<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Web Content Monitoring System Development</article-title>
      </title-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>In the work an implementation of the information system of content monitoring of web resources is presented. Means and methods on the basis of which this system is implemented are analyzed in details. The structure of the created database - types of data, connections and restrictions was developed. An algorithm for data collecting from external web resources based on user's musical preferences was developed. As a result of the practical part of the work, the information system was developed in a form of a web application. A description of the software components, its functional purpose, logical structure, used technical means, call and download techniques, appropriate input and output data formats of the system are given. The functional implementation of web application security is being considered. The user's manual for the developed system is described in details. The main functions of the system were tested and the results of the analysis are presented in the form of a control example, which demonstrates step by step the work of the developed system.</p>
      </abstract>
      <kwd-group>
        <kwd>Web Content Monitoring</kwd>
        <kwd>Web Application</kwd>
        <kwd>Internet Marketing</kwd>
        <kwd>SEO Technology</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The Internet is a system that combines smaller local area networks and individual
computers into one large global network and provides communication between them
through a variety of network protocols [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. It involves the emergence of a huge
amount of information resources, such as news and entertainment websites, forums,
social networks, educational sites and information [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. With an increase in the number
of Internet users, the number and variety of information resources in the network
naturally increases too [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In this regard, it becomes more and more difficult for a
user to find and process the information he needs. Same information is repeated on
many websites, which results in re-reading of the same data during a search. You can
also often find incorrect or outdated information too [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        There are sites that are not distinguished from other sites with the same subject
matter, the contents of which are almost identical and often irrelevant. In this regard,
the search of high-quality material is significantly complicated for the right user [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        Due to Internet popularity increasing and correspondent increasing of number of
web resources with diverse content, the process of updates tracking with aim to find
necessary information complicates over time [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. As a result, the search and analysis
of the necessary information takes more time [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Spam and inaccurate information
appears, resulting in frequent failures and complications during work or study [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. It's
becoming more and more difficult to keep track of updates of the information one
need and keep up to date with all latest news, ads and events [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Every average
Internet user spends countless hours of his life searching for the information he needs,
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. In view of this, development of a unified information resource for solving this
problem is urgent. Obtained tool could be used for various purposes [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], for
example: marketing researches, real-time media monitoring, analysis of public opinion,
creating a list of potential users based on information about users of competitor
resources. The goal is to develop a system of content monitoring of web resources that
would collect the required information from the Internet according to user-defined
criteria, convert them into a single format of presentation and display it to the user on
a web page. Therefore the work object is the development of methods and tools for
implementation of the information system of content monitoring of web resources.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>The basic principles of the web content monitoring</title>
      <p>
        Content is a set of information that exists only in electronic form and is indivisible in
time. Content monitoring is a set of operations on the Internet information which
includes search, analysis, classification and clustering of data [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">13-15</xref>
        ]. The result of
content monitoring is a processed and prepared data for a user according to his
requests [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Content-based monitoring targets defined by a specific user allows him to
track the information on the Internet according to his interests. Among the methods of
content monitoring of web resources, the following can be distinguished: collect
information in manual mode; use of search engines; use RSS feeders; use of specialized
services for gathering information (parsing). Manually collecting information is based
on the processing of a person's information page by page [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. This method is simple
and effective provided that the amount of the analyzed information is insignificant
and the one-time collection process [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. In the case of a systematic collection of
information and a large amount of it, the effectiveness of the manual method is
greatly reduced, as many forces need to be spent bypassing all web pages and storing the
collected information. Statistics show that people in a working day can handle no
more than hundreds of web pages in manual mode. This method is the most
costeffective and least productive. [
        <xref ref-type="bibr" rid="ref19 ref3">3, 19</xref>
        ] The use of search engines is accessible to
everyone and a simple method of content monitoring by certain criteria. Search engines
such as Google, Yandex, Bing are very popular today. Many people can not imagine
their life without the use of search engines. But this method of collecting information
is also extremely ineffective. Even the most advanced search engines are not able to
cover all the sites on the Internet. [
        <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23 ref24 ref25 ref26">20-26</xref>
        ] The length of the indexing of new
information can vary from several hours to several days. Such a delay is critical to
maintaining the relevance and credibility of the data. Another major disadvantage is the lack of
data archives that were removed from the Internet. It should also be noted that search
engines can not guarantee the relevance and reliability of the information provided. In
the end, search engines can skip a lot of important information by providing similar
search information from different websites in the search results [
        <xref ref-type="bibr" rid="ref27 ref28 ref29 ref30 ref31">27-31</xref>
        ]. We can
conclude that the use of search engines is a hybrid method of gathering information. For
though people use them to find information, the process of selection and analysis
should still be carried out manually [
        <xref ref-type="bibr" rid="ref32 ref33 ref34 ref35 ref36 ref37 ref38 ref39">32-39</xref>
        ]. At the moment there are no systems that
could analyze and monitor all Internet sites - news resources, social networks, forums,
and so on - in a unified way [
        <xref ref-type="bibr" rid="ref40 ref41 ref42 ref43 ref44 ref45">40-45</xref>
        ]. It is important to give monitoring results to a
user in a single format, which will ensure ease of search and ease of perception.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Analysis of known problem solving tools</title>
      <p>Today, there are many information resources whose purpose is to provide information
on events in the world of music, such as concerts, festivals and others. Among the
users of Ukraine, the most popular are such web-services as Kasa.in.ua, Concert.ua,
Karabas.com. Web service Concert.ua (www.concert.ua/ua) focuses on the sale of
tickets for various musical events. Here you can find various filters to find
information based on many criteria, such as location, price, event category, and musical style.
This is what distinguishes this web service from its rivals. Events on this resource are
added exclusively by moderators. Also, it should be noted that this service specializes
only in music events and here it is not possible to find information of another
category. This service has quite large developed communities in various social networks
and a large amount of advertising to popularize the service. Among the advantages of
this web service, you can highlight the following: archive of events; search field;
narrow specialization; developed customer support service; developed communities in
social networks; large number of filters developed communities in social networks.
Among the disadvantages are the following: content is rarely updated; adding new
events exclusively by moderators of the site; difficult navigation; there is no e-mail
distribution. Also among the popular analogs you can select the web-service
Kasa.in.ua (http://kasa.in.ua/). This service has a wider specialization. Here you can
buy tickets not only for concerts and festivals, but also for theatrical performances
and various sports events. New entries can be created by both resource moderators
and event organizers. On the site you can find the search and filtering of events by
city, which will allow to some extent to accelerate the search for the desired event.</p>
      <p>Among the advantages of this web service, you can highlight the following: adding
new records as moderators and event organizers; the presence of a search field; stable
content upgrade; convenient navigation; developed customer support service. Among
the disadvantages are the following: wide specialization; filtering events only outside
the city; lack of mail distribution; lack of records archive. An even wider range of
event categories includes the Karabas.com web service (http://karabas.com.ua/). Here
you can find information about festivals, concerts, seminars, theatrical performances,
sports events, tours and even quests. You can find a large variety of filters and a
search box for easy search on the site. Since the specialization of the web service is
considerably broad, the update is not so frequent. Among the advantages of this web
service, you can highlight the following: developed customer support service; search
field; large number of filters; developed communities in social networks. Among the
disadvantages are the following: there is no archive of events; difficult navigation;
adding new entries to site moderators only; wide specialization; content is not stable;
There is no e-mail distribution. For a more detailed analysis and comparison of the
advantages and disadvantages of each of the described web services, I build a
comparison table with the list of features required in web systems of this type.
As a result, it is possible to distinguish the basic functions which will be obligatory
when constructing a system of content monitoring of web resources: convenient
navigation; the possibility of adding new events by event organizers; frequent updating of
the content; availability of events archive; availability of a search field; availability of
filters; E-mail distribution.
4</p>
    </sec>
    <sec id="sec-4">
      <title>The system analysis of the task</title>
      <p>Goals tree for the projected system is shown in fig. 1. The main purpose of the
designed system is a content monitoring of web resources. The main goal can be broken
down into the following sub-targets: the first sub-goal of the system is to save
URLaddresses of websites. The system administrator makes URL-addresses in the
database. The second sub-goal is to get user data. In turn, it can be divided into the
following steps - registration or logging in to the system and entering data about the
musical tastes of the user. These steps are taken separately, since the selected musical
tastes may eventually be changed by the user in the system settings. The third subgoal
of the projected system is the gathering of information from the websites. This
subcategory is accordingly divided into the next steps - the transition to a website and the
creation of a query to search for the musical tastes of the user.
The information is collected from sites whose URL-addresses are stored in the
database. The generated request is sent to the relevant website and the necessary
information is searched. The fourth sub-goal is to store the collected and generated
information in the database. The fifth and final sub-goal of the projected system is the sending
of final information to the user. This sub-target contains two steps:

</p>
      <p>The formation of the final information for sending to the user - the system
extracts the information required by the user from the database;
Sending final information to the user - data extracted from the database, sent to
the user's page, as well as in the form of a letter to the e-mail.</p>
      <p>
        We can conclude that the gesigned system should directly affect only on the database.
This connection is important, since well-formed and stored data collected will be
much easier to choose and submit to the user. The purpose of the projected system is
easier to understand if the purpose of the system is correctly formulated. One can
formulate the following goal of the projected system: the system must collect data
from the sources specified by the administrator, generate and store the collected data
in the database, if necessary, to send data from the database to the user's system page,
in relation to its tastes and desires. To simplify the design and construction of the
system, it is necessary to decompose it and highlight its main components. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] The
projected system will be divided into 2 main elements - data collection and data feeds
to the user. Allocated elements of the system are atomic and not directly related to
each other. System elements will be linked by a database in which one module will
store data, and the second module will respectively take them out and send them to
the user. Thus, the maximum simplification of the projected system can be achieved.
      </p>
      <p>The next step in system analysis is to construct a diagram of activity, which will
depict the main activities of the system and will describe in details the process of the
system (fig. 2). On the constructed diagram of the activity is shown 5 basic processes
of the system. The process of filling out musical tastes data involves entering data by
the user at the registration or later on the settings page. The process of viewing
information about a particular event involves extracting information from the database and
forming a response on the user's page. The process of viewing information about all
events involves extracting all information from the database associated with the
preferences of the user and forming a response on the user's page.
The manual information collection process involves the collection of information
from websites and is important in cases where the collection of information did not
occur automatically. Creating a new event involves entering user event data and
saving it to a database. The state diagram depicts a change in the states of the system
when performing its processes (fig. 3).
According to the projected system, if the information about a particular event is
already in the database, it immediately returns to the user and the system goes into the
final state, which can still be regarded as a state of expectation. If the information
collection process is carried out, then the system goes from state to state according to
the stages of the process of gathering information. As a result, the collected
information returns to the user's page, and the system enters the final state. The following
diagram - a sequence diagram (fig 4) - displays the sequence of sending requests in
the system. This diagram allows you to better understand the process of creating a
system. From this diagram we see that the information collection service exists
independently and is used only when it is necessary to collect information.
When registering, the user enters into the system data about his or her musical tastes
(message 1). The system, having received the necessary data from the user, creates
and sends a request for the collection of the information collection service (message
2) and receives the information collected in response (message 3). In turn, the system
returns the received data to the user (message 4). Also, the user can send the system
ID of an existing event system (message 5) and immediately receive information
about the given event (message 6). To view the projected system from the point of
view of software and hardware implementation, a class diagram (Fig. 5) and a
deployment diagram were constructed (Fig. 6). According to the class diagram shown,
each event has its own category, and each category contains many events. Also, the
diagram depicts the classes responsible for handling events:



the Class EventRepository contains the basic methods for working with the
database, or more precisely for working with the event table of this database;
the EventService class contains business logic for creating, deleting, and
presenting an event;
the EventController class is responsible for receiving requests from the user and
sending a response.</p>
      <p>The main purpose of the system development is the creation of a web application that
can collect information from other web resources, compile and record the collected
information into a database, and most importantly - send the user records that will
satisfy his musical tastes. The system being developed is a multi-user system. There
are two types of users in the system: the administrator and the user. A simple user has
the ability to view information about a particular event or all events generated and
sent by the system, as well as fill in information about their musical tastes. The
administrator has an advanced set of features, as it can, in addition to the functions listed
above, also manually create records and run the process of collecting information
from external web resources manually. Table 2 illustrates a list of user types and
functions available to users.
The ability to create new records is only allowed by the administrator to ensure the
reliability and reliability of the information provided by the system. The ability to
start collecting content from external web resources manually is provided to provide
information updates in the event that the process does not start automatically
according to the established schedule. The developed system can be used as a free
webbased service to advise users of events in accordance with their musical tastes. This
web service can also be expanded to include paid revenue generating features for
owners. This web service will mostly be used for entertainment services. This
problem is well-known and widespread in the modern world, since it becomes more
difficult to find the necessary information on the Internet every time. In this case, the
problem of finding content about concerts and other events in the world of music is
being considered. The problem is important, as the user will have to spend a lot of
time and effort to find the right content for himself and make sure that it is reliable.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Methods and means of solving the problem</title>
      <p>Before developing a system, it is necessary to consider and select a method for
content monitoring and a database structure to store the information collected.</p>
      <p>The parsing process consists of three main steps:</p>
      <p>
        Collect information in its original form. Automatic parsing means copying the
code of a particular page with the subsequent extraction of content from it
(necessary data);
The stage of extraction, further processing of information and changes in its
format. Processing, systematization, categorization of the collected information and
bringing it into one kind is carried out [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ];
Generation of results. During this stage, all information received after the
previous stage is stored in the database or recorded in files. If necessary, the result is
also displayed on the screen or sent to the addressees by e-mail.
      </p>
      <p>
        In order to collect all the necessary information from a website, you need to
bypass all its pages and highlight the necessary content. Bypass all the necessary
pages of the site can be done in different ways:
By processing each page, the parser can be trained not only to extract the
necessary data, but also to temporarily store all the internal links that occur in it on the
path. Next, the parser goes to the pages of the website for each of the links
collected and extracts data from them until all pages are gone; [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]
Follow the first analysis of the website logic of the formation of url for web
pages and further generate addresses according to the revealed laws;
The user selects pages of sites that need to be analyzed, while the parser collects
information from the pages in the background.









The disadvantage of this method is that the DOM path may not always be
unambiguous. [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] The next method is to use XPath - that is, the ways that are widely used to
parsing XML data. The essence of this method is to use a simple syntax to describe
The first method will be used to build the system. The addresses of the websites from
which the information to be collected will be stored in the database, and the parser
will walk around all the pages of the selected sites in search of the necessary
information. Next you need to choose a way to extract data. There are several approaches to
extract data: DOM tree analysis; use XPath; parsing lines; use regular expressions.
Using the DOM analysis method of a tree, data can be obtained directly by the
identifier, name, or other attributes of the tree element (such item can be a paragraph, a
table, a block). In addition, if an element does not have any identifier, then it can be
reached in a certain unique way by going down the DOM tree or going through a
collection of similar elements. We can highlight the following benefits of this method:
the ability to obtain data of any type and level of complexity;
the ability to get data from any field, having written the path to it.
the path to an element without the need for a gradual movement down the DOM tree.
This method uses the popular JavaScript library jQuery. Parsing lines are used when
the data is displayed on a particular pattern (for example, a mobile phone
characteristics table) when only the values of a constant set of parameters change. In this case,
the data can be collected without analyzing the DOM tree. But this method is
ineffective for gathering a large amount of data and processing large websites [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
      <p>
        Regular expressions are used only for the extraction of data that has a strict format
- electronic addresses, phone numbers, very rarely - addresses, template data. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]
      </p>
      <p>Taking into account all the advantages and disadvantages of the above methods of
data extraction, it was decided to use the Jsoup library to bypass the DOM tree and
develop a separate parser for each of the websites.</p>
      <p>All data collected from websites will be generated in Event objects and translated
using ORM into a database entry. In the same way, the records read from the database
for presentation to the user will be converted to objects of the Event type. A relational
database will be used to store the collected data, which will provide a rigorous
structure of stored data, which is necessary for a single representation of all events in the
system. Also, relational databases can support more users than non-relational ones.
Although the use of a non-relativistic database will allow the storage of more
unstructured data that does not match a single data format, and the use of a relational
database will require greater performance if you store a large amount of data. Relational
data model displays data in the most comprehensible form for the user and is based on
a mathematical apparatus, which allows a succinct description of the basic operations
of the data. After analyzing the variety of tools for solving the task, the system of
content monitoring of web resources is resolved to be implemented as a web
application. The process of developing such systems consists of two main stages (Fig. 10):
creation of the user interface (client part); creation of the server part. The
development of the client part involves creating a convenient interface for connecting the user
with the server part. It is assumed that the user works only with the interface and does
not see what is happening on the server. Everything that the user sees - forms,
windows, colors, sliders, fonts, animations - belongs to the client part. The main tools for
creating a user interface are tools such as HTML and CSS. To develop the server part
of the web application, you need to choose a programming language that will satisfy
the developer's requirements. Among the popular server languages today, Ruby,
Node.js and Java can be identified. The main frameworks for developing high-quality
web applications in Java are Spring, Play, Dropwizard, Spark.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Description of the created software</title>
      <p>The practical result of the work is a developed and ready-to-use web application for
monitoring web content. Namely the intellectual information system, which is aimed
at gathering information about concerts, festivals and other musical events on the
territory of Ukraine. The server part of this web service is written in the Java
programming language version 8 using the Spring framework, including Spring Boot,
Spring Data, and Spring Security. The client part, that is, the user interface, is
developed on the basis of the Bootstrap framework. The developed system is deployed as a
separate isolated docker container, which ensures not only the ease of deployment of
the system, but also reliability and security. A relational database with a set of data is
necessary for the correct operation of the developed system. That is why the MySQL
database server is deployed in a separate container and linked to the system
developed. As the system deploys as a separate docker container, the pre-kernel file should
have installed the JRE container, that is, the Java Runtime Environment that is freely
accessible. The purpose of the developed system is to collect the information
necessary for the user from various web resources, its further processing, grouping and
returning to the user. The web-service focuses primarily on collecting relevant,
reliable information about festivals, concerts and other musical events on the territory of
Ukraine. Further, the information collected is grouped by categories and musical
styles and sent to the user according to the musical tastes introduced by him during
registration. The developed system can be expanded and improved by introducing a
new functional.</p>
      <p>During the development of the system, the following technologies were applied:









</p>
      <p>Spring Boot - Allows you to quickly configure all major project dependencies
and is the main mechanism for developing high-quality web services;
Spring Data - provides access to the relational database, simplifies the connection
setup and provides a ready-made feature to perform basic operations;
Spring Security - Provides the ability to secure the application, build
authorization and authentication systems;
Spring Retry - Provides re-execution of part of the code in the case of certain
foreseeable exceptions (for example, in case of an error connecting to an external
web resource);
JSP - technology for generating HTML pages with dynamic elements associated
with the controller;
Apache Tiles - a technology that allows you to generate static blocks of HTML
pages and only download them when first launched (such blocks are usually
header and footer);
AJAX - technology for building a user interface, which allows you to send
requests to the server and update the page received in response to data in the
background without reloading the entire page;
Pattern of designing DAO (data access object) - makes the logic of interaction of
the system with the database to a separate level, thereby separating it from
business logic. Data operations are implemented without disclosing the details of the
database;
design pattern DTO (data transfer object) - allows you to transfer from the level
of interaction of the system with the database to the level of business logic, only
the necessary part of the extracted data, which is less resource consuming;
jsoap library is a Java library for working with HTML. It provides a very
convenient API for extracting and processing data using DOM, CSS and jQuery
methods.</p>
      <p>In the process of constructing a relational database structure for the developed system,
the following entities were identified:




</p>
      <p>EVENT (id, name, date, price, image, city_id, category_id, website_id);
CATEGORY (id, name);
CITY(id, name);
USER(id, name, surname, email, password, role, enabled, uuid, category_id);
WEBSITE(id, name, url).</p>
      <p>The CATEGORY and EVENT essences are linked by one to one (1: M). The essence
of CITY and EVENT is one-to-many (1: M) with each other. The essences of EVET
and USER are linked to each other by the link many-to-many (M: M). The
CATEGORY and USER nature of the relationship between many and many (M: M).
The essence of WEBSITE and EVENT are linked by one to one (1: M).</p>
      <p>The underlined attributes of the above entities are the primary keys. For primary
keys, the value of NULL is inadmissible. Deletion is limited, but cascading recovery.
The developed web application is a distributed client-server system. The list of system
functions is listed below.</p>
      <sec id="sec-6-1">
        <title>1. Registering a new user, logging in and logging in a registered user. 2. Confirmation of user registration by sending a letter to the electronic mailbox. 3. Restore the user password by sending a letter to the e-mail box. 4. View the list of events offered to the user (Figure 8).</title>
        <p>Fig. 9. A filters set on the event viewer page
5. Create new event records, edit existing records and delete records from the system
administrator (Figure 10).
6. Blocking and deleting admin users (Figure 11).
7. Search for events by name, category, city of holding and ticket price (Figure 9).
Fig. 11. User Access Control Window</p>
      </sec>
      <sec id="sec-6-2">
        <title>8. Adding new event entries from other websites automatically.</title>
        <p>9. Adding new event records from other websites manually by the administrator.
It is known that there is always a risk of cyber attacks on the website. This, of course,
can negatively affect the security of user data and the reputation of the website owner.
Therefore, during the development of the system was the most common methods of
attack. SQL injection is one of the popular methods of hacking sites through the
introduction of arbitrary SQL code in the query to the database. The system is protected
against this type of attack due to the use of parameterized queries and sending
parameters to the server separately from the body of the request. CSRF Attack -
Interspace Forgery Request - A type of attack on website users that uses the shortcomings
of the HTTP protocol. To protect the system from this type of attack, arbitrary CSRF
tokens were used, which are verified by the server. To prevent errors when creating
new entries in the user database, all fields are validated. Also, when registering, the
user must create a password that contains at least eight characters. A rooted web
application is cross-browser and cross-platform so it can be used on any device that has
a browser installed and has access to the Internet. The input is the user's data that he
makes during registration - his name, surname, email address, and a list of the genres
of music he prefers. Output data, in the form of records of recommended concerts and
music festivals, is based on the input list of the music genres that the user likes and
displayed on his page.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Analysis of the results</title>
      <p>The purpose of the system is to collect information from external web resources with
further processing, grouping, storing in the database and sending to the user's page. In
order to check the efficiency and correctness of the work of the developed system, as
well as the compliance of the declared functional of the reality system, a control test
was made consisting of three steps described below.</p>
      <p>Step 1: View one of the websites, with information about the concerts, festivals
and other musical events (fig. 12).
This work opens the basic concepts of this topic, such as content and content
monitoring, are described. The main methods of content monitoring are presented, which
include specialized programs or parsers, news subscriptions, use of search engines
and manual data acquisition. The advantages and disadvantages of using these
methods are determined. As a result of the analysis it is determined that the most effective
method of content monitoring is the use of specialized programs (parsers). The main
stages of the implementation of parsing web resources and the purposes of their use
are listed. The system is a web application with the following functionality: account
creation; entering information about musical tastes; gathering information from other
web resources about musical events, festivals, concerts; create new events by
yourself; display of the proposed musical events system on the user's page. The system is
proposed to be used in everyday life. The system can be used by people regardless of
age, gender, musical preferences and will be useful for all concert and festival lovers.
The developed system will be freely accessible, each user will be able to use it
completely for free. But since for the development and updating of the system and the
payment for its maintenance costs are necessary, it is possible to add to the system of
paid functions or collection of donations for system development, attracting investors.
Therefore, I believe that the development of such a system in terms of relevance and
payback is appropriate. This system is expedient in terms of acceptance by end-users
as it will considerably reduce the time of search for the information necessary for the
user about the cultural events that will be held on the territory of Ukraine.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , Zhang,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.</surname>
          </string-name>
          :
          <article-title>Web content mining</article-title>
          . Springer,
          <fpage>71</fpage>
          -
          <lpage>87</lpage>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Khribi</surname>
            ,
            <given-names>M. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jemni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nasraoui</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Automatic recommendations for e-learning personalization based on web usage mining techniques and information retrieval</article-title>
          .
          <source>In: International Conference on Advanced Learning Technologies</source>
          ,
          <volume>241</volume>
          -
          <fpage>245</fpage>
          . (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Ferretti</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mirri</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prandi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salomoni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Automatic web content personalization through reinforcement learning</article-title>
          .
          <source>In: Journal of Systems and Software</source>
          ,
          <volume>121</volume>
          ,
          <fpage>157</fpage>
          -
          <lpage>169</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Lavie</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sela</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oppenheim</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Inbar</surname>
          </string-name>
          , O., Meyer, J.:
          <article-title>User attitudes towards news content personalization</article-title>
          .
          <source>In: Int. journal of human-computer studies</source>
          ,
          <volume>68</volume>
          (
          <issue>8</issue>
          ),
          <fpage>483</fpage>
          -
          <lpage>495</lpage>
          . (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Fredrikson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Livshits</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Repriv</surname>
          </string-name>
          :
          <article-title>Re-imagining content personalization and in-browser privacy</article-title>
          .
          <source>In: Symposium on Security and Privacy</source>
          ,
          <volume>131</volume>
          -
          <fpage>146</fpage>
          . (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <issue>6</issue>
          .
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>C. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>P. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chiu</surname>
            ,
            <given-names>F. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>Y. K.</given-names>
          </string-name>
          :
          <article-title>Application of neural networks and Kano's method to content recommendation in web personalization</article-title>
          .
          <source>In: Expert Systems with Applications</source>
          ,
          <volume>36</volume>
          (
          <issue>3</issue>
          ),
          <fpage>5310</fpage>
          -
          <lpage>5316</lpage>
          . (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Mirri</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prandi</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salomoni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Experiential adaptation to provide user-centered web content personalization</article-title>
          .
          <source>In: Proc. IARIA Conference on Advances in Human oriented and Personalized Mechanisms</source>
          , Technologies, and
          <source>Services (CENTRIC2013)</source>
          ,
          <fpage>31</fpage>
          -
          <lpage>36</lpage>
          . (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Fernandez-Luque</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karlsen</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bonander</surname>
          </string-name>
          , J.:
          <article-title>Review of extracting information from the Social Web for health personalization</article-title>
          .
          <source>In: Journal of medical Internet research</source>
          , e15 (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Ho</surname>
            ,
            <given-names>S. Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bodoff</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tam</surname>
          </string-name>
          , K. Y.:
          <article-title>Timing of adaptive web personalization and its effects on online consumer behavior</article-title>
          .
          <source>In: Information Systems Research</source>
          ,
          <volume>22</volume>
          (
          <issue>3</issue>
          ),
          <fpage>660</fpage>
          -
          <lpage>679</lpage>
          . (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Korobchinsky</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Peculiarities of Content Forming and Analysis in Internet Newspaper Covering Music News</article-title>
          , In: Computer Science and Information Technologies,
          <source>Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>52</fpage>
          -
          <lpage>57</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Kanishcheva</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Method of Integration and Content Management of the Information Resources Network</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>689</volume>
          , Springer,
          <fpage>204</fpage>
          -
          <lpage>216</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Naum</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kanishcheva</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Intellectual System Design for Content Formation</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>131</fpage>
          -
          <lpage>138</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          : Model of Touristic Information Resources Integration According to User Needs,
          <source>2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018 - Proceedings 2</source>
          ,
          <fpage>113</fpage>
          -
          <lpage>116</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Web content support method in electronic business systems</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2136</volume>
          ,
          <fpage>20</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hasko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuchkovskiy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Process analysis in electronic content commerce system</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          ,
          <string-name>
            <surname>CSIT</surname>
          </string-name>
          <year>2015</year>
          ,
          <volume>120</volume>
          -
          <fpage>123</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Designing architecture of electronic content commerce system</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the X-th Int. Conf. CSIT'</source>
          <year>2015</year>
          ,
          <fpage>115</fpage>
          -
          <lpage>119</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseyeva</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <source>Web Resources Management Method Based on Intelligent Technologies, Advances in Intelligent Systems and Computing</source>
          ,
          <volume>871</volume>
          ,
          <fpage>206</fpage>
          -
          <lpage>221</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demkiv</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ukhanska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hladun</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalchuk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petruchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dzyubyk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sokulska</surname>
          </string-name>
          , N.:
          <article-title>Design of the architecture of an intelligent system for distributing commercial content in the internet space based on SEOtechnologies, neural networks, and Machine Learning</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>2</volume>
          (
          <issue>2</issue>
          -
          <fpage>98</fpage>
          ),
          <fpage>15</fpage>
          -
          <lpage>34</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Pelekh</surname>
            <given-names>I.I.</given-names>
          </string-name>
          <article-title>Principles of Mashup System Semistructured Data Processing /</article-title>
          / Computer Science and Information Technologies (CSIT'
          <year>2018</year>
          )
          <article-title>: proc. of the XІІI-th Intern. Scientific and Techn</article-title>
          . Conf.,
          <string-name>
            <surname>Lviv</surname>
          </string-name>
          , Ukraine,
          <source>Min. of Education and Science of Ukraine</source>
          ,
          <year>2018</year>
          , P.
          <fpage>254</fpage>
          -
          <lpage>258</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharonova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hamon</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grabar</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalska-Styczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Computational linguistics and intelligent systems</article-title>
          .
          <source>In: CEUR Workshop Proceedings, Vol2136</source>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Vasyl</surname>
          </string-name>
          , Lytvyn, Victoria, Vysotska, Dmytro, Dosyn, Roman, Holoschuk, Zoriana, Rybchak:
          <article-title>Application of Sentence Parsing for Determining Keywords in Ukrainian Texts</article-title>
          .
          <source>In: Computer Science and Information Technologies (CSIT)</source>
          ,
          <fpage>326</fpage>
          -
          <lpage>331</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makara</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The consolidated information web-resource about pharmacy networks in city</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          ,
          <fpage>239</fpage>
          -
          <lpage>255</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>The control agent with fuzzy logic, Perspective Technologies and Methods in MEMS Design</article-title>
          , MEMSTECH'
          <year>2010</year>
          ,
          <fpage>40</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Martin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>del Toro</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haber</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dorronsoro</surname>
          </string-name>
          , J.:
          <article-title>Optimal tuning of a networked linear controller using a multi-objective genetic algorithm and its application to one complex electromechanical process</article-title>
          .
          <source>In: International Journal of Innovative Computing, Information and Control</source>
          , Vol.
          <volume>5</volume>
          /10(B),
          <volume>3405</volume>
          -
          <fpage>3414</fpage>
          . (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Precup</surname>
          </string-name>
          , R.-E.,
          <string-name>
            <surname>David</surname>
          </string-name>
          , R.-C.,
          <string-name>
            <surname>Petriu</surname>
            ,
            <given-names>E.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Preitl</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rădac</surname>
          </string-name>
          , M.-B.:
          <article-title>Fuzzy logic-based adaptive gravitational search algorithm for optimal tuning of fuzzy controlled servo systems</article-title>
          .
          <source>In: IET Control Theory &amp; Applications</source>
          , Vol.
          <volume>7</volume>
          (
          <issue>1</issue>
          ),
          <fpage>99</fpage>
          -
          <lpage>107</lpage>
          . (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veres</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
          </string-name>
          , H.:
          <article-title>The Risk Management Modelling in Multi Project Environment.</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>32</fpage>
          -
          <lpage>35</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pukach</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vovk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ugryn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Method of functioning of intelligent agents, designed to solve action planning problems based on ontological approach</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>3</volume>
          /2(
          <issue>87</issue>
          ),
          <fpage>11</fpage>
          -
          <lpage>17</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uhryn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hrendus</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naum</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Analysis of statistical methods for stable combinations determination of keywords identification</article-title>
          .
          <source>In: EasternEuropean Journal of Enterprise Technologies</source>
          ,
          <volume>2</volume>
          /2(
          <issue>92</issue>
          ),
          <fpage>23</fpage>
          -
          <lpage>37</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kis</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Content Analysis Method for Cut Formation of Human Psychological State</article-title>
          ,
          <source>Proceedings of the 2018 IEEE 2nd International Conference on Data Stream Mining and Processing</source>
          ,
          <string-name>
            <surname>DSMP</surname>
          </string-name>
          <year>2018</year>
          ,
          <volume>139</volume>
          -
          <fpage>144</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuchkovskiy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bobyk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malanchuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ryshkovets</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pelekh</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brodyak</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bobrivetc</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Panasyuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Development of the system to integrate and generate content considering the cryptocurrent needs of users</article-title>
          ,
          <source>Eastern-European Journal of Enterprise Technologies</source>
          <volume>1</volume>
          (
          <issue>2</issue>
          -
          <fpage>97</fpage>
          ), pp.
          <fpage>18</fpage>
          -
          <lpage>39</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuchkovskiy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markiv</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pabyrivskyy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Architecture of system for content integration and formation based on cryptographic consumer needs</article-title>
          ,
          <source>2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018 - Proceedings 1</source>
          ,
          <fpage>391</fpage>
          -
          <lpage>395</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>The Virtual Library System Design and Development</article-title>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          ,
          <volume>871</volume>
          ,
          <fpage>328</fpage>
          -
          <lpage>349</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hrendus</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Method for Determining Linguometric Coefficient Dynamics of Ukrainian Text Content Authorship</article-title>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          ,
          <volume>871</volume>
          ,
          <fpage>132</fpage>
          -
          <lpage>151</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Architectural ontology designed for intellectual analysis of e-tourism resources</article-title>
          ,
          <source>2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018 - Proceedings 1</source>
          ,
          <fpage>335</fpage>
          -
          <lpage>338</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Method for ontology content and structure optimization, provided by a weighted conceptual graph</article-title>
          ,
          <source>Webology</source>
          ,
          <volume>15</volume>
          (
          <issue>2</issue>
          ),
          <fpage>66</fpage>
          -
          <lpage>85</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Model and architecture for virtual library information system</article-title>
          ,
          <source>2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018 - Proceedings 1</source>
          ,
          <fpage>37</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oborska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Methods of Building Intelligent Decision Support Systems Based on Adaptive Ontology</article-title>
          .
          <source>In: International Conference on Data Stream Mining and Processing</source>
          ,
          <string-name>
            <surname>DSMP</surname>
          </string-name>
          <year>2018</year>
          ,
          <volume>145</volume>
          -
          <fpage>150</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kis</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Content monitoring method for cut formation of person psychological state in social scoring</article-title>
          ,
          <source>International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>106</fpage>
          -
          <lpage>112</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pukach</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nytrebych</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demkiv</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Senyk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malanchuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalchuk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huzyk</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          :
          <article-title>Analysis of the developed quantitative method for automatic attribution of scientific and technical text content written in Ukrainian, Eastern-</article-title>
          <source>European Journal of Enterprise Technologies</source>
          ,
          <volume>6</volume>
          (
          <issue>2</issue>
          -
          <fpage>96</fpage>
          ), pp.
          <fpage>19</fpage>
          -
          <lpage>31</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klyujnyk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
          </string-name>
          , H.:
          <article-title>Investigation the Ateb-Gabor Filter in Biometric Security Systems</article-title>
          .
          <source>In: Data Stream Mining &amp; Processing</source>
          ,
          <fpage>580</fpage>
          -
          <lpage>583</lpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klyujnyk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maslanych</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Havrysh</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
          </string-name>
          , H.:
          <article-title>Image filtration using the Ateb-Gabor filter in the biometric security systems</article-title>
          .
          <source>In: International Conference on Perspective Technologies and Methods in MEMS Design</source>
          ,
          <volume>276</volume>
          -
          <fpage>279</fpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buriachok</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lotoshynska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dmytryk</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Research of Ateb-Gabor Filter in Biometric Protection Systems</article-title>
          .
          <source>In: International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)</source>
          ,
          <fpage>310</fpage>
          -
          <lpage>313</lpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Basyuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Popularization of website and without anchor promotion</article-title>
          .
          <source>In: Int. Scientific and Technical Conference on Computer science and information technologies</source>
          ,
          <fpage>193</fpage>
          -
          <lpage>195</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          44.
          <string-name>
            <surname>Basyuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Innerlinking website pages and weight of links</article-title>
          .
          <source>In: Int. Scientific and Technical Conference on Computer science and information technologies (CSIT)</source>
          ,
          <fpage>12</fpage>
          -
          <lpage>15</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          45.
          <string-name>
            <surname>Basyuk</surname>
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>The Popularization Problem of Websites and Analysis of Competitors</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing II</source>
          , vol
          <volume>689</volume>
          . Springer, Cham,
          <fpage>54</fpage>
          -
          <lpage>65</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>