<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Cybersecurity Providing in Information and Telecommunication Systems, October</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>with Extension of Segmentation Methods</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mariia Nazarkevych</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Hrytsyk</string-name>
          <email>volodymyr.v.hrytsyk@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maryna Kostiak</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lyubomyr Parkhuts</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hanna Nazarkevych</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Stepan Bandera str., Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>26</volume>
      <issue>2021</issue>
      <fpage>43</fpage>
      <lpage>52</lpage>
      <abstract>
        <p>Edge detectors are studied in the paper. The visual range of the spectrum is the most informative for humans in terms of evolution. The division of boundary detectors is effective in a number of tasks. In particular, in this paper, the authors test the effectiveness of these methods from a subjective point of view. The article collects for comparison the results of the most popular methods of defining boundaries. Several images from a standard open source database are presented for analysis. Boundary/edge search methods were chosen to perform pattern recognition and scene analysis experiments because contours are usually the most informative and redundant features of the image being processed. The following methods are considered in the work. The Sobel filter is a discrete differential filter that calculates the approximate value of the gradient or gradient rate for the brightness of the image. The Previta filter is a border selection method in image processing that calculates the maximum response on a plurality of convolution cores to find the local orientation of the border in each pixel. The Roberts filter is one of the earliest boundary selection algorithms that calculates the sum of the squares of the differences between diagonally adjacent pixels. The Canney method is a boundary detection operator that uses a multi-step algorithm to detect a wide range of boundaries in images. The Canny Boundary Detector algorithm is not limited to calculating the image gradient. Only the maximum points of the image gradient remain in the border contour. Note that the Prewitt and Sobel method was studied in three versions in order to see all the positive and negative components of these filters. Edge detectors, fingerprints, data processing.</p>
      </abstract>
      <kwd-group>
        <kwd>Methods</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Boundary selection is widely used to solve the following practical problems: car number
recognition [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], cartography [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], clustering, medicine [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], finding text, figures or complex objects,
such as people in the image [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Known methods for identifying the boundaries of objects in the
image and proposed a method for identifying fingerprints.
      </p>
      <p>
        Image segmentation is the division of an image into areas that are not similar in some way. It is
assumed that the areas correspond to real objects or their parts, and the boundaries of the areas
correspond to the boundaries of objects. Segmentation plays an important role in the tasks of image
processing and computer vision [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Segmentation is necessary in pattern recognition and scene
analysis, as contours are usually the most informative and redundant features of the image being
processed.
      </p>
      <p>In the recognition process, recognition accuracy and shorter response times are always desirable
when it is necessary to identify a person in a system
with a database consisting of millions of
fingerprints. In some systems, the size of the database is constantly increasing.
EMAIL:
(M.</p>
      <p>Nazarkevych);
m.kostiak@gmail.com</p>
      <p>2022 Copyright for this paper by its authors.</p>
      <p>
        Segmentation of low quality images is a difficult task. Accurate segmentation of fingerprint
images directly affects the efficiency of extracting small details. If more background areas are
included in the segmented fingerprint of interest, more false functions appear. If some foreground
areas are excluded, useful features may be missed. For image segmentation, methods based on various
statistical and probabilistic models, cluster analysis methods, threshold and gradient methods, and
graph theory methods were most widely used [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>Threshold selection is a major problem with segmentation algorithms. Using different
segmentation thresholds allows you to get different results. Automatic selection of the optimal
threshold is a very difficult task. The proposed method allows you to segment the image without
selecting a threshold. At the same time the base of segments allowing to store their attributes for the
subsequent analysis is formed.</p>
      <p>When using traditional clustering methods, the feature space of image elements is divided into
areas (clusters) and R(  )=1 , when all   are included in one cluster. All  are distributed in
clusters, and then the connected elements of one cluster are combined into segments   In this
method, homogeneity is considered first of all.</p>
      <p>
        Image segmentation is typically used to highlight objects and borders (lines, curves, etc.) in
images. The result of image segmentation is a set of segments that together cover the entire image, or
a set of contours selected from the image. All pixels in a segment are similar in some characteristic or
calculated property, such as color, brightness, or texture. Neighboring segments differ significantly in
this characteristic [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Boundary selection [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] is one of the important tasks of computer vision. The difficulty of solving
this problem is due to the sensitivity of the methods to noise [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], brightness variance and to the
intersection of objects. Given the non-stationary conditions of obtaining input images and the high
sensitivity of algorithms for their processing to noise in the input data, there is a need to build a
deterministic process of applying a particular algorithm. It should be noted that in the practical
application of the Kenny algorithm, researchers focused on the analysis of each type of input data
separately, without comparing the results between different types of images.
      </p>
      <p>
        Segmentation is usually understood as the process of finding homogeneous areas in an image. This
step is very difficult and is generally not fully algorithmized for arbitrary images. Note that one of the
most effective methods of building areas involves the selection of starting points or with the help of
an operator (centroid binding algorithm), or automatically. The method of watersheds based on the
search for local minima with the subsequent grouping of areas around them in terms of connectivity is
effective here [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Development of a Method for Finding Boundaries to Construct Contours of Minutions in Fingerprints</title>
      <p>
        The purpose of finding boundaries in finding boundaries (curves) is to change the brightness or
color [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. In the future, the contours of objects are constructed from the boundaries, and from them
scenes. The input data for the algorithm are images with coordinates x, y, where each element
contains three color components - red, green and blue, denoted x,y red(I), x,y green(I), blue(I ) x,y .
The result of the algorithm is a matrix   , , each element of which is equal to 1, if the pixel with
coordinates (x, y) is the limit of 1, or 0.
      </p>
      <p>
        The solution of this problem must meet the requirements [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] of which the following:
 The algorithm must find as many boundaries as possible present in the image.
 The found boundaries should be as close as possible to the real boundaries.
 One real boundary should not create several parallel boundaries at the output.
 Noise should not create non-existent boundaries.
      </p>
      <p>To check the result of the algorithm, it is necessary to find the real boundaries of objects in the
image and construct a reference matrix   , ,, then calculate the degree of similarity of matrices φ by
the formula
 = | 1, | ∑ , {1,  ℎ
0,  ℎ
  , =   ,
  , ≠   ,
(1)
where |  , | is the number of elements in the matrix E.</p>
      <p>
        Since the known methods of identifying the boundaries of objects in the image are based on the
analysis of a photograph in shades of gray, it is necessary to convert a color image into a halftone
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. You can use object boundary identification methods for this image. Converting to grayscale is
performed for each pixel of the color image.
      </p>
      <p>
        To eliminate the influence of inhomogeneous illumination of the image, it is advisable to exclude
the general background from it and increase its contrast [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Exclusion from the general background
image is carried out in two stages. The first image forms a background image, and the second
subtracts the background image matrix from the main image represented by the two-dimensional
matrix. The value of each pixel of the background image is the arithmetic mean of the intensities of
neighboring pixels. The number of adjacent pixels is selected depending on the thickness of the
boundaries of the papillae of the fingers.
      </p>
      <p>Contrast adjustment is performed by “stretching” the initial brightness range to the range from the
minimum possible to the maximum possible brightness.</p>
      <p>
        One of the classical methods of determining the boundaries of objects in the image can be used to
highlight the boundaries of the papillae of the fingers [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Such methods include the Sobel filter [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ],
the Previta filter [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], the Roberts filter [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], the Lapsassian-Gaussian filter [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and the Canney
method [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>The Sobel filter is a discrete differential filter that calculates the approximate value of the gradient
or the norm of the gradient for the brightness of the image. The Sobel filter is based on the
convolution of the image by small integer filters in the vertical and horizontal directions.</p>
      <p>The Previta filter is a border selection method in image processing that calculates the maximum
response on a plurality of convolution cores to find the local orientation of the border in each pixel.
This method of selecting borders is still a substitution of border templates, because the image is
mapped to a set of templates, and each represents some orientation of the border. The size and
orientation of the border in a pixel is determined by a pattern that best corresponds to the local area of
the pixel.</p>
      <p>The Roberts filter is one of the earliest boundary selection algorithms that calculates the sum of the
squares of the differences between diagonally adjacent pixels. This can be done by convolving the
image with two cores. The conversion of each pixel by a Roberts filter can show a derived image
along non-zero diagonals, and the combination of these converted images can also be considered as a
gradient from the top two pixels to the bottom two.</p>
      <p>The Laplace-Gaussian filter is an analogue of the continuous Laplace operator, defined as a
relation on a graph or a discrete grid. The discrete Lapsasian-Gaussian is defined as the sum of the
second derivatives and is calculated as the sum of the color intensity differences on the neighbors of
the central pixel.</p>
      <p>The Canny method is a boundary detection operator that uses a multi-step algorithm to detect a
wide range of boundaries in images. The Canny boundary detector algorithm is not limited to
calculating the image gradient. Only the maximum points of the image gradient remain in the border
contour. Boundary direction information is used to delete points right next to the boundary and not to
break the boundary itself in the area of local gradient maxima.</p>
      <p>We will evaluate the methods of identifying the boundaries of objects by determining the degree of
discrepancy (1).</p>
      <p>
        =   +|  −  |+  + ℎ (2)
where   is the accuracy factor that characterizes the quality of the method,   – is the actual number
of bubbles in the photo, obtained by reference manual calculation,   – is the number of bubbles
identified by the appropriate method of determining the boundaries,   – is the number of
unidentified bubbles (errors of the first kind),  ℎ – the number of misidentified bubbles (errors of the
second kind). Maximizing the value of the accuracy factor indicates the best identification results
[
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. The best identification results were shown by the Canney method. Its results at this stage of the
study are acceptable for solving the problem of automation of obtaining and processing statistical
information. To compare the two histograms, we use Pearson's criterion 2 s:

 2 = ∑ =1
(  −  )
      </p>
      <p>
        2
 
where  is Pearson's criterion,   is the number of identified bubbles corresponding to the ith interval
of radii, yi is the actual number of bubbles corresponding to the ith interval of radii, k is the number of
data columns (intervals of the range of admissible radius) [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Application of the</title>
    </sec>
    <sec id="sec-4">
      <title>Kenny</title>
    </sec>
    <sec id="sec-5">
      <title>Algorithm to</title>
    </sec>
    <sec id="sec-6">
      <title>Highlight the</title>
    </sec>
    <sec id="sec-7">
      <title>Boundaries of</title>
    </sec>
    <sec id="sec-8">
      <title>Fingerprints</title>
      <p>Kenny's algorithm is an operator for selecting image boundaries. Kenny's goal was to develop an
(3)
(4)
(5)
  , =   , ∙   , ,
  , , =
2  2
1  2 2</p>
      <p>2+ 2
 =</p>
      <p>1
159 4
2
4
||5
2
4
9
9
4
12
5
12
15
12
5
4
9
9
4
12
2
4
5||
4
2
where  is the scattering coefficient.</p>
      <p>The Kenny operator uses Gaussian erosion with σ=1.4</p>
      <p>The search for gradients is to mark the boundaries where the gradient becomes most important.
They can have different directions, so the Kenny algorithm uses four filters to identify horizontal,
vertical, diagonal edges in a blurred image.
optimal algorithm for detecting boundaries that satisfy three criteria.</p>
      <p>1. Good detection (Kenny interpreted this property as increasing the signal-to-noise ratio).
2. Good localization (qualitative detection of the border position).</p>
      <sec id="sec-8-1">
        <title>3. A single solution for one boundary.</title>
        <p>The main stages of the basic algorithm:</p>
      </sec>
      <sec id="sec-8-2">
        <title>Convert a color image to grayscale.</title>
        <p>The color image is converted to shades of gray. Constants in front of the corresponding color
components x,y red(  , ), green(  , ) and blue(  , ) obtained empirically, taking into account the
physiological characteristics of human perception of color. The algorithm is sensitive to noise in the
image, therefore, to remove the noise used a Gaussian = σ , where   , is output pixel; x,y; I is input
pixel; x, y pixel coordinates;   , , is a Gaussian filter given by the formula
where Sx,y is output pixel, Ix,y is input pixel, x, y are pixel coordinates,   , , is Gaussian filter, which
is given by the formula:</p>
        <p>The angle of inclination of the gradient is rounded and can take on values 0, 45, 90, 135.
 = √  2 +   2
Θ = 
(</p>
        <p>)</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>4. Implementation of the Sobel Algorithm for Highlighting the Boundaries of</title>
    </sec>
    <sec id="sec-10">
      <title>Fingerprints</title>
      <p>
        The marginal areas of digital photography represent statistically complex curves in the image,
along which there is a sharp change in brightness. It is proposed to use the Sobel operator as an
algorithm for selecting edges [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. This algorithm is based on calculating the approximate value of the
brightness gradient. The advantage of the Sobel operator is the simplicity of calculations. The
algorithm is based on image convolution in two directions - horizontal and vertical. The formation of
a gradient image using the Sobel operator occurs according to the following rules:
 ( ,  ) = ‖∇ ( ,  )‖ = √ 12
+
      </p>
      <p>22
  =  ( ,  ) ∙</p>
    </sec>
    <sec id="sec-11">
      <title>5. Implementation of the Prewitt Algorithm for Highlighting the Boundaries of Fingerprints</title>
      <p>
        Prewitt [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] is a method of finding contours in image processing, which calculates the maximum
limit of a set of convolution of cores to detect the local orientation of the edge for each pixel. The
Prewitt Edge Detector file is an appropriate way to estimate the size and orientation of an edge.
Although Differential Gradient Edge Detection requires a fairly time-consuming calculation to
estimate orientation by magnitudes in the x and y directions, Previtt edge detection obtains orientation
directly from the nucleus with the maximum response. The set of cores is limited to eight possible
orientations; however, experience shows that the most direct estimates are not much more accurate.
On the other hand, a set of cores requires eight convolutions for each pixel, while a set of cores in the
gradient method requires only two, one core is sensitive to the edges in the vertical direction and one
to the horizontal direction, as shown in Fig. 1.
      </p>
      <p>This algorithm works on the principle of determining the maximum response on the set of matrices
used to detect the local orientation of the boundaries in each pixel. Various matrices are used for this
purpose. You can get eight from one matrix by rearranging its coefficients. The maximum value of
each pixel is the pixel in the resulting image. Its values an be in the range from 1 to 8, depending on
which matrix gave the greatest result. This method is also called border pattern substitution. The
image is mapped to a set of templates, each of which shows the location of the borders. Then the
location of the border in the pixel is formed by a pattern that most closely matches the nearby pixel in
the neighborhood.</p>
    </sec>
    <sec id="sec-12">
      <title>6. Experimental Investigations</title>
      <p>
        Experimental studies of the separation of the edges of the papillomas of the fingers were
performed on the basis of the Prewitt method, and the separation of the border by the Prewitt method
along the X and Y axes, the Sobel algorithm horizontally and vertically was studied, and the
boundaries were separated by the Canney method. The results of the experiments are shown in Fig. 2,
3 and 4 for three different fingerprint samples. Visually, different results are observed, but each of the
processed fingerprints has its own positive aspects of recognition. Before applying the edge selection
methods, it is advisable to filter the image from the effects of noise, which are described in [
        <xref ref-type="bibr" rid="ref25 ref26">25, 26</xref>
        ].
The hardware used in this study in preparation for the experiments is shown in [
        <xref ref-type="bibr" rid="ref27 ref28">27, 28</xref>
        ]. In general,
the construction of the information system is built in [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. Real-time synchronization for computer
vision systems is presented in [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. Statistical estimates of the developed experiments are taken from
[
        <xref ref-type="bibr" rid="ref31">31</xref>
        ], but in this study are not given. [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ] shows machine learning tools for fingerprint identification.
      </p>
    </sec>
    <sec id="sec-13">
      <title>7. Conclusions</title>
      <p>
        The paper shows the experiment as an element of pre-processing or for subjective evaluation
[3336]. In addition, this study shows the possibility of applying these methods in other areas [
        <xref ref-type="bibr" rid="ref14 ref25">14, 25, 37–
40</xref>
        ]. The effectiveness of the considered methods in new / other areas is planned to be investigated in
further works. The paper mentions the procedure of objective evaluation of efficiency and shows the
way to the implementation of automatic fingerprint comparison.
      </p>
      <p>The fact that in some conditions or for certain tasks a certain method is more effective than
another, and in others on the contrary - this is normal. And, it is these experiments that have roughly
shown which method is the most effective for extracting informational features from fingerprints and
we can work with them further. And which is inefficient and no need to spend effort on it when
solving problems of automatic analysis of fingerprints.</p>
    </sec>
    <sec id="sec-14">
      <title>8. References</title>
      <p>[35] Boyko, I., Petryk, M., Fraissard, J. Investigation of the electron-acoustic phonon interaction via
the deformation and piezoelectric potentials in AlN/GaN resonant tunneling nanostructures.
2021, 156, 106928
[36] Petryk, M.R., Boyko, I.V., Khimich, O.M., Petryk, M.M. High-Performance Supercomputer
Technologies of Simulation and Identification of Nanoporous Systems with Feedback for
nComponent Competitive Adsorption. Cybernetics and Systems Analysisthis, 2021, 57(2), pp.
316–328
[37] TajDini, M., et al., Wireless Sensors for Brain Activity—A Survey. In Electronics, Vol. 9, Issue
12, 2092. MDPI AG., 2020. https://doi.org/10.3390/electronics9122092
[38] Hu, Z. B., et al., Authentication System by Human Brainwaves Using Machine Learning and
Artificial Intelligence. In Advances in Computer Science for Engineering and Education IV,
374–388, 2021. https://doi.org/10.1007/978-3-030-80472-5_31
[39] Boyko, I., Mudryk, I., Petryk, M., Petryk, M. High-Performance Adsorption Modeling Methods
with Feedback-Influynces in n-component Nanoporous Media. 2021 11th International
Conference on Advanced Computer Information Technologies, ACIT 2021 - Proceedingsthis
link is disabled, 2021, pp. 441–444
[40] Mashkov, O., Krak, Y., Babichev, S., Bardachov, Y., Lytvynenko, V. Preface Lecture Notes on
Data Engineering and Communications Technologiesthis link is disabled, 2022, 77, pp. v–vi</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Mohammed</surname>
            ,
            <given-names>B. N.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ahmad</surname>
            ,
            <given-names>H. B.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Advanced car-parking security platform using Arduino along with automatic license and number recognition</article-title>
          .
          <source>Academic Journal of Nawroz University</source>
          ,
          <volume>10</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Idrissi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saadi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Manar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Astati</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harrouchi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Nacer</surname>
            ,
            <given-names>J. E.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Contribution of aeromagnetic cartography and lithostratigraphic studies to the identification of blind faults and the Cambrian deposits geometry in Jbel Saghro (eastern Anti-Atlas, Morocco)</article-title>
          .
          <source>Bollettino di Geofisica Teorica ed Applicata</source>
          ,
          <volume>62</volume>
          (
          <issue>1</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Zhu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Research on Data Analysis of Traditional Chinese Medicine with Improved Differential Evolution Clustering Algorithm</article-title>
          .
          <source>Journal of Healthcare Engineering</source>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Tang</surname>
            , J., Han,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tong</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Jia</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Skeletonnet: A topology-preserving solution for learning mesh reconstruction of object surfaces from rgb images</article-title>
          .
          <source>IEEE Transactions on Pattern Analysis and Machine Intelligence.</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dmytruk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hrytsyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vozna</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shevchuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          , ... &amp;
          <string-name>
            <surname>Sheketa</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Evaluation of the effectiveness of different image skeletonization methods in biometric security systems</article-title>
          .
          <source>International Journal of Sensors Wireless Communications and Control</source>
          ,
          <volume>11</volume>
          (
          <issue>5</issue>
          ),
          <fpage>542</fpage>
          -
          <lpage>552</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Lim</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Inertial proximal gradient methods with Bregman regularization for a class of nonconvex optimization problems</article-title>
          .
          <source>Journal of Global Optimization</source>
          ,
          <volume>79</volume>
          (
          <issue>3</issue>
          ),
          <fpage>617</fpage>
          -
          <lpage>644</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Logoyda</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voznyi</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dmytruk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Smotr</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Identification of Biometric Images using Latent Elements</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          . EID:
          <fpage>2</fpage>
          -
          <lpage>s2</lpage>
          .
          <fpage>0</fpage>
          -
          <lpage>85074659529</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Versaci</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Morabito</surname>
            ,
            <given-names>F. C.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Image edge detection: A new approach based on fuzzy entropy and fuzzy divergence</article-title>
          .
          <source>International Journal of Fuzzy Systems</source>
          ,
          <volume>1</volume>
          -
          <fpage>19</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Dronjuk</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Troyan</surname>
            <given-names>O.</given-names>
          </string-name>
          <article-title>The modified amplitude-modulated screening technology for the high printing quality</article-title>
          .
          <source>InInternational Symposium on Computer and Information Sciences 2016 Oct</source>
          <volume>27</volume>
          (pp.
          <fpage>270</fpage>
          -
          <lpage>276</lpage>
          ). Springer, Cham. DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -47217-1_
          <fpage>29</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Torre</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Poggio</surname>
            ,
            <given-names>T. A.</given-names>
          </string-name>
          (
          <year>1986</year>
          ).
          <article-title>On edge detection</article-title>
          .
          <source>IEEE Transactions on Pattern Analysis and Machine Intelligence, (2)</source>
          ,
          <fpage>147</fpage>
          -
          <lpage>163</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Ziou</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Tabbone</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>1998</year>
          ).
          <article-title>Edge detection techniques-an overview. Pattern Recognition and Image Analysis C/C of Raspoznavaniye Obrazov I Analiz Izobrazhenii</article-title>
          ,
          <volume>8</volume>
          ,
          <fpage>537</fpage>
          -
          <lpage>559</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Canny</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>1986</year>
          ).
          <article-title>A computational approach to edge detection</article-title>
          .
          <source>IEEE Transactions on pattern analysis and machine intelligence, (6)</source>
          ,
          <fpage>679</fpage>
          -
          <lpage>698</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Dronyuk</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
            <given-names>M</given-names>
          </string-name>
          , Poplavska
          <string-name>
            <surname>Z</surname>
          </string-name>
          .
          <article-title>Gabor filters generalization based on ateb-functions for information security</article-title>
          .
          <source>InInternational Conference on Man-Machine Interactions 2017 Oct</source>
          <volume>3</volume>
          (pp.
          <fpage>195</fpage>
          -
          <lpage>206</lpage>
          ). Springer, Cham.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hrytsyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voznyi</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vozna</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <article-title>Method of detecting special points on biometric images based on new filtering methods</article-title>
          . // 2021, CEUR Workshop Proceedings 2923, pp.
          <fpage>243</fpage>
          -
          <lpage>251</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lotoshynska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brytkovskyi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dmytruk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dordiak</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Pikh</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2019</year>
          ,
          <article-title>September)</article-title>
          .
          <article-title>Biometric Identification System with Ateb-Gabor Filtering</article-title>
          .
          <source>In 2019 XIth International Scientific and Practical Conference on Electronics and Information Technologies (ELIT)</source>
          (pp.
          <fpage>15</fpage>
          -
          <lpage>18</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Sudharshan</surname>
            ,
            <given-names>K. M.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Design of a Sobel Edge Detection Algorithm on FPGA</article-title>
          .
          <source>Turkish Journal of Computer and Mathematics Education (TURCOMAT)</source>
          ,
          <volume>12</volume>
          (
          <issue>12</issue>
          ),
          <fpage>2458</fpage>
          -
          <lpage>2462</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Munawar</surname>
            ,
            <given-names>H. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aggarwal</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qadir</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>S. I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kouzani</surname>
            ,
            <given-names>A. Z.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Mahmud</surname>
            ,
            <given-names>M. A.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>A gabor filter-based protocol for automated image-based building detection</article-title>
          .
          <source>Buildings</source>
          ,
          <volume>11</volume>
          (
          <issue>7</issue>
          ),
          <fpage>302</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Kang</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>A roberts' adaptive edge detection method</article-title>
          .
          <source>Journal of xi'an jiaotong university</source>
          ,
          <volume>42</volume>
          (
          <issue>10</issue>
          ),
          <fpage>1240</fpage>
          -
          <lpage>1244</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Kong</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akakin</surname>
            ,
            <given-names>H. C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Sarma</surname>
            ,
            <given-names>S. E.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>A generalized Laplacian of Gaussian filter for blob detection and its applications</article-title>
          .
          <source>IEEE transactions on cybernetics</source>
          ,
          <volume>43</volume>
          (
          <issue>6</issue>
          ),
          <fpage>1719</fpage>
          -
          <lpage>1733</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Kistenev</surname>
            ,
            <given-names>Y. V.</given-names>
          </string-name>
          , et al. (
          <year>2019</year>
          , March).
          <article-title>Medical diagnosis using NIR and THz tissue imaging and machine learning methods</article-title>
          .
          <source>In Dynamics and Fluctuations in Biomedical Photonics XVI</source>
          (Vol.
          <volume>10877</volume>
          , p.
          <year>108770J</year>
          ).
          <source>International Society for Optics and Photonics.</source>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliiarnyk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kramarenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Onyshschenko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2016</year>
          ,
          <article-title>August)</article-title>
          .
          <article-title>The method of encryption based on Ateb-functions</article-title>
          .
          <source>In 2016 IEEE First International Conference on Data Stream Mining &amp; Processing (DSMP)</source>
          (pp.
          <fpage>129</fpage>
          -
          <lpage>133</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Bogdan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>1995</year>
          ).
          <article-title>Data driven versions of pearson's chisquare test for uniformity</article-title>
          .
          <source>Journal of statistical computation and simulation</source>
          ,
          <volume>52</volume>
          (
          <issue>3</issue>
          ),
          <fpage>217</fpage>
          -
          <lpage>237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Vincent</surname>
            ,
            <given-names>O. R.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Folorunso</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2009</year>
          , June).
          <article-title>A descriptive algorithm for sobel image edge detection</article-title>
          .
          <source>In Proceedings of informing science &amp; IT education conference (InSITE)</source>
          (Vol.
          <volume>40</volume>
          , pp.
          <fpage>97</fpage>
          -
          <lpage>107</lpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Zhai</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2011</year>
          ,
          <article-title>October)</article-title>
          .
          <article-title>An improved Prewitt algorithm for edge detection based on noised image</article-title>
          .
          <source>In 2011 4th International congress on image and signal processing</source>
          (Vol.
          <volume>3</volume>
          , pp.
          <fpage>1197</fpage>
          -
          <lpage>1200</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>V.</given-names>
            <surname>Hrytsyk</surname>
          </string-name>
          , Andrii Grondzal,
          <string-name>
            <given-names>Andrij</given-names>
            <surname>Bilenkyj</surname>
          </string-name>
          .
          <article-title>Augmented reality for people with disabilities // CSIT'</article-title>
          <year>2015</year>
          . - IEEE. -
          <string-name>
            <surname>Lviv</surname>
          </string-name>
          . -
          <volume>14</volume>
          -17
          <string-name>
            <surname>Sept</surname>
          </string-name>
          . - p.
          <fpage>188</fpage>
          -
          <lpage>191</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Dronyuk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Fedevych</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2015</year>
          ,
          <article-title>October)</article-title>
          .
          <source>Synthesis of Noise-Like Signal Based on Ateb-Functions. In International Conference on Distributed Computer and Communication Networks</source>
          (pp.
          <fpage>132</fpage>
          -
          <lpage>140</lpage>
          ). Springer, Cham.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Tsmots</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teslyuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Vavruk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2013</year>
          ,
          <article-title>February)</article-title>
          .
          <article-title>Hardware and software tools for motion control of mobile robotic system</article-title>
          .
          <source>In 2013 12th International Conference on the Experience of Designing and Application of CAD Systems in Microelectronics (CADSM)</source>
          (pp.
          <fpage>368</fpage>
          -
          <lpage>368</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Tsmots</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsymbal</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khavalko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Skorokhoda</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tesluyk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2018</year>
          ,
          <article-title>August)</article-title>
          .
          <article-title>Neural-like means for data streams encryption and decryption in real time</article-title>
          .
          <source>In 2018 IEEE Second International Conference on Data Stream Mining &amp; Processing (DSMP)</source>
          (pp.
          <fpage>438</fpage>
          -
          <lpage>443</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Medykovskyy</surname>
            ,
            <given-names>M. O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasyeka</surname>
            ,
            <given-names>M. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasyeka</surname>
            ,
            <given-names>N. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turchyn</surname>
            ,
            <given-names>O. B.</given-names>
          </string-name>
          (
          <year>2017</year>
          ,
          <article-title>September)</article-title>
          .
          <article-title>Scientific research of life cycle performance of information technology</article-title>
          .
          <source>In 2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)</source>
          (Vol.
          <volume>1</volume>
          , pp.
          <fpage>425</fpage>
          -
          <lpage>428</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Hrytsyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2021</year>
          , May).
          <article-title>Real-Time Sensing, Reasoning and Adaptation for Computer Vision Systems</article-title>
          . In International Scientific Conference “
          <article-title>Intellectual Systems of Decision Making and Problem of Computational Intelligence”</article-title>
          (pp.
          <fpage>573</fpage>
          -
          <lpage>585</lpage>
          ). Springer, Cham.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , et al. (
          <year>2019</year>
          ).
          <article-title>Development of the quantitative method for automated text content authorship attribution based on the statistical analysis of N-grams distribution</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>6</volume>
          (
          <issue>2</issue>
          ),
          <fpage>28</fpage>
          -
          <lpage>51</lpage>
          . DOI:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2019</year>
          .186834
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , et al. (
          <year>2019</year>
          ).
          <article-title>Design of a recommendation system based on Collaborative Filtering and machine learning considering personal needs of the user</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>4</volume>
          (
          <issue>2</issue>
          ),
          <fpage>6</fpage>
          -
          <lpage>28</lpage>
          . DOI:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2019</year>
          .175507
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , et al.
          <article-title>Evaluation of the effectiveness of different image skeletonization methods in biometric security systems</article-title>
          // 2021, International Journal of Sensors,
          <source>Wireless Communications and Control</source>
          <volume>11</volume>
          (
          <issue>5</issue>
          ), pp.
          <fpage>542</fpage>
          -
          <lpage>552</lpage>
          ; https://doi.org/10.2174/ 2210327910666201210151809
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Hrytsyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Real-Time</surname>
            <given-names>Sensing</given-names>
          </string-name>
          ,
          <article-title>Reasoning and Adaptation for Computer Vision Systems</article-title>
          ,
          <source>ISDMCI 2021: Lecture Notes in Computational Intelligence and Decision Making</source>
          , pp
          <fpage>573</fpage>
          -
          <lpage>585</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>