<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Puzzle Form Images: How Does It Works?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Arkadiusz Drogon´</string-name>
          <email>arkadiusz.drogon@interia.pl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Karol Duda</string-name>
          <email>kmj.duda@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Barbara Smolen´</string-name>
          <email>smolen94@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Faculty of Applied Mathematics, Silesian Univeristy of Technology</institution>
          ,
          <addr-line>Gliwice, Poland, Kaszubska 23</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>-Image processing techniques are important algorithm both in applied mathematics and various aspects of computer science. The aim of this paper is to present the algorithm composing an image from the parts. We consider two cases. First, when the image is divided only vertically, and second, when the image is divided vertically and horizontally. We discuss our algorithm and also present appropriate statistics associated with the program's running time. Index Terms-image processing, Mathematica, images, composing algorithm</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>I. INTRODUCTION</p>
      <p>In today’s world, computers play a very important role.
They are used in every area of life and science. Today,
artificial intelligence (AI) is one of the major directions of
science. These methods combined with developing computer
technology create enormous opportunities for science.</p>
      <p>Nowadays, image processing is among rapidly growing
technologies. It forms core research area within engineering
and computer science disciplines too. Digital image processing
techniques help in manipulation of the digital images by
using computers. These techniques have many advantages over
analog image processing because computer allows a much
wider range of algorithms to be applied to the input data. For
example, pattern recognition uses algorithms such as neural
networks, which are based on machine learning.</p>
      <p>
        A very wide introduction to various image processing
techniques was presented in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Similarly in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] was
presented a discussion on positive aspects of algorithms, their
complexity and implementations. In this book we can find
many interesting algorithms for vision processing by the use
of computer programming. In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] were presented fundamental
of image processing, while in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] was given a discussion on
possible applications. In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] were presented geometric aspects
of image processing, which are important for contour matching
and therefore composition of images. A review on application
of neural networks and their efficiency in image processing
was presented in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] was discussed how to compose a
detection algorithm which classifies shapes of bacterias from
input images. In [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] was proposed a composition of
techniques for detection of peel defects from images. While in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
various models of computational intelligence were composed
Copyright held by the author(s).
to detect obstacles on the way from camera images, and
therefore advise users of the system about potential dangers
on the road. In [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] was discussed an application of kernel
tracking methodology for reconstruction of objects from input
images. Recent advances in multi objective image processing
were presented in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Texture modeling for differences in
pattern were discussed in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], where a model of oscillations
was used for matching objects details from input images. In
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] was presented how to use fuzzy systems to for recognition
from images, and in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] a discussion on nonlocal operators
was presented for image processing.
      </p>
      <p>Techniques of image processing use mathematical
operations on matrices of images (because as we will see in section
II, every digital image can be represented as a matrix). For
example in application of filters in image processing, the
values of points from its environment are taken into account
in calculating the new value of the point. In this paper we
present a proposal of the algorithm composing an image from
the parts. The paper presents a simulation on composing
puzzles from various images by the use of our method, where
we compare significant pixels that match object shapes. We
compare some features that describe complexity of this method
and discuss its potential benefits.</p>
    </sec>
    <sec id="sec-2">
      <title>II. BASICS</title>
      <p>The images we see on internet pages and the photos we
take with our mobile phones are examples of digital images.
It is possible to represent this kind of images using matrices.
Mathematically the image can be seen as the matrix
3
f12 : : : f1M
f22 : : : f2M</p>
      <p>... . . . ...
fN2 : : : fNM
where fij ; i = 1; : : : ; N; j = 1; : : : ; M represent colors
of the pixels, N and M are sizes of image (respectively
vertical and horizontal) given in pixels. Generally fij can be
the vectors describing color in certain system (for example
RGB). But in this paper we assume that for all images every
fij is a number, which describe color in a greyscale, where
set f0; 1; : : : ; 255g is transformed into f0; : : : ; 1g. By this
representation it is obvious, that we can operate on image
using mathematical operations on its matrix.</p>
    </sec>
    <sec id="sec-3">
      <title>III. COMPOSITION ALGORITHM</title>
      <p>Our algorithm is based on comparison of border pixels
of components of image. As an input we take table of
components of image in any order. In this paper M denotes
table of transformations of those components into their matrix
representations.</p>
      <p>First we will present an algorithm for the case when the
image is divided only vertically, so all components are strips
with the same height as the image.</p>
      <p>In the first step we create a matrix E of errors, where eij is
an error between right side of Mi and left side of Mj , in the
following way. For a diagonal of E we take a maximal value
1, because we do not want to link component of image with
itself. For other elements mean value of difference between
corresponding border pixels is computed.</p>
      <p>In the second step we find coordinates i; j in the matrix E
with minimal value of E, it means the images with "the best
fit". We join the matrices of these images, it is Mi with Mj ,
which corresponds to the merging of these images. The new
component replace Mi and Mj is deleted from M . Additional
change to matrix E occurs: column i is replaced by column j
and column j and line j are deleted, then diagonal elements
of this matrix are changed to 1 again. We could compute
the matrix E after every merge of components of images
but transformation described above give us the same result
and decreases amount of necessary computations. In package
Mathematica this step can be realized in the following way
E1=E;
Do[</p>
      <p>If[E1[[i, j]] == Min[E],</p>
      <p>joinl = M[[i]];
joinr = M[[j]];</p>
      <p>M[[i]] = Join[joinl, joinr, 2];
M = Delete[M, j];</p>
      <p>E[[i]] = E[[j]];</p>
      <p>E = Drop[E, {j}, {j}];</p>
      <p>Break];
, {j, 1, Length[M]}]
, {i, 1, Length[M]}];
Do[E[[i, i]] = 1, {i, 1, Length[E]}];</p>
      <p>Next second step is repeated with table M and matrix
E adjusted in previous iteration. The implementation of the
described technique is presented in following algorithm
Input: Table M of images
1: r := lenght of M
2: mv := vertical dimension of all Mi
3: Creating the matrix E
4: for i = 0; i r do
5: for j = 0; j r do
6: if i 6= j then
1 Xmv
jMi(k; 1)</p>
      <p>Mj (k; 1)j
7:
8:
9:
else
eij :=
eij := 1
r
k=1
10: end if
11: end for
12: end for
13: for k = 1; k &lt; r do
14: n := length of M
15: min := Minimum value of E
16: for i = 0; i n do
17: for j = 0; j n do
18: if eij = min then
19: replace Mi by joined Mi with Mj
20: delete Mj from M
21: replace in E column i by column j
22: delete column j and line j from E
23: break the loop
24: else
25: do nothing
26: end if
27: end for
28: end for
29: for i = 1; i lenght of E do
30: eii := 1
31: end for
32: end for
Output: M</p>
      <p>In the second case, when the image is divided vertically and
horizontally into rectangles of the same dimensions, we use
modified algorithm.</p>
      <p>As an input we take table M of components of image in
any order and number of rows (the number of parts into which
the image was divided horizontally). First we compute width
of image. To obtain this we sum width of all components and
divide it by number of rows. Now we create the matrix E of
errors in the same way as in the algorithm for strips. Next we
execute Algorithm 1, with one modification, until the same
number of components as number of rows remains. At the
end of the second step of the Algorithm 1 we check width
of component Mi which is result of this step. If it is less
than width of image then we proceed the next step. Otherwise
all values in both the column i and the line i in matrix E are
replaced by 1. Those modification ensures that when algorithm
stops, remaining components have the same dimensions.</p>
      <p>Finally, we transpose matrices of all remaining components
and use Algorithm 1 again. As a result we obtain image
reflected with respect to the diagonal.</p>
      <p>The implementation of the described technique is presented
in following algorithm
Input: Table M of images, number m of rows
1: mh := horizontal dimension of all Mi
2: r := lenght of M
3: mv := vertical dimension of all Mi
4: width := rmh</p>
      <p>m
5: Creating the matrix E by executing of steps from 4 to 12
of the Algorithm 1.
6: while Length of M &gt; m do
7: Executing of steps from 14 to 22 of the Algorithm</p>
      <p>First example1 is basic. We have three strips. In first
iteration the minimal error was found for M1 and M3, so
we join first and third part. Now we have only 2 parts and we
need to check in which way we should join them, so we need
to check which erros is smaller, e21 or e12. e12 is smaller so
we join the component M1 with M2.</p>
      <p>The next example shows how the algorithm works to divide
an image into rectangles. We have 12 rectangles: 200 100
px. Below we have the program start.</p>
      <p>In first iteration the minimal error was found for M12 and
M10, so we join 12th and 10th. As a result we have 11
1To test the algorithm were used random images from Google Images.
parts. Next steps are similar. In each steps (I-VIII) we find
the minimal error between all parts of the image and then we
check the minimal error and join the corresponding parts of
the the image.</p>
    </sec>
    <sec id="sec-4">
      <title>II step (joining part 12 and 10)</title>
    </sec>
    <sec id="sec-5">
      <title>II step (joining part 3 and 8)</title>
    </sec>
    <sec id="sec-6">
      <title>III step (joining part 2 and 6)</title>
    </sec>
    <sec id="sec-7">
      <title>IV step (joining part 4 and 8)</title>
    </sec>
    <sec id="sec-8">
      <title>V step (joining part 1 and 7)</title>
    </sec>
    <sec id="sec-9">
      <title>VI step (joining part 4 and 7)</title>
    </sec>
    <sec id="sec-10">
      <title>VII step (joining part 1 and 3)</title>
    </sec>
    <sec id="sec-11">
      <title>VIII step (joining part 2 and 4)</title>
      <p>The IXth step is another than earlier steps. We have to
transpose the matrix to continue the procedure. Next, we
will continue the previously described procedure, i.e. we will
compare all parts and join those for which the error eij will
be the smallest.</p>
    </sec>
    <sec id="sec-12">
      <title>X step (joining part 4 and 3)</title>
    </sec>
    <sec id="sec-13">
      <title>XI step (joining part 3 and 2)</title>
      <p>XII step (joining part 2 and 1)</p>
    </sec>
    <sec id="sec-14">
      <title>XIII step (joining part 2 and 1)</title>
    </sec>
    <sec id="sec-15">
      <title>V. TIME OF WORKING</title>
      <p>The basic problem of algorithms is their working time. We
can compare the operation of the program for division the
image only veritcally or veritcally and horizontally. The time
of the program does not depend on the degree of differentiation
of the image, because each time we compare the same number
of pixels (for a fixed image size and its division). The duration
of the program depends on the number of compared pixels and
kind of divising. Of course if the size of the image (number of
pixels) is greater, then the working time is greater. The graph
below shows the approximate running time of the program for
diffrent divisions.</p>
      <p>We see that the relationship between image size and time is
linear for each division: for only vertically and for vertically
and horizontally division.</p>
      <p>VI. CONCLUSION</p>
      <p>The "Puzzles" algorithm can be extended to cases when the
divisions are irregular, i.e. the sizes of vertical and horizontal
divisions are different. Currently, such a situation is
impossible, because the algorithm requires equal divisions. In addition,
it can be seen that combining images may be incorrect for
situations where the images are very similar or specific. Since
our algorithm finds first components with minimal error, join
them and proceed to the next step, we might obtain wrong
result if there were more components with the same error. For
example when the majority of the image is one color.</p>
      <p>Another problem is time of working. For large images
divided in many components, it might take relativily a lot
of time for algorithm to stop. It is caused by amount pixels
needed for algorithm to compare.</p>
      <p>Algorithms described above may have applications in
decision support systems that search for objects with characteristic
attributes. Our algorithms may be used for finding elements
of images that fits the fixed pattern.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G. A.</given-names>
            <surname>Baxes</surname>
          </string-name>
          .
          <article-title>Digital image processing: principles and applications</article-title>
          . Wiley New York,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J. C.</given-names>
            <surname>Bezdek</surname>
          </string-name>
          , J. Keller, R. Krisnapuram, and
          <string-name>
            <given-names>N.</given-names>
            <surname>Pal</surname>
          </string-name>
          .
          <article-title>Fuzzy models and algorithms for pattern recognition and image processing</article-title>
          , volume
          <volume>4</volume>
          . Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Caselles</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Catté</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Coll</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Dibos</surname>
          </string-name>
          .
          <article-title>A geometric model for active contours in image processing</article-title>
          .
          <source>Numerische mathematik</source>
          ,
          <volume>66</volume>
          (
          <issue>1</issue>
          ):
          <fpage>1</fpage>
          -
          <lpage>31</lpage>
          ,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R.</given-names>
            <surname>Damaševicˇius</surname>
          </string-name>
          , C. Napoli, T. Sidekerskiene˙, and
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Woz´niak. Imf mode demixing in emd for jitter analysis</article-title>
          .
          <source>Journal of Computational Science</source>
          ,
          <volume>22</volume>
          :
          <fpage>240</fpage>
          -
          <lpage>252</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Egmont-Petersen</surname>
          </string-name>
          , D. de Ridder, and
          <string-name>
            <given-names>H.</given-names>
            <surname>Handels</surname>
          </string-name>
          .
          <article-title>Image processing with neural networksâA˘Tˇa review</article-title>
          .
          <source>Pattern recognition</source>
          ,
          <volume>35</volume>
          (
          <issue>10</issue>
          ):
          <fpage>2279</fpage>
          -
          <lpage>2301</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.</given-names>
            <surname>Gilboa</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Osher</surname>
          </string-name>
          .
          <article-title>Nonlocal operators with applications to image processing</article-title>
          .
          <source>Multiscale Modeling &amp; Simulation</source>
          ,
          <volume>7</volume>
          (
          <issue>3</issue>
          ):
          <fpage>1005</fpage>
          -
          <lpage>1028</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Jain</surname>
          </string-name>
          .
          <article-title>Fundamentals of digital image processing</article-title>
          . Prentice-Hall, Inc.,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>T.</given-names>
            <surname>Kapus</surname>
          </string-name>
          <article-title>´cin´ski</article-title>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Nowicki</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          .
          <article-title>Comparison of effectiveness of multi-objective genetic algorithms in optimization of invertible s-boxes</article-title>
          .
          <source>In International Conference on Artificial Intelligence and Soft Computing</source>
          , pages
          <fpage>466</fpage>
          -
          <lpage>476</lpage>
          . Springer,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Parker</surname>
          </string-name>
          .
          <article-title>Algorithms for image processing and computer vision</article-title>
          . John Wiley &amp; Sons,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.</given-names>
            <surname>Pavlidis</surname>
          </string-name>
          .
          <article-title>Algorithms for graphics and image processing</article-title>
          .
          <source>Springer Science &amp; Business Media</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Plaza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Benediktsson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Boardman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Brazile</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Bruzzone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Camps-Valls</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chanussot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fauvel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Gamba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gualtieri</surname>
          </string-name>
          , et al.
          <article-title>Recent advances in techniques for hyperspectral image processing</article-title>
          .
          <source>Remote sensing of environment</source>
          ,
          <volume>113</volume>
          :
          <fpage>S110</fpage>
          -
          <lpage>S122</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          <article-title>Ke˛sik, K. Ksia˛z˙ek, and M. Woz´niak. Obstacle detection as a safety alert in augmented reality models by the use of deep learning techniques</article-title>
          .
          <source>Sensors</source>
          ,
          <volume>17</volume>
          (
          <issue>12</issue>
          ):
          <fpage>2803</fpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wozniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Tramontana</surname>
          </string-name>
          . Is swarm intelligence able to create mazes?
          <source>International Journal of Electronics and Telecommunications</source>
          ,
          <volume>61</volume>
          (
          <issue>4</issue>
          ):
          <fpage>305</fpage>
          -
          <lpage>310</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>H.</given-names>
            <surname>Takeda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Farsiu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Milanfar</surname>
          </string-name>
          .
          <article-title>Kernel regression for image processing and reconstruction</article-title>
          .
          <source>IEEE Transactions on image processing</source>
          ,
          <volume>16</volume>
          (
          <issue>2</issue>
          ):
          <fpage>349</fpage>
          -
          <lpage>366</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Vese</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Osher</surname>
          </string-name>
          .
          <article-title>Modeling textures with total variation minimization and oscillating patterns in image processing</article-title>
          .
          <source>Journal of scientific computing</source>
          ,
          <volume>19</volume>
          (
          <issue>1-3</issue>
          ):
          <fpage>553</fpage>
          -
          <lpage>572</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          <article-title>´niak and</article-title>
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          .
          <article-title>Adaptive neuro-heuristic hybrid model for fruit peel defects detection</article-title>
          .
          <source>Neural Networks</source>
          ,
          <volume>98</volume>
          :
          <fpage>16</fpage>
          -
          <lpage>33</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          ´niak,
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          , L. Kos´mider, and
          <string-name>
            <given-names>T.</given-names>
            <surname>Cłapa</surname>
          </string-name>
          .
          <article-title>Automated fluorescence microscopy image analysis of pseudomonas aeruginosa bacteria in alive and dead stadium</article-title>
          .
          <source>Engineering Applications of Artificial Intelligence</source>
          ,
          <volume>67</volume>
          :
          <fpage>100</fpage>
          -
          <lpage>110</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woz</surname>
          </string-name>
          ´niak,
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Tramontana</surname>
          </string-name>
          .
          <article-title>Application of bio-inspired methods in distributed gaming systems</article-title>
          .
          <source>Information Technology And Control</source>
          ,
          <volume>46</volume>
          (
          <issue>1</issue>
          ):
          <fpage>150</fpage>
          -
          <lpage>164</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>