems and Technologies</source>
          . Astana IT University. Nur-Sultan, Kazakhstan,
          <source>April 28-30</source>
          ,
          <year>2021</year>
          . DOI:
          <volume>10</volume>
          .1109/SIST50301.
          <year>2021</year>
          .
          <volume>9465897</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. C.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. C.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <article-title>RAFI: robust authentication framework for IoT-based RFID infrastructure</article-title>
          , in: Sensors,
          <year>2022</year>
          , vol.
          <volume>22</volume>
          , no.
          <issue>9</issue>
          , p.
          <fpage>3110</fpage>
          . doi.org/10.3390/s22093110.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Koopialipoor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. R.</given-names>
            <surname>Murlidhar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Fatemi</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Tahir</surname>
            ,
            <given-names>D. J.</given-names>
          </string-name>
          <string-name>
            <surname>Armaghani</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Use of intelligent methods to design effective pattern parameters of mine blasting to minimize flyrock distance</article-title>
          ,
          <source>in: Natural Resources Research</source>
          ,
          <year>2020</year>
          , vol.
          <volume>29</volume>
          , pp.
          <fpage>625</fpage>
          -
          <lpage>639</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hladkyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gladka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kostikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lisnevskyi</surname>
          </string-name>
          ,
          <article-title>An IoT Solution: A Fitness Trainer</article-title>
          ,
          <source>in: Information Technology and Implementation (IT&amp;I-2021), December 01-03</source>
          ,
          <year>2021</year>
          , Kyiv,
          <source>Ukraine: CEUR Workshop Proceedings</source>
          ,
          <year>2021</year>
          ,
          <volume>3179</volume>
          , pp.
          <fpage>215</fpage>
          -
          <lpage>226</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gladka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kravchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hladkyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Borashova</surname>
          </string-name>
          ,
          <article-title>Qualification and Appointment of Staff for Project Work in Implementing IT Systems under Conditions of Uncertainty</article-title>
          , in: SIST 2021
          <article-title>-</article-title>
          2021
          <source>IEEE International Conference on Smart Information Systems and Technologies</source>
          ,
          <year>2021</year>
          , ISBN:
          <fpage>978</fpage>
          - 1-
          <fpage>7281</fpage>
          -7470-9, https://doi.org/10.1109/SIST50301.
          <year>2021</year>
          .
          <volume>9465897</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>