<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Credibilistic  Fuzzy  Clustering  Method  Based  on  Evolutionary  Approach of Crazy Wolfs in Online Mode </article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alina Shafronenko</string-name>
          <email>alina.shafronenko@nure.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yevgeniy Bodyanskiy</string-name>
          <email>yevgeniy.bodyaskiy@nure.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Iryna Pliss</string-name>
          <email>iryna.pliss@nure.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kharkiv National University of Radio Electronics</institution>
          ,
          <addr-line>Nauky ave 14, Kharkiv, 61166</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>   The problem of big data credibilistic fuzzy clustering is considered. This task was interested, when data are fed in both batch and online modes and has a lot of the global extremums. To find the global extremum of the objective function of plausible fuzzy clustering, a modification of the crazy gray wolfs algorithm was introduced, which combines the advantages of evolutionary algorithms and global random search. It is shown that different search modes are generated by a unified mathematical procedure, special cases of which are well-known algorithms for both local and global optimization. The proposed approach is quite simple in computational implementation and is characterized by high speed and reliability in tasks of multi-extreme fuzzy clustering.</p>
      </abstract>
      <kwd-group>
        <kwd>1  Fuzzy clustering</kwd>
        <kwd>credibilistic fuzzy clustering</kwd>
        <kwd>adaptive goal function</kwd>
        <kwd>evolutionary algorithms</kwd>
        <kwd>gray wolf optimization</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction </title>
      <p>and imitate the natural swarms or communities or systems such as fish schools, bird swarms, cat
swarms, bacterial growth, insect’s colonies and animal herds etc. Evolutionary swarm intelligence
algorithms include many algorithms such ant colony optimization [12], particle swarm optimization
(PSO) [13], artificial bee colony [14], ant lion optimizer (ALO) [15], moth-flame optimization,
dragonfly algorithm, sine cosine algorithm, whale optimization algorithm, multi-verse optimizer, grey
wolf optimizer (GWO) [16], firefly algorithm, cuckoo search, and many others.</p>
      <p>The purpose of the paper is to consider the problem of data fuzzy clustering that is received for
processing in both batch and online modes. To find the global optimum of a multi-extremal objective
function, to develop a method that can find the global extremum of complex functions.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem Statement </title>
      <p>Baseline information for solving the tasks of clustering in a batch mode is the sample of
observations, formed from N n -dimensional feature vectors
X  {x1, x2 ,..., xN }  Rn , xk  X , k  1, 2,..., N .</p>
      <p>
        The problem of fuzzy clustering of data arrays is considered in the conditions when the formed
clusters arbitrarily overlap in the space of features. The source information for solving the problem is
an array of multidimensional data vectors, formed by a set of vector-observations
X  (x(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), x(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),..., x(k ),...x(N ))  Rn where k in the general case the observation number in the
initial array, x(k )  (x1(k ),..., xi (k ),..xn (n))T . The result of clustering is the partition of this array on m
overlapped classes with centroids cq  Rn , q  1, 2,..., m , and computing of membership levels
0  uq (k )  1 of each vector-observation x(k) to every cluster cq .
3. Credibilistic Fuzzy Clustering Method  
      </p>
      <p>Alternatively, to probabilistic and possibilistic procedures [17,18] it was introduced credibilistic
fuzzy clustering approach using as its basis the credibility theory [19, 20] and is largely devoid of the
drawbacks of known methods.</p>
      <p>The most common approach within the framework of probabilistic fuzzy clustering is associated
with minimizing the goal function [3].</p>
      <p>N m
Goal uq (k ), cq     uq (k )d 2  x(k ), cq </p>
      <p>
        k 1 q1
where uq (k ) - membership level, cq - centroid, d - Euclidian metric, β - fuzzifier;
with сonstraints
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
0  Credq (k )  1, for all q and k,

sup Credq (k )  0,5, for all k,

Credq (k )  sup Credl (k )  1,
for any q and k, for which Credq (k )  0,5.
      </p>
      <p>
        It should be noted that the goal functions (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) are similar and that there are no rigid
probabilistic constraints in (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) on the sum of the membership in (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ).
      </p>
      <p>In the procedures of credibilistic clustering, there is also the concept of fuzzy membership, which
is calculated using the neighborhood function of the form</p>
      <p>uq (k) q d  x(k),cq 
monotonically decreasing on the interval [0,] so that  q (0)  1, q ()  0.</p>
      <p>Such a function is essentially an empirical similarity measure of [23] related to distance by the
relation</p>
      <p>
        Note also that earlier it was shown in [16] that the first relation (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) for   2 can be rewritten as
 d 2  x(k ), cq  1 ,
uq (k )  1   q2 
where
uq (k) 
      </p>
      <p>1
1  d 2  x(k ), cq </p>
      <p>.</p>
      <p> 
 q2   md 2  x(k),cl  </p>
      <p>
        
 l1 
 l 
1
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) 
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) 
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        ) 
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) 
(
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
(
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
which is a generalization of the function (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) (for  q2  1 (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) coincides with (
        <xref ref-type="bibr" rid="ref10">10</xref>
        )) and satisfies all the
conditions for (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ).
      </p>
      <p>
        In batch form the algorithm of credibilistic fuzzy clustering in the accepted notation can be written
as [20, 22]
 1
uq (k )  1  d 2  x(k ), cq  ,
uq (k )  uq (k ) sup ul (k )1 ,
 
Credq (k )  12  uq (k )  1  sup ul (k ) ,
 lq 
 N Credq (k ) x(k )

cq  k1 N Credq (k )
 k1
and in the online mode, taking into account (
        <xref ref-type="bibr" rid="ref9">9</xref>
        ), (
        <xref ref-type="bibr" rid="ref10">10</xref>
        ):
1
      </p>
      <p>,
 q2 (k  1)  m



 
uq (k  1)  1 




uq (k  1) 

 d 2  x(k  1), cl (k)
l1
lq</p>
      <p>1
d 2  x(k  1), cq (k) </p>
      <p> ,
 q2 (k  1) 
uq (k  1)
sup ul (k  1)</p>
      <p>,
Credq (k  1)  12  uq (k  1)  1  sup ul (k) ,</p>
      <p>
        
 lq 



cq (k  1)  cq (k)  (k  1)Credq (k  1) x(k  1)  cq (k ).
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        ) 
(
        <xref ref-type="bibr" rid="ref12">12</xref>
        ) 
      </p>
      <p>
        From the point of view of computational implementation, algorithm (
        <xref ref-type="bibr" rid="ref12">12</xref>
        ) is not more complicated
than procedure (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) and, in the general case, is its generalization to the case of credibilistic approach to
fuzzy clustering.
      </p>
    </sec>
    <sec id="sec-3">
      <title>4. Evolutionary Approach of Crazy Wolfs  </title>
      <p>
        To find the global extremum of functions (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ), it is advisable to use bio-inspired
evolutionary algorithms for particle swarm optimization [24], among which the so-called gray wolf
algorithm (GWO) can be noted as one of the fastest coding ones [25]. According to the algorithm
proposed in [25], gray wolves live together and hunt in groups.
      </p>
      <p>The search and hunting process can be described as follows:</p>
      <p>Cα  B1 *GWα  X (t) ,
Cβ  B *GWβ  X (t) ,  </p>
      <p>2
C  B *GWδ  X (t) ,</p>
      <p>δ 3
if the prey is found, they first track, pursue and approach it.</p>
      <p>If the prey runs, then the gray wolves chase, surround and watch the prey until it stops moving,
which can be written as
where G W  ‐ wolf movement function. </p>
      <p>After the prey is found, the attack begins:</p>
      <p>GW1  GWα  A1 * Cα ,
GW2  GWβ  A2 * Cβ ,
GW3  GWδ  A3 * Cδ ,
GW(t)  GW1  GW2  GW3 . 
3</p>
      <p>In a case, when A  1 - gray wolves flee from dominants, which means that omega wolves will
flee from prey and explore more space; if A  1 they approach the dominants, which means that
δwolves will follow the dominants that approach the prey.</p>
      <p>Figure 2: Exploration and exploitation of wolf in GWO</p>
      <p>To achieve a proper trade-off between scouting and hunting, an improved gray wolf algorithm is
proposed.
The change in the positions of the wolves is described as follows:</p>
      <p>С  В * X P (t)  X (t) ,</p>
      <p>X t 1  XP (t)  A*C   ,
where X P - prey position, X - position of the wolf,   - a random perturbation that introduces an
additional scan of the search space.</p>
      <p>To increase the reliability of finding exactly the global extremum of the objective function, you
can use the idea of "crazy cats" - optimization [26, 27], modified by the introduction of a random
walk, which has proven its effectiveness when solving multi-extremal problems. By introducing,
according to L. Rastrigin, an additional search perturbation, it is possible to write down the movement
of the wolf in the form:</p>
      <p>        1    X t  1  X t    2 H  k 
where  - parameter for correction of disturbance characteristics, 0    1 - self-learning speed
parameter,  2 - white noise variance H   .</p>
      <p>In this way, the probability of finding the global extremum of the adopted objective function
increases, which ultimately increases the effectiveness of the fuzzy clustering process.</p>
    </sec>
    <sec id="sec-4">
      <title>5. Experimental Research </title>
      <p>
        The proposed method was tested on well-known multiextremal function such as Ackley's function,
presented in form (
        <xref ref-type="bibr" rid="ref13">13</xref>
        ), Fig. 4:
f (x)  20 exp(0.2 0.5(x2  y2 ) )  exp(0.5 cos(2 y))  e  20.
(
        <xref ref-type="bibr" rid="ref13">13</xref>
        ) 
(
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )  
(
        <xref ref-type="bibr" rid="ref12">12</xref>
        )
      </p>
      <p>Pseudocode of proposed method can write in the form of next steps presented in the Table 1:</p>
      <p>The behavior of Crazy GWO method can tested on multiextremal Ackley's function. Analyzes
was provide on 100 iterations. On Fig. 5 demonstrate search history of global extremum of proposed
function (a), the trajectory of the first variable of the first wolf (b), fitness history of all wolves (c) and
the parameter A (d)</p>
      <p>For further validating the searching accuracy of Crazy GWO method (CGWO) with GWO and
PSO algorithms.</p>
      <p>Two swarm intelligence algorithms (PSO algorithm and GWO algorithm) are selected to carry out
the simulation contrast experiments with the proposed CGWO so as to verify its superiority on the
convergence velocity and searching precision. The simulation convergence results on the adopted
testing functions are shown in Fig. 6:</p>
    </sec>
    <sec id="sec-5">
      <title>6. Discussion </title>
      <p>Analyzing the results of the obtained experimental studies and comparative analysis of the method
of clustering data arrays based on the crazy gray wolf algorithm with clustering methods based on
both the classical approach to data clustering and more exotic ones, the proposed method
demonstrates sufficiently high results.</p>
      <p>The main advantages of the proposed method are the simplicity of mathematical calculations, the
speed of working with data, regardless of the type, size, and quality of the analyzed sample. It should
be noted the accuracy of the data clustering method based on the improved gray algorithm and the
obtained clustering results, which is achieved with the help of the optimization procedure of the
evolutionary algorithm.</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion </title>
      <p>The problem of credibilistic fuzzy clustering of data using a crazy gray wolf algorithm is
considered. The proposed method excludes the possibility of "getting stuck" in local extrema by
means of a double check of finding the dominant wolf in the extremum and, in comparison with the
given calculation error, allows to reduce the number of procedures starts. A feature of the proposed
modified optimization procedure is the possibility of managing random disturbances that determine
the properties of the modified the random walk, that has proven effectiveness when solving
multiextremal problems.</p>
      <p>The approach is quite simple in numerical implementation, allows finding global extrema of
complex functions, which is confirmed by the results of experimental research.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Acknowledgement </title>
      <p>The work is supported by the state budget scientific research project of Kharkiv National
University of Radio Electronics “Development of methods and algorithms of combined learning of
deep neuro-neo-fuzzy systems under the conditions of a short training sample”.</p>
    </sec>
    <sec id="sec-8">
      <title>8. References </title>
      <p>[14] D. Karaboga, An idea based on honey bee swarm for numerical optimization. Technical report,
technical report-tr06, Erciyes University, engineering faculty, computer engineering department,
2005.
[15] S. Mirjalili, The ant lion optimizer. Adv Eng Softw 83, 2015, pp.80–98.
[16] E. Elhariri, N. El-Bendary, A.E. Hassanien, A. Abraham, Grey wolf optimization for
oneagainst-one multi-class support vector machines. 2015 7th international conference of soft
computing and pattern recognition (SoCPaR). IEEE, 2015, pp 7–12.
[17] F.Höppner, F. Klawonn, R. Kruse, T. Runker, Fuzzy Clustering Analysis: Methods for
Classification, Data Analysis and Image Recognition. Chichester, John Wiley &amp;Sons, 1999,
289p.
[18] R. A Krishnapuram, “Possibilistic Approach to Clustering”. IEEE Transactions on Fuzzy</p>
      <p>Systems, May 1993. Vol. 1. pp. 98-110. DOI: 10.1109/91.227387
[19] J. Zhou, Credibilistic clustering: the model and algorithms. International Journal of Uncertainty,
Fuzziness and Knowledge-Based Systems. 2015. Vol. 23, №4. pp. 545-564. DOI:
10.1142/S0218488515500245.
[20] J. Zhou, Credibilistic clustering algorithms via alternating cluster estimation. Journal of</p>
      <p>Intelligent Manufacturing. 2017. Vol. 28. pp.727-738. DOI: 10.1007/s10845-014-1004-6.
[21] J.C. Bezdek, ”A convergence theorem for the fuzzy ISODATA clustering algorithms/ Bezdek
J.C.// IEEE Transactions on Pattern Analysis and Machine Intelligence”. IEEE, 1980. Vol. 2,
№1. pp. 1- 8. DOI: 10.1109/TPAMI.1980.4766964.
[22] Shafronenko A., Bodyanskiy Ye., Klymova I., Holovin O., Online credibilistic fuzzy clustering
of data using membership functions of special type. Proceedings of The Third International
Workshop on Computer Modeling and Intelligent Systems (CMIS-2020), April 27-1 May 2020.</p>
      <p>Zaporizhzhia, 2020. Access mode: http://ceur-ws.org/Vol-2608/paper56.pdf.
[23] Bodyanskiy Ye, Shafronenko A., Mashtalir S., Online robust fuzzy clustering of data with
omissions using similarity measure of special type. Lecture Notes in Computational Intelligence
and Decision Making-Cham: Springer, 2020. pp.637-646.
[24] Shafronenko A., Bodyanskiy Ye. Pliss I., Patlan K. Fuzzy Clusterization of Distorted by Missing
Observations Data Sets Using Evolutionary Optimization. Proceedings “Advanced Computer
Information Technologies (ACIT’2019)”, Česke Budejovice, Czech Republic, June 5-7, 2019,
pp. 217-220. doi: 10.1109/ ACITT.2019.8779888
[25] Shafronenko A. Yu, Bodyanskiy Ye. V., Pliss I.P. ”The Fast Modification of Evolutionary
Bioinspired Cat Swarm Optimization Method”. 2019 IEEE 8th International Conference on
Advanced Optoelectronics and Lasers (CAOL), Sozopol, Bulgaria, 6-8 Sept. 2019, pp. 548-552.
doi: 10.1109/CAOL46282. 2019.9019583
[26] Saha S.K., Kar R., Mandal D., Ghoshal S.P. IIR filter design with craziness based particle swarm
optimization technique. World Academy of Science, Engineering and
Technology-2011pp.1628-16356
[27] Sarangi A., Sarangi S.K., Mukherjee M., Panigrahi S.P. System identification by crazy-cat
swarm optimization. Proc. Int. Conf. on Microwave, Optical and Communication
EngineeringBhubaneswar, India - 2015-Doc.18-29 pp. 439 – 442.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.C.</given-names>
            <surname>Wunsch</surname>
          </string-name>
          , Clustering. Hoboken,
          <string-name>
            <surname>N.J. John Wiley</surname>
          </string-name>
          &amp; Sons, Inc.,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.C.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          , Data Mining: Text Book. Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>T.</given-names>
            <surname>Kohonen</surname>
          </string-name>
          ,
          <string-name>
            <surname>Self-Organizing Maps</surname>
          </string-name>
          . Berlin: Springer,
          <year>1995</year>
          , 362 p.
          <source>DOI: 10.1007/978-3-642- 56927-2.</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>T.</given-names>
            <surname>Back</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.B.</given-names>
            <surname>Fogel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Michalewicz</surname>
          </string-name>
          , Handbook of evolutionary computation. Oxford University Press, New York,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>L.</given-names>
            <surname>Davis</surname>
          </string-name>
          ,
          <article-title>Handbook of genetic algorithms</article-title>
          . Van Nostrand Reinhold, New York,
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Simon</surname>
          </string-name>
          ,
          <article-title>Biogeography-based optimization</article-title>
          .
          <source>IEEE Trans Evol Comput</source>
          ,
          <year>2008</year>
          ,
          <volume>12</volume>
          (
          <issue>6</issue>
          ):
          <fpage>702</fpage>
          -
          <lpage>713</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>N.</given-names>
            <surname>Hansen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kern</surname>
          </string-name>
          ,
          <article-title>Evaluating the CMA evolution strategy on multimodal test functions</article-title>
          .
          <source>International conference on parallel problem solving from nature</source>
          . Springer,
          <year>2004</year>
          , pp
          <fpage>282</fpage>
          -
          <lpage>291</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hohfeld</surname>
          </string-name>
          , G. Rudolph,
          <article-title>Towards a theory of populationbased incremental learning</article-title>
          .
          <source>Proceedings of the 4th IEEE conference on evolutionary computation</source>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.R.</given-names>
            <surname>Koza</surname>
          </string-name>
          ,
          <article-title>Genetic programming: on the programming of computers by means of natural selection</article-title>
          . MIT Press, Cambridge,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>R.</given-names>
            <surname>Storn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Price,</surname>
          </string-name>
          <article-title>Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces</article-title>
          .
          <source>J Global Optim</source>
          ,
          <year>1997</year>
          ,
          <volume>11</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>341</fpage>
          -
          <lpage>359</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Engelbrecht</surname>
          </string-name>
          ,
          <article-title>Fundamentals of computational swarm intelligence</article-title>
          . Wiley, Hoboken,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dorigo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.M.</given-names>
            <surname>Gambardella</surname>
          </string-name>
          ,
          <article-title>Ant colony system: a cooperative learning approach to the traveling salesman problem</article-title>
          .
          <source>IEEE Trans Evol Comput</source>
          ,
          <year>1997</year>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>53</fpage>
          -
          <lpage>66</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>R.</given-names>
            <surname>Eberhart</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kennedy</surname>
          </string-name>
          ,
          <article-title>A new optimizer using particle swarm theory</article-title>
          .
          <source>Proceedings of the sixth international symposium on micro machine and human science</source>
          ,
          <year>1995</year>
          . MHS'95. IEEE, pp
          <fpage>39</fpage>
          -
          <lpage>43</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>