<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>International Conference of Yearly Reports on
Informatics Mathematics and Engineering, online, July</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Hybridization of K Nearest Neighbors Classifier with Cuckoo Search Algorithm</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Katarzyna Prokop</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Faculty of Applied Mathematics, Silesian University of Technology</institution>
          ,
          <addr-line>Kaszubska 23, 44100 Gliwice</addr-line>
          ,
          <country country="PL">POLAND</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>9</volume>
      <issue>2021</issue>
      <fpage>18</fpage>
      <lpage>25</lpage>
      <abstract>
        <p>Artificial intelligence methods are one of the most used algorithms in big data and Internet of Things solutions. Therefore, a very important aspect is to create new algorithms and improve existing ones. In this paper, the proposition of a hybrid method for classifying elements in certain datasets is presented. The proposed method joins properties of  Nearest Neighbors Algorithm (a classifier) and Cuckoo Search Algorithm (a heuristic algorithm). The proposed model was presented, tested, and discussed on a selected dataset of Iris Flowers. The efectiveness of the method is compared for diferent variants of input parameters to show the eficiency of the proposition.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;data classification</kwd>
        <kwd>knn</kwd>
        <kwd>heuristic</kwd>
        <kwd>clustering</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In everyday life, people are constantly faced with the
need to make choices. Depending on the method of
selection, the decisions turn out to be more or less accurate
in relation to a given problem. It is often justified to use
certain mathematical techniques in the decision-making
process for example to assess the probability that a choice
will bring the expected result [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1, 2, 3</xref>
        ].
      </p>
      <p>
        The main intention of the work is to propose a hybrid
method for classifying an object into one of the existing
groups from a specific data set. Such grouping of data is
related to the concept of clustering, which is the ordering
of database records into collections based on established
guidelines [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>The idea of clustering implies the separation of
elements into clusters with similar characteristics.
Simultaneously objects belonging to one group should be less
similar to elements from other clusters. This process is
unsupervised, based on measurements of the value of
the similarity metric between items without making any
other assumptions. However, the clustering process does
not guarantee the ordering of the data while maintaining
the actual relations between the elements because there
are many possible divisions of the data set.</p>
      <p>
        The aim of the hybrid classification method described
in the paper is to assign an object to the appropriate
group using a heuristic algorithm. The term ”heuristic”
is derived from the Greek word heuresis which means
invention and from the word heureka which stands for
”I have found”. In ancient times heuristics were
concerned with solving problems based on formulating
appropriate hypotheses. They are defined as methods of
searching solutions that have no guarantee of finding
the optimal solution [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]. Heuristics are used when
conventional methods are too costly, e.g. due to the
computational complexity or when the appropriate algorithm
is not fully known. Therefore, it is possible that heuristics
would solve the problem incorrectly. In the last years,
heuristic algorithms were improved by applied
parallel computing to decrease time complexities [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ] and
in many applications like classifications [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">9, 10, 11</xref>
        ] and
clustering[
        <xref ref-type="bibr" rid="ref12 ref13 ref14">12, 13, 14</xref>
        ].
      </p>
      <p>
        The efectiveness of the proposed method has been
tested for diferent sets of input parameters.
Cuckoo Search Algorithm [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] is an example of a
stochastic optimization method – in other words an optimization
process whose essential element is the randomization of
certain parameters [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Owing to the fact of using
random values the solution is quickly obtained. Cuckoo
Search Algorithm aim is to find an answer for a given
problem by imitating the behavior of some species of
cuckoos.
      </p>
      <p>
        The cuckoo is a medium-sized migratory bird in the
cuckoo Cuculidae family. It is representative of the
nesting parasites which means animals that use the parents of
other species to take care of their ofspring. Cuckoos drop
their eggs into foreign nests, where their progeny grows
up [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Over the generations cuckoos have learned to
adapt to their surroundings, making themselves similar
to other bird species to increase the chance to survive in
a foreign nest. This ability is called mimicry [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], which
can be also defined by masking. Cuckoos become similar
to the host species even before they hatch. The host is
often unable to distinguish the cuckoos from his ofspring
due to the mimicry, which results in him raising these where 0 means throwing away the intruder from the nest,
individuals like his own hatchlings. However, when he 1 saving the cuckoo,  is a random value in the range
discovers the intruder, throws it out of the nest without (0, 1), generated separately for each individual and the
hesitation. minimum of the function  (· ) is searched. If the function
      </p>
      <p>Every cuckoo in the algorithm is interpreted as a point  (· ) were to be maximised, the function (· , · )would take
in n-dimensional space. The individual is evaluated re- the form:
garding the value of the fitness function based on taken
coordinates. Thanks to that, the best cuckoos solving a
given problem can be selected. All birds are in the nest,
which is the set of the currently best-adapted points. Ad- (4)
ditionally, the movement of cuckoos takes place. It is When the final set of the best solutions is known and
set by a given equation of displacement. Another im- all the actions characteristic of the algorithm were
perportant element of the algorithm is the so-called ”host formed a certain number of times (iteratively), the last
decision”, when the cuckoo can be thrown away from the step is to find the best individual. This is done by
comparnest and replaced with another, newly hatched bird. This ing the values of the fitness function for all the cuckoos
operation depends on the comparison of the values of in the nest.
the fitness function for both individuals and the assumed The structure of the algorithm is presented in
pseuprobability detection of an intruder in the nest. docode 1.</p>
      <p>The mathematical model of the cuckoo search
algorithm can be presented in the steps described below. Algorithm 1 Cuckoo Search Algorithm.</p>
      <p>The algorithm starts by generating an initial cuckoo
population. It is assumed that the cuckoo is the point of
n coordinates (depending on the size of the problem, i.e.
the number of variables of the fitness function  (· )):
where 1, ..., a re chosen e.g. randomly from a given
interval. Then each individual is displaced using Lévy’s
movement. The flight of the cuckoos is modeled as the
following function:
where  is the appropriate coordinate and  and  are the
initially determined coeficients. Therefore, the Cuckoo
Search Algorithm will depend on these parameters. In
addition, the value of displacement depends on the fixed
step  &gt; 0. Then the value  · (;  ; ) be added to every
coordinate to move the cuckoo. In nature, many animal
species use this type of movement strategy when they
do not remember or have no information about where
the food can be found.</p>
      <p>Another operation that goes into the algorithm is ”host
decision”. Detection of intruder birds takes place with
a certain fixed probability  ∈ (0, 1). Removal of a bird
takes place if and only if the individual  which is
compared with individual  is better suited to the fitness
function. The decision process can be written as the
following function (· , · ):
(1)
(2)</p>
    </sec>
    <sec id="sec-2">
      <title>3. K Nearest Neighbors Algorithm</title>
      <p>
        The K Nearest Neighbors Algorithm is a simple
classiifer, which is based on finding  elements in a given
database as similar as possible to the tested element, i.e.
its so-called neighbors [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Then it is assumed that the
neighbors by ”voice of the majority” will settle to which
group the new record will belong. The result of the
classification is the group that contains the largest number
of neighbors. The similarity of records is determined
by measuring the distance between individual elements,
which can be treated as vectors. For this measurement,
(3) the Euclidean or the Manhattan metric can be used.
      </p>
      <sec id="sec-2-1">
        <title>Suppose that  and  are records with  characteristics,</title>
        <p>between which the distance is measured. The elements of
the dataset are interpreted as vectors. Then the Euclidean
distance function can be defined as:
and the Manhattan distance function can be described
by the formula:</p>
      </sec>
      <sec id="sec-2-2">
        <title>These functions satisfy the condition of the identity</title>
        <p>of indiscernibles, symmetry, and triangle inequality thus
represent metrics.</p>
        <p>
          The K Nearest Neighbors Algorithm is an example
of a lazy classification method [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. It does not gather
any information about a given problem. A solution is
selected in real-time, directly after passing along a vector
to classification.
        </p>
        <p>Let  = (1 , ..., ) be the ℎ record with  features
for  = 1, ...,  where  is the number of all vectors in
the dataset. It is clear that  ≥ . An element given to be
classified is described by  = (1, ..., ). The distance
measure  was assumed. Then the K Nearest Neighbors
Algorithm may be represented by the pseudocode 2.</p>
      </sec>
      <sec id="sec-2-3">
        <title>Algorithm 2 K Nearest Neighbors Algorithm.</title>
        <p>Depending on the established distance measure and
the number of neighbors, it is possible to obtain
diferent classification results. Testing various variants for a
(5)
(6)
18–25
given database allows us to determine the configuration
that will assign the class with the highest probability of
correctness.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Hybrid classification method</title>
      <p>Heuristic algorithms can be used in the process of data
clustering. The idea of this concept is based on
combining the classic classifier with the heuristic. This paper
presents a hybrid classification method that combines the
K Nearest Neighbors Algorithm with the Cuckoo Search
Algorithm.</p>
      <p>Let  = 1, ...,  be a -dimensional vector of
unknown group. The task of the method is to assign a vector
to the appropriate cluster. The idea is that cuckoos, which
are points in dimensional space, can be identified with
records of the database with  features. Then the initial
population is generated by assigning one specific element
from the dataset to a single cuckoo. A population is
therefore a set of a size equal to the size  of the considered
database, and the cuckoo coordinates will reflect the
values of records features. As a consequence the ℎ cuckoo
storing values from the ℎ record where  = 1, ..., 
can be represented as
(7)</p>
      <sec id="sec-3-1">
        <title>The cuckoos are displaced by Levy’s movement ac</title>
        <p>cording to the formula (2). This is followed by a decision
process called ”host decision”, described as a function (3).
In this case, the  fitness function is the distance function
(Euclidean, described by the formula (5) or Manhattan,
described by the function (6)). Its role is to measure the
distance between the cuckoo and the considered vector
 The result of the ”host decision” is to save the best
specimens in the nest, i.e. records with the shortest
distance from . Such refinement of the population occurs
a certain number of times iteratively. The next step is to
ifnd the best cuckoo in a final population.</p>
        <p>The above operations are performed exactly  times to
get  of the best individuals, one from each population.
These cuckoos represent the  nearest neighbors of the K
Nearest Neighbors Algorithm. The last step is to select an
appropriate cluster for the  vector based on information
about groups stored by neighbors. It is decided by the
”majority vote”, which means that the vector  is assigned
to the most frequently appearing cluster.</p>
        <p>The concept of using the Cuckoo Search Algorithm in
classification is presented by the pseudocode 3.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>5. Experiments</title>
      <sec id="sec-4-1">
        <title>The hybrid classification method was tested in the decision-making process, the purpose of which was to</title>
        <p>Algorithm 3 Application of the cuckoo algorithm in
classification.
method, according to the following formula:
where  is the number of correct matches and  is
the number of all tested items. The final results of the
obtained correctness have been rounded to two decimal
places.</p>
        <p>
          The experiments were performed for eight diferent
sets of input parameters , , ,  . Depending on the used
match the corresponding class to the object from the distance function (the tested variants are the Euclidean
database. A dataset of iris flowers was used for this distance (5) and the Manhattan distance (6)) and the
numtask. These data were shared in 1936 by the British biolo- ber of  nearest neighbors of the K Nearest Neighbors
gist and statistician Ronald Fisher [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. The set contains Algorithm, the efectiveness was compared. The program
150 records, each of which consists of 5 attributes that was launched five times for each of the integers  in the
determine the length of the plot of the flower cup, the range [
          <xref ref-type="bibr" rid="ref1 ref15">1, 15</xref>
          ] using the Euclidean distance, and then the
width of the plot, the length of the petal and its width, same was repeated using the Manhattan distance. The
as well as the name of the species. Therefore, the first arithmetic mean of the correctness coeficient for the
four attributes are expressed by numerical values, while obtained efects (expressed by the formula (8)) was
calcuthe species name is presented in words. The collection lated for each value of  and the used type of the distance
contains data on three species of irises: Iris setosa, Iris function. The results are presented in the form of a table
virginica, Iris versicolor. for each parameter set, respectively.
        </p>
        <p>To test the method, the program was created. Its task The first set of input parameters was  = 100,  =
was to randomly select 30 records to be checked, which 0.2,  = 0.2,  = 0.2 regardless of the value of the 
is 20% of all objects in the database. For testing, these parameter, the Euclidean distance was 100% efective in
objects were stripped of the fifth attribute (species name), matching the iris species to the tested record. In the case
which was remembered by the program to later deter- of the Manhattan distance, the obtained values of the 
mine whether the match using the hybrid classification coeficient were slightly lower, but the arithmetic mean
method was successful. The test set was subjected to the for each value of  did not fall below 74%. The maximum
method so that each record was matched with a class value was 90%. Detailed results are presented in the table
(species of the iris). On the output, the program returns 1.
information about the obtained  correctness of the</p>
      </sec>
      <sec id="sec-4-2">
        <title>Then  was increased to value 0.7, leaving the rest of</title>
        <p>the parameters unchanged. The program eficiency was
18–25
(8)</p>
        <p>The next four tests were performed for the number of the Manhattan distance, an average  between 74% and
iterations = 250. At the beginning, the following
param91.33% was obtained. Such a high value did not occur in
eter values were adopted: 
= 0.05,  = 0.7,  = 0.33. the previous test, when 
= 0.05, but compared to that
The results were placed in the table 5. Again, the method
was 100% efective for the Euclidean distance. The
arithmetic mean of the  coeficient for the Manhattan
disvariant of parameters, the range of the arithmetic mean
of the  coeficient in this sample is larger.</p>
      </sec>
      <sec id="sec-4-3">
        <title>In the penultimate test, the  arameter was returned to</title>
        <p>Arithmetic mean of the  coeficient for  = 100, 
=
0.05, while  and  where assumed to be  =  = 1. The
result of the program is shown in the table 7. Using the
Euclidean distance again ensured that the method was
100% efective, while for the Manhattan distance the mean
of the  ranged from 75.33% to 88.67%. Modifications to
 and  have not been observed to significantly improve
program operation.</p>
        <p>The last test was carried out for the number of
iterations = 250, while for the remaining parameters the
values were  =  = 1, as in the previous test, and the
 parameter was increased to 0.75. Table 8 presents the
results obtained during this experiment. The program
matched all records with the species correctly when it
used the Euclidean distance. Using the Manhattan
distance produced slightly worse results. The eficiency
of the program using this distance function, depending
on the diferent values of ,ranged between 70.67% and
87.33%. A fairly low value of the coeficient for = 2
can be noticed. This is the lowest average value of 
obtained during method testing. Modifying the 
parameter did not bring any significant benefits in terms of the
method’s eficiency.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>6. Conclusions</title>
      <sec id="sec-5-1">
        <title>The conducted tests showed that the hybrid classification method solves the problem of matching the appropriate</title>
        <p>species for the iris without mistakes when the Euclidean
distance is used in the K Nearest Neighbors Algorithm.
When using the Manhattan distance function, the user
can expect most records to be classified correctly, but
there are few mistakes. The lowest mean value of the
 correctness coeficient obtained was 70.67%, which
roughly means that 21 valid matches were made per 30
of the records under test. For the Manhattan distance
several times one of the highest efectiveness of the
program was noted for =13. However, the diferences are
not large enough to clearly state that this is the rule. It
was not observed that any of the tested values of 
significantly improved the efectiveness of the method, but
in most cases, the use of the  parameter with the value
from the set 1, 2, 3 resulted in a decrease in the program
efectiveness. The graph 1 shows the arithmetic mean
of the obtained results for eight trials with specific input
parameters.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>U.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. C.-W.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Srivastava</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          <article-title>FournierViger, A transaction classification model of federated learning</article-title>
          , in: International Conference on Industrial,
          <source>Engineering and Other Applications of Applied Intelligent Systems</source>
          , Springer,
          <year>2021</year>
          , pp.
          <fpage>509</fpage>
          -
          <lpage>518</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alrasheedi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mardani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Mishra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Loganathan</surname>
          </string-name>
          ,
          <article-title>An extended framework to evaluate sustainable suppliers in manufacturing companies using a new pythagorean fuzzy entropy-swarawaspas decision-making approach</article-title>
          ,
          <source>Journal of Enterprise Information Management</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Włodarczyk-Sielicka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Wawrzyniak</surname>
          </string-name>
          ,
          <article-title>Automatic ship classification for a riverside monitoring system using a cascade of artificial intelligence techniques including penalties and rewards</article-title>
          , ISA transactions (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kulczycki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Charytanowicz</surname>
          </string-name>
          ,
          <article-title>Kompletny algorytm gradientowej klasteryzacji, Sterowanie i automatyzacja: aktualne problemy i ich rozwiazania (</article-title>
          <year>2008</year>
          )
          <fpage>312</fpage>
          -
          <lpage>321</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Aho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. E.</given-names>
            <surname>Hopcroft</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. D.</given-names>
            <surname>Ullman</surname>
          </string-name>
          ,
          <article-title>Algorytmy i struktury danych</article-title>
          ,
          <source>Helion</source>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woźniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          , G. Borowik,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>A ifrst attempt to cloud-based user verification in distributed system</article-title>
          ,
          <year>2015</year>
          , p.
          <fpage>226</fpage>
          -
          <lpage>231</lpage>
          . doi:
          <volume>10</volume>
          .1109/ APCASE.
          <year>2015</year>
          .
          <volume>47</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kęsik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Woźniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Damaševičius</surname>
          </string-name>
          ,
          <article-title>Parallel technique for the metaheuristic algorithms using devoted local search and manipulating the solutions space</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>8</volume>
          (
          <year>2018</year>
          )
          <fpage>293</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woźniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , E. Tramontana,
          <article-title>Graphic object feature extraction system based on cuckoo search algorithm</article-title>
          ,
          <source>Expert Systems with Applications</source>
          <volume>66</volume>
          (
          <year>2016</year>
          )
          <fpage>20</fpage>
          -
          <lpage>31</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.eswa.
          <year>2016</year>
          .
          <volume>08</volume>
          .068.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>G.</given-names>
            <surname>De Magistris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Roma</surname>
          </string-name>
          , P. and,
          <string-name>
            <surname>C. Napoli</surname>
          </string-name>
          ,
          <article-title>An explainable fake news detector based on named entity recognition and stance classification applied to covid-19,</article-title>
          <string-name>
            <surname>Information</surname>
          </string-name>
          (Switzerland)
          <volume>13</volume>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .3390/info13030137.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Woźniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Damaševičius</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Maskeliu</surname>
          </string-name>
          <article-title>¯nas, Bio-inspired voice evaluation mechanism</article-title>
          ,
          <source>Applied Soft Computing</source>
          <volume>80</volume>
          (
          <year>2019</year>
          )
          <fpage>342</fpage>
          -
          <lpage>357</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>G.</given-names>
            <surname>Lo Sciuto</surname>
          </string-name>
          , G. Capizzi,
          <string-name>
            <given-names>S.</given-names>
            <surname>Coco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Shikler</surname>
          </string-name>
          ,
          <article-title>Geometric shape optimization of organic solar cells for eficiency enhancement by neural networks</article-title>
          ,
          <source>Lecture Notes in Mechanical Engineering</source>
          (
          <year>2017</year>
          )
          <fpage>789</fpage>
          -
          <lpage>796</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -45781-9_
          <fpage>79</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>G.</given-names>
            <surname>Capizzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. Lo</given-names>
            <surname>Sciuto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Woźniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Damaševičius</surname>
          </string-name>
          ,
          <article-title>A clustering based system for automated oil spill detection by satellite remote sensing</article-title>
          ,
          <source>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          <volume>9693</volume>
          (
          <year>2016</year>
          )
          <fpage>613</fpage>
          -
          <lpage>623</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -39384-1_
          <fpage>54</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>G. C.</given-names>
            <surname>Cardarilli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. Di</given-names>
            <surname>Nunzio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Fazzolari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Panella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Re</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rosato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Span</surname>
          </string-name>
          ,
          <article-title>A parallel hardware implementation for 2-d hierarchical clustering based on fuzzy logic</article-title>
          ,
          <source>IEEE Transactions on Circuits and Systems II: Express Briefs</source>
          <volume>68</volume>
          (
          <year>2020</year>
          )
          <fpage>1428</fpage>
          -
          <lpage>1432</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>N.</given-names>
            <surname>Brandizzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bianco</surname>
          </string-name>
          , G. Castro,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wajda</surname>
          </string-name>
          ,
          <article-title>Automatic rgb inference based on facial emotion recognition</article-title>
          , volume
          <volume>3092</volume>
          ,
          <year>2021</year>
          , p.
          <fpage>66</fpage>
          -
          <lpage>74</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>X.-S.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Deb</surname>
          </string-name>
          ,
          <article-title>Cuckoo search via lévy flights</article-title>
          , in: 2009 World congress
          <article-title>on nature &amp; biologically inspired computing (NaBIC)</article-title>
          , Ieee,
          <year>2009</year>
          , pp.
          <fpage>210</fpage>
          -
          <lpage>214</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>G.</given-names>
            <surname>Capizzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Woźniak</surname>
          </string-name>
          ,
          <article-title>Lessening stress and anxiety-related behaviors by means of ai-driven drones for aromatherapy</article-title>
          , volume
          <volume>2594</volume>
          ,
          <year>2020</year>
          , p.
          <fpage>7</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>Sudyka</surname>
          </string-name>
          ,
          <article-title>Genetyczne zagadki specjalizacji u kukułki cuculus canorus</article-title>
          ,
          <source>Ornis Polonica</source>
          <volume>53</volume>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Kuang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <article-title>A practical gpu based knn algorithm</article-title>
          ,
          <source>in: Proceedings. The 2009 International Symposium on Computer Science and Computational Technology (ISCSCI</source>
          <year>2009</year>
          ), Citeseer,
          <year>2009</year>
          , p.
          <fpage>151</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>R. A</surname>
          </string-name>
          . Fisher,
          <article-title>The use of multiple measurements in taxonomic problems</article-title>
          ,
          <source>Annals of eugenics 7</source>
          (
          <year>1936</year>
          )
          <fpage>179</fpage>
          -
          <lpage>188</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>