<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Web Content Support Method in Electronic Business Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Victoria Vysotska</string-name>
          <email>Victoria.A.Vysotska@lpnu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitor Basto Fernandes</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Michael Emmerich</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Leiden Institute of Advanced Computer Science, Leiden University</institution>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University Institute of Lisbon</institution>
          ,
          <country country="PT">Portugal</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In the given article content is support method as the content lifecycle stage in Web systems is proposed. The model describes the processes of information resources processing in the electronic business systems and simplifies the content automation support technology. In the given paper the main problems of e-commerce and content function management services are analyzed. The proposed method gives an opportunity to create an instrument of information resources processing and to implement the module of Web content support.</p>
      </abstract>
      <kwd-group>
        <kwd>content</kwd>
        <kwd>context</kwd>
        <kwd>information resources</kwd>
        <kwd>content management system</kwd>
        <kwd>content lifecycle</kwd>
        <kwd>electronic content commerce system</kwd>
        <kwd>Internet Marketing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The current development of the Internet contributes to information needs increasing
such as production factor or strategic resource. It also activates the new
implementation forms of information services [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">1-9</xref>
        ]. Informational product (commercial content)
is documented information, prepared according to user needs and designed to meet
them [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13">10-13</xref>
        ]. Actions for commercial content user providing are information
services. Internet market is set of economic, legal, organizational and programmatic
relations with the sale/purchase of information products/services between
producers/suppliers and users. The concept of commercial content is defined as information
resource in filling in the electronic content commerce systems (ECCS); object of
business processes in ECCS, such as paper, software, books, etc.; structured set of
logically complete information to which the relationship between the user and ECCS;
a set of data without predetermined patterns that exist only in electronic form;
information for commercial purpose which indivisible in time; the main factor in the
region formation of the ECCS functioning and purpose [
        <xref ref-type="bibr" rid="ref14 ref15 ref16 ref17 ref18 ref19 ref20 ref21">14-21</xref>
        ]. Information resources
are a collection of documents, or arrays of instruments in information systems
(libraries, archives, collections, data banks, repositories, museum storages, etc.), which are
subject to ECCS. Content is a set of information resources and products that are
stored in an environment information system (IS) of Virtual Library and available for
application users of the system [
        <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25 ref26">22-26</xref>
        ]. Content is these data without pre-defined
structure of visual presentation as opposed to structured data that usually are managed
by DBMS. The development of information technology led to the fact that in the
modern world economy it has become a key concept of content is an important
element of the driving force of economic growth and social change. The successful
development and growth of Internet e-commerce content once again proved that the
information economy is dynamic and profitable. There are three fundamental content
definitions [
        <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21 ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref29">18-29</xref>
        ]:
1.
2.
3.
      </p>
      <p>any significant information content IS (e.g., text, graphics, multimedia);
part of the message, which is not processed and does not change during
transmission;
content of the document data (other than attributes) that contains text, images,
videos, audio, scripts, programs, or any other similar material content of solid
media.</p>
      <p>
        A variety of content commercial content is this product information or content of
Web-site, Internet publishing, market research, consulting services, which are subject
to business processes ECCS. Content Management System (CMS) is a system that
meets a specific set of requirements and is designed for content management. Such
systems are used for storage and publication of a large number of documents, images,
music or videos. Another case of such systems is ECCS [
        <xref ref-type="bibr" rid="ref30 ref31 ref32 ref33 ref34 ref35 ref36">30-36</xref>
        ]. Such CMS can
manage text and image content, giving user’s convenient storage tools and information
publications. Management System Web-content is designed to generate content
within the portal and have the same problem (dynamic collection, content caching, its
safety, etc.) and other kinds of Web-applications. The initial information for
constructing mathematical models of processes are functioning ECCS data on purpose
and working conditions of CMS [
        <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21">18-21</xref>
        ]. This information defines the main purpose
of modeling ECCS and allows us to formulate requirements on formal models of
ECCS and models of content management.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Formal ECCS model</title>
      <p>Formal ECCS model S  X ,C,V , H ,Y
is a tuple of variables that describe the
process of the system (Table 1).</p>
      <p>
        The values xi , cr , vl , hk , y j are elements of subsets that are disjoint and
contain deterministic and stochastic components [
        <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21">18-21</xref>
        ]. Inbox influences xi , influences
the flow of content cr , the external environment vl and internal system parameters
hk are independent, and source information y j systems are dependent variables
[18    
21]. The process of operation S is described by a function y t   f  x, c, v, h, t  .
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Comparative characteristic of content management</title>
      <p>
        A description models built of content flow is important and remains unexplored.
When considering in [
        <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21">18-21</xref>
        ] the dynamics of thematic content streams found that
models are limited, opening the way for further research. In Table 2, comparative
characteristics of content management are presented, which describe the process of
identifying and aging research (actual) content rather than defining the stages of the
content lifecycle (creation, management, implementation). Existing CMS do not
support full content lifecycle (creation, management, implementation) streams and do not
solve the fundamental problems of information resources processing – content
development and implementation. Formal ECCS model does not disclose the content
management mechanisms. Formal models of content management appointment only
determine the aging process (actual) content stream, and some of them (logistics,
analytical) and thematic content stream. They do not solve the problem of the content
formation, implementation and not solve all problems, content management, for
example, submitting a set of content by end users according to their inquiry, history or
information portfolio, automatic digests creation, information portraits, automatic
detection of thematic subjects, the construction of correlation tables of
communication concepts, calculation of ratings terms, gathering information from different
sources and its format, identifying keywords and concepts of content, automatic
categorization of content, identifying duplication of content, selective dissemination of
content. A basic lack of formal models of content management is the lack of links
between input information, content and output information in ECCS.
The general principles of ECCS architecture design allow to realize technology of a
information resources processing effective. A formal model of electronic content
commerce systems is six elements as
      </p>
      <p>S  X , Formation, C, Management, Realization,Y ,
where X  x1, x2 ,, xn  is input data set, Formation is operator of content
for</p>
      <p>X
mation, C  c1, c2 ,, cn  is a content set, Management is operator of content</p>
      <p>C
management, Realization is operator of content support and Y  y1, y2 ,, ynY 
is initial information set. Input information xi is independent variables in vector

form with like x t    x1 t , x2 t ,, xnX t  , and content c j and source
informa
tion yk are dependent variables given via c t   c1  xi ,t , c2  xi ,t  ,, cn  xi ,t  and
 C
y t    y1 t  t , y2 t  t ,, yn t  t  . The formation of content to describe as
  Y 
c  xi , t   FormationuF , xi ,t  , where uF  xi  is a set of conditions of the content

formation, so uF  xi   uf1  xi , uf2  xi ,, ufnUf  xi  . Content is formed as


c j   ufk


 xi  X   ufk U F  , </p>
      <p>.</p>
      <p>U F  U Fx  U Fx , i  1, m, k  1, n
The process of content realization is described by the function
  
y t  t   Realization uR ,c,t, t  ,

where uR  xi   ur1  xi ,ur2  xi  ,,urnUr  xi  is a set of terms of content, so


y j   urk

</p>
      <p>U R  U Rc
ci  C   urk U R  ,


.
 U Rc , i  1, m, k  1, n
</p>
      <sec id="sec-3-1">
        <title>Formal model of the formation of information resources formation will be</title>
        <p>provided as</p>
        <p>Formation  X , C, Gathering, Formatting,
where X is the set of incoming information from Web-sites or from moderators, C
is the set of content, Gathering is a set of functions of collecting information from
sources, Formatting is the set of functions of formatting information, transforming
the set of content, KeyWords is a set of functions identify keywords, concepts,
Categorization is the set features an automatic categorization, Backup is the set of
functions identify duplication of content, Dissemination is a set of functions of
selective dissemination of content.</p>
        <p>The set of the commercial content is shaped by dependence
CF  Formatting Gathering  X ,UG ,U F  , where UG is a finite set of conditions for
collecting information from various sources, U F is the set of finite terms of
formatting information. Detection duplication of content C  Backup CF ,U B  , where
U B is finite set of conditions identifying duplication of content. Detection of
duplicate content within the meaning of ECCS based on linguistic methods is to identify
general terms, chains which constitute verbal signature content. Automatic
categorization CCt  Categorization  KeyWords C,U K ,UCt  , where KeyWords C,U K  is
detection of keywords, concepts; U K is a set of conditions out the keywords,
concepts; U Ct is set an automatic categorization; CCt is a set of classified content.</p>
        <p>Processing a set of content C to identify important keywords built on the
principle of detecting keywords in content (terms), which is based on Zapf’s law and
reduced to the choice of words with an average frequency of occurrence (most common
words are ignored by "stop-dictionary", and rare words with text messages not
include). The function of selective commercial textual content distribution
CD  Dissemination CCt ,U Ds  , where CD is set of selectively distributed
content; U Ds is a set of conditions of selective dissemination of content. Selective
distribution list content CDs  sup(CCt ) depends on the level of demand for this content.
Associative rules forming the list of contents consists of a list of content CCt
(original list) and the list of content selected from the original list CDs , so CCt  CDs .
Formation of association rules is formation content formed as a result of initial and
original lists. The probability of formation of association rules is the probability with
which the content of the original list CCt will appear in the content of the original list
CDs in the database, so
cf (CCt  CDs ) 
sup(CCt  CDs ) .</p>
        <p>sup(CCt )</p>
        <p>Models of resource management. Main tasks of the content management module
are creation, rotation of the database and providing access to it, forming the
operational and retrospective database; personalization of users, storing personal user
queries and sources of statistics, ensuring the search in database, generation of output
forms, information interaction with other DB.</p>
        <p>Classification models of content management.
1. Formal model generating pages on demand is</p>
        <sec id="sec-3-1-1">
          <title>ManagementQ  X ,C,Q, R, Edit,Y ,</title>
          <p>where X  x1, x2 ,, xnX  is the set of incoming information; C  c1, c2 ,, cnC  is
the set of content;</p>
          <p>Y   y1, y2 ,, ynY 
is the prevailing set of pages;
Q  q1, q2 ,, qnQ  is a set of requests; R is feature formation and presentation
pages; Edit is editing and modifying content. The process of editing and updating
 
content is described by c  xi ,t   Edit  c, xi ,t  . The formation of pages is described as
   
y t  t  R q,c, w,t, t  , that is,</p>
          <p>  c j  Cq   qi t   Cq  ,
yi t  t   c j , w ,</p>
          <p> C  Cq  Cq , j  1, m, i  1, n

where wt  is the content weight of the block.</p>
          <p>2. Generation of pages while editing. When making changes to the contents of a
site create a set of static pages then ignores interactivity between the visitor and
content. Formal model of the generation of pages while editing</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>ManagementE  C, Edit,Y ,</title>
          <p>where C  c1, c2 ,, cn  is the set of content; Y   y1, y2 ,, yn  is a set of static</p>
          <p>C Y
pages; Edit is editing and modifying content. The formation of static pages to
de  
scribe Edit appearance y t   Edit c, w, t  .</p>
          <p>3. Mixed type combines the advantages of the first two types. It can be realized by
caching is submission module generates a page once; it still several times faster
downloads from the cache. Cache can be updated either automatically after a certain
period or when amending certain sections of the site and a team administrator.
Another approach is the preserving of certain information blocks at the stage of
collecting and editing site pages with these blocks when requested by the relevant page.
Formal model of mixed type is then given as</p>
        </sec>
        <sec id="sec-3-1-3">
          <title>ManagementM  X , C, Q, R, Edit, Caching,Y ,</title>
          <p>where X  x1, x2 ,, xnX  is the set of incoming information; C  c1, c2 ,, cnC 
is the set of content; Y   y1, y2 ,, ynY  is the prevailing set of pages
Q  q1, q2 ,, qnQ  is a set of requests; R is feature formation and presentation
pages; Edit is editing and updating content; Caching is function cache formation.
The formation of cache pages</p>
          <p> 
Cache  Caching  y, w, t, t  , Cache   yi yi Y , t  t, i  1, n .</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Formal model of information resources will be provided as</title>
        <p>Realization  X ,C , BuInfPortr, BuDigest,</p>
        <p>IdThemTop, ConCorrTablConc,CalRankConc,Y ,
where X is the set of incoming information; C is the set of content; BuInfPortr is a
set of functions forming information portraits; BuDigest is a set of functions
forming digest; IdThemTop is set of functions identifying thematic stories;
ConCorrTablConc is a set of functions build tables relationship concepts;
CalRankConc is a set of functions calculating ratings of concepts; Y is a set of
initial information.</p>
        <p>Finite set of content C  CP , CD , CT , CC , CR , where CP is a set of content
information of portraits; CD is a set of content digest, CT is a set of thematic content
of plots; CC is a set of tables of content relationship concepts; CR is a set of content
ratings of concepts.</p>
        <p>The set of content information of portraits CP  BuInfPortr  X ,U P , CT  , where
U P is a finite set of conditions for the formation of information portraits. The set of
content digests CD  BuDigest  X ,CT ,U D  , where UD is a finite set of conditions
the formation of digests.</p>
        <p>The set of thematic content subjects CT  IdThemTop  X ,UT  , where UT is a
finite set of conditions identifying thematic subjects. Terms of identifying thematic
scenes UT  sim ci , PD   , where ci is current content monitoring; PD is
dictionary; sim ci , PD  is a measure of proximity of content i to content dictionary; 
is empirically conditioned setting.</p>
        <p>The set of tables of commercial content relationship concepts
CC  ConCorrTablConc CT ,UC  , where UC is finite set of conditions for
building a table relationship concepts. The set of content ratings of concepts
CR  CalRankConc CC ,Th,U R , Sp  , where UR is finite set of parameters
calculating rankings concepts Th is key criteria of content; Sp is a function definition of
spam. The set of initial information Y  Realization CD , CR  . In the case of
assessment content key hypotheses space will include: Th  H 1 is a negative tone;
Th  H0 is the tone neutral and Th  H1 is positive tone. With a set of content with a
positive tone selected terms that are typical for this content. Of these selected terms
with values of probability p t | H1   1 .</p>
        <p>2
5</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Content analysis of textual information</title>
      <p>The system provides the introduction, the content categories choice, content
ordering, mutual settlements implementation, the order tracing. There are different classes
of ECCS and models variety of such systems. Nevertheless the article highlights the
main patterns of transition from the processes of information resources formation to
them support. Accordingly formal models of information resources formation,
management and maintenance were proposed. These models allow realizing the ECCS
architecture optimally. The complex method of the content forming provides a
information gathering from different Web-site and its formatting; content keywords and
concepts identify; automatic categorization of content; content duplication identify;
selective dissemination of content. Operative method of the content management
provides database formation and access to it; operational and retrospective database
formation; database rotation; user experience personalized; personal needs and
sources maintaining; counting; statistical analysis of the users operation in the system;
content search in the database; initial forms generation; information interaction with
the database of other subsystems. Complex method of content support provides
information portraits formation; digests formation; thematic content identification;
concepts relationship tables construction; concepts ratings calculation; new developments
identification, their tracking and clustering. The fully functional ECCS is
characterized complex system of interrelated operations, methods, techniques. The annotations
database creating is a search images database creating of original content and their
clustering (to the content group formation with close on some criteria of search
images). Annotation base (search pattern of clusters used in the search process) is
associated with the cluster base. Each entry corresponds to its specified cluster and
description containing. This description is made of automatic abstracting methods.</p>
      <p>The content accompany step Realization described in the operator form
y(t p  t)  Realization(vl , hk , cr , zw , t p , t) ,
where vl is conditions set of content support and external influences of environment
on the system, i.e. vl  (v1(qi , hk , cr , zw,t p ),, vnV (qi , hk , cr , zw,t p )) ; hk is the set of
content
management
conditions,
i.e.</p>
      <p>Н  h1 (ci1, qd ),, hnH (cinH , qd );
Q  {q1, q2 , qnQ } is set of user queries; value Z  {z1, z2 , znZ } is set of
information resource pages zw  Z of in the system
S
at
w  1, nZ ; the value
T  {t1, t2 , tnT } is time t p  T transaction of information resource processing in
the system S when p  1, nT ; the value Y  {y1, y2  ynY } is set of statistical data
y j Y in system S at j  1, nY .</p>
      <p>Output statistics implemented are as
 (qd Q)  (zw  Z )  
  (vl V )  cr  qd  hk , 

y j   lvl V  Vqd Vqd ,d  1, nQ ,l  1, nV ,</p>
      <p> .
 
 w  1, nZ , r  1,nC , k  1, nH </p>
      <p>Content analysis of textual information allows determine the signs prevalence of
researched content in ECCS. It is important not as an absolute, but the relative
importance of attributes, i.e. characteristics of the place (shares) among other features. For
example, this is the percentage of forum users discussion of economic Issues
concerning political or the percentage of positive comments on articles regarding the negative
and in respect of all comments on this category of articles in online newspapers. The
degree of correlation between the features in the texts provides empirical data to
understand of the functional links between elements reflected in the texts reality eg the
audience mood determination of online newspaper about the economic or political
situation in the country and/or world. If there are texts that have chronological
sequence received number fixed in time portraits of the investigated reality (change in
demand for a content category according to the season, such as winter read more
fiction and detective stories – summer) or the target audience portraits (change in
demand for a content category according to the article, for example, demand for political
articles before the election). This allows to put forward hypotheses of the prognostic
character about the system functioning. In digest formation using content analysis
with regard to frequency weights of words from the concepts dictionary generated.
The digest formation consists are algorithms of the concepts dictionary forming, of
the content duplicate definition and of the digest create (alg. 1).</p>
      <p>Algorithm 1. A digest create.</p>
      <p>Stage 1. Content Select based on its weight.</p>
      <p>Step 1. Digest size C input.</p>
      <p>Step 2. The algorithm 1 implementation.</p>
      <p>Step 3. The weight consistent determine of each content as the weights sum of its
individual words that W   wi .</p>
      <p>Step 4. The input content stream sort from the weights values.</p>
      <p>Step 5. Meaningful content duplicates definition for statistical criterion of text
uniqueness U  0,9 .</p>
      <p>Step 6. Content filter of unsuitable for digests building (when W  l , where l –
Content removal threshold value by the self-education rules of content structuring and
moderating) and statistically substantial duplicates.</p>
      <p>Step 7. The choice of V  q content with greater weight where q  const and the
moderator given.</p>
      <p>Stage 2. Digest text construction of selected content.</p>
      <p>Step 1. Dictionary construction of selected content.</p>
      <p>Step 2. Content analysis application to the text (Table 1).</p>
      <p>Step 3. Sentences filtration that do not meet the semantic rules of content
structuring and moderating.</p>
      <p>Step 4. Hypertext presentation formation of digest, its contents and a link to the
original source.</p>
      <p>Stage 3. Generated text edit of digest.</p>
      <p>Step 1. The check amount of generated content ci . If ci  C , then step 2,
otherwise stage 4.</p>
      <p>Step 2. Content delete from the input stream that is used to the digest formation.
Step 3. Steps 1-2 implementation.</p>
      <p>Step 4. Resulting append to the pre-formed digest and move to step 1.</p>
      <p>Stage 4. Digest text formation as a separate content and its maintaining in the
database with reference on the source.</p>
      <p>Stage
Total
sources
or content
determina</p>
      <p>tion
Content
analysis
selection
Linguistic</p>
      <p>units
identifying
Computation units
finding and
classifier
formation
Procedure
for
calculat</p>
      <p>ing</p>
      <p>Results
interpretation</p>
      <p>Stage characteristics of content analysis
Using a set of defined criteria which corresponds to each content: given type of source;
one type of content; given the parties which involved in the communication process;
message size matched (minimum / length); messages appearance frequency; messages
distributing method; messages distribution space; messages appearance time, etc.</p>
      <p>The selected set of content is formed on the criteria a limited sampling from a larger
array of information. Its forming using the procedure from a set of precisely defined
actions for processing without any changes of all objects study.</p>
      <p>Compliance with strict requirements concerning the linguistic units choice for content
analysis: large enough to interpret meaning; small enough not to interpret the many
meanings; easily identified; units number is large enough for sampling. When taking of
the themes analysis unit take into account that its size does not go beyond a paragraph;
new theme arises with the new characteristics appearance of linguistic units.</p>
      <p>Computing units may coincide with semantic units, or have specific characteristics.In
the first case, the analysis procedure is to the frequency calculate of the selected
content unit use. Otherwise, the researcher proposes computation unit (physical length of
the texts; text area, filled with informative units; the number of rows, paragraphs,
characters, columns in text; the file size / type; pictures number with a certain content
and story) based on the analyzed material and research purposes.</p>
      <p>Standard techniques for classification of selected groups of mathematical statistics and
probability theory formulas.</p>
      <p>This includes all extracted text fragments. When forming conclusions do not take into
account of the some results, without exception all. Here are identified and measured the
text characteristics. They allow drawing conclusions about that wanted to emphasize or
hide its author. Or they predict changes in demand for content based statistical set of
calculated coefficients for the time period of specified category.</p>
      <p>Content with new themes is the new groups basis of interdependent content in
thematic stories identifying with the following procedures:
 control within the system is level destination of user access to different content;
 content integration is content moving to a new decision;
 content support of various types is content storage and sorting in a central
repository;
 detailed documentation and context-intelligent help support;
 rating system of site articles evaluation;
 template changes is general formatting changes to the content of the part site
reflects the entire site;
 workflow support is automated business processes create for specific content;
 content marking is new categories and markers adding to content before / after
saving;
 version control is new versions creating, view and return to the previous versions
of content;
 content analysis of text streams in the system;
 visual administration tool is easy authors management of content, without
resorting to programming, typically implemented using HTML-forms;
 concepts relationship tables construction.</p>
      <p>The concepts ratings calculation is based on procedure for results calculating of
content analysis, taking into account the ratio coefficient c of positive and negative
(for the selected item) estimates, opinions, arguments, as described in the user
comments on the content ECCS. In Table 6 presents a available stages list of the
commercial content lifecycle on the developed system. In Table 2 also presented the operation
results of the developed systems from Google Analytics. They imply that the presence
of all stages of the content lifecycle on the site significantly increases the amount of
visits and unique users.
Achieved goal
Dynamics (%)
Pageviews
Pages number per visit
New Visits (%)
Absolute Unique Visitors
Traffic Sources - search
systems
Traffic Sources - Direct
Traffic
Traffic Sources - Other Sites
(%)</p>
      <p>Vgolos</p>
      <p>0
39,74
4249331
2,34
35,34
671308
42,77
15,76
41,21</p>
      <p>In Fig. 1 presents the functioning results of the developed systems from Google
Analytics in graphs and charts. They imply that the presence of all stages of the
content lifecycle on the site significantly increases the amount of visits and unique users.</p>
      <p>Average Time of Spent Online (min: c)
Fotoghalereja</p>
      <p>Vysocjkykh
Traffic Sources - search systems (%)
Traffic Sources - Direct Traffic (%)
Traffic Sources - Other Sites (%)</p>
      <p>Vgolos</p>
      <p>Tatiana</p>
      <p>PressTime</p>
      <p>AutoChip
a)
b)
d)</p>
      <p>Vgolos</p>
      <p>Tatiana</p>
      <p>PressTime</p>
      <p>AutoChip
Fig. 1. Distribution of a) the residence time, b) traffic, c) new visits and refusals, d) visit to the
resource</p>
      <p>Refusals Index (%)</p>
      <p>New Visits (%)</p>
      <p>The lifecycle model of commercial content implement in the form of
contentmonitoring complexes to content collection from data various sources and provide a
content database according to the users information needs. As a result, content
harvesting and primary processing its lead to a single format, classified according to the
Categories and he is credited tags with keywords. This facilitates the commercial
content management process implementation. In text analyzing explore its layered
structure: the source text as a characters linear sequence; morphological structure
linear sequence, statements linear sequence, related unity net. The text preliminary
study provides for the text division into individual tokens that carry out the finite
automata method. Entry information is text in natural language text as a characters
sequence, and output information – analyzed text partition, sentences and tokens
table. There is the following relationship: the more unique content in the electronic
content commerce systems, the more the visitor’s information resource in its system.
Commercial content support subsystem reduces the time to fill out unique content an
information resource and increases the volume in a short time at this unique content in
information resources and the queries number from search engines. These data take
into account when creating or updating information resource and improve the
electronic content commerce systems architecture. The service of the statistics of visits to
the information resource of the ECCS allows us to estimate the increase in the volume
of sales of content from the direct proportional dependence of the increase in the
number of visits to the information resource, the number of regular users, and the
promise of marketing activities (Figures 2).</p>
    </sec>
    <sec id="sec-5">
      <title>Discussion</title>
      <p>The presence of different types ECCS increases in sales of goods and / or services a
regular user of 9%, the active involvement of unique visitors, potential users and
expanding the boundaries of the target and regional audience by 11%, page views by
12%, time of visit information resources on 7%. So cumulative and median filtering
for information resource victana.lviv.ua visit pages per session is shown in Fig. 3. For
an agglomeration hierarchical cluster analysis, it is advisable to choose the strategy of
the "closest neighbor" for unification (since the proximity matrix consists of only 5
objects). The distance between the two groups is defined as the distance between the
two closest elements of these groups (Figure 4). This strategy is monotonous and
greatly compresses the space of signs.</p>
      <p>We will now analyze the information resource tatjana.in.ua from the ECCS type
B2C (Figure 5). In fig. 6-7 gives the result of finding the trend in a time series of
smoothing methods for the information resource tatjana.in.ua without B2C.</p>
      <p>In fig. 8-9 results of median filtration are presented. To construct graphs and
histograms, the largest and smallest smoothing interval is selected, so that the dependence
of the degree of data smoothing depending on the interval can be seen. In fig. 10-12
expositional smoothing is given.</p>
      <p>In fig. 12-13 provides smoothing formulas from Kendel. In fig. 14 - dendrogram,
and in fig. 15 is a correlation field.</p>
      <p>We will now analyze the functioning of the information resource vgolos.com.ua as
an example of the ECCS (Figure 16).</p>
      <p>To construct curls (Fig. 17) a table is analyzed for the computation of the
frequency of sorted data. On the basis of the correlation coefficients for each table with
the values of the smoothed functions, the corresponding correlation matrices were
constructed (Figures 18-20). From the provided data, a property object table is
generated. Data was split by years (2011-2015). For a graphical representation, a
dendrogram has been constructed that shows the formed clusters (Fig. 21).</p>
      <p>Fig. 17. Analysis of the redistribution of vgolos.com.ua</p>
      <p>This paper solves the problem of current scientific research and development of
methods and means of information resources processing in ECCS. In the upshot used
the classification, mathematical and software architecture and overall ECCS. In the
paper the terminology and electronic content commerce systems are analyzed and
classified to determine their characteristic patterns, trends, process design and
simulation. The authors developed a formal model ECCS for shortcomings determining of
existing methods and means of resources processing. They developed also
standardized methods for information resources processing in ECCS. The architecture of
modules is implementing stages of commercial content lifecycle in ECCS is
proposed. Software for information resources processing increased attendance of
electronic content commerce systems is suggested. From the perspective of systemic
approach is applying the principles of information resources processing in ECCS. This
made it possible to develop methods for the commercial content formation,
management and support. The proposed integrated method of content support makes it
possible to develop a module of commercial content realization. In the present paper, the
main regularities of ECCS classes and models opportunities are defined. The authors
identified the transition from the information resources processing for their
implementation. Formal models of the information resources formation, management and
implementation are proposed. They allow realizing optimally the architecture of
ECCS. The most significant factor taken into account in the formalization and
algorithm models is the use of research tools for hardware and software IT.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Mobasher</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Data mining for web personalization</article-title>
          .
          <source>In: The adaptive web</source>
          , Springer,
          <fpage>90</fpage>
          -
          <lpage>135</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Dinucă</surname>
            ,
            <given-names>C.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ciobanu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Web Content Mining</article-title>
          . In: University of Petroşani, Economics,
          <volume>85</volume>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>The control agent with fuzzy logic, Perspective Technologies and Methods in MEMS Design</article-title>
          , MEMSTECH'
          <year>2010</year>
          ,
          <fpage>40</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Basyuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>The main reasons of attendance falling of internet resource</article-title>
          ,
          <source>Computer Science and Information Technologies</source>
          ,
          <fpage>91</fpage>
          -
          <lpage>93</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Pospelov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Situatsionnoe upravlenie: teoriya i praktika (</article-title>
          <year>1986</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Golota</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Logika antonimov i nechetkaya logika: skhodstva i razlichiya</article-title>
          ,
          <source>Soft Computing and Measurement</source>
          ,
          <volume>208</volume>
          -
          <fpage>210</fpage>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Grinyaev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Nechetkaya logika, www</article-title>
          .computerra.ru/offline/2001/4.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Zade</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ”
          <article-title>Ponyatie lingvisticheskoy peremennoy i ego primenenie</article-title>
          , (
          <year>1976</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Osgood</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>The nature and measurement of meaning, Psychological Bulletin</article-title>
          , vol.
          <volume>49</volume>
          ,
          <fpage>197</fpage>
          -
          <lpage>237</lpage>
          (
          <year>1952</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Peleshko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Izonin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Image Superresolution via Divergence Matrix and Automatic Detection of Crossover</article-title>
          . In:
          <source>International Journal of Intelligent Systems and Application</source>
          ,
          <volume>8</volume>
          (
          <issue>12</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Rashkevych</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vynokurova</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Izonin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lotoshynska</surname>
          </string-name>
          , N.:
          <article-title>Single-frame image super-resolution based on singular square matrix operator</article-title>
          .
          <source>In: IEEE 1th Ukraine Conference on Electrical and Computer Engineering (UKRCON)</source>
          ,
          <fpage>944</fpage>
          -
          <lpage>948</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutsyk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lysak</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukeniuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Lossless Image Compression in the Remote Sensing Applications In: Proc. of the IEEE First Int</article-title>
          .
          <source>Conf. on Data Stream Mining &amp; Processing (DSMP)</source>
          ,
          <fpage>195</fpage>
          -
          <lpage>198</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Kowalik</surname>
          </string-name>
          , Dagmara:
          <article-title>Polish vocational competence standards for the needs of audult education and the Europen labour marke</article-title>
          .
          <source>In: International Conference on Advanced Information Engineering and Education Science</source>
          , ICAEES,
          <fpage>95</fpage>
          -
          <lpage>98</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Mykich</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Uncertainty in situational awareness systems</article-title>
          , Modern Problems of Radio Engineering, Telecommunications and Computer Science, TCSET,
          <fpage>729</fpage>
          -
          <lpage>732</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Mykich</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Algebraic Framework for Knowledge Processing in Systems with Situational Awareness</article-title>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          ,
          <volume>217</volume>
          -
          <fpage>228</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Davydov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Information System for Translation into Ukrainian Sign Language on Mobile Devices</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>48</fpage>
          -
          <lpage>51</lpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Davydov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Linguistic Models of Assistive Computer Technologies for Cognition and Communication</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>171</fpage>
          -
          <lpage>175</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Information resources processing using linguistic analysis of textual content</article-title>
          .
          <source>In: Intelligent Data Acquisition and Advanced Computing Systems Technology and Applications</source>
          , Romania,
          <fpage>573</fpage>
          -
          <lpage>578</lpage>
          , (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pukach</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vovk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ugryn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Method of functioning of intelligent agents, designed to solve action planning problems based on ontological approach</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>3</volume>
          /2(
          <issue>87</issue>
          ),
          <fpage>11</fpage>
          -
          <lpage>17</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <source>Information Technology of Processing Information Resources in Electronic Content Commerce Systems, Computer Science and Information Technologies</source>
          ,
          <fpage>212</fpage>
          -
          <lpage>222</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hasko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuchkovskiy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Process analysis in electronic content commerce system</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          ,
          <string-name>
            <surname>CSIT</surname>
          </string-name>
          <year>2015</year>
          ,
          <volume>120</volume>
          -
          <fpage>123</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Gonçalves</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fox</surname>
            ,
            <given-names>E.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Watson</surname>
            ,
            <given-names>L.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kipp</surname>
            ,
            <given-names>N.A.</given-names>
          </string-name>
          : Streams, Structures, Spaces, Scenarios, Societies (
          <year>5S</year>
          )
          <article-title>: A Formal Model for Digital Libraries</article-title>
          .
          <source>In: ACM Transactions on Information Systems (TOIS)</source>
          ,
          <volume>22</volume>
          (
          <issue>2</issue>
          ),
          <fpage>270</fpage>
          -
          <lpage>312</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Gonçalves</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          : Streams, Structures, Spaces, Scenarios, and
          <string-name>
            <surname>Societies</surname>
          </string-name>
          (5S)
          <article-title>: A Formal Model for Digital Library Framework and Its Applications</article-title>
          .
          <source>PhD thesis</source>
          , Virginia Polytechnic Institute and State University, (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Pérez</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Enrech</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Defining library services for a virtual community</article-title>
          .
          <source>In: Libraries Without Walls Conference</source>
          , Lesvos, Grecia, Centre for research in Library and Information
          <string-name>
            <surname>Management</surname>
          </string-name>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Pérez</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Enrech</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Virtual Library Services for a Virtual University: User-Oriented Virtual Sites in an Open Library</article-title>
          . In: EADTU, Paris,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Stoffle</surname>
            ,
            <given-names>C.J.:</given-names>
          </string-name>
          <article-title>The Emergence of Education and Knowledge Management as Major Functions of the Digital Library</article-title>
          .
          <source>In: Follet Lecture Series</source>
          , http://www.ukoln.ac.uk/services/papers/follett/stoffle/paper.html.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Tkachenko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tkachenko</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Izonin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsymbal</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Learning-based image scaling using neural-like structure of geometric transformation paradigm</article-title>
          .
          <source>In: Studies in Computational Intelligence</source>
          ,
          <volume>730</volume>
          , Springer Verlag,
          <fpage>537</fpage>
          -
          <lpage>565</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Maksymiv</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Video-based Flame Detection using LBP-based Descriptor: Influences of Classifiers Variety on Detection Efficiency</article-title>
          .
          <source>In: International Journal of Intelligent Systems and Applications</source>
          ,
          <volume>9</volume>
          (
          <issue>2</issue>
          ),
          <fpage>42</fpage>
          -
          <lpage>48</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Chernukha</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bilushchak</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Mathematical modeling of random concentration field and its second moments in a semispace with erlangian disrtibution of layered inclusions</article-title>
          .
          <source>In: Task Quarterly</source>
          ,
          <volume>20</volume>
          (
          <issue>3</issue>
          ),
          <fpage>295</fpage>
          -
          <lpage>334</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Zhezhnych</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markiv</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Linguistic Comparison Quality Evaluation of Web-Site Content with Tourism Documentation Objects</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>689</volume>
          ,
          <fpage>656</fpage>
          -
          <lpage>667</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Mobasher</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Data mining for web personalization</article-title>
          .
          <source>In: The adaptive web</source>
          , Springer,
          <fpage>90</fpage>
          -
          <lpage>135</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Dinucă</surname>
            ,
            <given-names>C.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ciobanu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Web Content Mining</article-title>
          . In: University of Petroşani, Economics,
          <volume>85</volume>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , Zhang,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.</surname>
          </string-name>
          :
          <article-title>Web content mining. Web Mining and Social Networking</article-title>
          . In: Springer,
          <fpage>71</fpage>
          -
          <lpage>87</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Jivani Anjali</surname>
          </string-name>
          <article-title>Ganesh: A Comparative Study of Stemming Algorithms</article-title>
          .
          <source>In: Int. J. Comp. Tech. Appl.</source>
          ,
          <volume>6</volume>
          ,
          <fpage>1930</fpage>
          -
          <lpage>1938</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Smart Data Integration by Goal Driven Ontology Learning</article-title>
          .
          <source>In: Advances in Big Data. Advances in Intelligent Systems and Computing</source>
          . - Springer International Publishing AG 2017. P.
          <volume>283</volume>
          -
          <fpage>292</fpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Basyuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>The Popularization Problem of Websites and Analysis of Competitors”</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing II. CSIT 2017. Advances in Intelligent Systems and Computing</source>
          , vol
          <volume>689</volume>
          . Springer, Cham pp.
          <fpage>54</fpage>
          -
          <lpage>65</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>