<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Textual Content Categorizing Technology Development Based on Ontology</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Ivan Franko Drohobych State Pedagogical University</institution>
          ,
          <addr-line>Drohobych</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1869</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The methods and means of using ontologies within systems for the categorization of textual content were created. Also, a method for optimizing the definition of which rubrics best relate to a certain text content was developed. The intellectual system that will use the methods developed earlier, as well as other research results was implemented. The results will allow users to easily filter their text content. The system developed has intuitive user interface.</p>
      </abstract>
      <kwd-group>
        <kwd>ontology</kwd>
        <kwd>content</kwd>
        <kwd>text categorization</kwd>
        <kwd>text content</kwd>
        <kwd>information technology</kwd>
        <kwd>computer science</kwd>
        <kwd>intellectual system</kwd>
        <kwd>intelligent system</kwd>
        <kwd>text content categorization</kwd>
        <kwd>user interface</kwd>
        <kwd>text document</kwd>
        <kwd>text classification</kwd>
        <kwd>information system</kwd>
        <kwd>machine learning algorithm</kwd>
        <kwd>user unfriendly interface</kwd>
        <kwd>content categorization system</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The task of content analysis is becoming more and more relevant in connection with
the rapid growth of the popularity of the World Wide Web, as well as the exponential
increase in the amount of content inside the network [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Priority is information that is
intended for a person. It is for these reasons that the automation of categorization of
the text is an important task [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The main problem of categorization manually is the
considerable time and effort of the person who conducts it [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Also, the challenging
is the unification of the categories to which the text content belongs. Categorization
automation solves these problems by [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]:
      </p>
      <p>The aim of work is designing and developing a system of text categorization. The
following structure of research was created to achieve the goal of work:</p>
    </sec>
    <sec id="sec-2">
      <title>Research methods of constructing a system of text categorization. Research on ontology languages. Analysis of the finished decisions in the field of categorized text. Search and analysis of existing ontologies.</title>
      <p>Analysis of machine learning algorithms.</p>
      <p>Creating an algorithm for determining relevant categories in text content.
Object of research is the process of creation of intellectual systems of text
categorization, the main purpose of which is convenient and qualitative classification of the text
content. The subject of the study is means, methods and ways of developing
intelligent systems of text content text categorization using an ontological approach. The
main requirement of the system is to eliminate the need for manual categorization of
the text. The second requirement is to create a user-friendly system for text
categorization. The final result is a system that will allow users to quickly and accurately
categorize text content. Expected results of the development of such a system are:
1.
2.
3.
4.</p>
      <p>Development of methods and tools for using ontologies in the text
categorization systems.</p>
      <p>Development of methods for optimizing the definition and improvement of
the relevance of the categorization to the text.</p>
      <p>Development of a system that would use both existing and innovative
methods of categorization.</p>
      <p>Development of user-friendly and clear user interface of the system.
2</p>
      <sec id="sec-2-1">
        <title>Key concepts analysis</title>
        <p>
          In order to understand the design and development of the intellectual system, the
definition of this term should be specified. So, under the term «intellectual system»
means a technical or software system that is capable of solving tasks that are
considered to be traditional. These tasks belong to a specific subject area, knowledge of
which is stored in the memory of such system. An intelligent system usually includes
three basis blocks: knowledge base; mechanism of decision making; intelligent
interface. Intellectual system can be understood as intelligent information systems with
intellectual support that solves the problem without the participation of the decision
maker, in contrast to the intellectualized system in which the operator is present [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
        </p>
        <p>
          If we analyze the main methods of content categorization, namely text, one can
conclude that one of the most successful methods of categorization is methods used
by ontologies. It is also worth noting that these systems, for the most part, do not use
the full spectrum of opportunities and benefits of ontologies, which provides great
prospects for future developments in this direction. If to compare ontologies with
other methods of constructing knowledge bases, you can easily see the benefits of the
first one. Ontology is a standard of knowledge engineering, which has proven itself as
one of the best methods for representing objective knowledge [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          However, in the field of ontologies there is a set of unresolved problems, the
solution of which will allow the development of fast and efficient systems for working out
the text, namely its categorization. The list of such tasks includes [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]:
1.
2.
3.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Tasks of the criteria for filling and optimizing ontologies; Modeling processes for processing information resources and the emergence of new knowledge based ontologies; Assessment of the novelty of ontology knowledge.</title>
      <p>Under the formal model of ontology, O understand the three of the following form:</p>
      <p>
        O = &lt;C, R, F&gt;, (1)
where C is a finite set of concepts (concepts, terms) of the domain (PO), which is
given by the ontology of O; R: C → C - a finite set of relations between concepts
(concepts, terms) of a given software; F - finite set of functions interpretation
(axiomatization, restrictions) defined on concepts or ways ontology O. It is worth noting
that the set C is finite and non-empty, and F and R must be finite [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. To improve the
system's results, it is necessary to extend the ontology to the following form [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]:
      </p>
      <p>
        O = &lt;C, R, F, W, L&gt;, (2)
where W is the importance of the concepts C, and L is the importance of the
relationship R. Such an expansion improves the system's results at times, since categories the
importance of meeting a particular concept differ for different categories. The same is
with the concepts: the connection between them may have different meanings [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        In most cases, the graph is often used to provide ontologies (often a conceptual
graph). In the graph, vertices are the concept of software, and arcs are the relation
between different concepts. Depending on whether the axioms of the concepts are
defined, the vertices are divided into interpreted and not interpolated. The arches
(relation) can be vertical or horizontal. With the help of vertical arcs, the taxonomy of
the concepts of software is given. The requirement of horizontal arcs is to determine
the set of values and the area of definition of relations. In general, the structure of the
ontology can be defined by four categories of elements: concept; relation; axioms;
attributes. Concepts (classes) is general categories are organized according to the
hierarchy. The class can be considered as the union of all representatives of a certain
entity. That is, each class describes a group of entities united by common properties.
Defining which class belongs to one class is one of the most common tasks in systems
that use an ontological approach. Such a task is called categorization. Aattributes are
an ontology element that represents a certain class. It is a specific element that
belongs to one category. In elements of ontology there is a specific hierarchy. At the
lowest level, there are specific representatives (attributes). There are categories above
the instances. Above them are the relation between categories. In the top of hierarchy
there are axioms and rules that combine all these steps. Below is a schematic
representation of this hierarchy (Fig. 1). In order to build ontological model, first of all, it
is necessary to define the hierarchy of concepts (set C). Also, during the construction
of ontology, as an infological model, experts in subject areas should participate. For
qualitative ontology construction it is necessary that these specialists skillfully use
abstraction and combination. Also, when constructing an ontology, it is necessary to
construct atomic concepts from a set of differential attributes. For convenience, when
constructing ontologies, classification is often used. The classification is the method
of streamlining knowledge. Using classification approach, we divide objects into
groups based on their structure and behavior. In object-oriented analysis, by means of
determining the general properties of objects, the simplicity of the architecture of the
model system is achieved. It is because of the simplicity of the infological model of
the system that key mechanisms and abstractions are easy to find. In modern studies,
it is considered that there is no ideal hierarchy of classes, as well as the correct
classification of objects. Since there are no strict methods and rules for classification of
objects and their classes. This is due to the fact that is a compromise solution to
choose classes with which the system will operate [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>It can be assumed that there is no system for text content categorization that does not
use parsing or keyword typing. The key is a word, or a stable expression of the natural
language, which expresses some aspect of the content of the document; a word that
contains an important semantic load. Such a word can act as a key when searching for
information. Parsing is a process in which the input sequence of characters is
analyzed. The purpose of parsing is to break up the grammatical structure according to
the prescribed formal grammar. In this analysis, the content becomes a kind of data
structure. Often, as a data structure, a tree is used that repeats the syntactic structure
of the input data. This is due to the fact that such a structure is very well suited for
further processing. Stemming is algorithms work by cutting off the word to the base.
This is achieved by rejecting the suffix, ending, and other auxiliary parts of the word.
Although the results of the sedation, often reminiscent of the root of the word, the
emulation algorithms are based on other principles than algorithms for determining
the root of the word. Therefore, the word after stamping may be different from the
morphological root of the word. In the tasks of information retrieval and linguistic
morphology, the process of sedation is often used.</p>
      <p>
        The stemming algorithms contain the 2 most common problems [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]:
1.
      </p>
      <p>Over-stemming is when two words with different stems are stemmed to the
same root. This is also known as a false positive.</p>
      <p>Under-stemming is when two words that should be stemmed to the same root
are not. This is also known as a false negative.</p>
      <p>
        Stemming algorithms attempt to minimize each type of error, although reducing one
type can lead to increasing the other [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <sec id="sec-3-1">
        <title>Recent researches and publications analysis</title>
        <p>
          After analyzing modern works [
          <xref ref-type="bibr" rid="ref21 ref22 ref23 ref24 ref25 ref26 ref27 ref4 ref5 ref6 ref7 ref8">4-8, 21-27</xref>
          ], we can sum up that developments in the
field of construction and use of ontologies are actively improving. However, it is
worth noting that there are very little researches on the use of ontologies in
decisionmaking systems. In such systems, ontologies will help to make optimal decisions,
since they will allow better processing of information resources of the domain area of
the system. The work [
          <xref ref-type="bibr" rid="ref14 ref28 ref29 ref30 ref31 ref32">14, 28-32</xref>
          ] conducts the review and solution of the problem of
searching for methods for developing and processing resources for intelligent Internet
systems. Such methods will allow the development of such software tools, which
greatly facilitate the development, distribution and development of Web-systems.
These methods were developed as a result of the analysis of features, patterns and
dependencies in the processing of information resources of e-business systems. It can
also be seen that scientific research on this topic is rather local [
          <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref29 ref30 ref31 ref32 ref33">20-33</xref>
          ]. This creates a
certain contradiction, as the development of IT and related fields is very fast, and a
small amount of scientific works points to a number of problems in scientific circles.
As a result, there is a delay in the development of this direction, because of the lack of
theoretical information that leads to the problems of those people who are engaged in
a practical part of the research. This, in turn, can lead to a situation in which, due to
the lack of development of the field, specialists will no longer use ontologies in their
systems. Although ontologies are a very promising direction in certain classes of
tasks. The end of the twentieth century became the beginning of scientific research in
the field of practical use of ontologies in the design and operation of information
systems. Studies on this topic are actively under way. Formal mathematical models of
ontologies and their basic theoretical foundations were developed in works by [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]:
        </p>
        <p>
          After analyzing the scientific studies of foreign and our scientists, one can conclude
that in the area of processing of information resources, such aspects as assessing the
quality of ontology, extracting knowledge from heterogeneous sources and
developing methods of integration between ontologies are the main ones in the direction of
research ontologies. Modern areas of researches that are related to the teaching of
ontologies, as well as their practical use in intelligent information systems, are:
1. Learning ontologies based on the analysis of texts in the natural language [
          <xref ref-type="bibr" rid="ref11 ref12 ref13 ref2">2,
11-13</xref>
          ].
2. Methods and ways of using ontologies in the construction and use of
decision-making systems [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
3. Application development that would allow us to conveniently develop
ontologies manually, or develop them automatically (Ontosaurus, OntoEdit,
Protégé) [
          <xref ref-type="bibr" rid="ref15 ref16 ref17">15-17</xref>
          ].
4. The solution of practical problems, which are based on requests to
knowledge bases, using ontologies [
          <xref ref-type="bibr" rid="ref18 ref2">2, 18</xref>
          ].
5. Creating and improving ontology description languages (RDF, OWL, XML,
        </p>
        <p>
          DAML + OIL) [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ].
4
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Finished software products analysis</title>
        <p>
          A thorough search of sites with the possibility of the text categorization was carried
out for the analysis of finished software. After searching for such sites, one can
conclude that the text classification market has few rivals for the system under
development [
          <xref ref-type="bibr" rid="ref34 ref35 ref36 ref37 ref38 ref39 ref40 ref41 ref42">34-42</xref>
          ]. In spite of the fact that there are several libraries for categorizing, as
well as several open APIs that include the possibility of classifying the text,
fullfledged systems that would allow the simple user to thoroughly refine your text.
There are also several proprietary solutions, but they are quite expensive and for a
user, the price is not entirely justified. All found products face a number of
challenges: user-unfriendly interface; access to only one language; lack of possibility of
saving the result; impossibility to load text in a file. The following systems will be
considered: TwinWord, uClassify and Ailien. The first found software product is
TwinWord, which almost immediately showed a number of problems for ordinary users.
The first problem is the availability of only one language (English). Also, the
accuracy of categorizing is rather low, on the test text among the 10 categories proposed by
the system, none of them answered the subject of the text or its keywords. And the
last, but not the slightest problem of this system is a user-unfriendly interface (Fig. 2).
The next system is uClassif». This system showed itself not much better than the
previous one. It is also available in English only. The quality of categorizing is better, but
the results were still far from expected. As a result of the classification of this system,
it can be understood that it is more based on keywords. Also, the common problem
with the previous system is user-unfriendly interface (Fig. 3). The last system is
Aylien. This system is much better than the previous two and can be considered as the
best one. Although there are no other languages than English, it gives users a
taxonomy to select the text to be categorized. There are two taxonomy to choose from:
1. IPTC News Codes - The International Press Telecommunications Council
for News Categorization;
2. IAB QAG - Quality Assurance Guidelines from the Interactive Advertising
        </p>
        <p>Bureau (IAB).</p>
        <p>The results of the categorizing were also better than in the previous systems and were
fairly accurate. Also, this system has a much friendlier user interface (Fig. 4-5).</p>
      </sec>
      <sec id="sec-3-3">
        <title>System Analysis of the Study Object</title>
        <p>The main purpose of the system is the text content categorization. The main
objectives of this system are the user-friendly interaction with the system, and qualitative
categorization/clasification of the content. In order to achieve each of these
objectives, we will break them down. This partition will look like this:
1.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Interaction with users.</title>
      <p>o Authorization
o Sending request for categorizing.
o Reviewing categorized/classified articles.</p>
      <p>o Filtering articles by sections.</p>
      <p>Categorization content.</p>
      <p>o Processing a categorization request.
o Searching key essentials.
o Analyzing found key entities.
o Defining categories for articles.</p>
      <p>o Optimizing weights for categories.
In the text content categorization system an object that changes its state over time is
the article itself. Fig. 9 shows the state diagram of the article.
A sequence diagram shows a set of messages arranged in time sequence. Also, this
diagram depicts which messages are transmitted between objects during an action. In
UML, when constructing such a diagram, processes and objects are represented in the
form of vertical lines, and messages between them are represented as horizontal lines.
Messages must be ordered at the time of departure. Fig. 10 shows the sequence
diagram for the text content categorization system.
Since the diagram as a result of such association is rather voluminous, in order not to
confuse people who will work with this diagram, the actions are numbered. The
numbering begins with 1 and continues on the message movement in the system.
Collaboration diagram is one of the most comprehensive. This diagram is most commonly
used by system designers since they can see the overall picture of the system they are
developing. Fig. 11 shows a collaboration diagram.</p>
      <p>The latest diagram was a deployment diagram. Just like the previous diagram, this
diagram is more technical. As a component diagrams, it is very popular among
software developers, especially among DevOps. Because it is their competence to start
and configure the system's nodes. This diagram can also be used in software
development, in order to outline which nodes are needed by the system, which can
facilitate the development, since no extra work will be done. Fig. 12 shows the deployment
diagram of the intellectual system of categorization of the text content.</p>
      <sec id="sec-4-1">
        <title>Statement and justification of the problem</title>
        <p>As described in the previous section, there are already systems that would implement
the possibility of categorizing text content. There are different types of systems, both
public and closed systems, access to which must be purchased. However, none of the
systems can save results, although they can be used to improve the results. That is
why it should be used to improve the competitiveness of the system. The first and
most obvious problem is the user interface. Many existing systems have a big
problem in this direction. And this should be used in the development of this system. The
user interface is a very important part of the system, since it makes no sense to design
a system that nobody will use. The next problem is the ability for users to save their
articles. This can improve the system time, since it will not be necessary to rearrange
articles. And if the user loses the result of the previous categorizing, he will always be
able to view the previous results. The third problem also applies to the preservation of
information. We can use the history of categorizations to improve its quality.
Knowing to which categories are the user's articles belongs, we can improve the accuracy of
classification. That is, if a user often writes on a single topic, then the possibility that
his new article belongs to this topic is much bigger than that the article belongs to a
completely new topic for the user. To solve this problem, you can connect a machine
learning algorithm that could analyze the user's history.
7</p>
      </sec>
      <sec id="sec-4-2">
        <title>Software product description</title>
        <p>For full operation of the system, a permanent connection with the server part of the
system is required. Also, on the server should be a mandatory access to the Internet,
because the server uses external resources. The system is based on the MERN stack
using the JavaScript programming language. The user interface is a web page where
the user can log in and take advantage of the system.</p>
        <p>The purpose of the system is to automate the classification of the text content. The
classification problem is quite acute in modern realities, since manual classification is
a time-consuming process, and correctly selected columns improve both SEO and
user-friendliness of the system. The system being developed uses the Dandelion API.
Dandelion API - an open API designed for text analysis. In this system, Dandelion
API is used to get the essence of the text. The entity that returns this API is part of the
DBPedia ontology. Dandelion API is a multilingual API. It supports a stable analysis
of 7 languages and more than 50 languages are in active development. DBPedia is a
crowd-sourced community effort to extract structured content from the information
created in various Wikimedia projects. Most systems of text classification have a
limited number of available classifications, but the system developed thanks to
DBPedia will have almost the maximum available at the moment the list of classifies.</p>
        <p>The main part of the whole process of analyzing the text on the server is to process
the essentials derived from DandelionAPI. For large text, DandelionAPI returns many
entities among which the most important ones to be identified, as well as determine
which sections they belong to. The solution to the task involves the following steps:</p>
        <p>Definition of the language of the text.
2. Splitting the text into pieces.
3. Configure Dandelion API request.
4. Sending Dandelion API request.
5. Getting results from the Dandelion API.
6. Rejecting entities with low confidence.
7. Finding and removing entities that are alternate names of other entities.
8. Obtaining categories from entities.
9. Counting the number of times each of the categories met.
10. Finding the maximum weight for each category.
11. Finding the weight of each category.
12. Correction of weight of each category according to the user's history.
13. Sifting categories with low weights.
14. Saving categories to user history.</p>
        <p>15. Saving categories as clasifications for text content.</p>
        <p>The problem text classification is relevant because none of the top sites for blogs /
articles does not offer automatic categorization of text, which means that users or
moderators of the data need to manually categorize content on each site. Content
classification is an important function of such a resource, as it will simplify the
navigation, search and filtering content to users. The advantages of the system are:




</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Multimodality.</title>
      <p>No need for support.</p>
      <p>Automation of categorizing process.
No constraints on the subject of convent.</p>
      <p>Ability to improve the system.</p>
    </sec>
    <sec id="sec-6">
      <title>Data in the system is divided into 3 categories:</title>
    </sec>
    <sec id="sec-7">
      <title>1. Inputs, which the user enters.</title>
      <p>2. Input that is the result of a request to the Dandelion API.</p>
      <p>3. Output data, which the system generates.</p>
      <p>Inputs made by the user are user data, as well as text content for classification. The
input, that is the result of a request to the Dandelion API - is the data received by the
system after the analysis of the user's text from the Dandelion API. Output is
classified articles that are received upon a user request. Integrated data is data that affect
the operation of the algorithm. In this system it is the history of user’s categories.
8</p>
      <sec id="sec-7-1">
        <title>User guide</title>
        <p>The «Text Categorizer» is a website. To access to the website Internet is needed. The
website is available on both personal computers and mobile devices. The target
audience of this application is people who generate or consume text content. All articles
and their classifications are publicly available on the site. To work with the system as
the user, it is only necessary to fill in all the information about the article (name, text),
after which the system will automatically select the category’s. The user does not
need any actions to do that. Due to the high automation of the process, there is only
one type of user in the system: Author. To work on the Author system you need to be
authenticated. After passing authentication, the author will be able to: view the
classified articles; filter articles by categories; categorize his own articles.</p>
        <p>To access the application, the user must first go to the site address, then
authenticate to the system. After passing the authentication process, the user will go directly
on the main page of the application (Fig. 13). On the main page, the user can see the
cards of the classified articles. Each card contains the main information about the
article: title, author, date of creation, category. At the top of all pages of the system,
the user can see the header. The left-handed menu consists of the following buttons:

</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Home is click below to be taken directly to the homepage. Create is click below to be taken directly to the creation page.</title>
      <p>On the right side, the user can see under which username he or she is locked, as well
as the exit button. In the bottom right corner of each card there is a button «View
Full», which allows you to go to the page detailed review article (Fig. 14). On the
page's detailed article view, you can see the full article. In the upper right corner of
the page is a button «Delete», which function is to delete the article from the system.
Also, the user has the option to click on one of the categories of the article and return
to the main page where the category to which the user has clicked will be included in
the article search filter.</p>
      <p>There is an option to add a category to the filter list by using several methods:


</p>
    </sec>
    <sec id="sec-9">
      <title>When moving from a detailed view page;</title>
      <p>Clicking on the category on the article card on the main page;</p>
      <p>Entering a category in the search box input.</p>
      <p>When entering the category in the search box, the user can enter any value. However,
one can select only one of the existing categories (Fig. 15). During updating of the list
of categories, on the main page are filtered and are appeared only selected
classifications. (Fig. 16).
To add an article to the system, go to the «Create» page (Fig. 4.5). This page has an
article entry form. The first input field is the title of the article. Then the user has a
choice:

</p>
      <p>To download the text document by clicking the «Select file» button.</p>
      <p>To enter the article text manually in the «Article Body» entry field.</p>
      <p>Next, the user must click on the «Submit» button, after which the article will
automatically be classified down and saved in the system. The user will be redirected to the
main page of the site.
9</p>
      <sec id="sec-9-1">
        <title>Test Case Analysis</title>
        <p>In order to check the work of the website one must consider the main types of work
with the system. An important part of the developed system is the possibility of
multilanguage use. Therefore, it is worth checking out the work with the major world
languages: English; German; Italian; French You also need to check whether it is
possible to download articles as a text document. Each author will start work the same:
authorization, transition to the main page, the click of a «Create» button, after which
will be done the main work with the system. The system`s work was first reviewed in
English (Fig. 18-19) and in German (Fig. 20-21).</p>
        <p>Fig. 21. View the result of the categorization of the German text</p>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>Subsequently, the article was verified in French (Fig. 22-23).</title>
    </sec>
    <sec id="sec-11">
      <title>Subsequently, the article was handwritten in Italian (Fig. 24-25).</title>
    </sec>
    <sec id="sec-12">
      <title>The ability of downloading a document was checked (Fig. 26-28).</title>
      <p>As a result of a practical implementation, a resource has been created. The main
proposes is solving the problem of automating the categorization of text content. A
description of the created software product was made. Using the ER-diagrams for the
Chen note, the database was described. In this section, there were also illustrated user
roles in the system and their main types of interaction with the system. Test case of
the main functional of the system was carried out and analyzed.</p>
      <sec id="sec-12-1">
        <title>Conclusion</title>
        <p>During the implementation of work, an analysis and review of literary sources were
conducted, in which key concepts, recent research and ready-made software solutions
of the problem were described and analyzed. As a result of this analysis, it was
determined that the developed system would be successful among users. It was also
determined which deficiencies of competitive systems need to be corrected in the system
being developed. System was analyzed after the analysis of literary sources. In this
analysis, an objective tree, a UML diagram and a system hierarchy were developed.
During this stage of the system development, it was determined which goals are
necessary to create the system. The next step at this stage was to determine the ways of
moving data in the system. The next stage was the choice of software solutions. The
MERN stack was selected as the backbone of the system. This stack was chosen due
to the ability to create an isomorphic JavaScript application. After the successful
determination of software products, the hardware requirements of the system under
development were determined. After the previous stages, the practical implementation
of the system was developed. The finished product has been described in detail. Also,
during this stage of development has been described user's manual. The system was
tested on a test case. The final stage of development was the analysis of the economic
feasibility of the system. It was considered economically feasible and competitive.</p>
        <p>As a result of the implementation of the graduation paper, we received a software
product that provides a convenient text categorization. Anyone can access this web
site and to categorize their own text through a website. The system is open to
improvements through the expansion of supported languages, as well as improving the
speed and quality of the definition of the categories.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Alipanah</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parveen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thuraisingham</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Ontology-driven query expansion using map/reduce framework to facilitate federated queries</article-title>
          .
          <source>In: Proc. of the International Conference on Web Services (ICWS)</source>
          ,
          <fpage>712</fpage>
          -
          <lpage>713</lpage>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Euzenat</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shvaiko</surname>
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Ontology Matching</article-title>
          . In: Springer, Heidelberg, Germany, (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Maedche</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staab</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Measuring Similarity between Ontologies</article-title>
          .
          <source>In: Knowledge Engineering and Knowledge Management</source>
          ,
          <fpage>251</fpage>
          -
          <lpage>263</lpage>
          . (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Xue</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hao</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Optimizing Ontology Alignments by using NSGA-II</article-title>
          .
          <source>In: The International Arab Journal of Information Technology</source>
          ,
          <volume>12</volume>
          (
          <issue>2</issue>
          ),
          <fpage>176</fpage>
          -
          <lpage>182</lpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Martinez-Gil</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alba</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aldana-Montes</surname>
            ,
            <given-names>J.F.</given-names>
          </string-name>
          :
          <article-title>Optimizing ontology alignments by using genetic algorithms</article-title>
          .
          <source>In: The workshop on nature based reasoning for the semantic Web</source>
          , Karlsruhe, Germany. (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Calvaneze</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Optimizing ontology-based data access. KRDB Research Centre for Knowledge and Data</article-title>
          . In: Free University of Bozen-Bolzano,
          <string-name>
            <surname>Italy.</surname>
          </string-name>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Gottlob</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Orsi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pieris</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Ontological queries: Rewriting and optimization</article-title>
          .
          <source>In: Data Engineering</source>
          ,
          <fpage>2</fpage>
          -
          <lpage>13</lpage>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heflin</surname>
          </string-name>
          , J.:
          <article-title>Query optimization for ontology-based information integration</article-title>
          .
          <source>In: Information and knowledge management</source>
          ,
          <fpage>1369</fpage>
          -
          <lpage>1372</lpage>
          . (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Keet</surname>
            ,
            <given-names>C.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ławrynowicz</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hilario</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Modeling issues &amp; choices in the data mining optimization ontology</article-title>
          . (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Keet</surname>
            ,
            <given-names>C.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ławrynowicz</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>d'Amato</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalousis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nguyen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Palma</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stevens</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hilario</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The data mining Optimization ontology</article-title>
          .
          <source>In: Web Semantics: Science, Services and Agents on the World Wide Web</source>
          ,
          <volume>32</volume>
          ,
          <fpage>43</fpage>
          -
          <lpage>53</lpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <article-title>Montes-y-</article-title>
          <string-name>
            <surname>Gómez</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gelbukh</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>López-López</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Comparison of Conceptual Graphs</article-title>
          .
          <source>In: Artificial Intelligence</source>
          ,
          <fpage>1793</fpage>
          . (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Biggs</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lloyd</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          , Wilson, R.:
          <source>Graph Theory. In: Oxford UP</source>
          ,
          <fpage>1736</fpage>
          -
          <lpage>1936</lpage>
          . (
          <year>1986</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Bondy</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Murty</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Graph Theory</article-title>
          . In: Springer. (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>The control agent with fuzzy logic, Perspective Technologies and Methods in MEMS Design</article-title>
          , MEMSTECH'
          <year>2010</year>
          ,
          <fpage>40</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Davydov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Information System for Translation into Ukrainian Sign Language on Mobile Devices</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>48</fpage>
          -
          <lpage>51</lpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Davydov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Linguistic Models of Assistive Computer Technologies for Cognition and Communication</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>171</fpage>
          -
          <lpage>175</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Martin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>del Toro</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haber</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dorronsoro</surname>
          </string-name>
          , J.:
          <article-title>Optimal tuning of a networked linear controller using a multi-objective genetic algorithm and its application to one complex electromechanical process</article-title>
          .
          <source>In: International Journal of Innovative Computing, Information and Control</source>
          , Vol.
          <volume>5</volume>
          /10(B),
          <volume>3405</volume>
          -
          <fpage>3414</fpage>
          . (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Precup</surname>
          </string-name>
          , R.-E.,
          <string-name>
            <surname>David</surname>
          </string-name>
          , R.-C.,
          <string-name>
            <surname>Petriu</surname>
            ,
            <given-names>E.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Preitl</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , Ră dac, M.-B.:
          <article-title>Fuzzy logic-based adaptive gravitational search algorithm for optimal tuning of fuzzy controlled servo systems</article-title>
          .
          <source>In: IET Control Theory &amp; Applications</source>
          , Vol.
          <volume>7</volume>
          (
          <issue>1</issue>
          ),
          <fpage>99</fpage>
          -
          <lpage>107</lpage>
          . (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Ramirez-Ortegon</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Margner</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cuevas</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rojas</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>An optimization for binarization methods by removing binary artifacts</article-title>
          .
          <source>In: Pattern Recognition Letters</source>
          ,
          <volume>34</volume>
          (
          <issue>11</issue>
          ),
          <fpage>1299</fpage>
          -
          <lpage>1306</lpage>
          . (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Solos</surname>
            ,
            <given-names>I.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tassopoulos</surname>
            ,
            <given-names>I.X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beligiannis</surname>
            ,
            <given-names>G. N.</given-names>
          </string-name>
          :
          <article-title>Optimizing Shift Scheduling for Tank Trucks Using an Effective Stochastic Variable Neighbourhood Approach</article-title>
          . In:
          <source>International Journal of Artificial Intelligence</source>
          ,
          <volume>14</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>26</lpage>
          . (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Martin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>del Toro</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haber</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dorronsoro</surname>
          </string-name>
          , J.:
          <article-title>Optimal tuning of a networked linear controller using a multi- In: objective genetic algorithm and its application to one complex electromechanical process</article-title>
          .
          <source>In: International Journal of Innovative Computing, Information and Control</source>
          , Vol.
          <volume>5</volume>
          /10(B),
          <volume>3405</volume>
          -
          <fpage>3414</fpage>
          . (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klyujnyk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
          </string-name>
          , H.:
          <article-title>Investigation the Ateb-Gabor Filter in Biometric Security Systems</article-title>
          .
          <source>In: Data Stream Mining &amp; Processing</source>
          ,
          <fpage>580</fpage>
          -
          <lpage>583</lpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klyujnyk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maslanych</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Havrysh</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
          </string-name>
          , H.:
          <article-title>Image filtration using the Ateb-Gabor filter in the biometric security systems</article-title>
          .
          <source>In: International Conference on Perspective Technologies and Methods in MEMS Design</source>
          ,
          <volume>276</volume>
          -
          <fpage>279</fpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buriachok</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lotoshynska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dmytryk</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Research of Ateb-Gabor Filter in Biometric Protection Systems</article-title>
          .
          <source>In: International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)</source>
          ,
          <fpage>310</fpage>
          -
          <lpage>313</lpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliarnyk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dmytruk</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>An images filtration using the Ateb-Gabor method</article-title>
          .
          <source>In: Computer Sciences and Information Technologies (CSIT)</source>
          ,
          <fpage>208</fpage>
          -
          <lpage>211</lpage>
          . (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kynash</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliarnyk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klyujnyk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
          </string-name>
          , H.:
          <article-title>Application perfected wave tracing algorithm</article-title>
          .
          <source>In: Ukraine Conference on Electrical and Computer Engineering (UKRCON)</source>
          ,
          <fpage>1011</fpage>
          -
          <lpage>1014</lpage>
          . (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliarnyk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Troyan</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>Data protection based on encryption using Ateb-functions</article-title>
          .
          <source>In: International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT)</source>
          ,
          <fpage>30</fpage>
          -
          <lpage>32</lpage>
          . (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kornelyuk</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Litvinenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Objective clustering inductive technology of gene expression profiles based on SOTA clustering algorithm</article-title>
          .
          <source>In: Biopolymers and Cell</source>
          ,
          <volume>33</volume>
          (
          <issue>5</issue>
          ),
          <fpage>379</fpage>
          -
          <lpage>392</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharonova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hamon</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grabar</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalska-Styczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Computational linguistics and intelligent systems</article-title>
          .
          <source>In: CEUR Workshop Proceedings, Vol2136</source>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Web content support method in electronic business systems</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2136</volume>
          ,
          <fpage>20</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseyeva</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <source>Web Resources Management Method Based on Intelligent Technologies, Advances in Intelligent Systems and Computing</source>
          ,
          <volume>871</volume>
          ,
          <fpage>206</fpage>
          -
          <lpage>221</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalska-Styczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Uniform Method of Operative Content Management in Web Systems</article-title>
          .
          <source>In: CEUR Workshop Proceedings (Computational linguistics and intelligent systems</source>
          ,
          <volume>2136</volume>
          ,
          <fpage>62</fpage>
          -
          <lpage>77</lpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Korobchinsky</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Peculiarities of Content Forming and Analysis in Internet Newspaper Covering Music News</article-title>
          , In: Computer Science and Information Technologies,
          <source>Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>52</fpage>
          -
          <lpage>57</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makara</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The consolidated information web-resource about pharmacy networks in city</article-title>
          .
          <source>In: CEUR Workshop Proceedings (Computational linguistics and intelligent systems)</source>
          ,
          <volume>2255</volume>
          ,
          <fpage>239</fpage>
          -
          <lpage>255</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veres</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>The Contextual Search Method Based on Domain Thesaurus</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>689</volume>
          ,
          <fpage>310</fpage>
          -
          <lpage>319</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Designing architecture of electronic content commerce system</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the X-th Int. Conf. CSIT'</source>
          <year>2015</year>
          ,
          <fpage>115</fpage>
          -
          <lpage>119</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uhryn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hrendus</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naum</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Analysis of statistical methods for stable combinations determination of keywords identification</article-title>
          .
          <source>In: EasternEuropean Journal of Enterprise Technologies</source>
          ,
          <volume>2</volume>
          /2(
          <issue>92</issue>
          ),
          <fpage>23</fpage>
          -
          <lpage>37</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>The Virtual Library System Design and Development</article-title>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          ,
          <volume>871</volume>
          ,
          <fpage>328</fpage>
          -
          <lpage>349</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The method of web-resources management under conditions of uncertainty based on fuzzy logic</article-title>
          .
          <source>In: International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>343</fpage>
          -
          <lpage>346</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Model of Touristic Information Resources Integration According to User Needs</article-title>
          .
          <source>In: International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          ,
          <fpage>113</fpage>
          -
          <lpage>116</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
          </string-name>
          , R.:
          <article-title>Satellite spectral information recognition based on the synthesis of modified dynamic neural networks and holographic data processing techniques</article-title>
          ,
          <source>2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>330</fpage>
          -
          <lpage>334</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hasko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuchkovskiy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Process analysis in electronic content commerce system</article-title>
          .
          <source>In: 2015 Xth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT)</source>
          ,
          <fpage>120</fpage>
          -
          <lpage>123</lpage>
          . (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>