<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Correlation Method of Dangerous Objects Detection for Aviation Security Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maksym Zaliskyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Migel</string-name>
          <email>migel_S@i.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alina Osipchuk</string-name>
          <email>alina.osipchuk2012@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Denys Bakhtiiarov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Lubomyr Huzar ave., Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Aviation security services have significant value for aviation safety. Aviation security services include personnel and technical equipment for dangerous and prohibited object detection. The X-ray screening system is the main equipment for baggage contain determining. The X-ray security devices give the possibility to detect weapons, including handguns, knives, and others. The high value of the probability of false detection of X-ray screening systems requires the development of new methods of image processing. Therefore, this paper concentrates on the synthesis and analysis of methods for handgun recognition while operating the X-ray screening system. The synthesis is based on a special image processing technique using a comparison of verified images with etalon images. During this, we use the correlation coefficient to determine verified object similarity with etalons inside the database and define their mutual rotation and resizing. The analysis is associated with computer modeling for estimating probabilistic characteristics of method efficiency.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Image processing</kwd>
        <kwd>recognition</kwd>
        <kwd>correlation coefficient</kwd>
        <kwd>baggage screening</kwd>
        <kwd>aviation security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        One of the main problems in civil aviation is to
increase the safety and regularity of aircraft flights
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Different reasons can affect safety. The
general approach considers two types of threats
that include unintentional and deliberate
behaviors [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The unintentional behavior does not
involve acts of unlawful interference. This case
refers to random events occurring in the aviation
system [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Such events can be connected with all
supported resources for flight processes [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. There
are various factors associated with unintentional
behavior, but the most important of them are:
1. Reliability of aviation equipment and the
possibility of random and gradual failures,
damages, and malfunctions occurrence
[
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
2. Human factors, including maintenance
personnel and aircraft pilots [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
3. Organizational factors and environmental
conditions [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ].
      </p>
      <p>The deliberate behavior of terrorists and
criminals can significantly reduce the level of
aviation safety. To counter such events, the
aviation security service operates at airports. Each
passenger and their baggage must be checked
before they enter the aircraft.</p>
      <p>
        The aviation security service includes
personnel and technical equipment to implement
the function of dangerous and prohibited object
detection. Personnel must be appropriately
trained. Technical equipment creates a system of
levels, on each of which different threats must be
detected and eliminated [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. For these purposes,
personnel uses screening equipment, detectors of
explosives, video surveillance devices, access
control systems, alarm systems, and others.
      </p>
      <p>
        A new challenge in the era of digital
information technology development and
utilization is protection against cyberterrorism.
This threat can be realized using different types of
cyberattacks, spreading false information aimed
to impair airport operations [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">11–13</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature Review and Problem</title>
    </sec>
    <sec id="sec-3">
      <title>Statement</title>
      <p>
        Following international requirements and
recommendations, screening inspection measures
should be organized at the airports. Screening
usually contains three or five levels. To analyze
the internal structure of the baggage, the personnel
of the aviation security service uses X-ray devices
[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The experience of equipment operation
shows that the main disadvantage of modern
Xray systems is a high level of probability of false
alarms [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ]. In some cases, this probability can
reach levels of 0.3, which means that three of ten
items of baggage need an additional inspection. It
is clear that this negatively affects the speed of
security control and reduces the level of
throughput of airport passenger traffic.
      </p>
      <p>
        To improve the efficiency of X-ray screening
systems, designers use two approaches. The first
approach is related to the modernization of
equipment operation processes [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ]. Such
modernization can be applied to all elements of
the operation system, including maintenance and
repair processes, parameter monitoring and
control of the technical condition of equipment,
and others [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. The second approach involves the
usage of more efficient data processing
procedures [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ]. The data in the aviation
security X-ray system are images of scanned items
of baggage. Therefore, the data are a
twodimensional array of discrete values
corresponding to the shades of the intensity of
image pixels.
      </p>
      <p>
        The literature considers many different
methods of image processing for X-ray systems.
The research [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] concentrates on classical
methods of image processing. The methods of
processing can be divided into the detection
methods for the given object, methods of noise
filtration, methods for the definition of object
contours, methods of highlighting the image in a
given area of the color gamut, and others [
        <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
        ].
      </p>
      <p>
        Effective data processing methods can
significantly simplify security control processes
based on automating the detection of dangerous
objects [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>
        Research [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] concentrates on the algorithm
for the recognition of dangerous objects based on
an implicit shape model. The authors developed
the visual vocabulary of objects for detection. The
proposed approach has good probabilistic
characteristics of detection for shuriken and razor
blades (probability of correct detection is
0.97 … 0.99 and probability of false alarm is
0.02 … 0.06) and sufficient probabilistic
characteristics for handguns (corresponding
probabilities are equal to 0.89 and 0.18,
respectively). Paper [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] presents a similar
approach to weapon recognition. In addition, the
authors proposed a component-based strategy
with fast robust properties. Research [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] deals
with the weapon detection algorithm while
screening vehicles. The proposed approach
consists of the following steps: pre-processing,
database usage, obtained image binarization,
detection of edges, and weapon detection after
edges comparison with information from the
database. Conducting an experiment study gave
authors the possibility to conclude about 80%
accuracy of the developed methodology.
      </p>
      <p>A new trend in image processing is the usage
of artificial intelligence techniques and Neural
Networks (NNs). In the branch of X-ray image
processing, the most convenient type of NN is
Convolutional NN (CNN). A literature search
gives many examples of CNN utilization for the
tasks of dangerous object detection.</p>
      <p>
        Publication [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] deals with the research of the
pre-trained CNN using the paradigm of transfer
learning. Such CNN is used for the recognition of
handguns and provides high efficiency in terms of
the probability of false alarms. The authors
obtained the value of corresponding probability
approximately equal to 0.0021.
      </p>
      <p>
        Paper [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] presents an efficiency analysis of
CNN utilization for the recognition of different
objects. The possible ways of CNN modernization
for X-ray systems are considered in the
publication [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. We can conclude that CNN is an
effective and robust method for the recognition of
weapons and other prohibited objects, but it has
weakness in the necessity of high enough
computing time and power [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ].
      </p>
      <p>
        The literature considers different approaches
for data processing and detection in many fields
of study, for example, those given in publications
[
        <xref ref-type="bibr" rid="ref32">32–37</xref>
        ], which could be adapted for automated
Xray screening systems. Data processing
techniques in the field of detection can be applied
for tasks of object recognition on X-ray images.
      </p>
      <p>Mentioned analysis of the literature shows
insufficient probabilistic characteristics of
detection while X-ray security system image
processing. Therefore, the aim of this paper is a
synthesis of a new method for dangerous object
recognition, an analysis of the efficiency of the
proposed method, and the formation of
recommendations for this method's improvement.</p>
    </sec>
    <sec id="sec-4">
      <title>3. Methodology</title>
      <p>The X-ray security system consists of a
transmitter and receiver of X-ray radiation. The
transmitter unit contains a radiation source (X-ray
tube), a power supply unit, and collimators (to
form the scan beam). The receiver unit contains a
detector line, optical-to-electrical and
electricalto-optical signal convertors, a unit for image
processing, and a device for information display.
Baggage is placed on a conveyor and moved
through the scanning area between the transmitter
and receiver.</p>
      <p>The detector line of the receiver records one of
the parameters of attenuated radiation that
propagates through the baggage. Received
parameter values are encoded in gamut luminosity
or grayscale. In this situation, the received
parameter is a three-dimensional function of the
coordinates (x, y, z). However, since the monitor
of the X-ray security system displays a
twodimensional image, we will consider the
brightness function to be two-dimensional for a
further solution to our problem. Let the brightness
function is ( x, y) . In this case, the abscissa and
ordinate will indicate a specific image pixel on the
monitor of the X-ray security system.</p>
      <p>The problem of improving the unit for image
processing is not new. However, this problem is
still relevant today due to several reasons:
1. A constant increase in the variety of
prohibited and dangerous items.
2. The possibility of noises that distort the
quality of the image.
3. An increase in the complexity of airport
structure and the increasing level of airport
passenger traffic.
4. Limitation for time to make correct
decisions on aviation security measures.</p>
      <p>There are two ways to the improvement of the
unit for image processing associated with the
hardware and software. However, both
approaches require new efficient methods of data
processing. In these conditions, statistical and
filtering techniques are very relevant.</p>
      <p>To examine the proposed method, this research
uses computer modeling and statistical
simulation. In addition, it should be noted that our
approach is at the first stage of development, so
some limitations will be used.</p>
      <p>The flowchart of data processing procedures
while recognizing dangerous objects on the X-ray
security system image is shown in Fig. 1.
s
t
c
e
jb e
o s
su aab
o t
reg ad
n
a
D</p>
      <sec id="sec-4-1">
        <title>Image obtaining</title>
      </sec>
      <sec id="sec-4-2">
        <title>Image preprocessing</title>
      </sec>
      <sec id="sec-4-3">
        <title>Determining the possible location of searched object</title>
      </sec>
      <sec id="sec-4-4">
        <title>Detection</title>
      </sec>
      <sec id="sec-4-5">
        <title>Estimation of</title>
        <p>probabilistic
characteristics for
detected object</p>
        <p>The first procedure is image obtaining. This
procedure is implemented in an X-ray security
system based on encoding the level of attenuated
radiation into the brightness. The image has the
form of a two-dimensional array with the
corresponding value of brightness. The metal
objects completely absorb radiation, and then the
value in the array for this case will be equal to
zero. The maximum possible value in the array
corresponds to receiving radiation without
attenuation.</p>
        <p>The second procedure is signal preprocessing.
This procedure concentrates on the initial
preparation of the image for subsequent
operations. Preprocessing can contain image noise
filtration, image dimensions change, selection of
the objects with given attenuation of radiation,
and others. For example, if we want to recognize
handguns, we will select only metal objects with
complete attenuation of the signal. However, such
selection decreases the quality of dangerous
object detection, because weapons can be
produced using 3D printers and other materials.</p>
        <p>The next procedure is possible to position
determination for the searched object. This
procedure can be implemented using different
transformations to decision space, various
clustering techniques, spatial spectra calculation,
and others.</p>
        <p>The detection procedure assumes decisive
statistics calculation and comparison of their
values with a threshold. The threshold can be
computed using some priori information, for
example about the probability of false alarm for
given statistical characteristics of noise.</p>
        <p>To synthesize the efficient algorithm for
different object detection, the reference database
of searched object masks can be used. In the
general case, the masks give the possibility to train
the detector and improve the quality of detection.
The X-ray security system must contain filter
banks for different dangerous objects. This study
uses seven types of etalons for handguns that need
to be detected. The etalons description is shown in
Fig. 2.</p>
        <sec id="sec-4-5-1">
          <title>Etalon 1</title>
        </sec>
        <sec id="sec-4-5-2">
          <title>Etalon 2</title>
        </sec>
        <sec id="sec-4-5-3">
          <title>Etalon 3</title>
        </sec>
        <sec id="sec-4-5-4">
          <title>Etalon 4</title>
        </sec>
        <sec id="sec-4-5-5">
          <title>Etalon 5</title>
        </sec>
        <sec id="sec-4-5-6">
          <title>Etalon 6</title>
        </sec>
        <sec id="sec-4-5-7">
          <title>Etalon 7</title>
          <p>The last procedure of data processing is an
estimation of probabilistic characteristics for
detected objects. This procedure assumes
calculation receiver operating characteristics for
different noise situations, calculation of error
matrix, and others.</p>
          <p>In this paper, we concentrate on only
techniques for handgun detection. This technique
is based on the correlation coefficient calculation
of analyzed images and etalons.</p>
          <p>Before explaining the step-by-step procedure
of detection, let's introduce limitations:
1. The object of the search is the handgun.
2. The preprocessing procedure filter all
noises in the image.
3. The object of search has an arbitrary angle
of rotation and arbitrary scale factor.
4. The area of possible location of a handgun
is selected in the image.
5. The handgun can be produced using 3D
printers.</p>
          <p>The calculations of all steps for the detection
procedure were carried out in the MathCAD
program.</p>
          <p>Consider the step-by-step procedure of
detection.</p>
          <p>Step 1. Reading images of selected areas of
analyzed items and etalons. It is possible to
perform simultaneous studies for all etalons. For
simplicity, this methodology presents only one of
them. The example of the selected area and etalon
6 images are shown in Fig. 3.</p>
          <p>a
b</p>
          <p>In the MathCAD program, images were
obtained using the built-in operator read_image().
In addition, at this step, it is possible to distort the
image by adding noise to it. Two noise generators
have been implemented: Gaussian and Rayleigh.
Noise parameters can be adjusted, and it is
possible to estimate the signal-to-noise ratio.</p>
          <p>Step 2. Image binarization. To speed up the
computing process, it may be useful to filter out
pixels of small amplitudes—insignificant ones.</p>
        </sec>
      </sec>
      <sec id="sec-4-6">
        <title>The remaining</title>
        <p>pixels can be considered as
significant. To implement this procedure, the
thresholds for etalons and analyzed images were
chosen. The results of the calculation are matrices
B(x, y) that contain zeroes and ones.</p>
        <p>The
example
of</p>
        <p>binarization for images
presented in Fig. 3 is shown in Fig. 4.</p>
        <p>a
b
1
0
1
0
0
0
 c =
where Nx and Ny are image dimensions.</p>
        <p>Obtained estimate of the center is weighed
center with taking into account pixel intensity.</p>
        <p>The results of the calculation generate centers
for analyzed images (xc; yc) and etalons (xcEi; ycEi).</p>
        <p>The image movement is realized using the
matrix method of graphics processing [38]. The
translation matrix in this case will be
 E = (0
0  c −  cE
1  c −  cE ).</p>
        <p>1
1</p>
        <p>The coordinates of each pixel of the etalon are
transformed according to the equation
 Em
the sums of all distances in the radial matrices for
all possible sectors. The example of obtained
dependencies is shown in Fig. 6.
a
b
images: a) tested image; b) image of etalon 6</p>
        <p>The movement of the etalon image to the
position of the analyzed one may require not only
rotation but also reflection. Therefore, we created
a reversible</p>
        <p>matrix of accumulated sums of
distances in the discrete sectors for the etalon
image to further use it in sliding processing for
step-by-step evaluation of the correlation with a
reflected copy and to make a decision about the
need to perform reflection transformation.</p>
        <p>The next stage of calculation is an estimation
of the correlation coefficient. For this purpose,
direct and reverse matrices were extended to two
complete rotations. After that, we used the
estimation</p>
        <p>windows that moved along extended
matrices.
correlation coefficient allows making decisions
about image reflection. In this numerical case,
reverse sliding provides the greater value of the
global maximum, so the etalon image should be
reflected.</p>
        <p>To perform</p>
        <p>reflection transformation, we
used the matrix equation with reflection matrix
about the x-axis of the following type

= (0
1
0
0
0
−1
0
0).</p>
        <p>1
for (a) direct sliding and (b) reverse sliding</p>
        <p>Then we can estimate the RA α. This angle
corresponds to the argument of a maximum of
global maximums for the correlation coefficient
for direct and reverse sliding, i.e.
α = −
2</p>
        <p>argmax( dir( ),  rev( )),
 s
where j is several discrete scan sectors,  dir( ) and
 rev( ) are correlation coefficients for direct and
reverse sliding, respectively.</p>
        <p>For considered numerical example, the
estimate of RA is equal to—6.075 radians.</p>
        <p>To perform rotation of etalons, we used the
matrix equation with rotation matrix about the
center of the coordinate system of the following
type</p>
        <p>cosα − sinα 0
 E = ( sinα cosα 0).</p>
        <p>0 0 1</p>
        <p>It should be noted that to implement this
procedure, etalon images were moved to the
coordinate system origin, reflected in case of
necessity, rotated, and moved back to the initial
point. Therefore, this operation requires two
translation matrices of the following types
1 0 − c 1 0  c
 1 = (0 1 − c) ,  2 = (0 1  c).</p>
        <p>0 0 1 0 0 1</p>
        <p>The complete transformation matrix for Step 4
will take the following form
 α = { 2</p>
        <p>E  1, if max( dir)&lt; max( rev),</p>
        <p>2 E  1, otherwis e.</p>
        <p>After performing the matrix calculation, we
can obtain the following result
a) if max( dir)&lt; max( rev),</p>
        <p>2 E  1 =
cosα − sinα  c −  c cosα +  csinα
= (− sinα − cosα  c +  c sinα +  c cosα) ;
0 0 1
b) if max( dir)≥ max( rev),</p>
        <p>1 E  2 =
cosα − sinα  c −  c cosα +  csinα
= ( sinα cosα  c −  c sinα −  c cosα).</p>
        <p>0 0 1</p>
        <p>The example of the transformation result is
shown in Fig. 8. Visual analysis of obtained radial
matrices shows the approximately same shape of
both dependencies.</p>
        <p>Step 5. Estimation of the scale factor. This step
is associated with solving the optimization task for
the correlation coefficient.</p>
        <p>For this purpose, we perform direct and reverse
linear movement of images of radial
transformations of the etalon image relative to the
tested one and vice versa with sliding correlation
coefficient estimation.
a</p>
        <p>a
b
Figure 8: Radial matrices for images: a) tested
image; b) image of etalon 6</p>
        <p>In this case, we use the property of radial
matrices, which is connected with the fact that the
number of distance rings between any two
arbitrary points of the same image with different
scaling factors is the same, which allows
estimating the correlation coefficient using a
sliding distance window. The success of the
described procedure requires sliding the radial
matrix of larger objects relative to the radial
matrix of smaller objects. However, since the size
of each of the objects is unknown, it is necessary
to check both sliding options.</p>
        <p>Fig. 9 presents the dependence of the
correlation coefficient estimates on the scale
factor for both sliding options. Visual analysis of
dependencies shows the existence of maximum in
one of two cases. The maximum values are equal
to 0.69 and 0.108 for direct and reverse sliding,
respectively.
b
Figure 9: Estimates of the correlation coefficient
for (a) direct sliding and (b) reverse sliding

0

0
0
0
1
0).
correlation coefficient allows estimating the scale
factor s. This factor corresponds to the argument
of the maximum correlation coefficient for direct
and reverses sliding, i.e.</p>
        <p>= 2
arg max( dir( ), rev( ))
.</p>
      </sec>
      <sec id="sec-4-7">
        <title>For considering</title>
        <p>numerical examples the
estimate of the scale factor is equal to—0.479.</p>
        <p>To perform the scaling procedure, we used the
matrix equation with a scaling
matrix of the
following type</p>
        <p>E = (0</p>
        <p>It should be noted that to implement this
procedure, etalon images were moved to the
coordinate system origin, scaled, and moved back
to the initial point. The complete transformation
matrix for Step 5 will take the following form

 =  1 E  2 = (0 

0
0  c −   c
0
 c −   c ).</p>
        <p>1</p>
        <p>An example of the transformation result is
shown in Fig. 10.
a) tested image; b) image of etalon 6</p>
        <p>Step 6. Final decision-making. This procedure
consists of two operations. The first operation is a
calculation of the correlation coefficient between
the analyzed image and the transformed image of
the etalon. The second operation is a comparison
of the correlation coefficient with the threshold. If
the calculated correlation is greater than the
threshold, the decision on dangerous object
presence will be made.</p>
        <p>The main problem is the threshold value
determination. In this research, the threshold
value
was
calculated
based
on
computer
modeling. The value of the threshold corresponds
required value of the probability of a false alarm.
For our study, we computed the approximate
value of the threshold for a decision about
handgun presence for a 0.01 probability of a false
alarm. This threshold is approximately equal to
0.71. In future research, we will try to find the
value of the threshold taking into account noise
influence based on statistical simulation.</p>
        <p>For the presented numerical example, the final
correlation coefficient is equal to 0.799. This
value exceeds the threshold, so we have the
correct detection of handguns.</p>
        <p>The flowchart of the proposed method for
handgun detection is shown in Fig. 11.</p>
        <p>Start
Tested image,</p>
        <p>etalons
Data arrays for
images forming
Binarization of</p>
        <p>images
Combination of
images centers
Estimation of RA and
etalons rotation
max(rdir)&lt; max(rrev)</p>
        <p>Yes</p>
        <p>Etalon
reflection
Estimation of scale
factor and etalons</p>
        <p>scaling
Comparing correlation
coefficient with</p>
        <p>threshold</p>
        <p>Decision on
handgun presence</p>
        <p>Finish</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Results and Discussion</title>
      <p>To estimate the efficiency of the proposed
method of detection, it is necessary to perform an
analysis. In classical interpretation, the analysis of
the detector assumes the calculation of receiver
operating characteristics. However, according to
the introduced limitations we process the image
without
noise.</p>
      <p>In
this
case,
the
analysis
concentrates on the calculation of a matrix of
correct and erroneous decisions while handgun
recognition.</p>
      <p>The analysis was carried out using the
designed program in MathCAD. To test the
possible decision-making, two types of tested
images were generated. The first type is one of the
etalon images with an arbitrary angle of rotation
and arbitrary scale factor. The second type is one
of the tested images, including other dangerous
objects (weapons) and non-dangerous objects.
The basic types of tested images are shown in
Fig. 12.</p>
      <p>Image 1
Image 4
Image 7</p>
      <p>Image 2</p>
      <p>Image 3
Image 5</p>
      <p>Image 6
Image 8</p>
      <p>Image 9
Image 10</p>
      <p>Image 11</p>
      <p>Image 12
Image 13</p>
      <p>Image 14</p>
      <p>Image 15</p>
      <p>Image 16 Image 17
Figure 12: The images for detector testing
Image 18</p>
      <p>The results of correlation coefficient
calculation in the case of etalon (E) and tested
image (I) recognition are given in Table 1 and
Table 2, respectively.</p>
      <p>The data in Table 1 was obtained without
rotation and scaling. The diagonal elements in
Table 1 correspond to the maximum value of the
correlation coefficient. Rotating and scaling
reduce the correlation coefficient estimate to
0.95. Computer simulation made it possible to
estimate the probability of correct detection of
the handgun, which was 0.882 for false alarm
probability equal to 0.01. The non-detected
weapons (and correspondingly low correlation
coefficient) in Table 2 are due to the absence of
etalons in the filter bank for tested images 1–7.
The data in Table 2 was obtained for random
values of rotation and scaling of tested images.</p>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusions</title>
      <p>The paper concentrates on the synthesis and
analysis of methods for handgun recognition
while X-ray security system operation. The
proposed method is based on a special image
processing technique using a comparison of
verified images with etalon images. The
modeling gives the possibility to determine the
probabilities of correct detection and false alarm
(0.882 and 0.01, respectively). The future scope
is associated with increasing the efficiency of
detection by introducing new etalons and
combining the correlation approach with the
spectral technique of detection.</p>
    </sec>
    <sec id="sec-7">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>I.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Marais</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kuzmenko</surname>
          </string-name>
          ,
          <article-title>Aircraft Positioning Using Multiple Distance Measurements</article-title>
          and
          <string-name>
            <given-names>Spline</given-names>
            <surname>Prediction</surname>
          </string-name>
          , Aviation,
          <volume>26</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . doi:
          <volume>10</volume>
          .3846/aviation.
          <year>2022</year>
          .
          <volume>16589</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Cusick</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cortes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Rodrigues</surname>
          </string-name>
          , Commercial Aviation Safety, 6th ed.,
          <source>McGraw Hill</source>
          , New York (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>I.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kuzmenko</surname>
          </string-name>
          ,
          <source>Configuration Analysis of European Navigational Aids Network, Integr. Communs. Navig. Surveill. Conf. (ICNS)</source>
          , Dulles,
          <string-name>
            <surname>VA</surname>
          </string-name>
          , USA, (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICNS52807.
          <year>2021</year>
          .
          <volume>9441576</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>G.F.</given-names>
            <surname>Titterton</surname>
          </string-name>
          , Aircraft Materials &amp; Processes, 5th ed.,
          <source>Sterling Book House</source>
          , Mumbai, India, (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          et al.,
          <source>Data Processing Through the Lifecycle of Aviation Radio Equipment, 17th Int. Conf. Comput. Scis. Inf. Technols. (CSIT)</source>
          , Lviv, Ukraine, (
          <year>2022</year>
          ,)
          <fpage>146</fpage>
          -
          <lpage>151</lpage>
          . doi:
          <volume>10</volume>
          .1109/ CSIT56902.
          <year>2022</year>
          .
          <volume>10000844</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          et al.,
          <source>Model Building for Diagnostic Variables During Aviation Equipment Maintenance, 17th Int. Conf. Comput. Scis. Inf. Technols. (CSIT)</source>
          , Lviv, Ukraine, (
          <year>2022</year>
          )
          <fpage>160</fpage>
          -
          <lpage>164</lpage>
          . doi:
          <volume>10</volume>
          .1109/CSIT56902.
          <year>2022</year>
          .
          <volume>10000556</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>E.</given-names>
            <surname>Salas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Maurino</surname>
          </string-name>
          , Human Factors in Aviation, 2nd ed., Academic Press, Burlington, (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Averyanova</surname>
          </string-name>
          et al.,
          <article-title>Turbulence Detection and Classification Algorithm Using Data from AWR, 2022 IEEE Ukrainian Microw</article-title>
          .
          <source>Week (UkrMW)</source>
          ,
          <source>Kyiv</source>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>I.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kuzmenko</surname>
          </string-name>
          ,
          <article-title>Statistical Analysis and Flight Route Extraction from Automatic Dependent SurveillanceBroadcast Data, Integr</article-title>
          .
          <source>Communs. Navig. Surveill. Conf. (ICNS)</source>
          , Dulles,
          <string-name>
            <surname>VA</surname>
          </string-name>
          , USA, (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          . doi:
          <volume>10</volume>
          .1109/ ICNS54818.
          <year>2022</year>
          .
          <volume>9771515</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sweet</surname>
          </string-name>
          , Aviation and
          <string-name>
            <given-names>Airport</given-names>
            <surname>Security</surname>
          </string-name>
          .
          <source>Terrorism and Safety Concerns</source>
          , CRC Press, Taylor &amp; Francis Group, Boca Raton, (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <source>Critical Aviation Information Systems Cybersecurity, Meet. Secur. Challs. Thr. Data Anals. Decis. Support</source>
          ,
          <volume>47</volume>
          (
          <issue>3</issue>
          ) (
          <year>2016</year>
          )
          <fpage>308</fpage>
          -
          <lpage>316</lpage>
          . doi:
          <volume>10</volume>
          .3233/978-1-
          <fpage>61499</fpage>
          -716-0-308.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>K.</given-names>
            <surname>Khorolska</surname>
          </string-name>
          , et al.,
          <article-title>Application of a Convolutional Neural Network with a Module of Elementary Graphic Primitive Classifiers in the Problems of Recognition of Drawing Documentation and Transformation of 2D to 3D Models</article-title>
          ,
          <source>Journal of Theoretical and Applied Information Technology</source>
          <volume>100</volume>
          (
          <issue>24</issue>
          ) (
          <year>2022</year>
          )
          <fpage>7426</fpage>
          -
          <lpage>7437</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Z. B.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <source>Authentication System by Human Brainwaves Using Machine Learning and Artificial Intelligence</source>
          , in: Advances in Computer Science for Engineering and
          <string-name>
            <surname>Education IV</surname>
          </string-name>
          (
          <year>2021</year>
          )
          <fpage>374</fpage>
          -
          <lpage>388</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -80472- 5_
          <fpage>31</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Mery</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Saavedra</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Prasad, XRay Baggage Inspection With Computer Vision: A Survey</article-title>
          , IEEE Access,
          <volume>8</volume>
          (
          <year>2020</year>
          )
          <fpage>145620</fpage>
          -
          <lpage>145633</lpage>
          . doi:
          <volume>10</volume>
          .1109/ ACCESS.
          <year>2020</year>
          .
          <volume>3015014</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.</given-names>
            <surname>Riffo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Mery</surname>
          </string-name>
          ,
          <source>Automated Detection of Threat Objects Using Adapted Implicit Shape Model, IEEE Trans. Syst. Man Cyberns. Systs</source>
          .
          <volume>46</volume>
          (
          <issue>4</issue>
          ) (
          <year>2016</year>
          )
          <fpage>472</fpage>
          -
          <lpage>482</lpage>
          . doi:
          <volume>10</volume>
          .1109/TSMC.
          <year>2015</year>
          .
          <volume>2439233</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>R.</given-names>
            <surname>Voliansky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pranolo</surname>
          </string-name>
          ,
          <source>Parallel Mathematical Models of Dynamic Objects, Int. J. Adv. Intell. Informs</source>
          .
          <volume>4</volume>
          (
          <issue>2</issue>
          ) (
          <year>2018</year>
          )
          <fpage>120</fpage>
          -
          <lpage>131</lpage>
          . doi:
          <volume>10</volume>
          .26555/ijain.v4i2.
          <fpage>229</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          , et. al.,
          <source>Data Processing Method for Deterioration Detection During Radio Equipment Operation, Workshop Microw. Theory Techs. Wirel. Communs. (MTTW)</source>
          , Riga, Latvia, (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/MTTW.
          <year>2019</year>
          .
          <volume>8897232</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>I. Ostroumov</surname>
          </string-name>
          et al.,
          <source>Relative Navigation for Vehicle Formation Movement, 3rd KhPI Week on Adv. Tech. Kharkiv, Ukraine</source>
          , (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/KhPIWeek57572.
          <year>2022</year>
          .
          <volume>9916414</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          , et. al.,
          <source>Sequential Procedure of Changepoint Analysis During Operational Data Processing, Workshop Microw. Theory Techs. Wirel. Communs. (MTTW)</source>
          , Riga, Latvia, (
          <year>2020</year>
          )
          <fpage>168</fpage>
          -
          <lpage>171</lpage>
          . doi:
          <volume>10</volume>
          .1109/MTTW51045.
          <year>2020</year>
          .
          <volume>9245068</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>I.</given-names>
            <surname>Prokopenko</surname>
          </string-name>
          , I. Omelchuk,
          <string-name>
            <given-names>M.</given-names>
            <surname>Maloyed</surname>
          </string-name>
          ,
          <article-title>Synthesis of Signal Detection Algorithms Under Conditions of Aprioristic Uncertainty, Ukrainian Microw</article-title>
          . Week, Kharkiv, Ukraine, (
          <year>2020</year>
          )
          <fpage>418</fpage>
          -
          <lpage>423</lpage>
          . doi:
          <volume>10</volume>
          .1109/UkrMW49653.
          <year>2020</year>
          .
          <volume>9252687</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>N.</given-names>
            <surname>Kuzmenko</surname>
          </string-name>
          et al.,
          <source>Airplane Flight Phase Identification Using Maximum Posterior Probability Method, IEEE 3rd Int. Conf. Syst. Anal. Intell. Comput. (SAIC)</source>
          , Kyiv, Ukraine, (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . [33]
          <string-name>
            <given-names>O.</given-names>
            <surname>Sushchenko</surname>
          </string-name>
          et al.,
          <source>Airborne Sensor doi: 10.1109/SAIC57818</source>
          .
          <year>2022</year>
          .
          <volume>9922913</volume>
          . for Measuring Components of Terrestrial
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>R.</given-names>
            <surname>Alberts</surname>
          </string-name>
          ,
          <source>Modeling and Control of Image Magnetic Field, 41st Int. Conf. Electron. Processing for Interventional X-Ray, Nanotechnol. (ELNANO)</source>
          , Kyiv, Technische Universiteit Eindhoven, Ukraine, (
          <year>2022</year>
          )
          <fpage>687</fpage>
          -
          <lpage>691</lpage>
          . Eindhoven, (
          <year>2010</year>
          ).
          <source>doi: 10.1109/ELNANO54667</source>
          .
          <year>2022</year>
          .
          <volume>9926760</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>R.</given-names>
            <surname>Gonzalez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Woods</surname>
          </string-name>
          , Digital Image [34]
          <string-name>
            <given-names>O.</given-names>
            <surname>Sushchenko</surname>
          </string-name>
          et al.,
          <source>Integration of MEMS Processing</source>
          , 4th ed.,
          <string-name>
            <surname>Pearson</surname>
          </string-name>
          , New York, Inertial and Magnetic Field Sensors for (
          <year>2017</year>
          ).
          <source>Tracking Power Lines, XVIII Int. Conf.</source>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>W.</given-names>
            <surname>Burger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.J.</given-names>
            <surname>Burge</surname>
          </string-name>
          , Principles of Perspect. Technols.
          <source>Methods MEMS Des. Digital Image Processing: Core (MEMSTECH)</source>
          ,
          <source>Polyana (Zakarpattya)</source>
          ,
          <source>Algorithms</source>
          , Springer, London, (
          <year>2010</year>
          ). Ukraine, (
          <year>2022</year>
          )
          <fpage>33</fpage>
          -
          <lpage>36</lpage>
          . doi:
          <volume>10</volume>
          .1109/
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>O.</given-names>
            <surname>Semenov</surname>
          </string-name>
          , Aviation Security Equipment,
          <year>MEMSTECH55132</year>
          .
          <year>2022</year>
          .10002907. NAU, Kyiv, Ukraine, (
          <year>2013</year>
          ). [35]
          <string-name>
            <given-names>R.</given-names>
            <surname>Volianskyi</surname>
          </string-name>
          , et. al.,
          <source>Dual Channel Sliding</source>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sarkar</surname>
          </string-name>
          , et. al.,
          <source>Design of Weapon Mode Control for Chua's Circuit, Workshop Detection System, 3rd Conf. Electrons Adv. Wirel. Opt. Communs. (RTUWO)</source>
          ,
          <source>Sustain. Comm. Syst</source>
          .,
          <string-name>
            <surname>Coimbatore</surname>
          </string-name>
          , India, Riga, (
          <year>2018</year>
          )
          <fpage>112</fpage>
          -
          <lpage>117</lpage>
          . doi:
          <volume>10</volume>
          .1109/ (
          <year>2022</year>
          )
          <fpage>1016</fpage>
          -
          <lpage>1022</lpage>
          . doi:
          <volume>10</volume>
          .1109/ RTUWO.
          <year>2018</year>
          .
          <volume>8587912</volume>
          . ICESC54411.
          <year>2022</year>
          .
          <volume>9885601</volume>
          . [36]
          <string-name>
            <given-names>F.</given-names>
            <surname>Yanovsky</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Braun</surname>
          </string-name>
          , Models of
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>S.</given-names>
            <surname>Thaiparnit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Chumuang</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Ketcham, Scattering on Hailstones in X-band, First Weapon Detector System by using X-Ray European Radar Conf</article-title>
          ., Amsterdam, Image Processing Technique,
          <source>18th Int. Netherlands</source>
          (
          <year>2004</year>
          )
          <fpage>229</fpage>
          -
          <lpage>232</lpage>
          . Symp. Communs. Inf. Technols. (ISCIT), [37]
          <string-name>
            <given-names>J.</given-names>
            <surname>Al-Azzeh</surname>
          </string-name>
          , et. al.,
          <source>A Method of Accuracy Bangkok</source>
          , Thailand, (
          <year>2018</year>
          )
          <fpage>214</fpage>
          -
          <lpage>219</lpage>
          . Increment Using Segmented Regression, doi: 10.1109/ISCIT.
          <year>2018</year>
          .
          <volume>8587853</volume>
          .
          <string-name>
            <surname>Algorithms</surname>
          </string-name>
          ,
          <volume>15</volume>
          (
          <issue>10</issue>
          )
          <fpage>378</fpage>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>S.</given-names>
            <surname>Akçay</surname>
          </string-name>
          , et. al.,
          <source>Transfer Learning Using doi: 10.3390/a15100378. Convolutional Neural Networks for Object</source>
          [38]
          <string-name>
            <given-names>D.</given-names>
            <surname>Hearn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Baker</surname>
          </string-name>
          , W. Carithers,
          <string-name>
            <surname>Classification Within X-Ray Baggage</surname>
          </string-name>
          Computer Graphics with OpenGL, 4th ed.,
          <string-name>
            <surname>Security</surname>
            <given-names>Imagery</given-names>
          </string-name>
          ,
          <source>Int. Conf. Image Process. Pearson</source>
          , New York (
          <year>2014</year>
          ).
          <source>(ICIP)</source>
          , Phoenix, USA, (
          <year>2016</year>
          )
          <fpage>1057</fpage>
          -
          <lpage>1061</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICIP.
          <year>2016</year>
          .
          <volume>7532519</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>B.</given-names>
            <surname>Gu</surname>
          </string-name>
          , et. al.,
          <article-title>Automatic and Robust Object Detection in X-Ray Baggage Inspection Using Deep Convolutional Neural Networks</article-title>
          ,
          <source>IEEE Trans. Ind. Electrons</source>
          .
          <volume>68</volume>
          (
          <issue>10</issue>
          ) (
          <year>2021</year>
          )
          <fpage>10248</fpage>
          -
          <lpage>10257</lpage>
          . doi:
          <volume>10</volume>
          .1109/TIE.
          <year>2020</year>
          .
          <volume>3026285</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gaus</surname>
          </string-name>
          , et. al.,
          <article-title>Evaluation of a Dual Convolutional Neural Network Architecture for Object-Wise Anomaly Detection in Cluttered X-Ray Security Imagery</article-title>
          ,
          <source>Int. Jt. Conf. Neural Netws. (IJCNN)</source>
          , Budapest, Hungary, (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . doi:
          <volume>10</volume>
          .1109/IJCNN.
          <year>2019</year>
          .
          <volume>8851829</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , et. al.,
          <article-title>X-Ray Image Recognition Based on Improved Mask RCNN Algorithm</article-title>
          , Math. Probls. Eng. (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          . doi:
          <volume>10</volume>
          .1155/
          <year>2021</year>
          /6544325.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>V.</given-names>
            <surname>Larin</surname>
          </string-name>
          et al.,
          <article-title>Prediction of the Final Discharge of the UAV Battery Based on Fuzzy Logic Estimation of Information and Influencing Parameters, 3rd KhPI Week on Adv</article-title>
          . Technol.,
          <string-name>
            <surname>Kharkiv</surname>
          </string-name>
          , Ukraine, (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/ KhPIWeek57572.
          <year>2022</year>
          .
          <volume>9916490</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>