<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Genetic method of image processing for motor vehicle recognition</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<affiliation key="aff0">
								<orgName type="department">Dept. of Software Tools</orgName>
								<orgName type="institution">Zaporizhzhia National Technical University</orgName>
								<address>
									<postCode>69063</postCode>
									<settlement>Zaporizhzhia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Genetic method of image processing for motor vehicle recognition</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">CE175DC1CB918E01999500CC5F5750A0</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T08:33+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Pattern Recognition</term>
					<term>Genetic Algorithm</term>
					<term>Evolutionary Algorithm</term>
					<term>Neural Networks</term>
					<term>Python</term>
					<term>OpenCV</term>
					<term>Keras</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>An analysis of scientific articles on similar topics was conducted; it was de-termined that the best recognition accuracy rate is achieved by using convo-lutional neural networks. Modifications of a simple genetic algorithm (Alfa-Beta, Alfa-Beta Fixed, Fixed) were developed. The implementation of the program for recognition of road users (cars, bicycles, pedestrians, motorcycles, trucks, etc.) was developed. Also, a comparison was made between the use of modifications of a simple genetic algorithm and the best approach for solving the problem of road user recognition. The purpose of the research conducted was to find an optimal approach for solving the problem of road user recognition, since the system that hasn't been implemented yet can recognize road users accurately. It was found that the improved Alpha-Beta modification is the best approach from the considered ones used to solve the problem. This modification allowed getting the best accuracy rate in less time selection, in comparison with other base modifications and simple genetic algorithm. The obtained results have a high practical value, since the developed modification allows optimizing the process of selection of values in other subject areas.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The theory of pattern recognition exists as a branch of informatics and related disciplines. It develops methods for the classification and identification of objects of various nature: signals, situations, objects that are characterized by a comprehensive number of certain features <ref type="bibr" target="#b0">[1]</ref>. The problem of object recognition can also be a purpose of interdisciplinary researches -including work on creation of artificial intelligence. It is also often used in solving practical problems in the field of computer vision. When setting the classical problem of object recognition, it is necessary to apply a mathematical language based on logical thinking and mathematical principles. In contrast to this approach, there are methods for recognizing objects using machine learning and 6 artificial neural networks, formed not so formalized approaches to recognition, and show not worse, but in some cases, a much better result.</p><p>One of these areas is road safety, which includes many narrow areas: number-plate recognition, traffic congestion determination, recognition of road users in self-driving cars, etc.</p><p>However, for today, problems of recognition quality are not completely solved. For example, the vulnerability was detected in the Tesla Autopilot system: the system in most cases cannot recognize a bicycle. It identifies a bicycle as a person or a small car; accordingly, the system can make decisions that may endanger cyclist's life <ref type="bibr" target="#b0">[1]</ref>.</p><p>Vulnerabilities in recognizing road users in systems such as Mazda Smart City Brake Support <ref type="bibr" target="#b1">[2]</ref>, Waymo Autopilot <ref type="bibr" target="#b2">[3]</ref> are also known.</p><p>It can be said that recognizing bicycles and other road users is a topical task. Recognition of road users can be used in the system of control and / or traffic safety or it can be used to study the reasons of constructing specialized bicycle lanes, etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Analysis of literary data and problem statement</head><p>This work <ref type="bibr" target="#b3">[4]</ref> presents a study of solving the problem of bicycle recognition on a video stream by combining the following approaches: Histogram of Oriented Gradients (HOG) <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>, Support Vector Machine (SVM) <ref type="bibr" target="#b6">[7]</ref>, cascade classifier (Violi-Jones method) <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>. Presented results of performing bicycle recognition in different weather conditions, and it is argued that the developed approach can be used in systems of real time recognition.</p><p>However, using of a combination of HOG and SVM methods is not optimal, since it allows you to recognize large enough objects that are not always present in video in real time and due to the fact that it takes a lot of time to calculate complex parameters. Using a cascaded classifier is more optimal in terms of recognition time. However, this method has errors in recognition -because of the application of different scales and the size of the scanning window, one object can be recognized as two.</p><p>In general, low image quality, weather conditions and various lighting conditions make precise recognition more complicated for the methods used. The approach developed is complex and complicated, and each method requires sufficient computational resources that effect on results.</p><p>An expedient approach to the implementation of the bicycles recognition would be the use of neural networks.</p><p>Thus, in <ref type="bibr" target="#b9">[10]</ref>, the study of the analysis of the flow of machines on the CCTV (video surveillance systems) images, based on the solution of the problem of recognition of machines with the help of neural networks Faster R-CNN (the faster regionbased convolutional neural network) <ref type="bibr" target="#b10">[11]</ref> and SSD (single shot multibox detector) <ref type="bibr" target="#b11">[12]</ref>.</p><p>In general, SSDs are capable of quickly recognizing, but are often mistaken for small objects, while Faster R-CNNs are slower than SSD, but can provide more precision.</p><p>Work aim is to test the specified trained neural networks on images of low quality and under different weather conditions. As a result of the study, it was found that the considered neural networks are not capable of recognizing all the machines, and in the case of bad weather conditions (rain, snow, fog), the accuracy indicator falls significantly. Therefore, the study of neural networks to detect vehicles should use more diversity training set. In addition, the study implements the recognition of only cars, although the concept of "traffic" covers several types of transport (motorcycles, trucks, etc.).</p><p>In <ref type="bibr" target="#b12">[13]</ref>, the solution of the machine recognition problem by studying a convolutional neural network <ref type="bibr" target="#b13">[14]</ref> is considered, which is based on reinforced learning mistake and samples of error-prone probes. That is, in the training of the convolutional neural network, it is proposed to use the training errors of the current stage as training data in the next stage. A comparison of histogram oriented gradient recognition with convolutional neural networks, one of which was taught in the standard way, and the second -by the proposed authors, was made, which resulted in the proposed approach showed better performance.</p><p>However, there are no examples of car recognition, because of the small amount of study sample used in the study, one cannot say with complete certainty that a significant improvement in the training of the firewall neural network has been achieved.</p><p>In <ref type="bibr" target="#b14">[15]</ref> the decision of the recognition problem among the crowd of each pedestrian separately is considered. The main purpose of the study is to recognize pedestrians in black and white images in various situations, the pedestrian's identification of the image, even with partial overlap, and with high accuracy, localize it. Also, the goal is to determine how many pedestrians are presented in the image.</p><p>The approach developed in this article is based on the scale-independent expansion of the Implicit Shape Model (ISM).</p><p>Authors succeeded in realizing all goals, but the accuracy of pedestrian recognition is 71.3% and is not satisfactory.</p><p>Also, it's worth noting that the developed method works only with images. However, the method has a great potential and can, as a result of further development, develop towards image recognition and tracking.</p><p>In <ref type="bibr" target="#b15">[16]</ref> we consider the solution of the problem of pedestrian recognition by combining several neural networks.</p><p>The proposed system consists of two subsystems: the main pedestrian detection system for generation of all detections and a system of semantic segmentation to improve the results. Pedestrian Detection system in turn consists of a generator "candidates" for pedestrians and classification system. In order to provide more information about the coordinates of the object of the classification network, it is proposed to use the new method of soft tokens, which relates the object to all classes. For the implementation of the classification system the idea of "combined training" was implemented. Also, the technique of "soft rejection" is proposed for combining the conclusions of all networks of classification and the network of semantic segmentation with the conclusion of the network of "candidates" generation.</p><p>Pedestrian recognition has been tested on four popular image sets: Caltech Pedestrian set, INRIA set, ETH set, KITTI set. The first three sets received the highest recognition accuracy. Also, it indicates the significant speed of the developed approach.</p><p>In <ref type="bibr" target="#b16">[17]</ref> the implementation of pedestrian recognition is considered, using the combination of the method of histogram oriented gradients, the method of reference vectors and the convolutional neural network.</p><p>The purpose of work is to construct a semantic areas of interest in order to get the foreground object is to reduce the errors associated with error detection background.</p><p>First, using a convolutional neural network trained by the Caltech Pedestrian set, the thermal map is generated by the input image. Further, semantic interest regions are extracted from the thermal map by morphological image processing. In the rest, semantic interest regions share the whole image on the background and foreground, to facilitate the work of the detectors who make the decision.</p><p>It is noted that with the help of semantic regions of interest, the work of detectors to varying degrees improves.</p><p>However, the use of a combination of HOG and SVM methods is not optimal, as it allows you to recognize large enough objects that are not always present in video in real time and due to the fact that it takes a lot of time to calculate complex parameters.</p><p>In work <ref type="bibr" target="#b17">[18]</ref> the implementation of the system of recognition of vehicles belonging to 7 classes (motorcycle, car, pickup, bus, truck, truck with a trailer, truck with several trailers) is considered on the CCTV video. The Deep Convolutional Neural Network (DCNN) was used in the implementation.</p><p>The proposed system algorithmically consists of two tasks: localization and classification. Initially, the localization is performed, by generating regions independent of the class, for each frame, and then using a deep convolutional neural network to produce feature descriptions for each region. Finally, using the Support Vector Machines (SVM) method, for each region, the resulting description descriptions are compared with the templates, and a conformity assessment and classification are performed.</p><p>The accuracy of vehicle recognition differs for each class, but in general, the accuracy is within the range of 92 -95%. The accuracy of the recognition significantly decreases when downloaded traffic, rain and fog, with low video quality.</p><p>The disadvantage of this development is the use of a deep convolutional neural network, since its calculation requires a lot of computational resources, which is not acceptable. The use of this neural network is possible with the presence of a powerful CPU (CPU) or graphics processor (NVIDIA GPU), in conjunction with such artificial intelligence environments as CUDA, Caffe, Torch. Also, the system detects recognition errors on a small scale, then the object of one class is recognized as an object of another class, for example, the "truck" is recognized as a "truck with a trailer", and so on.</p><p>The analysis <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref><ref type="bibr" target="#b21">[22]</ref><ref type="bibr" target="#b22">[23]</ref><ref type="bibr" target="#b23">[24]</ref><ref type="bibr" target="#b24">[25]</ref><ref type="bibr" target="#b25">[26]</ref> in the subject area suggests that conducting research on the implementation of the system traffic participant's recognition and increasing the accuracy of recognition is a rather topical task.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Purpose and objectives of the research</head><p>The purpose of the study is to develop a program for solving the problem of road users recognition -cars, bicycles, pedestrians, motorcycles, trucks. Also, it is necessary to develop an evolutionary method that would allow to obtain the best indicators of recognition accuracy when selecting the parameters of teaching neural networks at lesser time.</p><p>To achieve this goal, the following tasks were solved:</p><p>1. Conduct an analysis of existing methods for solving the pattern recognition problem. 2. To develop methods of evolutionary search for selection of parameters for teaching neural networks. 3. To implement the program realization of developed methods of evolutionary search. 4. To conduct the study of the effectiveness of the developed method.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4</head><p>Materials and methods of studying the influence of parameters in the training of neural networks</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Equipment used in the experiment</head><p>The study of the influence of the values of parameters in the training of neural networks on the accuracy and time of training was carried out on a computer with an Intel Core i5 7400 processor with a clock speed of 3 GHz, with a memory capacity of 8 GB.</p><p>To study neural networks, a study sample of 8,000 images was divided into 5 classes and 3 sub-sets: educational (1000 images), test (200 images), verifying (400 images).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Methods of determining the influence of parameters of teaching neural networks</head><p>The study of the effect of values of the parameters of training neural networks was carried out using a simple genetic algorithm and its modifications. The sequence of actions of a simple genetic algorithm is as follows: generation of an initial population Ps consisting of N individuals occurs:</p><formula xml:id="formula_0">, ,…,I I = P N 1 s ) (<label>( 1 )</label></formula><p>where I -the individual. Each individual I (its genes) is encoded by certain values from the set of all parameters of the set Q. Let the parameters of the neural networks have a set of parameters</p><formula xml:id="formula_1">Q: , ,f ,m,f n Q= opt act j ) ( (2)</formula><p>where n -number of neurons of a certain layer, j = 1, ..., m, m -number of layers, f act -activation function f opt is a function of optimization. Then the individual I N of the initial population Ps can be encoded by formula <ref type="bibr" target="#b2">(3)</ref>. .</p><formula xml:id="formula_2">, ,…,n 64 , 32 =R n Q max i ] [ ) ( , ,…,m 2 , 1 =R m Q max ] [ ) ( (3) , ,sigmoid relu,elu, =R f Q act ] tanh [ ) ( a],</formula><formula xml:id="formula_3">Q =R I N ) (<label>(4)</label></formula><p>Next, to evaluate the optimality of each individual I of the population of the P S , the fitness function f fit is calculated:</p><formula xml:id="formula_4">, I max = P f i s fit ) ( ) (<label>(5)</label></formula><p>where i=1,...,N. The next step is to check if the conditions for completing the search for the optimal solution are not fulfilled. Such conditions can be the number of generations N, the value of the fitness function f fit , runtime, and so on. In the example of selecting parameters for teaching neural networks, the value of fitness function is the accuracy of the trained neural network. If the conditions are fulfilled, it is necessary to complete the execution of the algorithm and output the results, the most optimal generation of the individual.</p><p>Then the selection of specimens is performed in a new population P n : individuals are ranked according to the fitting indicator, 40% of the most adapted individuals (T) are selected in a new population. Also randomly selected 10% less fitting individuals (L). Another 50% of the new population P n is obtained by crossing the selected individuals (K).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>=T+L+K. P n (6)</head><p>Intersection (C) of individuals has the following algorithm: subsets of B and W randomly selected individuals on M and F having a specific set of genes:</p><formula xml:id="formula_5">, ,f ,f ,m ,…,n n M= 1 opt 1 act 1 1 m 1 1 ) ) (( ( 7 ) . ,f ,f ,m ,…,n n F= 2 opt 2 act 2 2 m 2 1</formula><p>) ) (( Then the crossing can be expressed as follows:</p><formula xml:id="formula_6">. F M C= ) (  (8)</formula><p>The result of the crossing of individuals is two descendants K 1 , K 2 , which can be written as follows:</p><formula xml:id="formula_7">, ,f f ,R ,f f ,R ,m m ,R ,…,n n , ,…,n n R = K 2 opt 1 opt 2 act 1 act 2 1 2 m 2 1 1 m 1 1 1 ) [ ] [ ] [ )] ( ) [( ( (9) , ,f f ,R ,f f ,R ,m ,R[m ,…,n n , ,…,n n R = K 2 opt 1 opt 2 act 1 act 2 1 2 m 2 1 1 m 1 1 2 ]) [ ] [ ] )] ( ) [( (</formula><p>where R -function of the choice of a random variable. This approach of crossing individuals is called uniform cross-linking, since the coding of the offspring randomly selects the values for each gene from each ancestor.</p><p>For the received descendants the mutation operator μ is applied according to (3):</p><formula xml:id="formula_8">. f ,R f ,R m ,R n R =R K μ opt act i )] ( ) ( ) ( ) ( [ ) (<label>(10)</label></formula><p>Then, after applying the mutation operator, the descendant can be written as follows:</p><formula xml:id="formula_9">. ,f ,m,f ,…,n n = K opt act m i μ ) ) ((<label>(11)</label></formula><p>After applying the mutation operator descendants included the new generation P n . The bursts and mutations are held until a new generation of P n of size N is created:</p><formula xml:id="formula_10">, ,K T+L = P j n ) ) ((<label>(12)</label></formula><p>where j = 1, ..</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>., (N-(T + L)).</head><p>Next, the f fit fitness function for each new generation P n (5) is calculated. It is checked whether the conditions for completing the search for an optimal solution were not fulfilled. If the conditions are fulfilled, it is necessary to complete the execution of the algorithm and output the results, the most optimal generation of the individual. If the conditions are not fulfilled -continue the implementation of the algorithm, proceed to the formation of the next generation P n+1 based on the generation P n .</p><p>The proposed modifications to a simple genetic algorithm are as follows: 1) modification Alfa-Beta: for crossing in each generation, a different number of couples for crossing is selected, in which one individual refers to the most suitable one and the other to the least adapted individuals. Also, random mutations (base and double) or one mutation (base) can occur: Monte Carlo method generates a random number 0 or 1. If 0 falls, then one mutation arises if there is one mutation -there are two mutations.</p><p>The sequence of actions of this modification of a simple genetic algorithm is similar to its basic version, but it has some differences. At the stage of selection of individuals to a new population of P n individuals are ranked according to the fitness parameter, then the number of pairs is determined randomly -a certain number of the most adapted individuals, and the same number of the least adapted. The most suitable individuals form a subset of B, the least adapted -subset of W. Both subsets are included in the set of pairs V. The number of individuals that can be chosen in pairs is in the range of 20-60% of the total number of individuals. The rest of the new population P n is obtained by crossing the selected individuals (K).</p><formula xml:id="formula_11">, V,K = P j n ) (<label>(13)</label></formula><p>where j = 1, ..., (N-V). Also, in the proposed modification, two (μ1, μ2) or one mutation (μ) may occur randomly, whereas in the basic version of the algorithm, one mutation arises randomly. Moreover, in a situation when there are two mutations -one gene can mutate twice. After applying the mutation operator descendants included the new generation P n . Crossing and mutation are held as long as we create the next generation of P n size N (13).</p><p>2) modification Alfa-Beta fixed: the number of couples for crossing is selected in each generation, with one person referring to the most suitable one and the other to the least adapted individuals. Also, random mutations (base and double) or one mutation (base) can occur: Monte Carlo method generates a random number 0 or 1. If 0 falls, then one mutation arises if there is one mutation -there are two mutations . A fixed point of crossing is established -the first half of the genes participate in the crossing -the genes responsible for the number of neurons in the layers, the values of other genes are always passed on to the descendants of one of the individuals.</p><p>The sequence of actions of this modification is similar to the sequence of Alfa-Beta modifications, however, the crossing operation is excellent: according to formula 7, subsets B and W are randomly selected by the individual M and F having a certain set of genes. Intersection can be expressed as:</p><formula xml:id="formula_12">). ) (( F 2 1 , F 2 1 M 2 1 C* = <label>(14)</label></formula><p>The result of the crossing of individuals is two descendants K 1 , K 2 , which can be written as follows:</p><formula xml:id="formula_13">, ,f f , ,m ,…,n n , ,…,n n R = K 2 opt 2 act 2 2 m 2 1 1 m 1 1 1 ) )] ( ) [( ( (15) , ,f f , ,m ,…,n n , ,…,n n R = K 2 opt 2 act 2 2 m 2 1 1 m 1 1 2 ) )] ( ) [( (</formula><p>where R is a random variable selection function, m 2 , f 2 act , f 2 opt -the value of the genes transmitted from the individual F. 3) modification Fixed: a fixed point of crossing is established -half of the genes are involved in the crossing -the genes responsible for the number of neurons in the layers, the values of other genes are always passed on to the descendants of one of the individuals. Also, in the mutation stage randomly, there are two mutations (base and double) or one mutation (base): the Monte Carlo method generates a random number, 0 or 1. If 0 falls, then there is one mutation, if there is 1 -occurs two mutations. The sequence of actions of this modification is similar to the sequence of Alfa-Beta modification, but there is a difference: the selection of individuals to a new population occurs both in the basic version of the genetic algorithm <ref type="bibr" target="#b5">(6)</ref>, and the crossing occurs as in the second modification ( <ref type="formula" target="#formula_12">14</ref>), <ref type="bibr" target="#b14">(15)</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Experiments and results of research on the use of modifications of a simple genetic algorithm</head><p>There were 4 experiments in which the genetic algorithms and the simple simple genetic algorithm were considered. All experiments were carried out with the same parameters: the number of generations -5, the size of the population -20, the mutation rate -0.01. Input data is a sample of 5-digit images (pedestrian, bicycle, motorcycle, auto, truck), in which each class has 1600 images.</p><p>To modify Alpha-Beta and a simple genetic algorithm, the elite coefficient was also set at 0.4 and the randomly selected individuals were 0.1.</p><p>In the figures below, graphs of parameter selection parameters are presented in the training of the neural network by the proposed modifications of the genetic algorithm. After selecting the parameters of learning by the genetic algorithm and its modifications, the recognition accuracy for the best neural network and the selection time were obtained. These results are shown in the Table <ref type="table" target="#tab_1">1</ref>. Figure <ref type="figure">1</ref> shows a graph of the mean accuracy for each generation of selection parameters for training neural networks. Figure <ref type="figure">2</ref> shows a chart of indicators for the 5 best individuals of the last generation of parameter selection for each neural network.   <ref type="table">4</ref>, we can conclude that the use of the Alpha-Beta modification of the genetic algorithm is the best approach to achieving higher recognition accuracy in less time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Discussion of the results of research on the use of modifications of a simple genetic algorithm</head><p>In the Fig. <ref type="figure">4</ref> and 5 are graphs of the execution time (in minutes) of the proposed method on computer systems, which depends on the number of cores involved. It can be seen from the graphs that the proposed method has an acceptable degree of parallelism and is effectively performed on both MIMD and SIMD systems. This way, the IPME cluster was able to reduce the method execution time from 1565 minutes (on one core) to an acceptable 147 minutes on 16 cores. On the ZNTU the computing system, the method execution time was reduced from 1268 minutes on a single core to 110 minutes on 16 cores. The differences in the performance of the systems are due to their architectural features: in the cluster cores are connected by means of the Infini-Band communicator, and in the multi-core computer they are located on a single chip, which explains the smaller impact of overhead (transfers and synchronizations). In addition, the processor in multi-core computer supports Turbo Boost technology [25- 32], making the time of the method execution on the single core much less than the execution time on the core of the cluster that does not support this technology.</p><p>As a result of the study, a modification of a simple genetic algorithm -Alfa-Beta -was developed. Using this modification allows you to speed up the selection of the parameters of training neural networks, and increase the accuracy. It has been shown that the increase in the number of mutations and selection in pairs of different individuals provides a greater variety of gene combinations, which leads to better performance in less time.  Based on the recognition results, we can conclude that a trained neural network is able to confidently determine the relevance of an object to a particular class.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusion</head><p>An analysis of existing methods of pattern recognition from scientific articles on similar problems was carried out. It was determined that the best recognition accuracy rate is achieved using convolutional neural networks. Three modifications of a simple genetic algorithm (Alfa-Beta, Alfa-Beta fixed and Fixed) were developed for selecting parameters of training neural networks.</p><p>A program using the developed modifications of a simple genetic algorithm for selecting parameters of training neural networks and recognition of road users was implemented. When applying the developed modifications, the following results were obtained:</p><p>-Alpha Beta -accuracy 86.90%, selection time -7 days, 7 hours, 16 minutes, 43 seconds;</p><p>-Alpha Beta fixed -accuracy 85.89%, selection time -10 days, 12 hours, 4 minutes, 58 seconds; -Fixed -accuracy 85.48%, selection time -5 days, 22 hours, 27 minutes, 5 seconds.</p><p>Comparison of the rates of a simple genetic algorithm was conducted; it was determined that the Alpha-Beta modification is the best approach to recognize road users since this modification allowed better accuracy (86.90%) for shorter selection time (7 days, 7 hours, 16 minutes, 43 seconds).</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .Fig. 2 .</head><label>12</label><figDesc>Fig.1. Schedule of mean accuracy for selection of parameters for teaching neural networks</figDesc><graphic coords="9,124.68,477.84,345.00,189.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 3 -</head><label>3</label><figDesc><ref type="bibr" target="#b6">7</ref> shows examples of recognition using a trained neural network.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .Fig. 4 .Fig. 5 .Fig. 6 .Fig. 7 .</head><label>34567</label><figDesc>Fig. 3. Example of recognizing the object "bicycle"</figDesc><graphic coords="11,124.68,449.40,295.20,215.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="10,126.24,176.64,342.60,187.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="12,149.04,176.52,297.00,220.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="12,161.64,425.88,271.80,234.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="13,155.64,176.52,283.80,208.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="13,134.40,413.76,326.40,235.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 .</head><label>1</label><figDesc>Results of selection of parameters using a simple genetic algorithm</figDesc><table><row><cell>GA version</cell><cell>Time of training</cell><cell>Accuracy on test data</cell><cell>Accuracy of auto-testing</cell></row><row><cell>Basic</cell><cell>8 days, 8 minutes, 39 seconds</cell><cell>79.45 %</cell><cell>85.89 %</cell></row><row><cell>modification Alpha-Beta</cell><cell>7 days, 7 hours, 16 minutes,43 seconds</cell><cell>82.12 %</cell><cell>86.90 %</cell></row><row><cell>modification Alpha-Beta fixed</cell><cell>10 days, 12 hours, 4 minutes, 58 seconds</cell><cell>80.02 %</cell><cell>85.89 %</cell></row><row><cell>modification Fixed</cell><cell>5 days, 22 hours, 27 minutes, 5 seconds</cell><cell>78.48 %</cell><cell>85.48 %</cell></row><row><cell cols="2">Based on the results presented in table</cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgment</head><p>The work was performed as part of the project "Methods and means of decisionmaking for data processing in intellectual recognition systems" (number of state registration 0117U003920) of Zaporizhzhia National Technical University.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Artificial neural networks in medical diagnostics [Iskusstvennyie neyronnyie seti v meditsinskoy diagnostike</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Lugovskaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computer systems and networks: proceedings of the 54th scientific conference of postgraduates, undergraduates and students 2018</title>
				<meeting><address><addrLine>BGUIR, Minsk</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="182" to="183" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">The doctor-patient relationship: challenges, opportunities, and strategies</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">D</forename><surname>Goold</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lipkin</surname><genName>Jr</genName></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of General Internal Medicine</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="23" to="33" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Approximation contexts in addressing graph data structures</title>
		<author>
			<persName><forename type="first">N</forename><surname>Van Tuc</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="30" to="55" />
		</imprint>
		<respStmt>
			<orgName>University of Wollongong Thesis Collection</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Long Memory in the Greek StockMarket</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">T</forename><surname>Barkoulas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ch</forename><forename type="middle">F</forename><surname>Baum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Travlos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applied Financial Economics</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="177" to="184" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Histograms of Oriented Gradients for Human Detection</title>
		<author>
			<persName><forename type="first">N</forename><surname>Dalal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CVPR</title>
		<imprint>
			<biblScope unit="page" from="886" to="893" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Training Recurrent Networks by Evolino</title>
		<author>
			<persName><forename type="first">J</forename><surname>Schmidhuber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wierstra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gagliolo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Gomez</surname></persName>
		</author>
		<idno type="DOI">10.1162/neco.2007.19.3.757</idno>
	</analytic>
	<monogr>
		<title level="j">Neural computation</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="757" to="779" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Statistics notes: measurement error</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Bland</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">G</forename><surname>Altman</surname></persName>
		</author>
		<idno type="DOI">10.1136/bmj.312.7047.1654</idno>
	</analytic>
	<monogr>
		<title level="j">BMJ</title>
		<imprint>
			<biblScope unit="volume">312</biblScope>
			<biblScope unit="page">1654</biblScope>
			<date type="published" when="1996">7047. 1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Rapid Object Detection using a Boosted Cascade of Simple Features</title>
		<author>
			<persName><forename type="first">P</forename><surname>Viola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Jones</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings IEEE Conference on Computer Vision and Pattern Recognition</title>
				<meeting>IEEE Conference on Computer Vision and Pattern Recognition</meeting>
		<imprint>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="1" to="9" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Robust real-time face detection</title>
		<author>
			<persName><forename type="first">P</forename><surname>Viola</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Vision</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="137" to="154" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Urban traffic flow analysis based on deep learning car detection from CCTV image series</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">V</forename><surname>Peppa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Bell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Komar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Xiao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci</title>
		<imprint>
			<biblScope unit="page" from="499" to="506" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Faster R-CNN: Towards real-time object detection with region proposal networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Girshick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Sun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Pattern Analysis and Machine Intelligence</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1137" to="1149" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">SSD: Single Shot MultiBox Detector</title>
		<author>
			<persName><forename type="first">W</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Anguelov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Erhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Szegedy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Reed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Fu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Berg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Vision ECCV</title>
		<imprint>
			<biblScope unit="page" from="21" to="37" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">A CNN Vehicle Recognition Algorithm based on Reinforcement Learning Error and Error-prone Samples</title>
		<idno type="DOI">10.1088/1755-1315/153/3/032052/pdf</idno>
		<ptr target="http://iopscience.iop.org/article/10.1088/1755-1315/153/3/032052/pdf" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Analysis of inrush currents of the unloaded transformer using the circuitfield modelling methods</title>
		<author>
			<persName><forename type="first">D</forename><surname>Yarymbash</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yarymbash</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kotsur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Divchuk</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2018.134248</idno>
	</analytic>
	<monogr>
		<title level="j">Eastern-European Journal of Enterprise Technologies</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="6" to="11" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">A guide to recurrent neural networks and backpropagation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Boden</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<publisher>Halmstad University</publisher>
			<biblScope unit="page" from="1" to="10" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Enhancing the effectiveness of calculation of parameters for short circuit of threephase transformers using field simulation methods</title>
		<author>
			<persName><forename type="first">D</forename><surname>Yarymbash</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yarymbash</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kotsur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Divchuk</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2018.140236</idno>
	</analytic>
	<monogr>
		<title level="j">Eastern-European Journal of Enterprise Technologies</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="22" to="28" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Genetic Algorithms and Neural Networks</title>
		<author>
			<persName><forename type="first">D</forename><surname>Whitley</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Genetic Algorithms in Engineering and Computer Science</title>
		<imprint>
			<biblScope unit="page" from="203" to="216" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Analysis of inrush currents of the unloaded transformer using the circuitfield modelling methods</title>
		<author>
			<persName><forename type="first">D</forename><surname>Yarymbash</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yarymbash</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kotsur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Divchuk</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2018.134248</idno>
	</analytic>
	<monogr>
		<title level="j">Eastern-European Journal of Enterprise Technologies</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="6" to="11" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Development of the indicator set of the features informativeness estimation for recognition and diagnostic model synthesis</title>
		<author>
			<persName><forename type="first">A</forename><surname>Oliinyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Subbotin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lovkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Leoshchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Zaiko</surname></persName>
		</author>
		<idno type="DOI">10.1109/TCSET.2018.8336342</idno>
	</analytic>
	<monogr>
		<title level="m">14th International Conference on Advanced Trends in Radioelectronics</title>
				<meeting><address><addrLine>TCSET</addrLine></address></meeting>
		<imprint>
			<publisher>Telecommunications and Computer Engineering</publisher>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="903" to="908" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Methods of semantic proximity extraction between the lexical units in infocommunication systems</title>
		<author>
			<persName><forename type="first">S</forename><surname>Leoshchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Oliinyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Subbotin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Zaiko</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2017.8246137</idno>
	</analytic>
	<monogr>
		<title level="m">4th International Scientific-Practical Conference Problems of Infocommunications</title>
				<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="7" to="13" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Synthesis of artificial neural networks using a modified genetic algorithm</title>
		<author>
			<persName><forename type="first">S</forename><surname>Leoshchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Oliinyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Subbotin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Gorobii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Zaiko</surname></persName>
		</author>
		<ptr target=":conf/iddm/PerovaBSKR18" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1st International Workshop on Informatics &amp; Data-Driven Medicine</title>
				<meeting>the 1st International Workshop on Informatics &amp; Data-Driven Medicine<address><addrLine>IDDM</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="1" to="13" />
		</imprint>
	</monogr>
	<note>dblp key</note>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Development of the method for decomposition of superpositions of unknown pulsed signals using the secondorder adaptive spectral analysis</title>
		<author>
			<persName><forename type="first">O</forename><surname>Stepanenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Oliinyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Deineha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Zaiko</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2018.126578</idno>
	</analytic>
	<monogr>
		<title level="j">EasternEuropean Journal of Enterprise Technologies</title>
		<imprint>
			<biblScope unit="volume">92</biblScope>
			<biblScope unit="issue">2/9</biblScope>
			<biblScope unit="page" from="48" to="54" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Stratified Model of the Internet of Things Infrastructure</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Alsayaydeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Shkarupylo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Hamid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Skrupsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Oliinyk</surname></persName>
		</author>
		<idno type="DOI">10.3923/jeasci.2018.8634.8638</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Engineering and Applied Science</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">20</biblScope>
			<biblScope unit="page" from="8634" to="8638" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Development of stratified approach to software defined networks simulation</title>
		<author>
			<persName><forename type="first">V</forename><surname>Shkarupylo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Skrupsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Oliinyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kolpakova</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2017.110142</idno>
	</analytic>
	<monogr>
		<title level="j">EasternEuropean Journal of Enterprise Technologies</title>
		<imprint>
			<biblScope unit="volume">89</biblScope>
			<biblScope unit="issue">5/9</biblScope>
			<biblScope unit="page" from="67" to="73" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Improved method of group decision making in expert systems based on competitive agents selection</title>
		<author>
			<persName><forename type="first">T</forename><surname>Kolpakova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Oliinyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lovkin</surname></persName>
		</author>
		<idno type="DOI">10.1109/UKRCON.2017.8100388</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON)</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<publisher>Institute of Electrical and Electronics Engineers</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="939" to="943" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Evolutionary method for solving the traveling salesman problem. Problems of Infocommunications</title>
		<author>
			<persName><forename type="first">A</forename><surname>Oliinyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Fedorchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Stepanenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Goncharenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2018.8632033</idno>
	</analytic>
	<monogr>
		<title level="m">Science and Technology : 5th International Scientific-Practical Conference PICST2018</title>
				<meeting><address><addrLine>Kharkiv; Kharkiv, Kharkiv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018-10-12">9-12 October 2018. 2018</date>
			<biblScope unit="page" from="331" to="339" />
		</imprint>
		<respStmt>
			<orgName>National University of Radioelectronics</orgName>
		</respStmt>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
