<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Volodymyr Shevchenko);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Improving the Reference Route Using a Stack of Iterative Local Optimization Methods⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Shevchenko</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Software Systems of the National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>40 Academician Glushkova Avenue, Building 5, Kyiv, Ukraine, 03187</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>King's College London</institution>
          ,
          <addr-line>Strand, London WC2R 2LS</addr-line>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Volodymyr Shevchenko</institution>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>The work develops methods for constructing a suboptimal flight route for an unmanned aerial vehicle (UAV) that performs the task of eliminating the consequences of an emergency. The UAV must sequentially fly around a certain number of route points. Each point must be visited only once. The UAV returns to the same point from which it started. This task can be classified as a traveling salesman problem (TSP). At the beginning of the work, an analysis of existing research on solving the traveling salesman problem was performed. Methods of complete direct search, the method of ordered search based on a discrete dynamic programming procedure (Held-Karp method), integer linear programming methods, greedy algorithms, and local optimization methods were considered. A conclusion was made regarding the feasibility of solving the problem of constructing an optimal route using a combination of greedy algorithms and iterative methods for improving the solution. The resulting solution is not guaranteed to be optimal, but is close to optimal, that is, suboptimal. At the first stage of calculations, a reference trajectory is obtained using the greedy nearest neighbor algorithm. Then, local optimization methods are used to improve the reference trajectory. The methods of moving one point, exchanging two points, and deleting intersections of route sections are used as local optimization methods. During the search computational procedure, individual methods of improving the reference solution can enter local optimum, from which they cannot then escape. A combination of different methods allows you to leave local optimum, bypass ravine areas, and approach the global optimum. The use of iteration methods in the stack loop allows you to quickly find optimal UAV trajectories. The speed of the algorithms allows you to calculate the optimal route not only before the flight, but also to recalculate it during the flight, in case of a change in the task or the conditions for its execution. The performance of the proposed approach was tested by creating a model in the MatLab environment.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;emergency situation</kwd>
        <kwd>drone</kwd>
        <kwd>flight route</kwd>
        <kwd>route points</kwd>
        <kwd>optimization</kwd>
        <kwd>reference solution</kwd>
        <kwd>model</kwd>
        <kwd>computational methods1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The problems of constructing optimal routes have appeared a long time ago: the problems of
delivering goods by transport, delivering mail by postmen, delivering goods by traveling salesmen,
etc. According to the last type of delivery, the problem was called Traveling Salesman Problem
(TSP). These problems require routes that save time, money, etc. At the same time, the traveling
salesman had to visit each point only once, and also finish at the point from which he started. The
relevance of the problem has not decreased over the years. On the contrary, it has increased.
Therefore, the relevance of methods for solving the problem is only growing. In this study, the TSP
is solved to form the optimal route of an unmanned aerial vehicle (UAV), which is used to
eliminate the consequences of an emergency.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of existing research</title>
      <p>Let us consider the main methods for solving the TSP for a route with n points to be visited.</p>
      <p>
        The Brute Force method has a computational complexity of (n-1)! (for the symmetric case, the
cost of a route section is (n-1)!/2) [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1, 2, 3</xref>
        ]. The method has a limitation on the maximum number of
route points, which depends on the computational capabilities. In most cases, the method is used
when the number of route points is up to 10. The ordered search method is close to the brute force
method, but due to the rejection of unpromising route sections, it has a lower computational
complexity of n^2 * 2^n. This is the discrete dynamic programming method (Held-Karp algorithm).
This allows you to find optimal routes with up to 20-25 points. The disadvantage is the need for
large memory to store intermediate chains of route sections. The advantage of the methods of
brute-force selection is the guaranteed optimality of the found routes. The disadvantage is the
impossibility of optimizing routes with the number of points more than 25.
      </p>
      <p>
        Linear programming methods can be considered classical. They have a clear mathematical
formalization of the problem statement in the form of an integer linear programming problem.
Unfortunately, they also require a lot of computational resources and can lose even to direct
bruteforce methods. These methods can be effective in the case of a certain set of constraints of a special
type, which can lead to a decrease in the order of the problem (branch-and-bound method) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>Let us clarify the features of the statement of the applied TSP:
1.
2.</p>
      <p>The solution does not necessarily have to be perfectly accurate. It can be close to accurate,
that is, not optimal, but suboptimal.</p>
      <p>But the solution must be timely, even if you have to pay for it with accuracy.</p>
      <p>Conclusion: you need to use methods or a combination of methods that provide an acceptable
solution in an acceptable time. To do this, at the first stage it is necessary to quickly find a
reference solution, which can then be refined using other methods.</p>
      <p>
        Greedy algorithms are fast, but inaccurate [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4, 5, 6</xref>
        ]. They allow finding a reference solution that
may be far from optimal. After obtaining the reference solution, it is refined using local
optimization methods such as 2-opt, 3-opt (permutation of segments). Genetic algorithms, ant
algorithms, annealing algorithms are also used [
        <xref ref-type="bibr" rid="ref4 ref7 ref8">4, 7, 8</xref>
        ]. Refining the reference solution is a good
approach that has good convergence. However, existing studies have not paid enough attention to
the combination of such methods in a single set of nested iterative procedures.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], the construction of a reference trajectory using a greedy algorithm (Nearest Point
Method) was already considered. The shortcomings of such routes were noticeable even during
visual control of their quality. Therefore, just like other researchers, the authors defined the found
route as a reference and then improved it in an iterative procedure by moving the route points to
new places in the sequence of route points. For each route point, all possible new positions were
checked. For each new position of the point, a new route length was calculated. If the movement of
the point improved the current result, then such a movement was fixed. If it did not improve, then
it was ignored. In general, such a procedure led to a noticeable improvement in the result, but it
often also looked imperfect.
      </p>
      <p>Analysis of existing studies allowed us to draw the following conclusions:
1. For a large number of route points (more than 20-30), methods of direct enumeration of all
options and even methods of ordered enumeration of options such as the discrete Bellman
procedure consume too much computational resources.
2. Greedy algorithms (Nearest Point Method) are the most economical in terms of machine
resources, but inefficient in terms of solution quality.
3. It seems advisable to quickly build a reference solution using greedy algorithms with
further improvement of the reference solution using special iterative methods.
4. The method of improving the reference trajectory by sequentially moving individual route
points to new places in the sequence of route points cannot be considered sufficient.
Therefore, it would be advisable to supplement (combine) it with other methods of
improving the reference solution.</p>
      <p>The aim of the article is to improve the quality of route construction by quickly building a
reference solution and its further improvement by cyclic application of a stack of special iterative
methods. The task is to develop or adapt existing methods, as well as to determine the scheme of
their joint (sequential) use and to determine the criteria for stopping the iterative process.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Building a reference route</title>
      <p>A reference route is one that is constructed using simplified and, accordingly, fast methods. For
example, greedy algorithms (NPM, Nearest Point Method) are such. In the future, the reference
solution must be refined using other methods that do not require a large amount of computing
resources. To find the distance between two points, we use the Euclidean measure
!(, ) =
! − !
!</p>
      <p>!
+ ! − ! ,
where , j - point numbers; ,  - coordinates of points.</p>
      <p>In general, instead of distance, the cost of passing a route section should be used
(1)
(2)
(3)
(4)
(5)
(6)
 =</p>
      <p>! ,  − 1 .</p>
      <p>!"#$%&amp;%$,!!!,!
The procedure for finding the route length is the same for the reference and improved routes.</p>
      <p>,  = ! ,  .</p>
      <p>
        The cost of passing a route section may include: distance, energy consumption, UAV resource
use, probability of damage or destruction of the UAV, probability of other incidents, probability of
failure to complete the task, etc. The cost can also be found as a certain aggregation of a certain set
of factors (listed or others). For this, scalar convolutions can be used, for example, additive,
multiplicative, others or a combination thereof [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ].
      </p>
      <p>In the study, we distinguish the following sets of route points:</p>
      <p>LocationSet. An unordered set of route point numbers that are assigned to certain locations in a
list sequentially or in random order</p>
      <p>= {1, 2,3, … . . }.</p>
      <p>RouteSet. An ordered set of route points (tuple) that consists of the same points, but now
arranged in an order that corresponds to a specific route.</p>
      <p>= (3,7,1, … . .4, , 10, … ).</p>
      <p>The cost of such a route is equal to the sum of the costs of passing all sections between
neighboring points.</p>
      <p>=</p>
      <p>,  − 1 .</p>
      <p>!"#$%&amp;%$,!!!,!</p>
      <p>In this study, we assume that the cost of a route is equal to its length, as the sum of the
distances between neighboring sections.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Improving the reference route</title>
      <p>Improvement of the reference route can be performed using various methods. Let's analyze those
used in this study.</p>
      <sec id="sec-4-1">
        <title>4.1. 1-Point Moving Method (1PM)</title>
        <p>
          We have already considered the 1PM method above when analyzing the publication [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. The
disadvantage of the method is that it does not go through all possible route change options.
Therefore, the procedure of complete analysis of possible movements of all points should be
repeated several times until the improvement of the quality indicator (route length) stops.
        </p>
        <p>But previous shuffling can make certain successful solutions unavailable for the procedure of
subsequent shuffling. By analogy with gradient search procedures, we can say that the search can
enter a local optimum, which is separated from the global optimum by a ravine. The way out of
this situation is to shake (shuffle) the route tuple using other methods that allow you to bypass or
jump over the ravine.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. 2-Point Exchange Method (2PE)</title>
        <p>This is exactly what the 2PE method may be in many cases, analyzing the feasibility of exchanging
two points in a tuple describing a route. This procedure analyzes the exchange of points for all
possible pairs of points. The procedure can be repeated several times. The disadvantage of the
method is that it can create new intersections of route sections (segments), which immediately
indicates its non-optimality. Such a newly formed intersection can appear with the participation of
points that have already been analyzed and therefore do not fall into repeated checks. It would be
desirable to have a separate method that eliminates only intersections of route sections and does
not touch other points that are not related to the intersection.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Delete Crossing Method (DC)</title>
        <p>The DC method is aimed at eliminating intersections of route sections (Figure 1, 2). The method
can be considered a special case of the 2PE method. The advantage of the method is that it
purposefully eliminates only intersections. There remains a small probability that the elimination
of one intersection will form a new intersection. But this probability is significantly less than in the
2PE method.</p>
        <p>Even based on visual analysis, it can be concluded that the exchange of points i2, i3 should lead
to a reduction in the length of the route (Figure 1, 2). Since the elimination of one intersection can
form another intersection, the result of each replacement is checked for a reduction in the length of
the route. Let us consider the calculated dependencies. The equations of the lines passing through
the corresponding pairs of points before the elimination of the intersection have the form
(7)
(8)
(9)
(10)
(11)
(15)
(16)
 == !!"" ++ !!"".</p>
        <p>Substitute the coordinates of the node points
! = !"! + !" ;
! = !"! + !"
We find the coefficients
! = !"! + !".</p>
        <p>! = !"! + !"
! − !
!" =</p>
        <p>! − ! ! − !
We write the equation for the intersection point p5.</p>
        <p>; !" = ! − !"!;
!" =
! − !
; !" = ! − !"!.</p>
        <p>Subtract the upper equation from the lower one.</p>
        <p>0 = ! !" − !" + (!" − !").</p>
        <p>Convert. Find the coordinates of the intersection point
!! == !!""!! ++ !!"".
(12)
! = − !" − !" ; ! = !"! + !".</p>
        <p>!" − !"</p>
        <p>Next, we need to make sure that the intersection point really lies on the segments, and not on
their imaginary extension. To do this, we find the minimum and maximum abscissas and ordinates
for each pair of points (for each segment)
!"!"# =  !, ! ; !"!"# =  !, ! ;
!"!"# =  !, ! ; !"!"# =  !, ! ;
!"!"# =  !, ! ; !"!"# =  !, ! ;
!"!"# =  !, ! ; !"!"# =  !, ! .</p>
        <p>A sign that the intersection point lies on the segments is the simultaneous fulfillment of the
following conditions
(13)
!"!"# ≤ !; !"!"# ≤ !; !"!"# ≥ !; !"!"# ≥ !; (14)
!"!"# ≤ !; !"!"# ≤ !; !"!"# ≥ !; !"!"# ≥ !.</p>
        <p>Analysis of Figure 1 shows that it is sufficient to perform the check on only one coordinate.
This will significantly reduce the computational load.</p>
        <p>!"!"# ≤ !; !"!"# ≤ !; !"!"# ≥ !; !"!"# ≥ !.</p>
        <p>Reducing the computational load can also be achieved by replacing conditions (13), (14) with
checking the distances between points along one coordinate.</p>
        <p>! − ! ≥ ! − ! ; ! − ! ≥ ! − ! ;
|! − !| ≥ |! − !|; |! − !| ≥ |! − !|.</p>
        <p>If conditions (13), (14) or (13), (15) or (16) are met, then points i2 and i3 are swapped. It is clear
that such a modification of the route may not be final. The method can be applied repeatedly until
the condition for stopping the iterative procedure is met.</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Nesting of iterative procedures</title>
        <p>Let us pay attention to the fact that the proposed approach to improving the reference solution
provides for several levels of iterative procedures:</p>
        <p>Level 1. Iterations at the level of route points (within the method). All possible route change
options are reviewed with an analysis of possible changes for all points or all pairs of route points.</p>
        <p>Level 2. Iterations at the level of individual methods. One iteration includes a single application
of a separate method for all points or all pairs of route points (one of the methods: 1PM, 2PE, DC).
And such iterations at the level of one method can be repeated.</p>
        <p>Level 3. Iterations at the level of a set of different methods. One iteration includes the sequential
execution of components of a certain set of methods, represented by a tuple (2PE, 1PM, DC). If the
sequence of methods can be repeated R times, then the scenario for creating and refining the
reference solution can be represented by the following chain of methods</p>
        <p>+ (2 + 1 + ) ∗ .</p>
        <p>The order of the 1PM, 2PE, DC methods may vary depending on the specifics of the route and
the experience of the researcher. It can also be changed in different iterations at the level of the set
of methods.
(17)</p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Conditions for stopping iterative procedures of reference route refinement methods</title>
        <p>The stopping conditions of the reference route refinement procedure are used only for Iterations at
the level of individual methods and for iterations at the level of a set of methods.</p>
        <p>The condition for stopping the iterative procedure at level 2 (of a separate method) is the
equality of the results of two consecutive iterations of this method.</p>
        <p>() = ( − 1).</p>
        <p>After that, the transition to the next method in the tuple occurs (2PE, 1PM, DC).</p>
        <p>The condition for stopping the iterative procedure at level 3 (set of methods) is the equality of
the results of all methods within the current iteration at level 3</p>
        <p>2() = 1() = ().</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Method validation</title>
      <p>The proposed approach was tested in the MatLab software environment. Let us consider the results
of the simulation by iterations at level 2 (separate methods) for a route including 50 points (Figure
3-6). The red circle indicates the location of the base from which the UAV takes off and returns to.
The blue line indicates the reference route that was built using the greedy algorithm, the red line is
the route obtained as a result of improving the reference route at this iteration at level 2.</p>
      <p>Figure 7 shows the results of the numerical experiment. To the left of the equal sign is the
abbreviated name of the method used. To the right of the equal sign are the route lengths that were
achieved using this method at each iteration of level 2. The protocol of using the reference route
improvement methods (Figure 7) shows that the 2PE method reached its potential already at the
second iteration of level 2, the 1PM method implemented 4 successful iterations, and the DC
method successfully worked only once. In the next iteration cycle of level 3 (multiple methods), the
2PE method was unable to add any improvements to the solution in the iterations of level 2. But
after that, the 1PM method successfully implemented two iterations of the reference route
improvement at level 2. Further repetitions of using the methods did not bring any improvements.
(18)
(19)</p>
      <p>The numerical experiment allows us to draw the following conclusions:
1. Changing methods can improve the result.
2. In some cases, the result can be improved by a method that seemed to have already done
everything it could in the previous iteration (for example, 1PM. Otherwise, it may be
another method).</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>The paper presents approaches to solving the TSP for constructing a UAV route involved in
eliminating the consequences of emergency situations.</p>
      <p>The resulting solution is not guaranteed to be optimal, but is close to optimal, i.e. suboptimal.</p>
      <p>At the first stage of calculations, a reference trajectory is obtained using a greedy nearest
neighbor algorithm.</p>
      <p>Then, local optimization methods are used to improve the reference trajectory.</p>
      <p>The methods of moving one point, exchanging two points, and eliminating intersections of
route sections are used as local optimization methods.</p>
      <p>During the computational procedure, individual methods of improving the reference solution
may enter local optimum, from which they cannot then escape. A combination of different
methods allows you to exit local optimum, bypass ravine areas, and approach the global optimum.</p>
      <p>Using a stack of iteration methods in a loop allows you to quickly find suboptimal UAV
trajectories.</p>
      <p>The speed of the algorithms allows you to calculate the optimal route not only before the flight,
but also to recalculate it during the flight, in case the task or the conditions for its execution
change.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>The author(s) have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Heping</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <article-title>The 1-1 algorithm for Travelling Salesman Problem, CoRR, v</article-title>
          .
          <source>abs/2104</source>
          .13197 (
          <year>2021</year>
          ) https://doi.org/10.48550/arXiv.2104.13197, https://arxiv.org/abs/2104.13197, https://dblp.org/rec/journals/corr/abs-2104-13197.bib.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Zakir</given-names>
            <surname>Hussain</surname>
          </string-name>
          <string-name>
            <given-names>Ahmed</given-names>
            , Ibrahim
            <surname>Al-Dayel</surname>
          </string-name>
          ,
          <article-title>An Exact Algorithm for the Single-Depot Multiple Travelling Salesman Problem</article-title>
          ,
          <source>IJCSNS International Journal of Computer Science and Network Security</source>
          , VOL.
          <volume>20</volume>
          No.
          <issue>9</issue>
          (
          <year>2020</year>
          ) DOI:
          <fpage>10</fpage>
          .22937/IJCSNS.
          <year>2020</year>
          .
          <volume>20</volume>
          .09.9. https://www.researchgate.net/publication/344463896_An_
          <article-title>Exact_Algorithm_for_the_SingleDepot_Multiple_Travelling_Salesman_Problem</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Chandra</given-names>
            <surname>Agung</surname>
          </string-name>
          , Natalia Christine,
          <article-title>Performance analysis of optimization methods for solving traveling salesman problem, Innovative Technologies and Scientific Solutions for Industries</article-title>
          , No.
          <volume>1</volume>
          (
          <issue>15</issue>
          ) (
          <year>2021</year>
          )
          <fpage>69</fpage>
          -
          <lpage>75</lpage>
          . doi: https://doi.org/10.30837/ITSSI.
          <year>2021</year>
          .
          <volume>15</volume>
          .069, https://www.researchgate.net/publication/350515816_PERFORMANCE_
          <article-title>ANALYSIS_OF_OPTI MIZATION_METHODS_FOR_SOLVING_TRAVELING_SALESMAN_PROBLEM.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Nataliya</given-names>
            <surname>Boyko</surname>
          </string-name>
          ,
          <article-title>An Overview of Existing Methods for Solving the Travelling Salesman Problem in Order to Find the Optimal Solution for Economic Problems, European scientific journal of Economic and Financial innovation</article-title>
          . №
          <volume>1</volume>
          (
          <issue>7</issue>
          ) (
          <year>2021</year>
          ). doi: http://doi.org/10.32750/2021- 0108, https://www.google.com/url?sa=t&amp;source=web&amp;rct=j&amp;opi=89978449&amp;url=https://journal.eae. com.ua/index.php/journal/article/download/129/115/&amp;ved=2ahUKEwjMnqk0ZuNAxWyExAIHZqeG8QQFnoECB8QAQ&amp;
          <article-title>usg=AOvVaw0OzPk2F2kE3LoWlAP23rNG.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Trotsko</surname>
          </string-name>
          , I. Chernozubkin,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Doryshyn</surname>
          </string-name>
          ,
          <article-title>Evaluation of the Practical Use of Search Algorithms for Solving Logistics Tasks Based on the Traveling Salesman's Task, Academic notes of the University "KROK"</article-title>
          , №
          <volume>3</volume>
          (
          <issue>67</issue>
          ) (
          <year>2022</year>
          )
          <fpage>69</fpage>
          -
          <lpage>73</lpage>
          . doi https://doi.org/10.31732/
          <fpage>2663</fpage>
          -2209- 2022-67-69-73, https://dspace.krok.edu.ua/handle/krok/2358.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Trotsko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.O.</given-names>
            <surname>Chernozubkin</surname>
          </string-name>
          ,
          <article-title>Combining the greedy algorithm with the Monte Carlo method for solving logistics problems based on the traveling salesman problem</article-title>
          ,
          <source>Scientific notes of the KROK University</source>
          ,
          <year>2021</year>
          , №
          <volume>2</volume>
          (
          <issue>62</issue>
          ). (
          <year>2021</year>
          )
          <fpage>125</fpage>
          -
          <lpage>131</lpage>
          . doi: https://doi.org/10.31732/
          <fpage>2663</fpage>
          -2209-2021-62-125-
          <lpage>131</lpage>
          ., http://snku.krok.edu.ua/vcheni-zapiskiuniversitetu-krok/article/view/414/441.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Maha</given-names>
            <surname>Ata Al-Furhud</surname>
          </string-name>
          ,
          <article-title>Zakir Hussain Ahmed, Genetic Algorithms for the Multiple Travelling Salesman Problem</article-title>
          ,
          <source>International Journal of Advanced Computer Science and Applications(IJACSA)</source>
          ,
          <volume>11</volume>
          (
          <issue>7</issue>
          ) (
          <year>2020</year>
          ) http://dx.doi.org/10.14569/IJACSA.
          <year>2020</year>
          .
          <volume>0110768</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Dharm</given-names>
            <surname>Raj</surname>
          </string-name>
          <string-name>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <surname>Manoj Kumar Singh</surname>
          </string-name>
          ,
          <string-name>
            <surname>Tarkeshwar Singh</surname>
          </string-name>
          ,
          <string-name>
            <surname>Rajkishore Prasad</surname>
          </string-name>
          ,
          <article-title>Genetic Algorithm for Solving Multiple Traveling Salesmen Problem using a New Crossover and Population Generation, Comp</article-title>
          . y Sist. vol.
          <volume>22</volume>
          no.
          <issue>2</issue>
          . Mexico City Apr./Jun. 2018 Epub Jan 21, (
          <year>2021</year>
          ), https://doi.org/10.13053/cys-22-2-2956 , https://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=
          <fpage>S1405</fpage>
          -
          <lpage>55462018000200491</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Igor</given-names>
            <surname>Sіnitsyn</surname>
          </string-name>
          , Yevhen Derevianko, Stanislav Denysyuk, Volodymyr Shevchenko,
          <article-title>Optimizing Reference Routes through Waypoint Sequence Variation in Emergency Events of Natural and Technological Origin, in: Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II (CPITS-II</article-title>
          <year>2024</year>
          ), Kyiv, Ukraine, October
          <volume>26</volume>
          ,
          <year>2024</year>
          (online),
          <source>CEUR Workshop Proceedings, ISSN 1613-0073</source>
          ,
          <year>2024</year>
          , Vol-
          <volume>3826</volume>
          , pp.
          <fpage>505</fpage>
          -
          <lpage>512</lpage>
          , https://ceur-ws.org/Vol3826/short20.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Viktor</surname>
            <given-names>Shevchenko</given-names>
          </string-name>
          , Oleh Bakaiev, Ihor Syvachenko,
          <article-title>Scalarization of the vector criterion of information system survivability based on information security indicators, in: Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II (CPITS-II</article-title>
          <year>2024</year>
          ), Kyiv, Ukraine, October
          <volume>26</volume>
          ,
          <year>2024</year>
          (online),
          <source>CEUR Workshop Proceedings, ISSN 1613-0073</source>
          ,
          <year>2024</year>
          , Vol-
          <volume>3826</volume>
          , pp.
          <fpage>294</fpage>
          -
          <lpage>300</lpage>
          , https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3826</volume>
          /short20.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Viktor</surname>
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Shevchenko</surname>
          </string-name>
          , Optimization Modeling in Strategic Planning,
          <source>TsVSD NUOU</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>