<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article"><?properties manuscript?><front><journal-meta><journal-id journal-id-type="nlm-journal-id">101662156</journal-id><journal-id journal-id-type="pubmed-jr-id">44078</journal-id><journal-id journal-id-type="nlm-ta">Min Eng</journal-id><journal-id journal-id-type="iso-abbrev">Min Eng</journal-id><journal-title-group><journal-title>Mining engineering</journal-title></journal-title-group><issn pub-type="ppub">0026-5187</issn></journal-meta><article-meta><article-id pub-id-type="pmid">29348699</article-id><article-id pub-id-type="pmc">5769960</article-id><article-id pub-id-type="doi">10.19150/me.7919</article-id><article-id pub-id-type="manuscript">HHSPA930993</article-id><article-categories><subj-group subj-group-type="heading"><subject>Article</subject></subj-group></article-categories><title-group><article-title>Industrial Internet of Things</article-title><subtitle>(IIoT) applications in underground coal mines</subtitle></title-group><contrib-group><contrib contrib-type="author"><name><surname>Zhou</surname><given-names>C.</given-names></name><!--<email>czhou@cdc.gov</email>--></contrib><contrib contrib-type="author"><name><surname>Damiano</surname><given-names>N.</given-names></name></contrib><contrib contrib-type="author"><name><surname>Whisner</surname><given-names>B.</given-names></name></contrib><contrib contrib-type="author"><name><surname>Reyes</surname><given-names>M.</given-names></name></contrib><aff id="A1">Member SME, are senior electrical engineer, electrical engineer, electrical technician and team leader, respectively, at Pittsburgh Mining Research Division (PMRD), National Institute for Occupational Safety and Health (NIOSH), Pittsburgh, PA, USA</aff></contrib-group><pub-date pub-type="nihms-submitted"><day>29</day><month>12</month><year>2017</year></pub-date><pub-date pub-type="ppub"><month>12</month><year>2017</year></pub-date><pub-date pub-type="pmc-release"><day>16</day><month>1</month><year>2018</year></pub-date><volume>69</volume><issue>12</issue><fpage>50</fpage><lpage>56</lpage><!--elocation-id from pubmed: 10.19150/me.7919--><abstract><p id="P1">The Industrial Internet of Things (IIoT), a concept that combines sensor networks and control systems, has been employed in several industries to improve productivity and safety. U.S. National Institute for Occupational Safety and Health (NIOSH) researchers are investigating IIoT applications to identify the challenges of and potential solutions for transferring IIoT from other industries to the mining industry. Specifically, NIOSH has reviewed existing sensors and communications network systems used in U.S. underground coal mines to determine whether they are capable of supporting IIoT systems. The results show that about 40 percent of the installed post-accident communication systems as of 2014 require minimal or no modification to support IIoT applications. NIOSH researchers also developed an IIoT monitoring and control prototype system using low-cost microcontroller Wi-Fi boards to detect a door opening on a refuge alternative, activate fans located inside the Pittsburgh Experimental Mine and actuate an alarm beacon on the surface. The results of this feasibility study can be used to explore IIoT applications in underground coal mines based on existing communication and tracking infrastructure.</p></abstract></article-meta></front><body><sec sec-type="intro" id="S1"><title>Introduction</title><p id="P2">The U.S. approach to health and safety in mining has historically been reactive in the sense that health and safety regulations and mandates have traditionally been passed as a result of tragic mining accidents. An example of this is the Mine Improvement and New Emergency Response Act (MINER Act) of 2006, which was passed as a result of several mining accidents where tracking of and communication with underground personnel were severely limited. While this reactive approach has led to the development and implementation of highly impactful safety interventions and safety practices, there exists a technological revolution that can shift the paradigm toward a proactive approach based on preventative methods: Internet of Things (IoT).</p><p id="P3">IoT is the network of physical objects, or &#x0201c;things,&#x0201d; embedded with electronics, sensors and connectivity to enable that network to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices (<xref rid="R2" ref-type="bibr">Atzori, Iera and Morabito, 2010</xref>; <xref rid="R8" ref-type="bibr">Gubbi et al. 2013</xref>). It should be noted that IoT has been defined from various perspectives, and hence numerous definitions exist in the literature. The apparent ambiguity of the IoT definition might be due to the fact that IoT is syntactically composed of two terms: the Internet and things. The first word pushes toward a network-oriented vision, while the second tends to put the focus on generic objects. The traditional Internet can be viewed as an internet of computers, so things connected to the Internet are computers only. IoT extends the internet by allowing other generic things that are commonly found in daily life, such as refrigerators and cars, to be interconnected through the Internet, thus creating a bridge between the virtual world and the physical world.</p><p id="P4">According to Gartner&#x02019;s 2014 Hype Cycle (<xref rid="R7" ref-type="bibr">Gartner Inc., 2014</xref>), IoT was the most hyped emerging technology of the year. Companies such as Amazon, General Electric, Microsoft and IBM heavily investigated IoT and now offer commercially available IoT platforms to a variety of industries. Terms used to represent the concept of IoT include Internet of Everything (IoE), Industrial Internet, Industry 4.0 and Web of things (WoT).</p><p id="P5">Currently, many IoT technologies are integrated into consumer applications, such as smart homes, connected cars and smart wearables. The industrial applications of IoT, or Industrial IoT (IIoT), however, is anticipated to have the capability to transform many industries, including manufacturing, oil and gas, agriculture, and mining.</p><p id="P6">With advances in sensing technologies, more and more sensors are being deployed in underground mines to measure important operational and environmental parameters such as carbon monoxide concentration, methane concentration, airflow, temperature and belt-running conditions. They collect a massive volume of data daily. One challenge is processing the data to best improve mine safety and operational efficiency. Combining IIoT and Big Data analytics offers a unique solution to this challenge and is expected to bring unprecedented opportunities to the mining industry.</p><p id="P7">Though not under the term IIoT, the mining industry has been deploying programmable logic controller (PLC) and supervisory control and data acquisition (SCADA) systems for monitoring and controlling for decades. For example, there exist a number of commercially available U.S. Mine Safety and Health Administration (MSHA)-approved wireless atmospheric monitoring systems (AMS) for coal-mining applications. There are also some wired monitoring systems, such as the PLC-controlled AMS network systems from Conspec Controls (Charleroi, PA). Compared with IIoT systems, these existing monitoring and control systems are generally proprietary systems and were not designed to interoperate or interconnect with other systems. The major difference between IIoT-based systems and legacy monitoring systems is that IIoT systems are based on an open, highly connected Internet Protocol (IP) network structure. Transition to the more open network architectures and data sharing of IIoT may bring opportunities to the mining industry that will enable it to move toward the next generation of smart mining and automation.</p><p id="P8">While the health and safety implications of applying IIoT technologies go well beyond mining, introducing these technical advancements into the underground coal mine environment may be especially challenging, and there are specific considerations that must be taken into account to transfer concepts to mining in general. This paper provides theories and applications essential to accelerate the adoption of IIoT at underground mines, discusses the feasibility, potential and challenges for underground coal mines, and presents a practical example of a mining-specific application.</p></sec><sec id="S2"><title>IIoT in the mining industry: State of the market and related work</title><sec id="S3"><title>IIoT in metal/nonmetal mines</title><p id="P9">Due to the current economic climate in mining, mine operators are heavily focused on improving asset management and equipment life-cycle management, and minimizing production costs. A report by <xref rid="R1" ref-type="bibr">Accenture (2015)</xref> said these priorities may open the door to IIoT in mining and revealed that 79 percent of the mining companies surveyed identified investing in data analytics and Industrial Internet as among their top three priorities.</p><p id="P10">The worldwide mining industry is already leveraging IIoT in wireless mining automation and connected mine projects. For example, <xref rid="R15" ref-type="bibr">Rio Tinto (2008)</xref> has been using autonomous, self-driving mining trucks to move ore around since 2008. Each self-driving truck has more than 200 sensors, a GPS receiver and a radar guidance system. The fleet is managed from an operations center located more than a thousand miles away. At the operations center, data from the vehicles and other equipment are fed into a comprehensive mine automation system, which gives a system view of the entire mining operation, including 3D visualizations of work sites and predictive maintenance schedules.</p><p id="P11">Cisco has actively promoted two cases where IIoT technology has been successfully applied to improve the safety and efficiency of underground mines. In the first case, which is perhaps one of the best known IIoT mining examples and has been highlighted in Cisco&#x02019;s IIoT initiatives (<xref rid="R4" ref-type="bibr">Cisco, 2014</xref>), 280 Cisco wireless access points were installed in the flagship gold mine of Dundee Precious Metals in Chelopech, Bulgaria, to provide wireless coverage along 50 km (31 miles) of tunnels. The IIoT solution implemented at this mine has helped to connect people, track the locations of miners and vehicles, monitor vehicle status and automate building controls. In addition, the blasting system of the mine is connected to the personnel location tracking system to improve miner safety. The second case was presented through a partnership with Goldcorp (<xref rid="R5" ref-type="bibr">Cisco, 2015</xref>). In addition to communication and real-time tracking of people and assets, ventilation on demand (VoD) was implemented based on a multiservice IP network installed in one of Goldcorp&#x02019;s mines.</p><p id="P12">In 2014, General Electric teamed up with mining equipment manufacturer Komatsu to implement IIoT solutions to improve the efficiency and service of mining operations (<xref rid="R20" ref-type="bibr">Vella, 2015</xref>). A joint venture called Komatsu and GE Mining Systems LLC was established to develop the next generation of mining solutions where IIoT and Big Data analytics are anticipated to play an important role. For example, the GE Remote Monitoring &#x00026; Diagnostics technology can be used to provide data analytics on truck performance to prevent unnecessary maintenance events and, by extension, reduce the costs associated with replacing failed components and maintenance downtimes through automation of predictive maintenance schedules.</p><p id="P13">Engineers from the NTT Innovation Institute Inc. and Colorado School of Mines recently completed a pilot project using IIoT to provide VoD at the Edgar Experimental Mine (<xref rid="R13" ref-type="bibr">NTTi3, 2016</xref>). Based on the team&#x02019;s assessment, the program achieved 10 percent energy savings in the first two weeks.</p></sec><sec id="S4"><title>IIoT in coal mines</title><p id="P14">While IIoT solutions have been successfully implemented in metal/nonmetal mines, the application of such technology in coal mines has been limited. Some barriers to IIoT integration in coal mines may be attributed to intrinsic safety requirements enforced in underground coal mines, the complexity of integrating full coverage into a mine infrastructure, and the initial overhead costs associated with integrating sensor networks and automation. Despite these barriers, some manufacturers and mine operators have taken initial steps to explore IIoT in underground coal mines.</p><p id="P15">Although still in its infancy in terms of implementation, IIoT in coal mines has been a hot research topic since early 2000 and has been widely investigated in China. For example, IIoT has been proposed in China for coal mine disaster warning (<xref rid="R10" ref-type="bibr">Hu et al., 2014</xref>), intelligent mine monitoring (<xref rid="R9" ref-type="bibr">Hu et al., 2013</xref>), mining equipment management (<xref rid="R18" ref-type="bibr">Tan et al., 2013</xref>), environmental sensing (<xref rid="R3" ref-type="bibr">Chen et al., 2012</xref>), real-time positioning (<xref rid="R21" ref-type="bibr">Wang, Zhou et al., 2011</xref>), coal seam water monitoring (<xref rid="R12" ref-type="bibr">Meng, Wang and Gao, 2012</xref>), and accident analysis (<xref rid="R17" ref-type="bibr">Sun, 2015</xref>). In addition to specific applications, some published papers focus on IIoT system overview and architecture design (<xref rid="R11" ref-type="bibr">Ke, 2010</xref>; <xref rid="R23" ref-type="bibr">Wei, Zhu and Du, 2011</xref>; <xref rid="R21" ref-type="bibr">Wang, Zhao et al., 2011</xref>; <xref rid="R25" ref-type="bibr">Zhang et al., 2012</xref>).</p><p id="P16">Reports on studies of IIoT in coal mines in other countries have been limited, but some related studies, such as those on minewide monitoring systems, have been reported in the United States and abroad. For example, the <xref rid="R19" ref-type="bibr">U.S. Bureau of Mines (1984)</xref> published a technical report comparing different mine monitoring systems in underground mines, and <xref rid="R14" ref-type="bibr">Nutter and Aldridge (1988)</xref> investigated the status of mine monitoring and communication. More recently, U.S. National Institute for Occupational Safety and Health (NIOSH) researchers conducted an MSHA data survey and found that 204 carbon monoxide systems and 33 AMS systems had been installed in producing coal mines in the United States (<xref rid="R16" ref-type="bibr">Rowland, III, Harteis and Yuan, 2017</xref>). Mine monitoring is a part of the IIoT, though it does not encompass the concepts of a complete IIoT solution on its own.</p><p id="P17">NIOSH has conducted intramural research in areas directly related to IIoT technologies. One of the key elements of underground IIoT is the communication backbone for connecting things underground. In 2010, NIOSH launched a five-year research project to investigate radio propagation mechanisms for the different frequencies that are commonly used by existing underground communications and tracking systems. Theoretical models were developed to predict underground communication and tracking system performance and were validated through extensive measurement results (Zhou, Waynert et al., 2015; Zhou, Plass et al., 2013).</p><p id="P18">In 2014, NIOSH engineers reviewed the emergency response plans of 306 active coal mines in the United States as part of a project on communication and tracking. The mines&#x02019; post-accident communication and tracking system installation information was extracted and analyzed (<xref rid="R6" ref-type="bibr">Damiano, Homce and Jacksha, 2014</xref>). One of the major results (<xref rid="F1" ref-type="fig">Fig. 1</xref>) was a comprehensive overview of the communication and tracking systems installed in U.S. underground coal mines in 2014. The list was used to evaluate the state of post-accident communication and tracking systems being used throughout the United States and to explore the capabilities and limitations of these systems in handling the data transmission and infrastructure required to operate an IIoT network.</p></sec></sec><sec id="S5"><title>Feasibility of IIoT in coal mines</title><p id="P19">To answer the question of whether it is feasible to implement IIoT technologies in coal mines, one must understand the major components of IIoT systems and compare them with those that already exist in coal mines. By examining the IIoT technologies used in other industries, the following system core components are identified: (1) things, such as machines and people equipped with sensors, services and actuators, (2) networks, to connect things together, and (3) systems/platforms, to process data from/to things, often deployed in the cloud.</p><sec id="S6"><title>System of systems</title><p id="P20">IIoT comprises a large scale of smart things and is often referred to as a &#x0201c;system of systems.&#x0201d; <xref rid="F2" ref-type="fig">Figure 2</xref> shows some examples of existing underground systems that can potentially be integrated to form a new IIoT system.</p><sec id="S7"><title>Ventilation and fire detection systems</title><p id="P21">Fires and explosions have been serious safety concerns since the advent of mining. Ventilation systems are crucial for maintaining nonexplosive and nontoxic atmospheres. The progression of technology has allowed mine monitoring techniques to become more sophisticated, and various advanced sensors for monitoring dust, oxygen, methane, carbon monoxide, carbon dioxide, temperature and air velocity have been developed and deployed throughout the mining industry (<xref rid="R16" ref-type="bibr">Rowland, III, Harteis and Yuan, 2017</xref>). In an IIoT system, these sensors could potentially be connected to a network to form a minewide monitoring system capable of collecting data and automatically transferring it to the surface through the existing communication backbone. The data can then be used to provide decision-making information and automatic actions. If an abnormal condition is detected, the local sensor node could be configured to simultaneously set off an alarm locally and in the monitoring and control center on the surface. Depending on the conditions detected, the system would then enact automatic measures to mitigate the hazard. For example, if the sensor data indicate a fire is occurring underground, the system may automatically activate fire suppression systems in the point of origin while taking additional measures to prevent the fire from spreading.</p></sec><sec id="S8"><title>Personnel and asset tracking systems</title><p id="P22">With the increasing mining equipment and assets &#x02014; such as boring machines, shearers, conveyors, hydraulic support, hydraulic pump stations, loaders, crushers, motor vehicles, ventilation fans and water pumps &#x02014; used in underground mines, equipment management systems are often needed to provide a more convenient, efficient and secure resource management platform. Through an IIoT network, the locations of those important assets along with the locations of all underground personnel can be tracked. As mandated by the MINER Act, all U.S. underground coal mines now have installed wireless tracking systems to track the locations of underground personnel. Many of those systems are based on radio-frequency identification (RFID) technologies, and thus can be easily incorporated into the proposed IIoT network platform.</p></sec></sec><sec id="S9"><title>Sensors</title><p id="P23">To get an overview of legacy sensors used in underground coal mines, sensors approved for use in U.S. underground coal mines during 1996 to 2016 were examined. It was found that the major MSHA-approved sensors are gas sensors, including those for methane, oxygen and carbon monoxide; airflow sensors; temperature and humidity sensors; vibration sensors; smoke sensors; and alarm sensors. There also exist approved sensors for monitoring other parameters, such as ventilation fan speed, pump water level, power status, and conveyor-belt conditions like speed and slip detection.</p></sec><sec id="S10"><title>Networks</title><p id="P24">Information collected by underground sensors should be readily accessible by underground miners as well as by dispatch personnel on the surface. Many mines have installed communication systems that have data back-haul capability. In these cases, an IIoT network may potentially be established based on existing mine communication systems, such as fiberoptics systems, leaky feeder systems, and node-based systems. IIoT systems likely require a large communication bandwidth to support the transmission of the massive amount of data collected underground. Therefore, from the bandwidth point of view, node-based systems with fiberoptics as a communication backbone would be favorable for IIoT applications. In addition, a communication interface between the existing communication backbone and the sensors would need to be established. One way to accomplish this is to attach a radio-frequency transceiver module to the sensors, or things. Different communication protocols, such as Wi-Fi, Zigbee, Bluetooth and BLE, should be investigated to identify the best protocol suited to underground mining applications.</p><p id="P25">As implied in the name, the Internet is one of the key components of IIoT technologies. Although low-power, IIoT-dedicated networks have been developed, deploying a new network underground may be costly. A solution would be to leverage existing communication and tracking networks as the backbone for these installations. As depicted in <xref rid="F1" ref-type="fig">Fig. 1</xref>, there are a number of communication systems that may be suitable for sensor data transmission and controls. An examination of each of these systems found that five of 12 systems, or 42 percent, have the capability to provide Internet to the underground with little or no modification. The five Internet-capable communication system manufacturers in active U.S. underground coal mines are listed in <xref rid="T1" ref-type="table">Table 1</xref>.</p><p id="P26">The number of manufacturers and availability of Internet-ready systems may have increased since 2014, and additional technology review efforts may be required to obtain the most current data.</p></sec><sec id="S11"><title>Platforms</title><p id="P27">Platforms are responsible for analyzing data, collected in real time through modern high-performance computing systems, and delivering optimized recommendations to operators and other type of users both inside and outside of mines. By leveraging a customizable and intuitive user interface, and with full mobile accessibility, users are able to gather insight into mine safety and profitability over time. Platforms also make it possible for appropriate users to analyze historical and real-time data to deliver predictions or forecast disaster. Big Data analytics is increasingly becoming a critical component of IIoT in many industries, including mining. Applying Big Data analytics and predictive analytics effectively to the mining industry, based on the proposed IIoT network platform, can have a significant impact in the industry by processing massive amounts of data and streamlining the prioritization, automation and resolution of day-to-day operations and mine hazards encountered.</p></sec></sec><sec id="S12"><title>Potential of IIoT in coal mines</title><sec id="S13"><title>Benefits of IIoT in coal mines</title><p id="P28">IIoT has the potential to boost the safety and productivity of the mining industry to new levels by enhancing the collaborative operation between people, equipment, transportation tools and the mining process. As shown in <xref rid="F2" ref-type="fig">Fig. 2</xref>, the primary end users of a IIoT system would be controlling centers on the surface. Besides mining companies, the proposed IIoT systems have the potential to influence mining equipment manufacturers, health and safety professionals, and worldwide researchers by creating new network-based applications enabled by IIoT systems. Some key applications of the proposed mine-wide IIoT-based network systems may include the following.</p><sec id="S14"><title>Employee condition and environment monitoring systems</title><p id="P29">IIoT systems equipped with large volumes of sensors and high connectivity make underground hazards more transparent to the surface, as well as to miners underground. This hazard transparency can help reduce or eliminate miners&#x02019; exposure to hazardous situations that can result in workplace injury and even death, through networked, smart, wearable sensors. The transferability potential for smart sensors developed in other industries may have a significant impact on the health and safety of miners.</p></sec><sec id="S15"><title>Mine resource management and equipment predictive maintenance</title><p id="P30">Many types of equipment are used underground for production and transportation purposes. They need to be regularly maintained to limit unexpected failures or breakdowns. Connected IIoT systems can monitor the conditions of the equipment in real time and use the data collected to predict failure. Parts or components can be issued against predicted failure to achieve predictive maintenance or even prescriptive maintenance.</p></sec><sec id="S16"><title>Mine safety management and disaster forecasting</title><p id="P31">Mine safety management can be achieved through minewide monitoring such as atmospheric monitoring and ground stability monitoring. Advanced data analytics might be applied to identify possible areas of weakness in mine safety systems and to forecast potential disasters based on historical and current data collected. The system provides an audiovisual warning to alert the relevant people when a hazard is detected or forecasted, so proper action can be taken to eliminate the hazard and/or to reduce the damage caused by it.</p></sec><sec id="S17"><title>Mining automation</title><p id="P32">Mines may benefit tremendously from the automation of mine equipment. For example, from a safety point of view, a good way to reduce mining injuries might be to relocate miners away from extremely dangerous working places and providing them with automated or remote-controlled machines. As a matter of fact, wireless mining automation is already being used. Automatically controlling equipment based on information monitored is in the spirit of IIoT systems and may significantly contribute to the next generation of mining automation.</p></sec><sec id="S18"><title>Predictive energy optimization, such as ventilation on demand</title><p id="P33">VoD is probably one of the most known applications of IIoT to the mining industry, but IIoT applications are not limited to VoD. It is about energy optimization based on energy consumption monitoring and Big Data analytics.</p></sec><sec id="S19"><title>Remote diagnostics and product performance monitoring</title><p id="P34">The open connectivity of IIoT systems would facilitate services such as remote diagnostics. This feature could also allow equipment manufacturers to track the performance of their products in their lifetimes after the products are sold and are being used underground. This valuable performance data can be used to improve product design.</p></sec><sec id="S20"><title>Post-accident rescue coordination and accident investigation</title><p id="P35">When a disaster occurs, an IIoT system can provide a central place for rescue coordination and accident investigation. The system stores critical information &#x02014; such as emergency response plans, a list of first aid stations, a list of trained rescue personnel along with their contact information, and place of duty during an emergency &#x02014; and makes this information easily accessible by authorized staff. Through an integrated personnel tracking system, the IIoT system can provide the names of miners trapped underground along with their last known locations. Trapped miners may use handheld devices, such as tablets or smart-phones, to check the minewide gas conditions provided by the minewide monitoring system and select the best route for escape. When self-escape is not possible, trapped miners can search for the closest refuge alternative.</p></sec><sec id="S21"><title>Smart refuge-alternative systems</title><p id="P36">In the event of a disaster, miners are trained to escape from the mine with the available self-rescue apparatus first, and enter a refuge alternative if escape is cut off. Refuge alternatives are intended to provide mine workers with breathable air, food and water for 96 h. Although refuge alternatives are only designed for use in post-accident events, their functionalities should be checked periodically to make sure they will work as designed in an emergency. Furthermore, there should be a mechanism to immediately signal the surface when a refuge alternative is activated following a disaster. One way to monitor the occupancy status of a refuge alternative from the surface is to attach a sensor, such as a magnetic switch sensor, to the door of the refuge alternative to detect when the door is open. This door sensor could be linked to the network so the information can be relayed to the surface. The air quality and temperature information for both the inside and outside of the refuge alternative could be continuously monitored from the surface. The equipment inside refuge alternatives can also be monitored and managed by the proposed IIoT-based network system.</p></sec></sec></sec><sec id="S22"><title>Key challenges for IIoT in coal mines</title><sec id="S23"><title>Challenges</title><p id="P37">Despite the promise and new opportunities offered by IIoT, there are challenges that could hinder the adoption of IIoT technologies in coal mines.</p><sec id="S24"><title>Security and privacy</title><p id="P38">Security due to connectivity to the global network is always a concern for IIoT technologies, especially in the mining industry. According to the results of a World Economic Forum survey on IIoT (source details), 72 percent of the people surveyed believe that concern over security is the greatest barrier inhibiting business from adopting IIoT in North America. Given the novelty of IIoT and the pace of innovation today, people may believe that there is a need for a revolutionary security solution that can be uniquely tailored to mining applications and may want to wait for such a solution before implementing IIoT. However, traditional IT security controls that have evolved over the past decades can be effectively applied to IIoT in mining, provided they can be adapted to the constraints of the sensors deployed in mining environments.</p><p id="P39">Similar to security, the privacy of miners and the confidentiality of the business process is another concern caused by connectivity to the global network. IIoT promotes the sharing of information among connected things, including equipment and personnel, and the information around them, which can lead to a privacy concern. This privacy concern can be addressed by properly controlling access so that information is only available to authorized users.</p></sec><sec id="S25"><title>Harsh and gassy environments</title><p id="P40">Although IIoT has been successfully implemented in other industries, special care has to be taken to adapt the technology from the surface to the underground. First, due to the harsh nature of mining environments, such as extreme moisture and heavy dust, rugged design is required for sensors and equipment used underground. Second, confined space and tunnel-like structures in mining environments cause some unique radio propagation behavior that must be taken into account in the design of wireless sensors and networks operated in such environments (<xref rid="R26" ref-type="bibr">Zhou, Plass et al., 2015</xref>). Third, the gassy underground atmosphere is potentially explosive, so intrinsic-safety or explosion-proof technology is often required in underground coal mines. Electrical systems, including the IIoT sensors and communication nodes, should be designed in such a way that they do not have any components that produce sparks or high surface temperatures, or components that can hold enough energy to produce a spark of sufficient energy to cause an ignition. As a result, IIoT systems used on the surface must be evaluated and approved by MSHA before they can be used underground. Sometimes, systems on the surface cannot be used underground because they would need to be redesigned in order to be certified as permissible equipment by MSHA.</p></sec><sec id="S26"><title>Network interoperability</title><p id="P41">The fundamental concept behind IoT is to connect a large scale of systems or things to a common network and infrastructure. This poses a challenge to the scalability and interoperability of the networks in the mining industry, as many existing networks are proprietary systems that are not designed to be interoperable.</p></sec><sec id="S27" sec-type="methods"><title>Data analytics tailored to mining applications</title><p id="P42">Data analytics refers to examining large amounts of real-time and historical data to uncover patterns and correlations. Fast and agile data analytics specific to mining applications may help mine operators make informed decisions on health and safety as well as production to prevent potential accidents and reduce costs. While data analytics has been widely used in other industries to help organizations turn data into useful information, it is still in its infancy in the mining industry.</p></sec></sec></sec><sec id="S28"><title>IIoT for real-time monitoring and control: Practical examples</title><p id="P43">To show the feasibility and potential of IIoT for mining applications, an IIoT prototype system using commercially available components was built and demonstrated in NIOSH&#x02019;s experimental mine in Pittsburgh, PA.</p><sec id="S29"><title>System description</title><p id="P44">As shown in <xref rid="F3" ref-type="fig">Fig. 3</xref>, the developed IIoT system consisted of IIoT sensors, a communication network, a cloud-based data engine and actuators. Some examples of IIoT sensors and the actuator, built specifically for this application, are shown in <xref rid="F4" ref-type="fig">Fig. 4</xref>. These IIoT sensors were constructed by integrating the corresponding sensor with an ESP8266 miniature low-cost microcontroller board that had embedded Wi-Fi connectivity (Espressif Systems, Shanghai, China). The IIoT control unit (actuator) in <xref rid="F4" ref-type="fig">Fig. 4</xref> consists of a Wi-Fi microcontroller board, similar to what would be used in IIoT sensors, and a power switch controlled by the WiFi microcontroller board. For this demonstration, the Wi-Fi coverage underground was achieved by using an integrated cellular repeater system. The cellular signal coverage was extended from the surface to the underground work area using a cellular amplifier. The input antenna of the cellular amplifier was placed on the surface and connected to the amplifier located underground by a long, low-loss coaxial cable through a borehole. Any system that can be connected to the Internet with an open protocol could have been used in place of the cellular repeater system here.</p></sec><sec id="S30"><title>Refuge alternative door-open detection</title><p id="P45">To demonstrate the monitoring and control ability of the developed IIoT system prototype, a door-open detection sensor was installed to monitor the door status of a built-in-place refuge alternative located in the experimental mine. The sensor/micro-controller was programmed to conserve battery power, so it was dormant most of the time and would only transmit data whenever a door-open event was detected. The user interface would display the status of the door after it received messages from the sensor. A similar approach was taken for other controlled devices.</p><p id="P46">In this demonstration, one warning light and two fans were used to demonstrate the automatic actions enabled by the sensor network (<xref rid="F5" ref-type="fig">Fig. 5</xref>). The actuators and sensors communicated with the server using the Message Queue Telemetry Transport (MQTT) protocol, which is a publish-subscribe lightweight messaging protocol designed for machine-to-machine communications. This messaging protocol is designed for small-code-footprint applications where the network bandwidth is limited. The system was programmed to activate a light and two fans when the refuge-alternative door was open and turn them off when the door was closed.</p><p id="P47">Although a simple door-open detection sensor was used in the demonstration, other sensors can also be used as the event triggers. The system can be configured to control one device with triggers from multiple sensors or to control multiple devices using a trigger from one sensor. Because the Internet is a worldwide network, the connected things in this demostration can essentially be monitored and controlled anytime, from anywhere in the world where there is Internet coverage. Even though the information can be accessed anywhere in the world, it could also be made local or even intranet-based, so only people with access to those intranet systems can get the information.</p></sec></sec><sec sec-type="conclusions" id="S31"><title>Conclusion</title><p id="P48">This paper presented a discussion on the current state of IIoT in the mining industry, specifically, the feasibility and potential of applying IIoT to the mining industry, particularly to underground coal mines. The potential applications and benefits of applying IIoT to underground coal mines were summarized to highlight areas where IIoT may have an immediate impact based on current infrastructure that exists in underground coal mines. The research found that a large portion of the sensors and communication systems installed in underground coal mines can be potentially integrated into IIoT systems with little or no modification. In addition, an example for a mining-specific IIoT application was presented by discussing a NIOSH prototype system that was developed based on low-cost, open-source micro-controller boards. The system was developed and installed in NIOSH&#x02019;s experimental mine in Pittsburgh to monitor the door status of a built-in-place refuge alternative and to automatically turn on or turn off equipment based on door status. The results of this paper can be used to further explore the transferability potential and feasibility of IIoT applications in underground coal mines based on previous research and advances in technologies.</p></sec></body><back><fn-group><fn id="FN1"><p><bold>Disclaimer</bold></p><p>The findings and conclusions in this report are those of the authors and do not necessarily represent the views of NIOSH. Reference to specific brand names does not imply endorsement by NIOSH.</p></fn></fn-group><ref-list><ref id="R1"><element-citation publication-type="web"><collab>Accenture</collab><year>2015</year><source>Industrial Internet Insights Report for 2015</source><comment><ext-link ext-link-type="uri" xlink:href="https://www.accenture.com/t20150523T023646Z__w__/us-en/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Dualpub_11/Accenture-Industrial-Internet-Insights-Report-2015.pdf">https://www.accenture.com/t20150523T023646Z__w__/us-en/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Dualpub_11/Accenture-Industrial-Internet-Insights-Report-2015.pdf</ext-link></comment></element-citation></ref><ref id="R2"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Atzori</surname><given-names>L</given-names></name><name><surname>Iera</surname><given-names>A</given-names></name><name><surname>Morabito</surname><given-names>G</given-names></name></person-group><year>2010</year><article-title>The Internet of Things: A survey</article-title><source>Computer Networks</source><volume>54</volume><fpage>2787</fpage><lpage>2805</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.comnet.2010.05.010">https://doi.org/10.1016/j.comnet.2010.05.010</ext-link></comment></element-citation></ref><ref id="R3"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname><given-names>Y</given-names></name><name><surname>Meng</surname><given-names>F-W</given-names></name><name><surname>Guo</surname><given-names>H-C</given-names></name></person-group><year>2012</year><article-title>Design of detection system for mine oxygen concentration based on Internet of Things</article-title><source>Electronic Design Engineering</source><volume>20</volume></element-citation></ref><ref id="R4"><element-citation publication-type="web"><collab>Cisco</collab><year>2014</year><source>Mining firm quadruples production, with Internet of Everything</source><comment><ext-link ext-link-type="uri" xlink:href="https://www.cisco.com/assets/global/BE/tomorrow-starts-here/pdf/c36-730784-01_dundee_precious_metals_cs_v3a_en_be.pdf">https://www.cisco.com/assets/global/BE/tomorrow-starts-here/pdf/c36-730784-01_dundee_precious_metals_cs_v3a_en_be.pdf</ext-link></comment></element-citation></ref><ref id="R5"><element-citation publication-type="web"><collab>Cisco</collab><year>2015</year><source>Goldcorp&#x02019;s &#x000c9;l&#x000e9;onore: Internet of Things enables the mine of the future today</source><comment><ext-link ext-link-type="uri" xlink:href="https://www.cisco.com/c/dam/en_us/solutions/industries/materials-mining/downloads/c36-goldcorp-cs.pdf">https://www.cisco.com/c/dam/en_us/solutions/industries/materials-mining/downloads/c36-goldcorp-cs.pdf</ext-link></comment></element-citation></ref><ref id="R6"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Damiano</surname><given-names>N</given-names></name><name><surname>Homce</surname><given-names>G</given-names></name><name><surname>Jacksha</surname><given-names>R</given-names></name></person-group><year>2014</year><article-title>A review of underground coal mine emergency communications and tracking system installations</article-title><source>Coal Age</source><volume>119</volume><fpage>34</fpage><lpage>35</lpage></element-citation></ref><ref id="R7"><element-citation publication-type="web"><collab>Gartner Inc</collab><year>2014</year><source>Gartner&#x02019;s 2014 Hype Cycle for Emerging Technologies</source><comment><ext-link ext-link-type="uri" xlink:href="http://www.gartner.com/newsroom/id/2819918">http://www.gartner.com/newsroom/id/2819918</ext-link></comment></element-citation></ref><ref id="R8"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gubbi</surname><given-names>J</given-names></name><name><surname>Buyya</surname><given-names>R</given-names></name><name><surname>Marusic</surname><given-names>S</given-names></name><name><surname>Palaniswami</surname><given-names>M</given-names></name></person-group><year>2013</year><article-title>Internet of Things (IoT): A vision, architectural elements, and future directions</article-title><source>Future Generation Computer Systems</source><volume>29</volume><fpage>1645</fpage><lpage>1660</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.future.2013.01.010">https://doi.org/10.1016/j.future.2013.01.010</ext-link></comment></element-citation></ref><ref id="R9"><element-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Hu</surname><given-names>S</given-names></name><name><surname>Tang</surname><given-names>C</given-names></name><name><surname>Yu</surname><given-names>R</given-names></name><name><surname>Liu</surname><given-names>F</given-names></name><name><surname>Wang</surname><given-names>X</given-names></name></person-group><year>2013</year><article-title>Intelligent coal mine monitoring system based on the Internet of Things</article-title><conf-name>IEEE 2013 3rd International Conference on Consumer Electronics, Communications and Networks (CECNet)</conf-name><conf-loc>Xianning, China</conf-loc><conf-date>Nov. 20&#x02013;22, 2013</conf-date><fpage>380</fpage><lpage>384</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/cecnet.2013.6703350">https://doi.org/10.1109/cecnet.2013.6703350</ext-link></comment></element-citation></ref><ref id="R10"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hu</surname><given-names>Y</given-names></name><name><surname>Sun</surname><given-names>LM</given-names></name><name><surname>Yu</surname><given-names>SC</given-names></name><name><surname>Huang</surname><given-names>JL</given-names></name><name><surname>Wang</surname><given-names>XJ</given-names></name><name><surname>Guo</surname><given-names>H</given-names></name></person-group><year>2014</year><article-title>Coal mine disaster warning Internet of Things intrusion detection system based on back propagation neural network improved by genetic algorithms. Applied Mechanics and Materials</article-title><source>Trans Tech Publ</source><volume>441</volume><fpage>343</fpage><lpage>346</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4028/www.scientific.net/amm.441.343">https://doi.org/10.4028/www.scientific.net/amm.441.343</ext-link></comment></element-citation></ref><ref id="R11"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ke</surname><given-names>H</given-names></name></person-group><year>2010</year><article-title>The key technologies of IoT with development and applications</article-title><source>Radio Frequency Ubiquitous Journal</source><volume>1</volume><fpage>12</fpage></element-citation></ref><ref id="R12"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Meng</surname><given-names>X</given-names></name><name><surname>Wang</surname><given-names>J</given-names></name><name><surname>Gao</surname><given-names>Z</given-names></name></person-group><year>2012</year><article-title>Research on coal seam floor water inrush monitoring based on perception of IoT coupled with GIS</article-title><source>Engineering</source><volume>4</volume><issue>8</issue><fpage>467</fpage><lpage>476</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4236/eng.2012.48061">https://doi.org/10.4236/eng.2012.48061</ext-link></comment></element-citation></ref><ref id="R13"><element-citation publication-type="web"><collab>NTT Innovation Institute Inc. (NTTi3)</collab><year>2016</year><source>Using the Industrial Internet of Things to transform human safety and energy consumption in the mining industry</source><comment><ext-link ext-link-type="uri" xlink:href="http://www.ntti3.com/blog/iiot-industrial-internet-things-mining-industry-innovation/">http://www.ntti3.com/blog/iiot-industrial-internet-things-mining-industry-innovation/</ext-link></comment></element-citation></ref><ref id="R14"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Nutter</surname><given-names>R</given-names></name><name><surname>Aldridge</surname><given-names>MD</given-names></name></person-group><year>1988</year><article-title>Status of mine monitoring and communications</article-title><source>IEEE Transactions on Industry Applications</source><volume>24</volume><fpage>820</fpage><lpage>826</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/28.8986">https://doi.org/10.1109/28.8986</ext-link></comment></element-citation></ref><ref id="R15"><element-citation publication-type="web"><collab>Rio Tinto</collab><year>2008</year><source>Mine of the Future</source><comment><ext-link ext-link-type="uri" xlink:href="http://www.riotinto.com/australia/pilbara/mine-of-the-future-9603.aspx">http://www.riotinto.com/australia/pilbara/mine-of-the-future-9603.aspx</ext-link></comment></element-citation></ref><ref id="R16"><element-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Rowland</surname><given-names>J</given-names><suffix>III</suffix></name><name><surname>Harteis</surname><given-names>SP</given-names></name><name><surname>Yuan</surname><given-names>L</given-names></name></person-group><year>2017</year><article-title>The Use of Atmospheric Monitoring Systems in U.S. Underground Coal Mines</article-title><conf-name>SME Annual Conference &#x00026; Expo 2017</conf-name><conf-loc>Denver, CO</conf-loc><publisher-name>Society for Mining, Metallurgy &#x00026; Exploration</publisher-name><publisher-loc>Englewood, CO</publisher-loc></element-citation></ref><ref id="R17"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Sun</surname><given-names>J</given-names></name></person-group><year>2015</year><article-title>Accident analysis and big data and Internet of Things in coal mine</article-title><source>Industry and Mine Automation</source><volume>3</volume><fpage>1</fpage><lpage>5</lpage></element-citation></ref><ref id="R18"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Tan</surname><given-names>Z-L</given-names></name><name><surname>Zhang</surname><given-names>C-L</given-names></name><name><surname>Yu</surname><given-names>J-Z</given-names></name></person-group><year>2013</year><article-title>Research on construction of equipment management system in coal mines based on application of IoT</article-title><source>Coal Mine Machinery</source><volume>6</volume><fpage>137</fpage></element-citation></ref><ref id="R19"><element-citation publication-type="journal"><collab>U.S. Bureau of Mines</collab><year>1984</year><article-title>Underground communications, control and monitoring</article-title><source>USBM Information Circulation</source><fpage>IC8955</fpage></element-citation></ref><ref id="R20"><element-citation publication-type="web"><person-group person-group-type="author"><name><surname>Vella</surname><given-names>H</given-names></name></person-group><year>2015</year><source>Using the Internet of Things to boost efficiency in mining operations</source><comment><ext-link ext-link-type="uri" xlink:href="http://www.mining-technology.com/features/featureusing-the-internet-of-things-to-boost-efficiency-in-mining-operations-4585946/">http://www.mining-technology.com/features/featureusing-the-internet-of-things-to-boost-efficiency-in-mining-operations-4585946/</ext-link></comment></element-citation></ref><ref id="R21"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname><given-names>X</given-names></name><name><surname>Zhou</surname><given-names>T-Z</given-names></name><name><surname>Zhao</surname><given-names>D</given-names></name></person-group><year>2011</year><article-title>Research and realization of real time location system in coal mine based on internet of things</article-title><source>Coal Mine Machinery</source><volume>12</volume><fpage>32</fpage></element-citation></ref><ref id="R22"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname><given-names>Y</given-names></name><name><surname>Zhao</surname><given-names>B-C</given-names></name><name><surname>Chen</surname><given-names>J-F</given-names></name><name><surname>Liu</surname><given-names>Y-L</given-names></name></person-group><year>2011</year><article-title>Internet of things technology and application in coal mine industry</article-title><source>Computer Knowledge and Technology</source><volume>33</volume><fpage>95</fpage></element-citation></ref><ref id="R23"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wei</surname><given-names>Q</given-names></name><name><surname>Zhu</surname><given-names>S</given-names></name><name><surname>Du</surname><given-names>C</given-names></name></person-group><year>2011</year><article-title>Study on key technologies of Internet of Things perceiving mine</article-title><source>Procedia Engineering</source><volume>26</volume><fpage>2326</fpage><lpage>2333</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.proeng.2011.11.2442">https://doi.org/10.1016/j.proeng.2011.11.2442</ext-link></comment></element-citation></ref><ref id="R24"><element-citation publication-type="web"><collab>World Economic Forum</collab><year>2015</year><source>Industrial Internet of Things: Unleashing the Potential of Connected Products and Services</source><comment><ext-link ext-link-type="uri" xlink:href="http://www3.weforum.org/docs/WEFUSA_IndustrialInternet_Report2015.pdf">http://www3.weforum.org/docs/WEFUSA_IndustrialInternet_Report2015.pdf</ext-link></comment></element-citation></ref><ref id="R25"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname><given-names>Y</given-names></name><name><surname>Fu</surname><given-names>G</given-names></name><name><surname>Zhao</surname><given-names>Z</given-names></name><name><surname>Huang</surname><given-names>Z</given-names></name><name><surname>Li</surname><given-names>H</given-names></name><name><surname>Yang</surname><given-names>J</given-names></name></person-group><year>2012</year><article-title>Discussion on application of IOT technology in coal mine safety supervision</article-title><source>Procedia Engineering</source><volume>43</volume><fpage>233</fpage><lpage>237</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.proeng.2012.08.040">https://doi.org/10.1016/j.proeng.2012.08.040</ext-link></comment></element-citation></ref><ref id="R26"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhou</surname><given-names>C</given-names></name><name><surname>Plass</surname><given-names>T</given-names></name><name><surname>Jacksha</surname><given-names>R</given-names></name><name><surname>Waynert</surname><given-names>JA</given-names></name></person-group><year>2015</year><article-title>RF propagation in mines and tunnels</article-title><source>IEEE Antennas and Propagation Magazine</source><volume>57</volume><fpage>88</fpage><lpage>102</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/map.2015.2453881">https://doi.org/10.1109/map.2015.2453881</ext-link></comment></element-citation></ref><ref id="R27"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhou</surname><given-names>C</given-names></name><name><surname>Waynert</surname><given-names>J</given-names></name><name><surname>Plass</surname><given-names>T</given-names></name><name><surname>Jacksha</surname><given-names>R</given-names></name></person-group><year>2013</year><article-title>Attenuation constants of radio waves in lossy-walled rectangular waveguides</article-title><source>Progress In Electromagnetics Research (PIER)</source><volume>142</volume><fpage>75</fpage><lpage>105</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2528/pier13061709">https://doi.org/10.2528/pier13061709</ext-link></comment></element-citation></ref></ref-list></back><floats-group><fig id="F1" orientation="portrait" position="float"><label>Figure 1</label><caption><p>Overview of communication and tracking systems installed in U.S. underground coal mines (<xref rid="R6" ref-type="bibr">Damiano et al., 2014</xref>).</p></caption><graphic xlink:href="nihms930993f1"/></fig><fig id="F2" orientation="portrait" position="float"><label>Figure 2</label><caption><p>Example of IIoT system in coal mines.</p></caption><graphic xlink:href="nihms930993f2"/></fig><fig id="F3" orientation="portrait" position="float"><label>Figure 3</label><caption><p>IIoT system used for the demonstration in the Pittsburgh Experimental Mine.</p></caption><graphic xlink:href="nihms930993f3"/></fig><fig id="F4" orientation="portrait" position="float"><label>Figure 4</label><caption><p>Examples of IoT sensors and actuator.</p></caption><graphic xlink:href="nihms930993f4"/></fig><fig id="F5" orientation="portrait" position="float"><label>Figure 5</label><caption><p>IIoT demonstration setup in (a) a conference room (top) and (b) the Pittsburgh Experimental Mine (bottom).</p></caption><graphic xlink:href="nihms930993f5"/></fig><table-wrap id="T1" position="float" orientation="portrait"><label>Table 1</label><caption><p>Manufacturers of Internet-compatible systems in active U.S. underground coal mines in 2014.</p></caption><table frame="box" rules="all"><thead><tr><th valign="bottom" align="left" rowspan="1" colspan="1">Manufacturer</th><th valign="bottom" align="left" rowspan="1" colspan="1">Technology</th></tr></thead><tbody><tr><td align="left" valign="top" rowspan="1" colspan="1">Mine Site Technologies (MST)</td><td align="left" valign="top" rowspan="1" colspan="1">Node-based</td></tr><tr><td align="left" valign="top" rowspan="1" colspan="1">Strata Worldwide</td><td align="left" valign="top" rowspan="1" colspan="1">Node-based</td></tr><tr><td align="left" valign="top" rowspan="1" colspan="1">American Mine Research (AMR)</td><td align="left" valign="top" rowspan="1" colspan="1">Node-based</td></tr><tr><td align="left" valign="top" rowspan="1" colspan="1">Active Control Technology</td><td align="left" valign="top" rowspan="1" colspan="1">Node-based</td></tr><tr><td align="left" valign="top" rowspan="1" colspan="1">Becker Varis</td><td align="left" valign="top" rowspan="1" colspan="1">Leaky feeder</td></tr></tbody></table></table-wrap></floats-group></article>