<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Genetic method of image processing for motor vehicle recognition</article-title>
      </title-group>
      <pub-date>
        <year>1800</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>An analysis of scientific articles on similar topics was conducted; it was de-termined that the best recognition accuracy rate is achieved by using convo-lutional neural networks. Modifications of a simple genetic algorithm (Alfa-Beta, Alfa-Beta Fixed, Fixed) were developed. The implementation of the program for recognition of road users (cars, bicycles, pedestrians, motorcycles, trucks, etc.) was developed. Also, a comparison was made between the use of modifications of a simple genetic algorithm and the best approach for solving the problem of road user recognition. The purpose of the research conducted was to find an optimal approach for solving the problem of road user recognition, since the system that hasn't been implemented yet can recognize road users accurately. It was found that the improved Alpha-Beta modification is the best approach from the considered ones used to solve the problem. This modification allowed getting the best accuracy rate in less time selection, in comparison with other base modifications and simple genetic algorithm. The obtained results have a high practical value, since the developed modification allows optimizing the process of selection of values in other subject areas.</p>
      </abstract>
      <kwd-group>
        <kwd>Pattern Recognition</kwd>
        <kwd>Genetic Algorithm</kwd>
        <kwd>Evolutionary Algorithm</kwd>
        <kwd>Neural Networks</kwd>
        <kwd>Python</kwd>
        <kwd>OpenCV</kwd>
        <kwd>Keras</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The theory of pattern recognition exists as a branch of informatics and related
disciplines. It develops methods for the classification and identification of objects of
various nature: signals, situations, objects that are characterized by a comprehensive
number of certain features [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The problem of object recognition can also be a
purpose of interdisciplinary researches - including work on creation of artificial
intelligence. It is also often used in solving practical problems in the field of computer
vision. When setting the classical problem of object recognition, it is necessary to apply
a mathematical language based on logical thinking and mathematical principles. In
contrast to this approach, there are methods for recognizing objects using machine
learning and 6 artificial neural networks, formed not so formalized approaches to
recognition, and show not worse, but in some cases, a much better result.
      </p>
      <p>One of these areas is road safety, which includes many narrow areas: number-plate
recognition, traffic congestion determination, recognition of road users in self-driving
cars, etc.</p>
      <p>
        However, for today, problems of recognition quality are not completely solved. For
example, the vulnerability was detected in the Tesla Autopilot system: the system in
most cases cannot recognize a bicycle. It identifies a bicycle as a person or a small
car; accordingly, the system can make decisions that may endanger cyclist’s life [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Vulnerabilities in recognizing road users in systems such as Mazda Smart City
Brake Support [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], Waymo Autopilot [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] are also known.
      </p>
      <p>It can be said that recognizing bicycles and other road users is a topical task.
Recognition of road users can be used in the system of control and / or traffic safety or it
can be used to study the reasons of constructing specialized bicycle lanes, etc.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Analysis of literary data and problem statement</title>
      <p>
        This work [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] presents a study of solving the problem of bicycle recognition on a
video stream by combining the following approaches: Histogram of Oriented
Gradients (HOG) [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ], Support Vector Machine (SVM) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], cascade classifier
(VioliJones method) [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ].
      </p>
      <p>Presented results of performing bicycle recognition in different weather
conditions, and it is argued that the developed approach can be used in systems of real time
recognition.</p>
      <p>However, using of a combination of HOG and SVM methods is not optimal, since
it allows you to recognize large enough objects that are not always present in video in
real time and due to the fact that it takes a lot of time to calculate complex parameters.
Using a cascaded classifier is more optimal in terms of recognition time. However,
this method has errors in recognition - because of the application of different scales
and the size of the scanning window, one object can be recognized as two.</p>
      <p>In general, low image quality, weather conditions and various lighting conditions
make precise recognition more complicated for the methods used. The approach
developed is complex and complicated, and each method requires sufficient
computational resources that effect on results.</p>
      <p>An expedient approach to the implementation of the bicycles recognition would be
the use of neural networks.</p>
      <p>
        Thus, in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], the study of the analysis of the flow of machines on the CCTV
(video surveillance systems) images, based on the solution of the problem of
recognition of machines with the help of neural networks Faster R-CNN (the faster
regionbased convolutional neural network) [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and SSD (single shot multibox detector)
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>In general, SSDs are capable of quickly recognizing, but are often mistaken for
small objects, while Faster R-CNNs are slower than SSD, but can provide more
precision.</p>
      <p>Work aim is to test the specified trained neural networks on images of low quality
and under different weather conditions. As a result of the study, it was found that the
considered neural networks are not capable of recognizing all the machines, and in the
case of bad weather conditions (rain, snow, fog), the accuracy indicator falls
significantly. Therefore, the study of neural networks to detect vehicles should use more
diversity training set. In addition, the study implements the recognition of only cars,
although the concept of "traffic" covers several types of transport (motorcycles,
trucks, etc.).</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], the solution of the machine recognition problem by studying a
convolutional neural network [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] is considered, which is based on reinforced learning
mistake and samples of error-prone probes. That is, in the training of the convolutional
neural network, it is proposed to use the training errors of the current stage as training
data in the next stage. A comparison of histogram oriented gradient recognition with
convolutional neural networks, one of which was taught in the standard way, and the
second - by the proposed authors, was made, which resulted in the proposed approach
showed better performance.
      </p>
      <p>However, there are no examples of car recognition, because of the small amount
of study sample used in the study, one cannot say with complete certainty that a
significant improvement in the training of the firewall neural network has been achieved.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] the decision of the recognition problem among the crowd of each
pedestrian separately is considered. The main purpose of the study is to recognize
pedestrians in black and white images in various situations, the pedestrian's identification of
the image, even with partial overlap, and with high accuracy, localize it. Also, the
goal is to determine how many pedestrians are presented in the image.
      </p>
      <p>The approach developed in this article is based on the scale-independent
expansion of the Implicit Shape Model (ISM).</p>
      <p>Authors succeeded in realizing all goals, but the accuracy of pedestrian
recognition is 71.3% and is not satisfactory.</p>
      <p>Also, it's worth noting that the developed method works only with images.
However, the method has a great potential and can, as a result of further development,
develop towards image recognition and tracking.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] we consider the solution of the problem of pedestrian recognition by
combining several neural networks.
      </p>
      <p>The proposed system consists of two subsystems: the main pedestrian detection
system for generation of all detections and a system of semantic segmentation to
improve the results. Pedestrian Detection system in turn consists of a generator
"candidates" for pedestrians and classification system. In order to provide more information
about the coordinates of the object of the classification network, it is proposed to use
the new method of soft tokens, which relates the object to all classes. For the
implementation of the classification system the idea of "combined training" was
implemented. Also, the technique of "soft rejection" is proposed for combining the
conclusions of all networks of classification and the network of semantic segmentation with
the conclusion of the network of "candidates" generation.</p>
      <p>Pedestrian recognition has been tested on four popular image sets: Caltech
Pedestrian set, INRIA set, ETH set, KITTI set. The first three sets received the highest
recognition accuracy. Also, it indicates the significant speed of the developed approach.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] the implementation of pedestrian recognition is considered, using the
combination of the method of histogram oriented gradients, the method of reference
vectors and the convolutional neural network.
      </p>
      <p>The purpose of work is to construct a semantic areas of interest in order to get the
foreground object is to reduce the errors associated with error detection background.</p>
      <p>First, using a convolutional neural network trained by the Caltech Pedestrian set,
the thermal map is generated by the input image. Further, semantic interest regions
are extracted from the thermal map by morphological image processing. In the rest,
semantic interest regions share the whole image on the background and foreground, to
facilitate the work of the detectors who make the decision.</p>
      <p>It is noted that with the help of semantic regions of interest, the work of detectors
to varying degrees improves.</p>
      <p>However, the use of a combination of HOG and SVM methods is not optimal, as it
allows you to recognize large enough objects that are not always present in video in
real time and due to the fact that it takes a lot of time to calculate complex parameters.</p>
      <p>
        In work [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] the implementation of the system of recognition of vehicles
belonging to 7 classes (motorcycle, car, pickup, bus, truck, truck with a trailer, truck with
several trailers) is considered on the CCTV video. The Deep Convolutional Neural
Network (DCNN) was used in the implementation.
      </p>
      <p>The proposed system algorithmically consists of two tasks: localization and
classification. Initially, the localization is performed, by generating regions independent of
the class, for each frame, and then using a deep convolutional neural network to
produce feature descriptions for each region. Finally, using the Support Vector Machines
(SVM) method, for each region, the resulting description descriptions are compared
with the templates, and a conformity assessment and classification are performed.</p>
      <p>The accuracy of vehicle recognition differs for each class, but in general, the
accuracy is within the range of 92 - 95%. The accuracy of the recognition significantly
decreases when downloaded traffic, rain and fog, with low video quality.</p>
      <p>The disadvantage of this development is the use of a deep convolutional neural
network, since its calculation requires a lot of computational resources, which is not
acceptable. The use of this neural network is possible with the presence of a powerful
CPU (CPU) or graphics processor (NVIDIA GPU), in conjunction with such artificial
intelligence environments as CUDA, Caffe, Torch.</p>
      <p>Also, the system detects recognition errors on a small scale, then the object of one
class is recognized as an object of another class, for example, the "truck" is
recognized as a "truck with a trailer", and so on.</p>
      <p>
        The analysis [
        <xref ref-type="bibr" rid="ref10 ref13 ref15 ref16 ref17 ref18 ref19 ref20 ref21 ref4">4, 10, 13, 15-26</xref>
        ] in the subject area suggests that conducting research
on the implementation of the system traffic participant’s recognition and increasing
the accuracy of recognition is a rather topical task.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Purpose and objectives of the research</title>
      <p>The purpose of the study is to develop a program for solving the problem of road
users recognition - cars, bicycles, pedestrians, motorcycles, trucks. Also, it is
necessary to develop an evolutionary method that would allow to obtain the best indicators
of recognition accuracy when selecting the parameters of teaching neural networks at
lesser time.</p>
      <p>To achieve this goal, the following tasks were solved:
1. Conduct an analysis of existing methods for solving the pattern recognition
problem.
2. To develop methods of evolutionary search for selection of parameters for teaching
neural networks.
3. To implement the program realization of developed methods of evolutionary
search.
4. To conduct the study of the effectiveness of the developed method.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Materials and methods of studying the influence of</title>
      <p>parameters in the training of neural networks
4.1</p>
      <sec id="sec-4-1">
        <title>Equipment used in the experiment</title>
        <p>The study of the influence of the values of parameters in the training of neural
networks on the accuracy and time of training was carried out on a computer with an
Intel Core i5 7400 processor with a clock speed of 3 GHz, with a memory capacity of
8 GB.</p>
        <p>To study neural networks, a study sample of 8,000 images was divided into 5
classes and 3 sub-sets: educational (1000 images), test (200 images), verifying (400
images).
4.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Methods of determining the influence of parameters of teaching neural networks</title>
        <p>The study of the effect of values of the parameters of training neural networks was
carried out using a simple genetic algorithm and its modifications.</p>
        <p>The sequence of actions of a simple genetic algorithm is as follows: generation of
an initial population Ps consisting of N individuals occurs:
where I - the individual.</p>
        <p>Each individual I (its genes) is encoded by certain values from the set of all
parameters of the set Q. Let the parameters of the neural networks have a set of
parameters Q:</p>
        <p>Ps=(I1,…,I N ),</p>
        <p>Q=(n j ,m,fact ,fopt ),
where n - number of neurons of a certain layer,
j = 1, ..., m,
m - number of layers,
(1)
(2)
fact - activation function
fopt is a function of optimization.</p>
        <p>Then the individual IN of the initial population Ps can be encoded by formula (3).</p>
        <p>Q(ni )=R[32,64,…,nmax ],</p>
        <p>Q(m)=R[1,2,…,mmax ],</p>
        <p>Q( f act )=R[relu,elu,tanh ,sigmoid ],
Q( fopt )=R[adam,sgd,ada max ,nadam,rmsprop,adagrad,adadelta],
where i = 1, ..., m,
R - function of choice of a random variable,
nmax - maximum number of neurons,
mmax - maximum number of layers.
(3)
(4)
(5)
(7)
(6)</p>
        <p>I N=R(Q).</p>
        <p>f fit (Ps )= max(Ii ),</p>
        <p>Next, to evaluate the optimality of each individual I of the population of the PS,
the fitness function ffit is calculated:
where i=1,...,N.</p>
        <p>The next step is to check if the conditions for completing the search for the
optimal solution are not fulfilled. Such conditions can be the number of generations
N, the value of the fitness function ffit, runtime, and so on. In the example of selecting
parameters for teaching neural networks, the value of fitness function is the accuracy
of the trained neural network. If the conditions are fulfilled, it is necessary to
complete the execution of the algorithm and output the results, the most optimal
generation of the individual.</p>
        <p>Then the selection of specimens is performed in a new population Pn: individuals
are ranked according to the fitting indicator, 40% of the most adapted individuals (T)
are selected in a new population. Also randomly selected 10% less fitting individuals
(L). Another 50% of the new population Pn is obtained by crossing the selected
individuals (K).</p>
        <p>Intersection (C) of individuals has the following algorithm: subsets of B and W
randomly selected individuals on M and F having a specific set of genes:
P =T+L+K.</p>
        <p>n
M=((n11,…,nm1 ),m1,fa1ct ,fo1pt ),</p>
        <p>F=((n12,…,nm2 ),m2,fa2ct ,fo2pt ).</p>
        <p>Then the crossing can be expressed as follows:</p>
        <p>C=(M  F ).</p>
        <p>(8)
(10)
(11)
(12)
K1=(R[(n11,…,nm1 ),(n12,…,nm2 )],R[m1,m2 ],R[ fa1ct ,fa2ct ],R[ fo1pt ,fo2pt ),
(9)
K 2=(R[(n11,…,nm1 ),(n12 ,…,nm2 )],R[m1,m2 ],R[ f a1ct ,f a2ct ],R[ f o1pt ,f o2pt ]),
where R - function of the choice of a random variable.</p>
        <p>This approach of crossing individuals is called uniform cross-linking, since the
coding of the offspring randomly selects the values for each gene from each ancestor.</p>
        <p>For the received descendants the mutation operator μ is applied according to (3):
μ(K )=R[R(ni ),R(m),R( f act ),R( fopt )].</p>
        <p>Then, after applying the mutation operator, the descendant can be written as
follows:</p>
        <p>K μ=((ni ,…,nm ),m,f act ,fopt ).</p>
        <p>Pn=((T+L),K j ),</p>
        <p>After applying the mutation operator descendants included the new generation Pn.
The bursts and mutations are held until a new generation of Pn of size N is created:
where j = 1, ..., (N- (T + L)).</p>
        <p>Next, the ffit fitness function for each new generation Pn (5) is calculated.</p>
        <p>It is checked whether the conditions for completing the search for an optimal
solution were not fulfilled. If the conditions are fulfilled, it is necessary to complete
the execution of the algorithm and output the results, the most optimal generation of
the individual. If the conditions are not fulfilled - continue the implementation of the
algorithm, proceed to the formation of the next generation Pn+1 based on the
generation Pn.</p>
        <p>The proposed modifications to a simple genetic algorithm are as follows:
1) modification Alfa-Beta: for crossing in each generation, a different number of
couples for crossing is selected, in which one individual refers to the most suitable
one and the other to the least adapted individuals. Also, random mutations (base and
double) or one mutation (base) can occur: Monte Carlo method generates a random
number 0 or 1. If 0 falls, then one mutation arises if there is one mutation - there are
two mutations.</p>
        <p>The sequence of actions of this modification of a simple genetic algorithm is
similar to its basic version, but it has some differences. At the stage of selection of
individuals to a new population of Pn individuals are ranked according to the fitness
parameter, then the number of pairs is determined randomly - a certain number of the
most adapted individuals, and the same number of the least adapted.</p>
        <p>The most suitable individuals form a subset of B, the least adapted - subset of W.
Both subsets are included in the set of pairs V. The number of individuals that can be
chosen in pairs is in the range of 20-60% of the total number of individuals. The rest
of the new population Pn is obtained by crossing the selected individuals (K).</p>
        <p>Pn=(V,K j ),
(13)
where j = 1, ..., (N-V).</p>
        <p>Also, in the proposed modification, two (μ1, μ2) or one mutation (μ) may occur
randomly, whereas in the basic version of the algorithm, one mutation arises
randomly. Moreover, in a situation when there are two mutations - one gene can
mutate twice. After applying the mutation operator descendants included the new
generation Pn. Crossing and mutation are held as long as we create the next generation
of Pn size N (13).</p>
        <p>2) modification Alfa-Beta fixed: the number of couples for crossing is selected in
each generation, with one person referring to the most suitable one and the other to
the least adapted individuals. Also, random mutations (base and double) or one
mutation (base) can occur: Monte Carlo method generates a random number 0 or 1. If
0 falls, then one mutation arises if there is one mutation - there are two mutations . A
fixed point of crossing is established - the first half of the genes participate in the
crossing - the genes responsible for the number of neurons in the layers, the values of
other genes are always passed on to the descendants of one of the individuals.</p>
        <p>The sequence of actions of this modification is similar to the sequence of
AlfaBeta modifications, however, the crossing operation is excellent: according to formula
7, subsets B and W are randomly selected by the individual M and F having a certain
set of genes. Intersection can be expressed as:</p>
        <p>C* =((</p>
        <p>M 
K1=(R[(n11,…,nm1 ),(n12 ,…,nm2 )],m2 , f a2ct ,fo2pt ),</p>
        <p>K 2=(R[(n11,…,nm1 ),(n12 ,…,nm2 )],m2 , fa2ct ,fo2pt ),
where R is a random variable selection function,
m2, f 2act, f 2opt - the value of the genes transmitted from the individual F.
3) modification Fixed: a fixed point of crossing is established - half of the genes
are involved in the crossing - the genes responsible for the number of neurons in the
layers, the values of other genes are always passed on to the descendants of one of the
individuals. Also, in the mutation stage randomly, there are two mutations (base and
double) or one mutation (base): the Monte Carlo method generates a random number,
0 or 1. If 0 falls, then there is one mutation, if there is 1 - occurs two mutations. The
sequence of actions of this modification is similar to the sequence of Alfa-Beta
modification, but there is a difference: the selection of individuals to a new population
occurs both in the basic version of the genetic algorithm (6), and the crossing occurs
as in the second modification (14), (15).
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Experiments and results of research on the use of modifications of a simple genetic algorithm</title>
      <p>There were 4 experiments in which the genetic algorithms and the simple simple
genetic algorithm were considered. All experiments were carried out with the same
parameters: the number of generations - 5, the size of the population - 20, the mutation
rate - 0.01. Input data is a sample of 5-digit images (pedestrian, bicycle, motorcycle,
auto, truck), in which each class has 1600 images.</p>
      <p>To modify Alpha-Beta and a simple genetic algorithm, the elite coefficient was
also set at 0.4 and the randomly selected individuals were 0.1.</p>
      <p>In the figures below, graphs of parameter selection parameters are presented in
the training of the neural network by the proposed modifications of the genetic
algorithm. After selecting the parameters of learning by the genetic algorithm and its
modifications, the recognition accuracy for the best neural network and the selection
time were obtained. These results are shown in the Table 1. Figure 1 shows a graph of
the mean accuracy for each generation of selection parameters for training neural
networks. Figure 2 shows a chart of indicators for the 5 best individuals of the last
generation of parameter selection for each neural network.</p>
      <p>Based on the results presented in table 4, we can conclude that the use of the
Alpha-Beta modification of the genetic algorithm is the best approach to achieving
higher recognition accuracy in less time.</p>
    </sec>
    <sec id="sec-6">
      <title>Discussion of the results of research on the use of modifications of a simple genetic algorithm</title>
      <p>In the Fig. 4 and 5 are graphs of the execution time (in minutes) of the proposed
method on computer systems, which depends on the number of cores involved. It can
be seen from the graphs that the proposed method has an acceptable degree of
parallelism and is effectively performed on both MIMD and SIMD systems. This way, the
IPME cluster was able to reduce the method execution time from 1565 minutes (on
one core) to an acceptable 147 minutes on 16 cores. On the ZNTU the computing
system, the method execution time was reduced from 1268 minutes on a single core to
110 minutes on 16 cores. The differences in the performance of the systems are due to
their architectural features: in the cluster cores are connected by means of the
InfiniBand communicator, and in the multi-core computer they are located on a single chip,
which explains the smaller impact of overhead (transfers and synchronizations). In
addition, the processor in multi-core computer supports Turbo Boost technology
[2532], making the time of the method execution on the single core much less than the
execution time on the core of the cluster that does not support this technology.</p>
      <p>As a result of the study, a modification of a simple genetic algorithm - Alfa-Beta
- was developed. Using this modification allows you to speed up the selection of the
parameters of training neural networks, and increase the accuracy. It has been shown
that the increase in the number of mutations and selection in pairs of different
individuals provides a greater variety of gene combinations, which leads to better
performance in less time.</p>
      <p>Fig. 3-7 shows examples of recognition using a trained neural network.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgment</title>
      <p>The work was performed as part of the project “Methods and means of
decisionmaking for data processing in intellectual recognition systems” (number of state
registration 0117U003920) of Zaporizhzhia National Technical University.
22. Stepanenko, O., Oliinyk, A., Deineha, L., Zaiko, T.: Development of the method for
decomposition of superpositions of unknown pulsed signals using the secondorder adaptive
spectral analysis. EasternEuropean Journal of Enterprise Technologies, vol. 92, issue 2/9,
pp. 48–54, (2018). doi: 10.15587/1729-4061.2018.126578
23. Alsayaydeh, J.A., Shkarupylo, V., Hamid, M.S., Skrupsky, S., Oliinyk, A.: Stratified
Model of the Internet of Things Infrastructure, Journal of Engineering and Applied
Science, vol. 13, issue 20, pp. 8634-8638, (2018). doi: 10.3923/jeasci.2018.8634.8638.
24. Shkarupylo, V., Skrupsky, S., Oliinyk, A., Kolpakova T.: Development of stratified
approach to software defined networks simulation. EasternEuropean Journal of Enterprise
Technologies, vol. 89, issue 5/9, pp. 67–73 (2017). doi: 10.15587/1729-4061.2017.110142
25. Kolpakova, T., Oliinyk, A., Lovkin, V.: Improved method of group decision making in
expert systems based on competitive agents selection. IEEE First Ukraine Conference on
Electrical and Computer Engineering (UKRCON), Institute of Electrical and Electronics
Engineers, pp. 939–943, Kyiv (2017). doi: 10.1109/UKRCON.2017.8100388
26. Oliinyk A., Fedorchenko I., Stepanenko A., Rud M., Goncharenko D.: Evolutionary
method for solving the traveling salesman problem. Problems of Infocommunications.
Science and Technology : 5th International Scientific-Practical Conference PICST2018,
Kharkiv, 9–12 October 2018, Kharkiv, Kharkiv National University of Radioelectronics,
pp. 331-339 (2018). doi: 10.1109/INFOCOMMST.2018.8632033</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Lugovskaya</surname>
            ,
            <given-names>A. M.</given-names>
          </string-name>
          :
          <article-title>Artificial neural networks in medical diagnostics [Iskusstvennyie neyronnyie seti v meditsinskoy diagnostike]</article-title>
          .
          <source>Computer systems and networks: proceedings of the 54th scientific conference of postgraduates, undergraduates and students</source>
          <year>2018</year>
          , vol.
          <volume>1</volume>
          , pp.
          <fpage>182</fpage>
          -
          <lpage>183</lpage>
          . BGUIR, Minsk (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Goold</surname>
            ,
            <given-names>S.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lipkin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          Jr.:
          <article-title>The doctor-patient relationship: challenges, opportunities, and strategies</article-title>
          .
          <source>Journal of General Internal Medicine (1)</source>
          ,
          <fpage>23</fpage>
          -
          <lpage>33</lpage>
          (
          <year>1999</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Van</given-names>
            <surname>Tuc</surname>
          </string-name>
          ,
          <string-name>
            <surname>N.</surname>
          </string-name>
          :
          <article-title>Approximation contexts in addressing graph data structures</article-title>
          . University of Wollongong Thesis Collection,
          <fpage>30</fpage>
          -
          <lpage>55</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Barkoulas</surname>
            ,
            <given-names>J. T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baum</surname>
            ,
            <given-names>Ch. F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Travlos</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <article-title>: Long Memory in the Greek StockMarket</article-title>
          . Applied Financial Economics, vol.
          <volume>10</volume>
          , no.
          <issue>2</issue>
          ,
          <fpage>177</fpage>
          -
          <lpage>184</lpage>
          pp. (
          <year>2000</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Dalal</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <article-title>Histograms of Oriented Gradients for Human Detection</article-title>
          . CVPR,
          <fpage>886</fpage>
          -
          <lpage>893</lpage>
          (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Schmidhuber</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wierstra</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gagliolo</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gomez</surname>
            ,
            <given-names>F.:</given-names>
          </string-name>
          <article-title>Training Recurrent Networks by Evolino</article-title>
          .
          <source>Neural computation</source>
          . vol.
          <volume>19</volume>
          (
          <issue>3</issue>
          ),
          <fpage>757</fpage>
          -
          <lpage>779</lpage>
          pp. (
          <year>2007</year>
          ). doi:
          <volume>10</volume>
          .1162/neco.
          <year>2007</year>
          .
          <volume>19</volume>
          .3.757.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Bland</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Altman</surname>
          </string-name>
          , D.G.:
          <article-title>Statistics notes: measurement error</article-title>
          .
          <source>BMJ</source>
          .
          <volume>312</volume>
          (
          <issue>7047</issue>
          ):
          <volume>1654</volume>
          (
          <year>1996</year>
          ).
          <source>doi:10.1136/bmj.312.7047.1654</source>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Viola</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jones M.J. Rapid</surname>
          </string-name>
          <article-title>Object Detection using a Boosted Cascade of Simple Features</article-title>
          .
          <source>Proceedings IEEE Conference on Computer Vision and Pattern Recognition</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          (
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Viola</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <article-title>Robust real-time face detection</article-title>
          .
          <source>International Journal of Computer Vision</source>
          ,
          <volume>57</volume>
          ,
          <issue>2</issue>
          ,
          <fpage>137</fpage>
          -
          <lpage>154</lpage>
          рр. (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Peppa</surname>
            <given-names>M. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bell</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Komar</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xiao</surname>
            <given-names>W.</given-names>
          </string-name>
          <article-title>Urban traffic flow analysis based on deep learning car detection from CCTV image series</article-title>
          .
          <source>Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci.</source>
          ,
          <volume>499</volume>
          -
          <fpage>506</fpage>
          рр. (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Ren</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>He</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Girshick</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sun</surname>
            <given-names>J.. Faster R-CNN</given-names>
          </string-name>
          :
          <article-title>Towards real-time object detection with region proposal networks</article-title>
          .
          <source>IEEE Transactions on Pattern Analysis and Machine Intelligence</source>
          ,
          <volume>39</volume>
          ,
          <issue>6</issue>
          ,
          <fpage>1137</fpage>
          -
          <lpage>1149рр</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Liu</surname>
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Anguelov</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Erhan</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szegedy</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reed</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fu</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berg</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>SSD: Single Shot MultiBox Detector. Computer Vision</surname>
            <given-names>ECCV</given-names>
          </string-name>
          ,
          <fpage>21</fpage>
          -
          <lpage>37</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>A CNN Vehicle</surname>
          </string-name>
          <article-title>Recognition Algorithm based on Reinforcement Learning Error and Error-prone Samples</article-title>
          , http://iopscience.iop.org/article/10.1088/
          <fpage>1755</fpage>
          -1315/153/3/032052/pdf .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Yarymbash</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yarymbash</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kotsur</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Divchuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Analysis of inrush currents of the unloaded transformer using the circuitfield modelling methods</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          , vol.
          <volume>3</volume>
          , №
          <volume>5</volume>
          (
          <issue>93</issue>
          ), pp.
          <fpage>6</fpage>
          -
          <lpage>11</lpage>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2018</year>
          .134248
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Boden</surname>
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A guide to recurrent neural networks and backpropagation</article-title>
          . Halmstad University, pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          (
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Yarymbash</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yarymbash</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kotsur</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Divchuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Enhancing the effectiveness of calculation of parameters for short circuit of threephase transformers using field simulation methods</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          , vol.
          <volume>4</volume>
          , №
          <volume>5</volume>
          (
          <issue>94</issue>
          ), pp.
          <fpage>22</fpage>
          -
          <lpage>28</lpage>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2018</year>
          .
          <volume>140236</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Whitley</surname>
            <given-names>D. Genetic</given-names>
          </string-name>
          <string-name>
            <surname>Algorithms</surname>
            and
            <given-names>Neural</given-names>
          </string-name>
          <string-name>
            <surname>Networks</surname>
          </string-name>
          .
          <source>Genetic Algorithms in Engineering and Computer Science</source>
          , pp.
          <fpage>203</fpage>
          -
          <lpage>216</lpage>
          , (
          <year>1995</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Yarymbash</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yarymbash</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kotsur</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Divchuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Analysis of inrush currents of the unloaded transformer using the circuitfield modelling methods</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          , vol.
          <volume>3</volume>
          , №
          <volume>5</volume>
          (
          <issue>93</issue>
          ), pp.
          <fpage>6</fpage>
          -
          <lpage>11</lpage>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2018</year>
          .134248
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Oliinyk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subbotin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lovkin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leoshchenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaiko</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Development of the indicator set of the features informativeness estimation for recognition and diagnostic model synthesis</article-title>
          .
          <source>14th International Conference on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering (TCSET
          <year>2018</year>
          ), pp.
          <fpage>903</fpage>
          -
          <lpage>908</lpage>
          , (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1109/TCSET.
          <year>2018</year>
          .
          <volume>8336342</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Leoshchenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliinyk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subbotin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaiko</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Methods of semantic proximity extraction between the lexical units in infocommunication systems</article-title>
          .
          <source>4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&amp;T 2017)</source>
          ,
          <fpage>7</fpage>
          -
          <lpage>13</lpage>
          pp. (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1109/INFOCOMMST.
          <year>2017</year>
          .
          <volume>8246137</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Leoshchenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliinyk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subbotin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gorobii</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaiko</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Synthesis of artificial neural networks using a modified genetic algorithm</article-title>
          .
          <source>Proceedings of the 1st International Workshop on Informatics &amp; Data-Driven Medicine (IDDM</source>
          <year>2018</year>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          (
          <year>2018</year>
          ). dblp key: conf/iddm/PerovaBSKR18
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>