<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Choosing the Method of Finding Similar Images in the Reverse Search System</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleh Veres</string-name>
          <email>Oleh.M.Veres@lpnu.ua1</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bohdan Rusyn</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anatoliy Sachenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ihor Rishnyak</string-name>
          <email>rishnyakiv@gmail.com4</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Karpenko Physico-Mechanical Institute of the NAS</institution>
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Reseach Institute for Intelligent Computer Systems, Ternopil National Economic University</institution>
          ,
          <addr-line>Ternopil</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The article describes the research of image analysis methods. The methods of indexing images for the search of duplicate images, as well as methods for finding similar images based on the definition of key points are described. The prototype of the system was created, and testing of the described methods was carried out.</p>
      </abstract>
      <kwd-group>
        <kwd>analysis</kwd>
        <kwd>detector</kwd>
        <kwd>descriptor</kwd>
        <kwd>image</kwd>
        <kwd>key point</kwd>
        <kwd>method</kwd>
        <kwd>pixel</kwd>
        <kwd>hashing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Introduction
Graphic images are no less important than text, and sometimes it is impossible to
reveal a topic without them. In addition, some types of images themselves are
copyright objects and are protected by the copyright law of Ukraine. But this does not
prevent you from copying or scanning images and publishing them for your own. In
order to find duplicates or borrowing images in documents, it is necessary to
determine which graphic elements are considered similar. Obviously, such are full
duplicates that can in turn be reduced or stretched. When copying other people's images, a
plagiarist can resort to various tricks, but the basic problem as with other forms of
borrowing – do not visually similar to the original and keep its informative value. The
modifications include changing the brightness, contrast, color gamut (putting the
image in grayscale), etc. Among the modifications that affect the information content of
the image, but can also be used in some cases is image cropping or gluing of several
elements into one.</p>
      <p>On the one hand, such images are not borrowings, although they are completely
identical, and on the other hand, the value of an image may be precisely in the context
of its use, if the author used this illustration in the possible set of solutions. A
computer program is not able to assess the content of the image and make a conclusion
about the licenses under which this image is licensed, so the final decision has to be
made by an expert who checks the work using the program.</p>
      <p>The Analysis of Recent Researches and Publications</p>
      <p>
        Among approaches to the processing of graphic information into two main areas:
the definition of key points on the image and the use of locally-sensitive hashing can
be identified. These methods can be combined and generally give good results in the
search for similar images. First, the key points in the image are determined, and then
the image is divided into small fragments. By performing indexing of each fragment
separately, an array of signatures that are responsible for the image as a whole is
received. Using Hamming's measure [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], the same type of image was found, even with
90% cropping of the image. The described method covers the maximum number of
possible modifications that may be affected by the image. However, there is one
problem - the high probability of false results. The method finds an image that is partially
similar to a given one, rather than a duplicate with the highest possible accuracy.
      </p>
      <p>
        A. O. Biloshchitsky and O. V. Dichtyarenko [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] developed their own way of
determining the key features of the image. Unlike the definition of key points, in this
case the main features of the image were described using vectors. The resulting sets of
vectors were the basis for creating an image signature; for the hash, a locally-sensitive
minHash function was used. The method is named min-Hash and tf-idfWeighting.
The main task is to quickly locate similar images in large data sets. This method finds
similar images, even if it is different images of the same subject, but also has a lot of
false positives.
      </p>
      <p>The most popular are three methods for indexing images to find duplicate images:
Average Hash; Difference Hash; Hash Perceptual.</p>
      <p>
        To find similar images, the method is used to select key points. A key point, or
point feature of an image, is a point whose placement stands out against the
background of any other point. As features of the point of the image for most modern
algorithms a square box is taken, the size of which is 5 by 5 pixels. The process of
determining these points in the image is achieved using the method of using a detector and
a descriptor. A detector is a method for determining a key point that allocates it to the
background of an image. In turn, the descriptors should ensure the invariance of
finding the correspondence between the key points of image transformation. A descriptor
is a method which allows removing the key points of both images and comparing
them with each other. In the case of modifications to research objects, the detector
helps find the same key points on both objects [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        Key points must have a number of features [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]: the difference – each point must be
clearly distinguished from others and be unique in its area; invariance – the definition
of a key point should be independent of affine transformations; stability – the
allocation of such features should be resistant to noise and modifications; interpretation –
key points should be allocated so that they can be used for the analysis of
correspondences and extraction of the necessary information on their basis.
      </p>
      <p>So, to find snippets of an image or similar content of the illustrations – it is
necessary to experiment with the methods of determining key points, each of which also
has its own set of advantages and disadvantages.</p>
      <p>The main methods used in the construction of detectors and descriptors are FAST,
SIFT, ORB, AKAZE, BRIEF, BRISK .</p>
      <p>
        FAST (Features from Accelerated Segment Test). For a point-candidate P, using
the Brezenham algorithm, a circle of 16 pixels is constructed. The point is an angle if
there are N adjacent pixels on a circle whose intensity is greater than IP + t or the
intensity of all less than IP - t, where IP is the intensity of the point P, it is the limiting
value. Next, it is necessary to compare the intensity of the vertical and horizontal
points on the circle with the intensity at the point P. If for 3 of these points the
condition IPi &gt; (IP + t) or IPi &lt; (IP + t), i = 1, ... , 4, then a full test is conducted for all 16
points [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        SIFT (Scale Invariant Feature Transform). A variable-size space is created, which
calculates the functions LoG (Laplacian of Gaussian) with a different smoothing
parameter. A point is considered key if it is a local extremum of the Hawsian difference.
After the set of expected key points are specified (the points with a small contrast at
the boundaries of objects are deleted) and their orientation is determined. For this
purpose, a histogram of gradients is constructed in this area, the direction chosen
corresponding to the maximum component of the histogram is selected. Points are
assigned to all directions that correspond to the values of the components of the
histogram, which are larger than the given threshold. Invariant with respect to landslides,
rotations, changes in scale [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        ORB (Oriented FAST and Rotated BRIEF). Uses FAST to find key points. FAST
takes the threshold value of the intensity between the central pixel and the area around
the pixels around it as a parameter. The ORB [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] uses the FAST-9 modification (the
circle radius with the pixels around it is assumed to be 9), since it was the most
efficient in terms of performance. After detecting potential key points, Harris's corner
detector is used to refine them. To get N key points, first a low threshold in order to
get more than N points is used, then they are arranged with the help of the Harris
metric and the first N points are selected. To construct the descriptor of the points
obtained, a modification of the BRIEF, invariant to the rotation due to additional
transformations is used [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        AKAZE (Accelerated KAZE). Searching for key points is based on non-linear
image scaling using the FED (Fast Explicit Diffusion) scheme. As a binary descriptor,
M-LDB (Modified-Local Difference Binary) is used. It is currently considered one of
the best [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        BRIEF (Binary Robust Independent Elementary Features). A descriptor that
allows representing the original image in the form of binary strings is constructed for
domains. The smoothed image is divided into sections and for them a unique set of
points nd (x, y) is chosen. Then they compare intensity. As a result, we get a binary
string of dimension ND (128, 256 or 512). The obtained descriptors are compared
using Hamming's metric [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        BRISK (Binary Robust Invariant Scalable Keypoints). Gaussian smoothing is
applied to the circular areas of potential key points. To determine the direction of the
key point, the amount of local gradients is used [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>The main requirements for a method for finding identical images, more precisely
for the results of his work, are the maximum accuracy and minimum errors. The
information system must not only find all explicit duplicates (those that have changed
only the colors, sizes or format), but also "similar" images, while minimizing the
amount of work for the system operator.
3</p>
      <p>Analysis of methods for finding identical images</p>
      <p>
        For the choice of methods for analysis and the search for identical images, it is
necessary to explore the methods of indexing images; definition of a measure of
similarity; methods used in the construction of detectors and descriptors. The result of the
research is the basis for the design of an information reverse image search system
[1219]. To conduct research, test modules for the program realization of the prototype of
the information system of reverse pattern search was created based on their own data
sample [
        <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23 ref24 ref25 ref26 ref27">20-27</xref>
        ].
      </p>
      <p>To obtain exactly identical, but not similar images, the method of hashing for the
average value was analyzed, and for the determination of similarity dimensions, the
Hamming distance was used. The main objective of the study is to determine the
threshold function, which allows asserting that the images are complete duplicates.</p>
      <p>A picture from the database is chosen and the result is shown in (Fig. 1-2).
a)
a)</p>
      <p>On the right there is the image of the user, and on the left - the image found in the
database, the window below shows the Hamming distance in percentage terms. For
identical images, Hemming's distance is 100% – the image is found and it is
completely identical (Fig. 1a).</p>
      <p>Now the task will be complicated, the drawing in black and white with shades of
gray is completed, after which, the experiment is repeated (Fig. 1b). The system
reported minor changes, but still chose the correct image, showing a deviation of only
2%.</p>
      <p>Now the brightness and partially paint are changed (Fig. 2a). Hamming distance
has decreased by 10% to 88%, but the system has found and correctly identified the
need.</p>
      <p>In the case of different images (Fig. 2b), as a result of the program's work, the most
similar image was found, but the percentage of similarity has fallen by as much as
32%, indicating that it is impossible to speak of the image as identical.</p>
      <p>Consequently, it has been experimentally proved that the threshold function should
be set between 68-88%, so the smaller this figure, the more exact similarity is
determined, (based on the average colors) of images, rather than full duplicates.
4</p>
      <p>Analysis of methods working with control points</p>
      <p>In order to find similar content in the image, a comparative analysis of the methods
that work with the key points, namely: ORB, BRISK, AKAZE, FAST, respectively,
based on the results of the classifier will be conducted. The size of the inbound
images was compressed to 128, 256, and 512 pixels on each side. Input images are
divided into three groups: 30 images with a lot of details (Tabl. 1); 30 images with a
monitor set (Tabl. 2); 30 portrait photographs of people (Tabl. 3).</p>
      <p>To submit the results, the following abbreviations are used:
 PK – а total number of key points found;
 TPK – the total amount of time spent searching for key points (ms);
 TD – descriptor time (ms);
 S – the average time to search for a single key point and calculate its descriptor,
which looks like:</p>
      <p>S = (TPK + TD) / PK (ms);
(1)
 T – total time spent in the program in seconds (s).</p>
      <p>Analysis of the results of the first group. All images in this group have a large
number of parts located in different places. Information on evaluating methods for
various image extensions is provided in Table 1.</p>
      <p>The largest number of key points was found using the BRISK method, this number
increases in geometric progression, respectively, the higher the resolution of the
image under study, the more time will be needed for its processing.</p>
      <p>Method
Method</p>
      <p>PK
10444
11768
5041
6568
12311
26767
7286
15568
15719
78395
8688
32210</p>
      <p>PK
1409
2178
995
1024
1661
4954
1438
2427</p>
      <p>The ORB method was not too sensitive to resizing the image within the selected
range, its complexity increases in arithmetic progression. The shortest execution time
for the AKAZE descriptor. The FAST method takes the least time to search for
similar images.</p>
      <p>Analysis of the results of the second group. 30 illustrations of a monitor image are
taken, each of which will represent images in different windows of different
programs. This group for various image extensions will be analyzed (Tabl. 2).</p>
      <p>S
0,5214
2,1269
0,4166
0,6524
0,5327
0,9591
0,5218
0,3879
0,5234
0,3415
0,7272
0,2767</p>
      <p>S
0,3187
2,7231
0,5206
0,6514
0,3278
1,2276
0,6465
0,3996</p>
      <p>T</p>
      <p>T</p>
      <p>The number of key points in the sum of all images significantly decreased
compared to the first group, which affected the program's run time, the descriptor, and the
cost, respectively, the less the key points generate any algorithm, the less time it takes
to process them. All time costs are proportional to the number of key points. The
results of the algorithms practically do not differ from the previous group, this indicates
that their work does not depend on the input data.</p>
      <p>Analysis of the results of the third group. For the last group, portraits of 30 people
were selected (Tabl. 3).</p>
      <p>The average number of generating key points is greater than the same average
number of points in the second group, and less than the first. If each algorithm is
taken separately, their results for each group are proportional. Consequently, the
program's running time depends on the method selected and the number of key points it
detects.</p>
      <p>PK</p>
      <p>To develop a reverse search information system project, a threshold function was
searched for duplicate searches, using hashing on average and Hemming's measure.
On the basis of the experimental path, it can assumed that the threshold function
should be chosen between 68-88%, accordingly, the smaller this indicator, the more it
will determine exactly the similar (based on average colors) of images, rather than full
duplicates. Also similar images based on key points were tested by algorithms for
finding similar ones. The main element in this study was the time taken to find the
key points and compare them to the similarity of the methods: ORB, BRISK, AKAZE
and FAST. The worst was the BRISK algorithm, because the number of points
generated by them was considerably larger, which led to a rapid increase in processing
time. Experimentally it was discovered that the image size of 256x256 pixels is the
most optimal for its processing.
6</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. L.
          <string-name>
            <surname>Shapiro</surname>
            ,
            <given-names>G. Stockman.</given-names>
          </string-name>
          <article-title>Computer vision</article-title>
          . Washington University. -
          <volume>752</volume>
          р. (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>A. Biloshchytsʹkyy</surname>
            ,
            <given-names>O. Dikhtyarenko.</given-names>
          </string-name>
          <article-title>The effectiveness of methods for finding matches in texts</article-title>
          .
          <source>Managing the development of complex systems</source>
          , 14, Р.
          <fpage>144</fpage>
          -
          <lpage>147</lpage>
          . (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>N. S.</given-names>
            <surname>Shozda</surname>
          </string-name>
          .
          <article-title>Searching for textures in large databases</article-title>
          .
          <source>Informatics, Cybernetics and Computing. Donetsk. Ukraine. n. 39</source>
          , - P.
          <fpage>182</fpage>
          -
          <lpage>187</lpage>
          . (
          <year>2002</year>
          ).
          <article-title>(in Ukrainian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>A. Biloshchytsʹkyy</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Dikhtyarenko</surname>
          </string-name>
          .
          <article-title>Optimize the match search system by using algorithms for locally sensitive hashing of text data sets. Managing the development of complex systems</article-title>
          . -- №
          <fpage>19</fpage>
          . - Р.
          <fpage>113</fpage>
          -
          <lpage>117</lpage>
          . (
          <year>2014</year>
          ).
          <article-title>(in Ukrainian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>P. F.</given-names>
            <surname>Alcantarilla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Nuevo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bartoli</surname>
          </string-name>
          .
          <article-title>Fast Explicit Diffusion for Accelerated Features in Nonlinear Scale Spaces</article-title>
          .
          <source>British Machine Vision Conference (BMVC)</source>
          , (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>S.</given-names>
            <surname>Grewenig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Weickert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Schroers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bruhn</surname>
          </string-name>
          .
          <article-title>Cyclic Schemes for PDEBased Image Analysis</article-title>
          .
          <source>International Journal of Computer Vision</source>
          . (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>E.</given-names>
            <surname>Rublee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rabaud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Konolige</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. Bradski.</surname>
          </string-name>
          <article-title>ORB: an efficient alternative to SIFT or SURF</article-title>
          ,
          <source>Computer Vision</source>
          . (ICCV), IEEE International Conference,
          <volume>2564</volume>
          -
          <fpage>2571</fpage>
          . (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>E.</given-names>
            <surname>Rosten</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Drummond</surname>
          </string-name>
          .
          <article-title>Machine learning for high-speed corner detection</article-title>
          .
          <source>9th European Conference on Computer Vision</source>
          (ECCV). - P.
          <fpage>430</fpage>
          -
          <lpage>443</lpage>
          . (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>X.</given-names>
            <surname>Yang</surname>
          </string-name>
          , K. T. Cheng. LDB:
          <article-title>An ultra-fast feature for scalable augmented reality</article-title>
          .
          <source>In IEEE and ACM Intl. Sym. on Mixed and Augmented Reality (ISMAR)</source>
          . - P.
          <fpage>49</fpage>
          -
          <lpage>57</lpage>
          . (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>M. Calonder</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Lepetit</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Strecha</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Fua</surname>
          </string-name>
          .
          <source>BRIEF: Binary Robust Independent Elementary Features. 11th European Conference on Computer Vision (ECCV)</source>
          ,
          <fpage>778</fpage>
          -
          <lpage>792</lpage>
          . (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>S.</given-names>
            <surname>Leutenegger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Chli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Siegwart</surname>
          </string-name>
          . BRISK:
          <string-name>
            <surname>Binary Robust Invariant Scalable Keypoints. Zurich</surname>
          </string-name>
          . -- P.
          <fpage>2548</fpage>
          -
          <lpage>2555</lpage>
          . (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Time Dependence of the Output Signal Morphology for Nonlinear Oscillator Neuron Based on Van der Pol Model</article-title>
          .
          <source>In: International Journal of Intelligent Systems and Applications</source>
          ,
          <volume>10</volume>
          ,
          <fpage>8</fpage>
          -
          <lpage>17</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hasko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuchkovskiy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Process analysis in electronic content commerce system</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          ,
          <string-name>
            <surname>CSIT</surname>
          </string-name>
          <year>2015</year>
          ,
          <volume>120</volume>
          -
          <fpage>123</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Analysis features of information resources processing</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>124</fpage>
          -
          <lpage>128</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Teslyuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beregovskyi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Denysyuk</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teslyuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Development and Implementation of the Technical Accident Prevention Subsystem for the Smart Home System</article-title>
          .
          <source>In: International Journal of Intelligent Systems and Applications</source>
          ,
          <volume>10</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Tkachenko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tkachenko</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Izonin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsymbal</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Learning-based image scaling using neural-like structure of geometric transformation paradigm</article-title>
          .
          <source>In: Studies in Computational Intelligence</source>
          ,
          <volume>730</volume>
          , Springer Verlag,
          <fpage>537</fpage>
          -
          <lpage>565</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Peleshko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Izonin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Image Superresolution via Divergence Matrix and Automatic Detection of Crossover</article-title>
          . In:
          <source>International Journal of Intelligent Systems and Application</source>
          ,
          <volume>8</volume>
          (
          <issue>12</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Rashkevych</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vynokurova</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Izonin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lotoshynska</surname>
          </string-name>
          , N.:
          <article-title>Single-frame image super-resolution based on singular square matrix operator</article-title>
          .
          <source>In: IEEE 1th Ukraine Conference on Electrical and Computer Engineering (UKRCON)</source>
          ,
          <fpage>944</fpage>
          -
          <lpage>948</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutsyk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lysak</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukeniuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Lossless Image Compression in the Remote Sensing Applications In: Proc. of the IEEE First Int</article-title>
          .
          <source>Conf. on Data Stream Mining &amp; Processing (DSMP)</source>
          ,
          <fpage>195</fpage>
          -
          <lpage>198</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veres</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
          </string-name>
          , H.:
          <article-title>The Risk Management Modelling in Multi Project Environment.</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>32</fpage>
          -
          <lpage>35</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Smart Data Integration by Goal Driven Ontology Learning</article-title>
          .
          <source>In: Advances in Big Data. Advances in Intelligent Systems and Computing</source>
          . - Springer International Publishing AG 2017. P.
          <volume>283</volume>
          -
          <fpage>292</fpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Information resources processing using linguistic analysis of textual content</article-title>
          .
          <source>In: Intelligent Data Acquisition and Advanced Computing Systems Technology and Applications</source>
          , Romania,
          <fpage>573</fpage>
          -
          <lpage>578</lpage>
          , (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Eckel B. Philosophy Java</surname>
          </string-name>
          :
          <article-title>Programmer's Library</article-title>
          . St.Petersburg: Peter. -
          <volume>980</volume>
          p. (
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Mashnin</surname>
            <given-names>T.</given-names>
          </string-name>
          <article-title>JavaFX 2.0. Development of RIA applications</article-title>
          . - BHV-Petersburg,
          <volume>320</volume>
          p.
          <article-title>(in Russia)</article-title>
          . (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Bernard</surname>
            <given-names>V. H. JDBC</given-names>
          </string-name>
          : Java and
          <string-name>
            <given-names>Databases. M .</given-names>
            :
            <surname>Izd. Lori</surname>
          </string-name>
          . -
          <volume>324</volume>
          p.
          <article-title>(in Russia) (</article-title>
          <year>1999</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Gamma</surname>
            <given-names>E.</given-names>
          </string-name>
          <article-title>Methods of object-oriented design</article-title>
          .
          <source>Design Patterns. St. Petersburg: Publishing House "Peter"</source>
          . 366 p.
          <article-title>(in Russia) (</article-title>
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <given-names>G</given-names>
            <surname>Shildt</surname>
          </string-name>
          .,
          <string-name>
            <surname>Holmes</surname>
            <given-names>D.</given-names>
          </string-name>
          <article-title>The Art of Programming on JAVA</article-title>
          . - M .:
          <string-name>
            <given-names>Izd. House</given-names>
            <surname>Williams</surname>
          </string-name>
          .
          <volume>336</volume>
          p.
          <article-title>(in Russia) (</article-title>
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>