<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Tyumen State University</institution>
          ,
          <addr-line>Tyumen</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>146</fpage>
      <lpage>150</lpage>
      <abstract>
        <p>The paper discusses the feasibility of automatic document classification mechanisms for elearning systems. We suggest an intellectual system for text classification based on the age groups of text audience and represent the results of computational experiment characterizing the performance of the method. Informational retrieval; document classification; natural language processing; e-learning systems.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>AUTOMATIC DOCUMENT CLASSIFICATION ON THE BASIS OF TEXT AUDIENCE AGE</p>
      <p>GROUPS IN E-LEARNING SYSTEMS*</p>
      <p>E-learning systems are rapidly changing the way that educational institutes prefer for training. The
popularity of e-learning can be explained by the fact that there are a number of indisputable advantages
compared with traditional learning.</p>
      <p>E-learning is one of the most modern educational tools and a promising type of training. Students
studying remotely can decide when and how much time during the semester they can allocate to studying.
They give for themselves their individual training schedules. Students do not have to worry about the fact
that they lag behind their classmates. They can always return to the study of more complex issues, several
times watch video lectures, read the correspondence with the teacher. At the same time the already
wellknown topics can be skipped. Besides, students can learn from the comfort of their home or office from
anywhere in the world. For starting training they only need to have a computer with Internet access.
Students have no need to go to school or university every day. It is a definite advantage for people with
disabilities, for those who live in remote areas, who are serving time in prison, for parents with young
children. Distance learning does not require a release on the basic work and business trips.</p>
      <p>In traditional forms of teaching it is quite difficult for tutor to give the necessary attention to the
number of all students and adjust to everyone’s pace of work. Using of distance technologies helps to
organize individual approaches. In addition, sometimes consultations with the tutor via e-mail more
efficiently and faster than the appointment of a personal meeting with the full-time or distance learning.</p>
      <p>
        Studies show [
        <xref ref-type="bibr" rid="ref1 ref1 ref19 ref19 ref2 ref2 ref20 ref20 ref21 ref21 ref3 ref3">1-3</xref>
        ] that distance learning results do not concede to traditional forms of education.
A student during his distance learning works with educational material by his own, that improves
memorization and understanding. The opportunity to immediately apply the knowledge into practice at
work helps to fix it. Futhermore, the modern technologies make education more interesting and lively.
      </p>
      <p>
        In recent years, the acquisition and distribution of educational resources has been largely
automated. In particular, e-learning developing was considered by Doneva R. and Gaftandzhieva S [
        <xref ref-type="bibr" rid="ref22 ref22 ref4 ref4">4</xref>
        ],
Bodrow W. [
        <xref ref-type="bibr" rid="ref23 ref23 ref5 ref5">5</xref>
        ], Bazhenova I.Yu. [
        <xref ref-type="bibr" rid="ref24">6</xref>
        ], Parra B.J. [
        <xref ref-type="bibr" rid="ref25 ref25 ref6 ref6">7</xref>
        ], Shivdas P.A., Sivakumar S. [
        <xref ref-type="bibr" rid="ref26 ref26 ref7 ref7">8</xref>
        ].
      </p>
      <p>
        One of the main difficulties of distance learning is the need of creating a volume electronic
document library for storing a large number of educational texts [
        <xref ref-type="bibr" rid="ref2 ref2 ref20 ref20 ref27 ref27 ref8 ref8">2, 9</xref>
        ]. Documents in these libraries are
oriented to students of various specializations, training level and age. Document classification according to
these parameters requires a lot of human resources; therefore the solution of problems of automatic
document classification is undoubtedly important for science and practice.
      </p>
      <p>
        Various issues of automatic text classification are repeatedly discussed in scientific papers (in
particular, the recent works of Onan A. et al. [
        <xref ref-type="bibr" rid="ref28 ref28 ref9 ref9">10</xref>
        ], Zhitomirsky-Geffet M. et al. [
        <xref ref-type="bibr" rid="ref10 ref10 ref29 ref29">11</xref>
        ], Le M.H. [
        <xref ref-type="bibr" rid="ref11 ref30">12</xref>
        ]). Fedotov
A.M. et al. [
        <xref ref-type="bibr" rid="ref12 ref31">13</xref>
        ] proposed a technological approach for developing a model of information system to support
the scientific and educational activities, organized in the form of a digital library. The problems of
systematization of library documents are reviewed by Malki Z.[
        <xref ref-type="bibr" rid="ref13 ref13 ref32 ref32">14</xref>
        ] and Talla A. [
        <xref ref-type="bibr" rid="ref14 ref14 ref33 ref33">15</xref>
        ].
      </p>
      <p>
        This study deals with the task of document classification on the basis of the age of their audience.
This problem was affected by Akker R. and Traum D. [
        <xref ref-type="bibr" rid="ref15 ref15 ref34 ref34">16</xref>
        ], Choi D. [
        <xref ref-type="bibr" rid="ref16 ref16 ref35 ref35">17</xref>
        ], Lee H. [
        <xref ref-type="bibr" rid="ref17 ref17 ref36 ref36">18</xref>
        ]. Their studies were carried
out for English corpuses. Using the same classification features for Russian documents is not correct due to
the individual grammatical and lexical characteristics of Slavic languages. The ability to provide document
classification on the basis of the age of their audience improves the relevance of the results of informational
retrieval in electronic libraries and allows the system to eliminate unwanted resources from the query
results.
      </p>
      <p>In this research we suggest a text classification method and give a list of classification features that
we have used in our computational experiment.</p>
      <p>The “ISACT’</p>
      <p>We propose the intellectual system “ISACT” for text classification. The main task of the system is to
ensure the automatic classification of texts based on the age of their audience destinations. The “ISACT” can
be used both for determining the age category of the destination of the text and in order to conduct
comprehensive research on large samples of texts on various subjects.</p>
      <p>The “ISACT” consists of three modules (fig.1):
 the module of semantic and syntactic analysis;
 the classification module;
 the storage module.</p>
      <p>The module of semantic and syntactic analysis parses texts and searches for syntactic and semantic
text features.</p>
      <p>The parser is present a text as a set of proposals and divide it into a plurality of pairs of tokens and
corresponding frequencies.</p>
      <p>Texts loading the system can be represented as in the markup or in the form of unallocated. The
module of semantic and syntactic analysis creates a description of the processed text in XML-format for
saving and uploading the results of semantic and syntactic text analysis, which allows us to present the
results of the analysis in a form understandable to both system and user. This description is used for the
subsequent analysis of the data extracted. The results obtained in the module semantic-syntactic analysis,
and discharged from the system may be re-added to the other modules to continue working with the text.</p>
      <p>The classification module distributes the text by category. Correlation of the text with the categories
is based on the results of the module of semantic and syntactic analysis working.</p>
      <p>The module allows us to work with texts in two modes: the training mode and the control mode.
Thus, depending on the software system parameters set by the user it is possible to use the system as a
configuration of the classifier and to analyze and determine the category of text.</p>
      <p>The classification module classifies texts in two ways: the method is based on the computation of
Mahalanobis distance as a measure of the proximity of texts and neural method.</p>
      <p>The classical form of Mahalanobis distance’s formula is:
  FTi , FTj   (FTi  FTj )T T C 1 (FTi  FTj ) ,
(1)
Λ – the matrix of weighting coefficients; C – the covariance matrix; FTi , FTj – sets of classification features
for texts Ti and Tj.</p>
      <p>Similarly, the formula (1) can be calculated as the distance between the text and the center of mass
of the category R, represented as a vector of weighted values of classification features:
  FTi , R   ( FTi  R )T T C 1( FTi  R ) ,</p>
      <p>M
 k j FT j
R  j1</p>
      <p>M</p>
      <p>L
, k j  0 ,  k j  1 ,
j1
R – the vector describing the location of the center of mass of categories; М – the number of text of the
category included in the training sample, 1  M  L ; L – the total number of texts; k j – the weight ratio of
confidence training sample text.</p>
      <p>Neural network method implemented using a multi-layer perceptron (fig.2). Using of this network
type is caused by its ability to solve problems of poorly formalized types based on existing examples and
identifying patterns in the communication of input and output data. The input layer of the neural network
comprises a number of neurons equal to the number of classifications, and the output layer contains the
number of neurons corresponding to the number of categories.</p>
      <p>The text is input to the classifier in the form of a set of classification features identified in the course
of semantic and syntactic analysis module. The neural network implemented in the module has one hidden
layer.</p>
      <p>The network training was conducted on the basis of the back-propagation algorithm.</p>
      <p>The storage module is intended for the organization of storing, editing and retrieval of texts and
categories in relational database tables. In addition, the module has a mechanism of advanced text search,
which allows us to limit the results of a search query filters (by author, publication, category), register of
symbols and selected columns.</p>
      <p>Features modular architecture allows flexible integration of the “ISACT” in electronic documents
systems for solving problems of analysis, classification and storage of texts. For example, for integration of
the storage module to a relational database of the electronic library it is needed to change the connection
string that is used to open the database and select the required record from the data source. The “ISACT”
includes the following text data exchange formats: .xls, .xlsx, .xml, .txt.</p>
      <p>The approbation and results</p>
      <p>
        For the selection of classification features we used two samples of texts that are available on the
Russian National Corpus website [
        <xref ref-type="bibr" rid="ref18 ref37">19</xref>
        ]. The first text sample is represented by literary texts of different
genres (historical fiction, adventure, documentary prose, etc. – 5 902 documents, 9 332 659 sentences, 94
538 056 words), the second one includes children's literature (632 documents, 547 735 sentences, 4 742
627 words).
      </p>
      <p>The corpus includes various types of texts representing modern standard (written) Russian. The
age group of potential readers of texts - adult or child - is determined on the basis of expert evaluation.</p>
      <p>
        In the computational experiments are used the Database “Morphological Standard of the Russian
National Corpus” and “Database of meta tagging of the Russian National Corpus" (a collection of children's
literature)”[
        <xref ref-type="bibr" rid="ref38">20</xref>
        ]. The sample size is 532 texts of modern fiction (from the middle of the 20 century) and 510
various texts of children’s literature.
      </p>
      <p>This study deals with two categories – children’s and adults, according to the corpus provided for
the experiments.</p>
      <p>The classification result is the percentage of correctly classified records on the control sample The
original texts of the sample was divided into a training and a test sample n times. Next, we calculated the
average values for all partitions. The accuracy of the classification for the method based on Mahalanobis
distance amounted to 74.16% (standard deviation - 5.88%), for the neural method - 72.07% (standard
deviation - 6.62%).</p>
      <p>Conclusion</p>
      <p>The results of the study show the possibility of using automatic text classification for text age
audience detection tasks. In particular, this type of text classification will be useful in e-learning systems and
in digital libraries. In prospect, we plan to conduct experiments for more age categories of users. This
requires obtaining a training sample with the expert division of texts into the required number of categories.</p>
      <p>The software package “ISAСT” implemented in educational institution "Ugra Training Center" as the
subsystem of e-learning system.</p>
      <p>Литература</p>
      <p>References</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Ni</surname>
            <given-names>A.Y. Comparing</given-names>
          </string-name>
          <article-title>the effectiveness of classroom and online learning: teaching research methods// Journal of Public Affairs Education</article-title>
          .
          <article-title>-</article-title>
          <year>2014</year>
          . -
          <fpage>№</fpage>
          2. - P.
          <fpage>199</fpage>
          -
          <lpage>215</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Nguyen</surname>
            <given-names>T.</given-names>
          </string-name>
          <article-title>The effectiveness of online learning: beyond no significant difference and future horizons // MERLOT Journal of Online Learning and Teaching</article-title>
          . -
          <year>2015</year>
          . -
          <fpage>№</fpage>
          2. - P.
          <fpage>309</fpage>
          -
          <lpage>319</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Arkorful</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abaidoo</surname>
            <given-names>N.</given-names>
          </string-name>
          <article-title>The role of e-learning, the advantages and disadvantages of its adoption in higher education //</article-title>
          <source>International Journal of Education and Research</source>
          . -
          <year>2014</year>
          . -
          <fpage>№</fpage>
          12. - P.
          <fpage>397</fpage>
          -
          <lpage>410</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Doneva</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gaftandzhieva S. Automated</surname>
          </string-name>
          e-learning quality evaluation // Proceedings of International Conference on eLearning. - Bratislava, Slovakia,
          <year>2014</year>
          . - P.
          <fpage>169</fpage>
          -
          <lpage>174</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bodrow</surname>
            <given-names>W.</given-names>
          </string-name>
          <article-title>Evaluation of enterprise skills from the perspective</article-title>
          of university education // Proceedings of International Conference on e-Learning. - Bratislava, Slovakia,
          <year>2015</year>
          . - P.
          <fpage>130</fpage>
          -
          <lpage>135</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          7.
          <string-name>
            <surname>Parra</surname>
            <given-names>B.J.</given-names>
          </string-name>
          <article-title>Learning strategies and styles as a basis for building personal learning environments //</article-title>
          <source>International Journal of Educational Technology in Higher Education. - 2016</source>
          . -
          <fpage>№</fpage>
          11. - P.
          <fpage>70</fpage>
          -
          <lpage>77</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          8.
          <string-name>
            <surname>Shivdas</surname>
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sivakumar</surname>
            <given-names>S.</given-names>
          </string-name>
          <article-title>Innovation in services: A lancastrian approach to the field of e-learning // Education</article-title>
          and
          <string-name>
            <given-names>Information</given-names>
            <surname>Technologies</surname>
          </string-name>
          .
          <article-title>-</article-title>
          <year>2016</year>
          . -
          <fpage>№</fpage>
          6. -
          <fpage>P</fpage>
          .
          <year>1913</year>
          -
          <fpage>1925</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          9.
          <string-name>
            <surname>Sharifabadi</surname>
            <given-names>S.R.</given-names>
          </string-name>
          <article-title>How digital libraries can support e-learning // The Electronic Library</article-title>
          .
          <article-title>-</article-title>
          <year>2006</year>
          . -
          <fpage>№</fpage>
          3. - P.
          <fpage>389</fpage>
          -
          <lpage>401</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          10.
          <string-name>
            <surname>Onan</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korukoǧlu</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bulut</surname>
            <given-names>H</given-names>
          </string-name>
          .
          <article-title>Ensemble of keyword extraction methods and classifiers in text classification // Expert Systems with Applications</article-title>
          .
          <article-title>-</article-title>
          <year>2016</year>
          . - Vol.
          <volume>57</volume>
          . - P.
          <fpage>232</fpage>
          -
          <lpage>247</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          11.
          <string-name>
            <surname>Zhitomirsky-Geffet</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>David E.</given-names>
            ,
            <surname>Koppel</surname>
          </string-name>
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Uzan</surname>
          </string-name>
          <string-name>
            <surname>H</surname>
          </string-name>
          .
          <article-title>Utilizing overtly political texts for fully automatic evaluation of political leaning of online news websites // Online Information Review</article-title>
          .
          <article-title>-</article-title>
          <year>2016</year>
          . -
          <fpage>№</fpage>
          3. - P.
          <fpage>362</fpage>
          -
          <lpage>379</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          12.
          <string-name>
            <surname>Ле</surname>
            <given-names>М</given-names>
          </string-name>
          .Х.
          <article-title>Оптимизация алгоритма knn для классификации текстов // Труды Московского физико-технического института</article-title>
          .
          <source>- 2016</source>
          . -
          <fpage>№</fpage>
          1. -
          <fpage>С</fpage>
          .
          <fpage>92</fpage>
          -
          <lpage>94</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          13.
          <string-name>
            <surname>Fedotov</surname>
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barakhnin</surname>
            <given-names>V.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedotova</surname>
            <given-names>O.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhizhimov</surname>
            <given-names>O.L.</given-names>
          </string-name>
          <article-title>A model of digital library to support research activities // Cовременные информационные технологии для фундаментальных научных исследований в области наук о земле: материалы Международной конференции</article-title>
          . -
          <string-name>
            <surname>Петропавловск-Камчатский</surname>
          </string-name>
          ,
          <year>2014</year>
          . -
          <fpage>С</fpage>
          .
          <year>22</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          14. Malki Z.
          <article-title>Information and communication technologies role in developing electronic libraries</article-title>
          and information centers /
          <source>/ Journal of Theoretical and Applied Information Technology. - 2015</source>
          . -
          <fpage>№</fpage>
          2. - P.
          <fpage>167</fpage>
          -
          <lpage>183</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          15.
          <string-name>
            <surname>Tella</surname>
          </string-name>
          <article-title>A. Electronic and paper based data collection methods in library and information science research: A comparative analyses</article-title>
          // New Library World. -
          <year>2015</year>
          . - №
          <fpage>9</fpage>
          -
          <lpage>10</lpage>
          . - P.
          <fpage>362</fpage>
          -
          <lpage>379</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          16.
          <string-name>
            <surname>Akker</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Traum</surname>
            <given-names>D.</given-names>
          </string-name>
          <article-title>A comparison of addressee detection methods for multiparty conversations // Proc. of methods for multiparty conversations</article-title>
          . - Amsterdam,
          <year>2009</year>
          . - P.
          <fpage>99</fpage>
          -
          <lpage>106</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          17.
          <string-name>
            <surname>Choi</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ko</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            <given-names>H.</given-names>
          </string-name>
          , Kim P.
          <article-title>Text analysis for detecting terrorism-related articles on the Web /</article-title>
          / Journal of Network and
          <string-name>
            <given-names>Computer</given-names>
            <surname>Applications</surname>
          </string-name>
          . - 2013. -
          <fpage>№</fpage>
          5. - P.
          <fpage>37</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          18.
          <string-name>
            <surname>Lee</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stolcke</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shriberg</surname>
            <given-names>E.</given-names>
          </string-name>
          <article-title>Using out-of-domain data for lexical addressee detection in human-human-computer dialog //</article-title>
          <source>Proc. North American ACL/Human Language Technology Conference. - Atlanta</source>
          ,
          <year>2013</year>
          . - P.
          <fpage>215</fpage>
          -
          <lpage>219</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          19.
          <article-title>Национальный корпус русского языка [Электронный ресурс]</article-title>
          .
          <year>2015</year>
          . URL: http:// ruscorpora.ru/ (дата обращения:
          <volume>05</volume>
          .
          <fpage>10</fpage>
          .
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          1.
          <string-name>
            <surname>Ni</surname>
            <given-names>A.Y. Comparing</given-names>
          </string-name>
          <article-title>the effectiveness of classroom and online learning: teaching research methods// Journal of Public Affairs Education</article-title>
          .
          <article-title>-</article-title>
          <year>2014</year>
          . -
          <fpage>№</fpage>
          2. - P.
          <fpage>199</fpage>
          -
          <lpage>215</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          2.
          <string-name>
            <surname>Nguyen</surname>
            <given-names>T.</given-names>
          </string-name>
          <article-title>The effectiveness of online learning: beyond no significant difference and future horizons // MERLOT Journal of Online Learning and Teaching</article-title>
          . -
          <year>2015</year>
          . -
          <fpage>№</fpage>
          2. - P.
          <fpage>309</fpage>
          -
          <lpage>319</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          3.
          <string-name>
            <surname>Arkorful</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abaidoo</surname>
            <given-names>N.</given-names>
          </string-name>
          <article-title>The role of e-learning, the advantages and disadvantages of its adoption in higher education //</article-title>
          <source>International Journal of Education and Research</source>
          . -
          <year>2014</year>
          . -
          <fpage>№</fpage>
          12. - P.
          <fpage>397</fpage>
          -
          <lpage>410</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          4.
          <string-name>
            <surname>Doneva</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gaftandzhieva S. Automated</surname>
          </string-name>
          e-learning quality evaluation // Proceedings of International Conference on eLearning. - Bratislava, Slovakia,
          <year>2014</year>
          . - P.
          <fpage>169</fpage>
          -
          <lpage>174</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bodrow</surname>
            <given-names>W.</given-names>
          </string-name>
          <article-title>Evaluation of enterprise skills from the perspective</article-title>
          of university education // Proceedings of International Conference on e-Learning. - Bratislava, Slovakia,
          <year>2015</year>
          . - P.
          <fpage>130</fpage>
          -
          <lpage>135</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          6.
          <string-name>
            <surname>Bazhenova</surname>
            <given-names>I.Yu.</given-names>
          </string-name>
          <article-title>Sovremennye podkhody k formirovaniyu professional'nykh kompetentsiy v oblasti primeneniya yazykov programmirovaniya // Sovremennye informatsionnye tekhnologii i IT-obrazovanie</article-title>
          .
          <source>- 2015</source>
          . -
          <fpage>№</fpage>
          11. - P.
          <fpage>130</fpage>
          -
          <lpage>134</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          7.
          <string-name>
            <surname>Parra</surname>
            <given-names>B.J.</given-names>
          </string-name>
          <article-title>Learning strategies and styles as a basis for building personal learning environments //</article-title>
          <source>International Journal of Educational Technology in Higher Education. - 2016</source>
          . -
          <fpage>№</fpage>
          11. - P.
          <fpage>70</fpage>
          -
          <lpage>77</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          8.
          <string-name>
            <surname>Shivdas</surname>
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sivakumar</surname>
            <given-names>S.</given-names>
          </string-name>
          <article-title>Innovation in services: A lancastrian approach to the field of e-learning // Education</article-title>
          and
          <string-name>
            <given-names>Information</given-names>
            <surname>Technologies</surname>
          </string-name>
          .
          <article-title>-</article-title>
          <year>2016</year>
          . -
          <fpage>№</fpage>
          6. -
          <fpage>P</fpage>
          .
          <year>1913</year>
          -
          <fpage>1925</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          9.
          <string-name>
            <surname>Sharifabadi</surname>
            <given-names>S.R.</given-names>
          </string-name>
          <article-title>How digital libraries can support e-learning // The Electronic Library</article-title>
          .
          <article-title>-</article-title>
          <year>2006</year>
          . -
          <fpage>№</fpage>
          3. - P.
          <fpage>389</fpage>
          -
          <lpage>401</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          10.
          <string-name>
            <surname>Onan</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korukoǧlu</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bulut</surname>
            <given-names>H</given-names>
          </string-name>
          .
          <article-title>Ensemble of keyword extraction methods and classifiers in text classification // Expert Systems with Applications</article-title>
          .
          <article-title>-</article-title>
          <year>2016</year>
          . - Vol.
          <volume>57</volume>
          . - P.
          <fpage>232</fpage>
          -
          <lpage>247</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          11.
          <string-name>
            <surname>Zhitomirsky-Geffet</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>David E.</given-names>
            ,
            <surname>Koppel</surname>
          </string-name>
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Uzan</surname>
          </string-name>
          <string-name>
            <surname>H</surname>
          </string-name>
          .
          <article-title>Utilizing overtly political texts for fully automatic evaluation of political leaning of online news websites // Online Information Review</article-title>
          .
          <article-title>-</article-title>
          <year>2016</year>
          . -
          <fpage>№</fpage>
          3. - P.
          <fpage>362</fpage>
          -
          <lpage>379</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          12.
          <string-name>
            <surname>Le</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Kh</surname>
          </string-name>
          .
          <article-title>Optimizatsiya algoritma knn dlya klassifikatsii tekstov // Trudy Moskovskogo fiziko-tekhnicheskogo instituta</article-title>
          .
          <source>- 2016</source>
          . -
          <fpage>№</fpage>
          1. - P.
          <fpage>92</fpage>
          -
          <lpage>94</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          13.
          <string-name>
            <surname>Fedotov</surname>
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barakhnin</surname>
            <given-names>V.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedotova</surname>
            <given-names>O.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhizhimov</surname>
            <given-names>O.L.</given-names>
          </string-name>
          <article-title>A model of digital library to support research activities // Sovremennye informatsionnye tekhnologii dlya fundamental'nykh nauchnykh issledovaniy v oblasti nauk o zemle: materialy Mezhdunarodnoy konferentsii</article-title>
          . -
          <string-name>
            <surname>Petropavlovsk-Kamchatskiy</surname>
          </string-name>
          ,
          <year>2014</year>
          . - P.
          <year>22</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          14. Malki Z.
          <article-title>Information and communication technologies role in developing electronic libraries</article-title>
          and information centers /
          <source>/ Journal of Theoretical and Applied Information Technology. - 2015</source>
          . -
          <fpage>№</fpage>
          2. - P.
          <fpage>167</fpage>
          -
          <lpage>183</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          15.
          <string-name>
            <surname>Tella</surname>
          </string-name>
          <article-title>A. Electronic and paper based data collection methods in library and information science research: A comparative analyses</article-title>
          // New Library World. -
          <year>2015</year>
          . - №
          <fpage>9</fpage>
          -
          <lpage>10</lpage>
          . - P.
          <fpage>362</fpage>
          -
          <lpage>379</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          16.
          <string-name>
            <surname>Akker</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Traum</surname>
            <given-names>D.</given-names>
          </string-name>
          <article-title>A comparison of addressee detection methods for multiparty conversations // Proc. of methods for multiparty conversations</article-title>
          . - Amsterdam,
          <year>2009</year>
          . - P.
          <fpage>99</fpage>
          -
          <lpage>106</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          17.
          <string-name>
            <surname>Choi</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ko</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            <given-names>H.</given-names>
          </string-name>
          , Kim P.
          <article-title>Text analysis for detecting terrorism-related articles on the Web /</article-title>
          / Journal of Network and
          <string-name>
            <given-names>Computer</given-names>
            <surname>Applications</surname>
          </string-name>
          . - 2013. -
          <fpage>№</fpage>
          5. - P.
          <fpage>37</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          18.
          <string-name>
            <surname>Lee</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stolcke</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shriberg</surname>
            <given-names>E.</given-names>
          </string-name>
          <article-title>Using out-of-domain data for lexical addressee detection in human-human-computer dialog //</article-title>
          <source>Proc. North American ACL/Human Language Technology Conference. - Atlanta</source>
          ,
          <year>2013</year>
          . - P.
          <fpage>215</fpage>
          -
          <lpage>219</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          19.
          <source>The Russian National Corpus [Electronic resource]</source>
          .
          <year>2015</year>
          . URL: http:// ruscorpora.ru/ (date of access:
          <volume>05</volume>
          .
          <fpage>10</fpage>
          .
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          20. «
          <article-title>Baza dannykh metatekstovoy razmetki Natsional'nogo korpusa russkogo yazyka» (kollektsiya detskoy literatury)»</article-title>
          .
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>