<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Workshop on Cybersecurity Providing in Information and Telecommunication Systems, February</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Method for Obtaining Shadow Images of Control Objects for Telemetric Care Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lidiia Tereshchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Lubomyr Huzar ave., Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>28</volume>
      <issue>2023</issue>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The paper deals with two-dimensional spectral detectors for baggage inspection X-ray devices. This detector is based on the construction of analytical models for the internal structure of objects under control and their spectrum calculation. The methods of projective geometry and Bouguer-Lambert law are applied to obtain the analytical models for shadows of three-dimensional objects. Spectral detectors are designed according to the NeymanPearson criterion. Analysis shows that the proposed spectral detector has good operating characteristics even at low signal-to-noise ratios.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Keywords</kwd>
        <kwd>aviation security service</kwd>
        <kwd>X-ray</kwd>
        <kwd>optical imaging</kwd>
        <kwd>shadow of three-dimensional objects</kwd>
        <kwd>spectral detector</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Ensuring effective protection against terrorism
is the most difficult issue, especially for countries
with a developed air transport network, a large
number of airlines, and airports. The problem is
complicated by the unpredictability of terrorists’
actions. In addition, vulnerabilities in aviation
security systems (such as procedures for screening
airline passengers and their baggage, freight
shipments, mail, etc.) that can be exploited by law
violators should be taken into consideration. The
main way to improve aviation safety is to prevent
hazardous objects and substances, explosive
devices, and weapons on aircraft boards. This
requires a comprehensive development and
introduction of new methods of screening,
detection, and identification of dangerous objects
under control. Insights of the direct visualization
methods indicate that they are inherent in the same
type of operations: primary radiation exposure of
the objects under control in configuration space
(in the case of active method), reradiation
reception (scattered or passed through the object),
its conversion into an electrical signal, signal
processing and electrical-to-optical signal
conversion [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem Statement</title>
      <p>
        The paper addresses applied research
challenges concerning the development and
application of a new method of determination
(visualization) of the internal structure of the
Objects Under Control (OC), that enables
dangerous OC to be identified with high
probability in real-time, increases the speed of
dangerous substances identification in luggage,
and provides automation of these processes. In
addition, the automatic generation of images of
hazardous OC allows for periodic inspections of
aviation security service operators. Detection
systems based on X-ray, computer tomography,
and spectroscopy of mobile ions have certain
shortcomings [
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6 ref7 ref8 ref9">3–9</xref>
        ]. Some of these systems can
detect well-hidden explosives, but their
implementation requires considerable funds. In
addition, they have a high level of false alarms
(approximately 0.2 ... 0.4). Thus, the development
of analytical models for the receipt of
multidimensional shadows of translucent objects
for further processing will allow the classification
of OC, which will greatly facilitate the work of
operators serving supervision devices in Aviation
Security Service (AvSS), reducing the value of
false alarms. Literature analysis showed that the
modernization of equipment for AvSS is carried
out in two directions: in the part of the
improvement of hardware and software. In [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]
authors proposed a new X-ray backscatter
technique using an un-collimated powerful (high
kW) X-ray beam and an efficient pinhole camera
encompassed with a high-resolution matrix
detector for imaging of an object. Moreover, a
high-energy X-ray inspection technique for the
reliable inspection of air freight containers was
presented in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Analysis of various strategies
for object detection in X-ray security imagery is
given in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Moreover, the paper [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] also deals
with a technique for the classification of X-ray
baggage images using convolutional neural
networks. The application of deep convolutional
neural network as a classification method in
medicine X-ray image analysis was considered in
[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] authors investigated the feasibility
of applying straight-line-trajectory-based
tomographic imaging configurations to security
inspections. The method of automated target
recognition with the usage of a reference database,
which contains X-ray images of OC, for cargo
scanning systems was proposed in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The
papers [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ] deal with procedures of handguns,
shuriken, and razor blades recognition for
baggage inspection. The simulation of the internal
structure for OC with simple and complex forms
using the point source of irradiation in the center,
as well as with the bias relative to the center, is
considered in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. The method developed for
optical imaging of the inner structure of the
threedimensional objects allows obtaining a shadow of
these objects, exposed to electromagnetic
radiation. It has useful applications in different
life spheres, such as in medicine, the
manufacturing industry, the process of customs
supervision of goods and means of transport for
commercial use, etc. It allows the AvSS to
increase the probability of correct detection of
hazardous materials and reduce false alarms in its
security system. For medicine, the method may
help to increase the probability of health hazard
anomaly detection. So aim of this paper is a
synthesis of a two-dimensional spectral detector
for baggage inspection X-ray devices.
      </p>
    </sec>
    <sec id="sec-3">
      <title>Materials and Methods</title>
      <p>The construction of an analytical model
reduces to the calculation of a projective image of
an isotropic object in the case of homogeneous
irradiation by a point source located on the axis of
object symmetry perpendicular to the plane of the
image (screen). To determine the position of the
radiation source, the OC, and the screen with a
point source it is appropriate to use the cylindrical
coordinate system applied to the Fig. 1. The OC
model with complex form is presented in Fig. 2.</p>
      <p>Internal visualization of the OC with a
complex form, in this case, a sphere in the sphere,
designed with a point source is shown in Fig. 3.</p>
      <p>The simulation shows that the simplest objects
have shadows with transient characteristics,
halfdooms, and distortions of the type of crater, where
there are generally flat irradiating planes.
Changing the irradiation angle changes the
shadow to unrecognizability. To accurately
identify the intended OC, it is necessary to
automate the process of recognizing shadows,
taking into account possible distances between the
source, the OC and the screen receiver, the
irradiation angles, etc. Methods of analytical
modeling of the OC with different shapes,
geometrical dimensions, foreshortening,
substance, and appropriate extinction coefficients,
used to develop procedures for identifying
dangerous objects under security supervision of
passengers and baggage, allow imaging of OC's
inner structure. To verify the developed models
multidimensional spectra of visualization images
are obtained. The procedure for image processing
consists of using a shadow of the object of a given
shape to construct a two-dimensional spectrum
and its subsequent use in developing the standard
spectral detector proposed in the research. This
detector is invariant concerning the location of the
OC in the working area. The invariance of the
calculated spectrum to the location of the OC on
the plane of the screen provides the possibility of
applying algorithms for the calculation of
twodimensional spatial spectra of the visualization
image about the wanted images of some image
anomalies in the endoscopic imaging systems of
the AvSS. That is, the desired density distribution
of the object of control μ(x, y) must be matched to
fit its two-dimensional spatial
spectrum—Fourierimage М (К x , K y ) . In the further processing of
visualization data, we find solutions in the
frequency space М (К x , K y ) , and then, through
the inverse Fourier transform, the desired
distribution is calculated μ*(x, y), . The resulting
distribution is selected according to those images,
which are in the memory of the supervision
system. A decision is made to detect a particular
object after matching the resulting image μ*(x, y)
and mask μ*(x, y).</p>
      <p>Figs. 4 and 5 shows the spectra of images of
different shades of opaque OC of a simple shape
on the size of a 100×100 screen plane located
almost above the center of the screen.</p>
      <p>Objects marked with stars are not graphs, but
drawings illustrating examples of corresponding
graphs with the following input data: k=10; a1=2;
b1=4; c1=1; d1=1; d2=1; 1 = 1;a2=1; b2=5; c2=
3; 2 = 1 . The following formulas calculate the
imaginary distribution of the visualized parameter
with logarithmic gain.
h
x
b(x, h) = artg</p>
      <p>The function corresponding to the intensity
distribution of the received radiation is obtained
by the formula:</p>
      <p>d (x, h) = e −a( x,h )</p>
      <p>Consider the object of control in the form of a
pipe segment with a cavity inside.</p>
      <p>Let’s set the parameters of the rendering
system:</p>
      <p>r1 = 3, r2 = 2, k = 10, d = 1, c = 1, a = 1
where k is the distance from the radiation source
to the screen; c is the distance from the radiation
source to the OK; r1 is radius OK; r2 is cavity
radius; d is layer thickness; a is the radiation
attenuation coefficient in the OK material.</p>
      <p>The actual distribution of the extinction
coefficient will be:</p>
      <p>On one plane, the shadows of two
parallelepipeds are located, and their spectral
images are obtained (Fig. 13).</p>
      <p>The following figures show the spectral
images of the shadows of the parallelepiped and
the spheres that were located in space (Fig. 14).</p>
      <p>When using X-ray systems to provide
automation of care and increase the reliability of
decision-making on the presence of prohibited
articles and substances in the OC, there are problems
in identifying different forms and locations of the
OC. For this purpose, the example of the spectral
detector model was constructed in the Matlab
environment. In this case, the detection occurs
regardless of the OC location and regardless of its
shape and size. The considered models are the
shadows of two objects in a field with specified
boundaries. One object is a regular square (this kind
can have dynamite), and the other is a model of the
machine gun (Fig. 15). Also, white Gaussian noise
and a mixture of image and noise are modeled
(Fig. 16). The developed program allows us to detect
an OC with a given probability of false alarms for
the corresponding threshold decision depending on
the size of the OC. The program calculates the
probability of correct detection of a signal from an
OC.</p>
      <p>A mixture of useful signals and noise is shown
in Fig. 15. A mixture of signal with noise in cases
of signal-to-noise ratios equaled to 2 (a) and 0.5
(b) The Neyman-Pearson criterion is applied for
optimal detection of an OC. According to the
Neyman-Pearson criterion, the threshold level V
is determined from the condition that the
probability of a correct detection D with the given
probability of false alarm F was maximal. Hence,
the optimal character of the Neyman-Pearson
criterion is that it maximizes the probability of
correct detection at a fixed probability of false
alarms. In addition, it should be noted that the
program calculates the characteristics of the
detection. An example of these characteristics is
shown in Fig. 10. On these graphs it is seen that
when the decision threshold is reduced, the
detection characteristic is more efficient,
however, the probability of false detection is
increased. The analysis shows that the developed
spectral detector has good detection
characteristics even at low signal-to-noise ratios.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions</title>
      <p>The analysis of scientific publications has
shown that the most effective methods for the
detection and identification of hazardous OCs are
transient multi-energy direct X-ray ones. They
provide reliable detection of hazardous OCs.
However, these methods are complicated, their
implementation in the supervisory systems has a
significant expenditure of material resources, and
they do not work efficiently with dynamic OCs.
At a high probability of correct detection to 0.99,
there is a high probability of false alarms from 0.3
to 0.4. The simulation shows that the simplest OC
has shadows with transient characteristics,
halfdooms, and distortions of the type of crater, where
there are generally flat irradiating planes.
Changing the irradiation angle changes the
shadow to unrecognizability. To accurately
identify the intended OC, it is necessary to
automate the process of recognizing shadows,
taking into account possible distances between the
source, the OC and the screen receiver, the
irradiation angles, etc. The procedure for image
processing consists of using a given shape OC
shadow to construct a two-dimensional spectrum
and its subsequent use in developing the standard
spectral detector. This detector is invariant
concerning the location of the OC in the working
area. To solve the problem, a spectral detector
model is developed using the MatLab software
environment. In this case, the detection occurs
regardless of the OC location or its shape and size.
It allows the detection of dangerous objects with a
high probability of correct detection and a low
probability of false positives (from 0.03 to 0.05).</p>
    </sec>
    <sec id="sec-5">
      <title>5. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>K.</given-names>
            <surname>Khorolska</surname>
          </string-name>
          , et al.,
          <article-title>Application of a Convolutional Neural Network with a Module of Elementary Graphic Primitive Classifiers in the Problems of Recognition of Drawing Documentation and Transformation of 2D to 3D Models</article-title>
          ,
          <source>Journal of Theoretical and Applied Information Technology</source>
          <volume>100</volume>
          (
          <issue>24</issue>
          ) (
          <year>2022</year>
          )
          <fpage>7426</fpage>
          -
          <lpage>7437</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Z. B.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <source>Authentication System by Human Brainwaves Using Machine Learning and Artificial Intelligence</source>
          , in: Advances in Computer Science for Engineering and
          <string-name>
            <surname>Education IV</surname>
          </string-name>
          (
          <year>2021</year>
          )
          <fpage>374</fpage>
          -
          <lpage>388</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -80472-5_
          <fpage>31</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>O.</given-names>
            <surname>Semenov</surname>
          </string-name>
          ,
          <article-title>Theoretical Foundations and Principles of Construction of Technical Devices for Aviation Security: Training Guide, Kyiv</article-title>
          ,
          <string-name>
            <surname>NAU</surname>
          </string-name>
          ,
          <year>2001</year>
          ,
          <volume>214</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kolkoori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Wrobel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Ewert</surname>
          </string-name>
          ,
          <article-title>A new XRay Backscatter Technology for Aviation Security Applications, IEEE International Symposium on Technologies for Homeland Security (HST), Waltham</article-title>
          , MA, USA,
          <year>April 2015</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/THS.
          <year>2015</year>
          .7225329
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kolkoori</surname>
          </string-name>
          , et al.,
          <article-title>High Energy X-Ray Imaging Technology for the Detection of Dangerous Materials in Air Freight Containers, IEEE International Symposium on Technologies for Homeland Security (HST), Waltham</article-title>
          , MA, USA,
          <year>April 2015</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Akcay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Breckon</surname>
          </string-name>
          ,
          <article-title>An Evaluation of Region Based Object Detection Strategies Within X-Ray Baggage Security Imagery</article-title>
          ,
          <source>IEEE International Conference on Image Processing (ICIP)</source>
          , Beijing, China,
          <year>September 2017</year>
          ,
          <fpage>1337</fpage>
          -
          <lpage>1341</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Akcay</surname>
          </string-name>
          , et al.,
          <article-title>Transfer Learning Using Convolutional Neural Networks for Object Classification Within X-Ray Baggage Security Imagery</article-title>
          ,
          <source>IEEE International Conference on Image Processing (ICIP)</source>
          , Phoenix, AZ, USA,
          <year>September 2016</year>
          ,
          <fpage>1057</fpage>
          -
          <lpage>1061</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kurachka</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Tsalka</surname>
          </string-name>
          ,
          <article-title>Vertebrae Detection in X-Ray Images Based on Deep Convolutional Neural Networks</article-title>
          ,
          <source>IEEE 14th International Scientific Conference on Informatics, Poprad</source>
          , Slovakia,
          <year>November 2017</year>
          . doi:
          <volume>10</volume>
          .1109/informatics.
          <year>2017</year>
          .8327245
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>H.</given-names>
            <surname>Gao</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Straight-LineTrajectoryBased X-Ray Tomographic</surname>
          </string-name>
          <article-title>Imaging for Security Inspections: System Design, Image Reconstruction and Preliminary Results</article-title>
          ,
          <source>IEEE Transactions on Nuclear Science</source>
          ,
          <volume>60</volume>
          (
          <issue>5</issue>
          ) (
          <year>2013</year>
          )
          <fpage>3955</fpage>
          -
          <lpage>3968</lpage>
          . doi:
          <volume>10</volume>
          .1109/tns.
          <year>2013</year>
          .2274481
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>W.</given-names>
            <surname>Visser</surname>
          </string-name>
          , et al.,
          <source>Automated Comparison of X-ray Images for Cargo Scanning, IEEE International Carnahan Conference on Security Technology (ICCST)</source>
          , Orlando, FL, USA,
          <year>October 2016</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . doi:
          <volume>10</volume>
          .3390/s21217294
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.</given-names>
            <surname>Mery</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Katsaggelos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Logarithmic</given-names>
            <surname>Xray</surname>
          </string-name>
          <article-title>Imaging Model for Baggage Inspection: Simulation and Object Detection</article-title>
          , IEEE Conference on Computer Vision and Pattern Recognition Workshops, Honolulu,
          <string-name>
            <surname>HI</surname>
          </string-name>
          , USA,
          <year>July 2017</year>
          ,
          <fpage>251</fpage>
          -
          <lpage>259</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>C.</given-names>
            <surname>Meghare</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gode</surname>
          </string-name>
          ,
          <source>Automated Detection of Threat Object in X-ray Images of Baggage</source>
          ,
          <source>International Journal of Electrical, Electronics and Data Communication</source>
          ,
          <volume>5</volume>
          (
          <issue>6</issue>
          ) (
          <year>2017</year>
          ),
          <fpage>97</fpage>
          -
          <lpage>101</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Semenov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Tereshchenko</surname>
          </string-name>
          ,
          <article-title>Modeling of the Visualization of the Internal Structure of Objects of Control</article-title>
          ,
          <source>Electronics and Control Systems</source>
          ,
          <volume>1</volume>
          (
          <year>2008</year>
          )
          <fpage>144</fpage>
          -
          <lpage>148</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Cusick</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cortes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Rodrigues</surname>
          </string-name>
          , Commercial Aviation Safety,
          <string-name>
            <surname>Sixth Edition</surname>
          </string-name>
          , New York:
          <string-name>
            <surname>McGraw-Hill</surname>
            <given-names>Education</given-names>
          </string-name>
          ,
          <year>2012</year>
          ,
          <volume>696</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Safety</surname>
            <given-names>Management</given-names>
          </string-name>
          <string-name>
            <surname>Manual</surname>
          </string-name>
          . Montreal: International Civil Aviation Organization,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. Zhang Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <source>Review on Civil Aviation Safety Investment Research, 11th International Conference on Reliability, Maintainability and Safety (ICRMS)</source>
          ,
          <year>2016</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICRMS.
          <year>2016</year>
          .8050113
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          , et al.,
          <article-title>Method of Traffic Monitoring for DDoS Attacks Detection in E-Health Systems and Networks</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          ,
          <volume>2255</volume>
          (
          <year>2018</year>
          )
          <fpage>193</fpage>
          -
          <lpage>204</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Shutko</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Two-Dimensional Spectral Detector for Baggage Inspection X-Ray</surname>
            <given-names>System</given-names>
          </string-name>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>2300</volume>
          (
          <year>2018</year>
          )
          <fpage>63</fpage>
          -
          <lpage>66</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          , et al.,
          <article-title>Shadow Image Processing of X-Ray Screening System for Aviation Security</article-title>
          ,
          <source>International Journal of Image, Graphics and Signal Processing (IJIGSP) 14 (6)</source>
          (
          <year>2022</year>
          )
          <fpage>26</fpage>
          -
          <lpage>46</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijigsp.
          <year>2022</year>
          .
          <volume>06</volume>
          .03
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>