<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>On Application of Annealing Algorithm to Birthday Paradox Problem Solving</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Adrianna Benna Faculty of Applied Mathematics Silesian University of Technology Kaszubska 23</institution>
          ,
          <addr-line>44-100 Gliwice</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <fpage>47</fpage>
      <lpage>52</lpage>
      <abstract>
        <p>-In this paper, the idea of solving birthday paradox problem is proposed. Presented method is based on the application of Computational Intelligence. For different parameters the proposed solution has been performed. Research results has been gathered and presented to show possible advantages.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>Computational Intelligence (CI) is a methodology which
involves computing to obtain systems with the ability to
learn specific behavior and act like intelligent one. There are
three main pillars of CI - fuzzy logic, neural networks and
evolutionary computation. These methodologies are usually
inspired by nature but we can find their application in the
real - world problems in which mathematical or traditional
modeling are impossible to employ for a few reasons:
1) process is to complex for traditional modeling or simply
there is no mathematical algorithm available
2) imprecise or incomplete data
3) process might have stochastic nature and the optimal
solution is unknown
CI provides solutions for such problems by creating tools or
systems which can imitate intelligent behavior and have some
human - like abilities, i.e. learning, dealing with new situations
or decision making.</p>
    </sec>
    <sec id="sec-2">
      <title>II. RELATED WORKS</title>
      <p>
        CI methods take inspiration from our natural environment.
They are based on observations of human organism - i.e.
nervous or immune system and animals’ behavior - their
lifestyle, adaptation to new conditions and scrabbling.
They find their applications in many areas like optimization
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], simulation of human decision processes [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], mass service
systems positioning [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], image processing [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]; [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ],
optimization of semantic web services [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], reconstruction of missing
data [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], and more.
      </p>
      <p>
        Algorithm simulating cuckoo search for nests in the forest
was applied to intelligent video frames targeting [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Similarly,
this approach was also implemented for optimal synthesis of
six-bar double dwell linkage problem [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Cuckoos motion
model was also applied to multi objective scheduling problem
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Solving dynamic multidimensional knapsack problem
Copyright c 2016 held by the authors.
was implemented using developed model of fireflies
behavior in the summer [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. There are also methods simulating
changes in genes while adaptation to new environment. These
can be used for sizing of solar thermal electricity panels [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
Similarly CI methods can serve in games, to compose
scenarios and control plot [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Stability and optimization
of these methods is not a trivial problem [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], however it
is possible to modem adequately to the implementation to
achieve sufficient precision in the calculations [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        The first version of simulated annealing algorithm was
presented in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], where the authors proposed its implementation
for optimization purposes. With time computer scientists used
it for various purposes and therefore some improvements
and developments were proposed to simulated annealing to
increase precision of calculations [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Later, this method, and
other bio-inspired algorithms, were reported for efficiency and
precision in widely used minimization of various continues
functions [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. Moreover we can find comments on
restoration of low resolution structures of macromolecules by
application of annealing algorithm [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. Simulated annealing
approach can be used to compose structures of various
populations [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] and cloud-based users verification systems [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>In this article simulated annealing algorithm was used to
solve a birthday paradox, where implemented procedure was
made to calculate possibility of similarity in dates.</p>
    </sec>
    <sec id="sec-3">
      <title>III. BIRTHDAY PARADOX PROBLEM</title>
      <p>Common probability problem, proposed by Richard von
Mises in 1939 can be stated: what is the minimal number n of
people in the randomly chosen group for whom the probability
that some pair of them will share the same birthday is greater
than there is no pair like that? In other words, probability
that there are two people with the same birthday date must be
greater than 50%. The answer is that there must be at least
23 people in the random group. Many people says that it is
surprisingly little number and that is why problem is called
paradox. Pigeonhole principle says that probability reaches
100% when there are at least 366 (or 367 at leap years) people
in the group, so for 50% likelihood there should be 183 (184)
people. The thing is that in the group of 23 people there is
more than 22 comparisons. We have to compare everyone to
everyone, not only one person. This way, for 23 people we
have 23222 = 253 comparisons. Another counter - intuitive
thing is that growth of the probabilities, which depends of
number of people, is not linear. To simplify the problem we
can make a few assumptions:
1) no leap years, every year has 365 days
2) two people have the same birthday when month and day
are the same, year is ignored
3) all dates are equally likely (in fact, more babies are born
in Spring then in other seasons)
4) multiple births are considered as one birthday</p>
    </sec>
    <sec id="sec-4">
      <title>IV. TRADITIONAL APPROACH</title>
      <p>Sometimes it is easier to calculate probability of the
opposite event to ours. In our case, instead of calculating probability
that two people have birthday at the same day, we will
find probability that they don’t. For showing it, we can use
inequality that follows from probability:
p(k; n)
= pk =
= 1 (1
= Qik=11(1
1 ) (1
n
i )
n
2 ) : : : (1
n
kn 1 ) =
(1)
where p(k; n) is the probability that sequence of k elements
(number of people) chosen from n elements (365 days of the
year) will be injective. Let’s note it pk using 1.</p>
      <p>This event is opposite to ours. Because we want our event to
be more probable than 50%, 0 pk 0; 5. We have to find
minimal k for which pk 0; 5.</p>
    </sec>
    <sec id="sec-5">
      <title>By using inequality 1 + x</title>
      <p>we can estimate pk:
ex that is true 8x 2
R,
pk
= e
= e
= (1 1 3615 ) (1 3625 ) : : : (1
e 365 e 3625 : : : e k3651 =
1+2+:3::6+5(k 1) =
k(k 1)
730
k3651 ) =
0; 5, we need to find the minimal k, for which</p>
    </sec>
    <sec id="sec-6">
      <title>To satisfy pk</title>
      <p>we have
k2
k
730
0
The least positive solution of this inequality is
1 + p1 + 4 730 ln 2
2</p>
      <p>Due to shortening operation time of every program, we are
looking for the fastest solutions. This is the main reason for
using CI to solve birthday paradox problem. We want to know
how many people must be in the randomly chosen group to
make sure that probability that there is a pair of people that
have birthday at the same day is greater than 50%. By doing it
on traditional way, we have to take many samples of 1,2,3,...
person group (randomly chosen) and count the probability.
By using CI we can get the minimum number of people much
quicker.
(2)
(3)
(4)</p>
      <p>V. SIMULATED ANNEALING METHOD</p>
      <p>Annealing is a metallurgical process based on heating the
metal up to a high temperature, then keeping it at given
conditions and after that, slow cooling it down. The last stage
of this process is the most important step to achieve final
conditions. It has to be monitored in order to keep the metal in
the state similar to thermodynamic equilibrium, i.e. the state
in which parameters such as volume and pressure are constant
in time. We have three main elements that thermodynamic
equilibrium consists of:
1) thermal equilibrium - constant temperature as a result of
no heat exchange with the environment
2) mechanical equilibrium - constant pressure at any point
3) chemical equilibrium - no chemical reactions, no
changes in the structure of the metal
We can describe the thermodynamics of the whole process by
equation below:</p>
      <p>P (E)</p>
      <p>E
e kT
(5)
where E is the thermodynamic system, T is the absolute
temperature and k is the Boltzmann’s constant.</p>
      <sec id="sec-6-1">
        <title>A. Mathematical Model</title>
        <p>
          Mathematical models are to describe processes and relations
that are present in nature, science and technology by
application of devoted sequences of equations describing modeled
situation in a mathematical way, where we use these equations to
calculate the state of the simulated objects in initial conditions
and convert it after changes in the following operations. These
operations are performed by application of various computer
procedures where we use computational power to perform
numerical experiments simulating the object. In the presented
approach one of important CI methods was implemented to
solve the birthday paradox in a way similar to annealing
processes i.e. discussed for application in verification systems
[
          <xref ref-type="bibr" rid="ref23">23</xref>
          ] or compose structures of various populations [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ].
        </p>
        <p>Simulated Annealing Method (SAM) assumes that
temperature at the beginning of the process is high. It enables frequent
changes in configurations. When the temperature is lower,
there is less possibility for choosing the worst solution so it is
the criterion of acceptation of the solution. Therefore, we use
modified equation (5) in a simplified form:</p>
        <p>P (E)</p>
        <p>e T
= f (x0)
f (x)
where is the difference between the value of fitness function
calculated at the new random solution chosen from
neighborhood x0 and current solution x according to:
For a benchmark tests a simplified fitness condition was
chosen
x
f (x) = (8)
2
This equation is enough to perform experiments since linear
function is enough to simulate controlled growth of numerical
(6)
(7)
data in this experiment. For a new solution we have criterion
of acceptance:
&lt; e T
(9)
where is chosen randomly, and
temperature we can denote as :
2 (0; 1). Change of
Tk+1 = Tk r
(10)
where Tk is the temperature in the k-th iteration and r is
constant given at the beginning, where r 2 (0; 1). For the
benchmark test stop criterion was adapted to the modeled
object.</p>
      </sec>
      <sec id="sec-6-2">
        <title>B. Implemented Algorithm</title>
        <p>In the test method presented in Algorithm 1 was
implemented, for which we can also present a block diagram show
in Fig. 1. Firstly we establish initial values and random initial
solution x. The list date was created to remember x and next
solutions which satisfy our algorithm. When new solution, y,
gratify condition (9), we add it to the list date. After every
iteration we check if there are two the same numbers in the
list date. If so, we break our loop and save the length of the
list in the next list average. After clearing date, we are doing
the same as long as length of average is less then or equal to
number of samples in each iteration which was given at the
beginning. When average is complete, we take the average
value of all elements from average and that is our result for
given parameters.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>VI. BENCHMARK TESTS</title>
      <p>Results of numerical experiments are shown in Tab. II
Tab. III. For these results changes of probability that among
selected population are people for whom birthday paradox can
be encountered are presented in Tab. I and depicted in Fig. 2.
For each set of parameters, 28 results has been received and
then by taking the average of them, we get out final result
number of people. Outcomes presented in Tab. II - Tab. III
are very close to expected 23. In two cases we get exactly
this number - presented in Tab. III for parameters T = 1050,
p = 103, r = 0; 84, pr = 850 and T = 1049, p = 103,
r = 0; 83, pr = 850, as we can see, very similar to each
other.</p>
      <sec id="sec-7-1">
        <title>A. Conclusions</title>
        <p>We can state parameters for which, by rounding out we
get the expected value for our paradox - 23. As a fitness
function linear one was chosen but it turn out that for power
and exponential function we obtain similar results. The most
important was choosing optimal parameters. The greatest
impact for value of result have initial temperature and radius
of neighbourhood - along with their decrease, values of results
are also lower. Drop of number of samples in each iteration
causes bigger range of received solutions. What is surprising,
different values of the temperature change, don’t change the
results.</p>
        <p>In this article simulated annealing method was used to
solve a problem of birthday paradox. This is definitely better
way to obtain solution than traditional counting probability by
taking many samples of 1,2,3,... person groups. By using CI
methods,we get the solution easier and what is very important,
faster. Benchmark tests have been performed to indicate the
best paramaters for our algorithm.
22
23
22
23
22
23
23
23
23
22
23
23
23
23
22
23
23
23
22
23
23
23
23
23
23
22
23
23</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          <article-title>´niak, “Fitness function for evolutionary computation applied in dynamic object simulation and positioning</article-title>
          ,”
          <source>in IEEE SSCI 2014: 2014 IEEE Symposium Series on Computational Intelligence - CIVTS 2014: 2014 IEEE Symposium on Computational Intelligence in Vehicles and Transportation Systems, Proceedings. 9-12 December</source>
          , Orlando, Florida, USA: IEEE,
          <year>2014</year>
          , pp.
          <fpage>108</fpage>
          -
          <lpage>114</lpage>
          , DOI: 10.1109/CIVTS.
          <year>2014</year>
          .
          <volume>7009485</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          ´niak,
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kosmider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , and E. Tramontana, “
          <article-title>A novel approach toward x-ray images classifier</article-title>
          ,”
          <source>in Proceedings of IEEE Symposium Series on Computational Intelligence (SSCI)</source>
          .
          <volume>8</volume>
          - 10 December, Cape Town, RSA: IEEE,
          <year>2015</year>
          , pp.
          <fpage>1635</fpage>
          -
          <lpage>1641</lpage>
          , DOI: 10.1109/SSCI.
          <year>2015</year>
          .
          <volume>230</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          ´niak, M. Gabryel,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Nowicki</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Nowak</surname>
          </string-name>
          , “
          <article-title>An application of firefly algorithm to position traffic in nosql database systems</article-title>
          ,
          <source>” Advances in Intelligent Systems and Computing - KICSS'2014</source>
          , vol.
          <volume>416</volume>
          , pp.
          <fpage>259</fpage>
          -
          <lpage>272</lpage>
          ,
          <year>2016</year>
          , DOI: 10.1007/978-3-
          <fpage>319</fpage>
          -27478-2
          <fpage>18</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          , M. Woz´niak,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , E. Tramontana, and R. Damasˇevic˘ius, “
          <article-title>Is the colony of ants able to recognize graphic objects?”</article-title>
          <source>Proceedings of International Conference on Information and Software Technologies (ICIST)</source>
          , vol.
          <volume>538</volume>
          , pp.
          <fpage>376</fpage>
          -
          <lpage>387</lpage>
          ,
          <year>2015</year>
          , DOI: 10.1007/978-3-
          <fpage>319</fpage>
          -24770- 0
          <fpage>33</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          ´niak,
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gabryel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Nowicki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , and E. Tramontana, “
          <article-title>Can we preprocess 2d images using artificial bee colony?”</article-title>
          <source>Proceedings of International Conference on Artificial Intelligence and Soft Computing (ICAISC)</source>
          , vol.
          <volume>9119</volume>
          , pp.
          <fpage>660</fpage>
          -
          <lpage>671</lpage>
          ,
          <year>2015</year>
          , DOI: 10.1007/978-3-
          <fpage>319</fpage>
          -19324-3
          <fpage>59</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Chifu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Pop</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Salomie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Suia</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Niculici</surname>
          </string-name>
          , “
          <article-title>Optimizing the semantic web service composition process using cuckoo search,” in IDC'2012 - Studies in Computational Intelligence</article-title>
          , no.
          <source>382</source>
          . Springer,
          <year>2012</year>
          , pp.
          <fpage>93</fpage>
          -
          <lpage>102</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          ´niak, D. Połap,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Nowicki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , G. Pappalardo, and E. Tramontana, “
          <article-title>Novel approach toward medical signals classifier</article-title>
          ,”
          <source>in Proceedings of IEEE International Joint Conference on Neural Networks (IJCNN)</source>
          .
          <volume>12</volume>
          -
          <issue>17</issue>
          <year>July</year>
          , Killarney, Ireland: IEEE,
          <year>2015</year>
          , pp.
          <fpage>1924</fpage>
          -
          <lpage>1930</lpage>
          , DOI: 10.1109/IJCNN.
          <year>2015</year>
          .
          <volume>7280556</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G. S.</given-names>
            <surname>Walia</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Kapoor</surname>
          </string-name>
          , “
          <article-title>Intelligent video target tracking using an evolutionary particle filter based upon improved cuckoo search,” Expert Systems with Applications</article-title>
          , vol.
          <volume>41</volume>
          , no.
          <issue>14</issue>
          , pp.
          <fpage>6315</fpage>
          -
          <lpage>6326</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bulatovic</surname>
          </string-name>
          ´, S. Bordevic´, and
          <string-name>
            <given-names>V.</given-names>
            <surname>Dordevic</surname>
          </string-name>
          ´, “
          <article-title>Cuckoo search algorithm: a metaheuristic approach to solving the problem of optimum synthesis of a six-bar double dwell linkage</article-title>
          ,
          <source>” Mechanism and Machine Theory</source>
          , vol.
          <volume>61</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>K.</given-names>
            <surname>Chandrasekaran</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Simon</surname>
          </string-name>
          ,
          <article-title>“Multi-objective scheduling problem: hybrid approach using fuzzy assisted cuckoo search algorithm,” Swarm and Evolutionary Computation</article-title>
          , vol.
          <volume>5</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Baykasog</surname>
          </string-name>
          <article-title>˘lu and</article-title>
          <string-name>
            <surname>F. B. Ozsoydan</surname>
          </string-name>
          , “
          <article-title>An improved firefly algorithm for solving dynamic multidimensional knapsack problems,” Expert Systems with Applications</article-title>
          , vol.
          <volume>41</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>3712</fpage>
          -
          <lpage>3725</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Cabello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cejudo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Luque</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ruiz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Deb</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Tewari</surname>
          </string-name>
          , “
          <article-title>Optimization of the sizing of a solar thermal electricity plant: Mathematical programming versus genetic algorithms,” in CEC'2009 Proceedings</article-title>
          . IEEE,
          <year>2009</year>
          , pp.
          <fpage>1193</fpage>
          -
          <lpage>1200</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          , M. Woz´niak, C. Napoli, and E. Tramontana, “Is swarm intelligence able to create mazes?”
          <source>International Journal of Electronics and Telecommunications</source>
          , vol.
          <volume>61</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>305</fpage>
          -
          <lpage>310</lpage>
          ,
          <year>2015</year>
          , DOI: 10.1515/eletel-2015-0039.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          , M. Woz´niak, C. Napoli, and E. Tramontana, “
          <article-title>Real-time cloud-based game management system via cuckoo search algorithm</article-title>
          ,”
          <source>International Journal of Electronics and Telecommunications</source>
          , vol.
          <volume>61</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>333</fpage>
          -
          <lpage>338</lpage>
          ,
          <year>2015</year>
          , DOI: 10.1515/eletel-2015-0043.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Clerc</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Kennedy</surname>
          </string-name>
          , “
          <article-title>The particle swarmexplosion, stability and convergence in a multidimensional complex space</article-title>
          ,
          <source>” IEEE Transactions on Evolutionary Computation</source>
          , vol.
          <volume>6</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>58</fpage>
          -
          <lpage>73</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>I.</given-names>
            <surname>Fister</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X. S.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Brest</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and I. F.</given-names>
            <surname>Jr</surname>
          </string-name>
          ., “
          <article-title>Modified firefly algorithm using quaternion representation,” Expert Systems with Applications</article-title>
          , vol.
          <volume>40</volume>
          , no.
          <issue>18</issue>
          , pp.
          <fpage>7220</fpage>
          -
          <lpage>7230</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kirkpatrick</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Vecchi</surname>
          </string-name>
          , “
          <article-title>Optimization by simulated annealing,” Science</article-title>
          , vol.
          <volume>220</volume>
          , no.
          <issue>4598</issue>
          , pp.
          <fpage>671</fpage>
          -
          <lpage>680</lpage>
          ,
          <year>1983</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>L.</given-names>
            <surname>Ingber</surname>
          </string-name>
          , “
          <article-title>Very fast simulated re-annealing</article-title>
          ,
          <source>” Mathematical and Computer Modelling</source>
          , vol.
          <volume>12</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>967</fpage>
          -
          <lpage>973</lpage>
          ,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          <article-title>´niak and D</article-title>
          . Połap, “
          <article-title>On some aspects of genetic and evolutionary methods for optimization purposes</article-title>
          ,”
          <source>International Journal of Electronics and Telecommunications</source>
          , vol.
          <volume>61</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>7</fpage>
          -
          <lpage>16</lpage>
          ,
          <year>2015</year>
          , DOI: 10.1515/eletel-2015-0001.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Corana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Marchesi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Martini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Ridella</surname>
          </string-name>
          , “
          <article-title>Minimizing multimodal functions of continuous variables with the simulated annealing algorithm</article-title>
          ,
          <source>” ACM Transactions on Mathematical Software</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>262</fpage>
          -
          <lpage>280</lpage>
          ,
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D.</given-names>
            <surname>Svergun</surname>
          </string-name>
          , “
          <article-title>Restoring low resolution structure of biological macromolecules from solution scattering using simulated annealing,”</article-title>
          <source>Biophysical Journal</source>
          , vol.
          <volume>76</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>2879</fpage>
          -
          <lpage>2886</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>I.</given-names>
            <surname>Dupanloup</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schneider</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Excoffier</surname>
          </string-name>
          , “
          <article-title>A simulated annealing approach to define the genetic structure of populations,” Molecular Ecology</article-title>
          , vol.
          <volume>11</volume>
          , no.
          <issue>12</issue>
          , pp.
          <fpage>2571</fpage>
          -
          <lpage>2581</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          ´niak, D. Połap, G. Borowik, and
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , “
          <article-title>A first attempt to cloud-based user verification in distributed system</article-title>
          ,”
          <source>in Proceedings of Asia-Pacific Conference on Computer Aided System Engineering (APCASE)</source>
          .
          <volume>14</volume>
          -
          <issue>16</issue>
          <year>July</year>
          , Quito, Ecuador: IEEE,
          <year>2015</year>
          , pp.
          <fpage>226</fpage>
          -
          <lpage>231</lpage>
          , DOI: 10.1109/APCASE.
          <year>2015</year>
          .
          <volume>47</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>