<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Web Resource Changes Monitoring System Development</article-title>
      </title-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The detection of changes in the web content and notifying users about them in timely manner is an important service for both the owners of the web sites and ordinary users. The system created automatically captures and monitors the differences between the content of the web page at a given moment of time and compares them with saved earlier. The system periodically parses the contents of files on a server, available for public access according to the given pattern. It compares its contents with previously stored version and in case if discrepancies are discovered, immediately notifies the user. Thus, the user will not have to monitor manually the specified Internet resources.</p>
      </abstract>
      <kwd-group>
        <kwd>Web resource</kwd>
        <kwd>content</kwd>
        <kwd>SEO technology</kwd>
        <kwd>information technology</kwd>
        <kwd>web technology</kwd>
        <kwd>changes monitoring</kwd>
        <kwd>web server</kwd>
        <kwd>intelligent system</kwd>
        <kwd>operating system</kwd>
        <kwd>web page</kwd>
        <kwd>automated monitoring system</kwd>
        <kwd>neural network</kwd>
        <kwd>content downloader</kwd>
        <kwd>automated monitoring</kwd>
        <kwd>software product</kwd>
        <kwd>monitoring system</kwd>
        <kwd>trademark office</kwd>
        <kwd>computer science</kwd>
        <kwd>neural network</kwd>
        <kwd>intelligent automated monitoring system</kwd>
        <kwd>user interface</kwd>
        <kwd>global network</kwd>
        <kwd>internet resource</kwd>
        <kwd>web service</kwd>
        <kwd>web site</kwd>
        <kwd>regular expression pattern</kwd>
        <kwd>apache http server</kwd>
        <kwd>electronic content commerce system</kwd>
        <kwd>server part</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        With every year, the information technology industry gains more and more rapid
development. Smart systems for monitoring, analyzing and managing things are being
introduced everywhere. However, the development of information technology is not
limited only to this area. All related industries are also developing at a rapid pace. In
order to increase productivity and improve the quality of the final product, the human
labor is replaced by automation [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. A circle is creating: the development of the IT
sphere stimulates other sectors of employment, which in theirs turn stimulate the
development of IT. That is why this process is becoming increasingly widespread with
every year. It is logical that during this rapid development, we have a desire to keep
up with the new trends and to develop at the same pace. To meet these needs, we need
to constantly “consume” and “absorb” a huge amount of fresh information from
multiple sources. Unfortunately, the development of our abilities to perform this process
cannot be improved by purchasing new, more powerful computers [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. For today, it is
not enough to read just published books or magazines to keep a finger on the pulse of
the modern world [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The main reason of this is the huge amount of resources,
needed for the publication of even one textbook, the main of which is time. The time that
is spent on the design, printing and distribution of this publication. Fortunately, we
have the Internet for more rational use of opportunities. Exactly thanks to this the
global web has gained such popularity. As the main source of information the Internet
opens for us lots of data venues. Similarly, the content sites are trying to attract the
user with all possible palettes of web site design and functionality [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. For this
purpose, owners of Internet resources don’t spare the forces and facilities. In the face of
intense competition, there is a need to constantly maintain the quality of the product at
the proper level [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. To achieve this aim it is necessary to invest not only in the
development of something new, but also in preserving the already acquired that is
protecting the site from unwanted changes and supervising the correct the work of all its
components [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. As an option we can design a lot of data processing, create a bunch
of checks to protect against penetration of the unauthorized code into a page. But
none method or even a combination of them all will allow to be sure for one hundred
percent in the security of the initial data [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. That is why the logical decision is not to
going blindly for the unachievable aim, but to take care of possible solutions of
inevitable problems as they appears [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. An intelligent system of automated monitoring of
changes in web resources serves this purpose.
2
2.1
      </p>
    </sec>
    <sec id="sec-2">
      <title>Analytical review of literary and other sources</title>
      <sec id="sec-2-1">
        <title>Subversion (SVN)</title>
        <p>
          The first systems that provided the tracking of changes in the documents were the
version control systems [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. One of them is Subversion or SVN. Officially it was
introduced in 2004 by CollabNet and represents a free, centralized version control
system. It was built on the basis of CVS, but without its errors and disadvantages. At
that time CVS was an unofficial standard among developers [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>
          The work with SVN is not much different from the work with other centralized
version control systems. Users copy files from the central repository, works with
these copies and synchronize them with those that are left in the main repository,
commenting on new edits. The ability of two or more users working with the same
files is a useful feature. This is provided by creating local copies of the original files.
However, this product also has the function of blocking access to a particular file, so
that only one user could work with it. Also, the smart decision of this system is the
use of the mechanism of delta-compression – the saving of not the original and final
contents of the file, but only the differences between them [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>
          The key features that SVN system provides for its users [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]:
 smart tracking of changes of all in a given directory – the file transfers, their
renaming or attributes editing are fixed;
 convenient mechanism of synchronization of the proper files;
 emulation procedure:
─ the making of new branches takes place by copying the old ones and adding
new edits;
─ automatic finding of differences and their unification during branches merging;
 edits, no matter how large are they, are fixed in a single repository in the atomic
transactions representation;
 transferring and processing only the differences between files, but not themselves;
 the same qualitative processing of both binary and text files;
 two storage formats:
─ repository – database;
─ repository – a set of regular files;
 the ability to write commits in any language;
 the ability to create a reflection copy of the repository;
Although the SVN system is based on CVS, however, there is little left from it. Here
is a list of the major differences [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]:
 the way of working with text and binary files was improved;
 boundaries in which the system tracks changes were increased – now it can control
not only files but also directories;
 a set of properties of each file was added to the control;
 it saves network traffic during transferring files to the repository that are not
completely modified but only different parts;
 the ability to lock files during work was created, so that nobody can makes changes
in parallel.
        </p>
        <p>
          For a better understanding of what a version control system represents and what
possibilities it offers, see Fig. 1 [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
This figure shows the way of project development. It resembles the structure of a tree
with a multitude of branches. Exactly from here the name for the mechanism for
creating various temporary versions of one software product is created. The trunk of the
project is marked by green color, by yellow – the branches. Branches are created at
the time of development for some additional functions in the system. In the case of
their successful realization additional branches are merged into the trunk. This
process is called synchronization and is indicated by a red arrow in this figure. Blue –
branches of the project that will no longer change, are called tags. Discontinued
development branch is marked by purple [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. The process of user interaction with the
SVN system can be divided into the following parts [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]:
1. Connect to a central repository.
2. Download the latest version of the project from the repository or creation a new
one.
3. If the project was created earlier – make the necessary changes to the working
copy. If this is a new project – work with it as with any other project, not tracked
by this system.
4. Commit of accomplished actions and providing a textual description of what was
made.
5. Transfer the completed commit to the repository.
        </p>
        <p>
          Due to the strict observance of this plan the history of the project development is
created with the possibility at any time to return to a certain stage of development and go
to a different way [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ].
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>SiteLock</title>
        <p>
          SiteLock is protecting web pages in real time [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. This product was introduced in
2009 as the start-up of two programmers – Neville Feather and Scott Lovell, which
eventually turned into an advanced security in the field of web security. This product
was developed to expand the ability to protect resources written in WordPress CMS.
It extends the set of standard features by its own, which will be useful to both the web
developers and the owners of Internet resources. The main advantage of this software
is the enormous variety of website scanning tools that prevent most problems for
appearing. SiteLock provides its users with the following scanning capabilities [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]:
 Applications scanning – checking for outdated, unstable or unsafe applications;
 SMART scanning – access to the root folder of the site is going through the FTP
protocol and runs a full scan to identify weak spots or malware. Files are checked
in binary format, which makes it impossible to miss even the least errors;
 A regular malware search is a simpler version of SMART validation that uses less
server resources and is suitable for fast site crawling;
 Providing the information about domain – regular checking who the owner of
domain is;
 SSL certificate validation for relevance;
 The detection of SQL injections – if rogue software attempts to transfer SQL code
through the form of the site into the database. In case of a successful injection the
database will be restored from backlog copy and the owner will receive a detailed
report by what method it was realized;
 Spam protection is search for a domain in the largest spam databases (check
whether the e-mail address declared on the site has not been broken and is not used
for the distribution of spam);
 XSS testing is similar to SQL injections – but detecting an attempt to introduce
redirects of end-user requests;
 Searching for open network ports;
 Scanning of recommendations – checking external redirects, cookies, etc.
SiteLock also can boast with its own centers of data processing that are strategically
located to provide the shortest response time to the request and the ability to cache
user sites on their own servers. Also this system interacts through leading network
providers of level 1 to provide its customers with high speed servers with high
capacity [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]. All this enables SiteLock owners to give their services equally to users
regardless of their location. The capabilities of caching data on system servers are as
follows [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]:
1. Dynamic – this method constantly updates the information on the website and its
display. Depending on which content of the site is changing and how it changes,
the forecast for future changes is made to establish a balance between caching data
for a quick response and the relevance of these data.
2. Static – simple caching of static content of a web resource. It includes caching
        </p>
        <p>HTML files, a JavaScript resource and images.
3. Caching on the user’s side – keeping as much data as possible in the browsers of
the site visitors for even faster display of content and offline viewing of web
resources.
4. Loading pages from memory – pages with the largest number of requests are
cached in RAM. This can be done without working with the file system and
buffers.</p>
        <p>
          Particularly useful for owners is the ability to self-control which data should be
cached, and which should not. So, in the case of site design changes or some other
global changes, SiteLock allows to delete all or only certain parts of the cached
content. Another strong side of this product is the availability of support. It works in 24/7
format, that enables users to get an answer to the question at any time. SiteLock
works well with its main aim – protecting users’ web resources and providing means
to improve their end products – that is why it became so popular. However, its
disadvantage is limited support of CMS systems [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ].
2.3
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Content Downloader</title>
        <p>
          The Content Downloader software is a parser. With its help it becomes possible to
save on computer the files with text and graphics presented on the site. In order to
work with it the knowledge of programming is not required, which is an advantage,
because it allows to include in the list of customers the ordinary users. This software
product, like its counterparts, is often used to quickly fill the new web page or to
download and compare different sites [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. This software is not a new one, it has been
in the market for a long time and has proved to be a reliable and convenient tool with
a lot of useful features. One of the main criteria for choosing this tool among many
others is the simple, intuitive interface that is an important argument in terms of
attracting new customers and keeping old ones [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]. The user only needs to assign the
address of the resource from where the data is parsed, the size of data and choose the
format in which to save the results of the work. Parser has a large set of analysis
methods, which allows to collect data effectively from entire web pages or only
necessary parts of them [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]. Content Downloader can be used for [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]:
 Phone numbers, email addresses or other contact information parsing;
 Downloading information (descriptions, prices, images) from online stores and
saving results to a CSV table;
 The specialized part of the web resource (tables, headers, inserts of the code,
conclusions) parsing;
 Local storage of XML-maps of the sites;
 The attached files parsing;
 Downloading of the hidden data, access to which is possible only after
authorization or clicking on the relevant items (this feature is only available during
purchasing the maximum version of the product, which extends the basic Content
Downloader functionality with the WebApp application that actually simulates a click on
a button);
 Any content that matches the filters from all declared data sources parsing.
Content Downloader qualitatively differs from other parser programs with the ability
to fine tune the system to any requirements, to ensure comfortable work of users
having different levels of understanding of the system and with various tasks complexity.
Among its many features one should pay attention to the following [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ]:
 The ability to set ways of authorization on the resources from which parsing will
occur;
 The ability to configure cookies files so that the user do not have to constantly
relogin;
 Set the pause time with which server requests will be realized;
 Adjust the number of parsing threads;
 Saving resources received during parsing as:
─ local resource – into the system where the Content Downloader is installed;
─ remote resource – cloud storage or FTP access – that is adjusting the process of
automatic downloading data;
─ any SQL database;
 Simultaneous parsing of different information from one source, and breakdown of
the results into different categories;
 The ability to connect own PHP scripts for more deeper and more detailed
processing of the data;
 The ability to set any User Agent, and its replacement during the work of the
parser;
 Setting a custom proxy server (one or more);
 Ability to download site resources through a browser to connect JavaScript scripts;
 The ability to “competently” parse and store data in different encodings;
 Setting the multithreading work of the system (both during data parsing and
saving);
 A large selection of data extensions (CSV, TXT, HTM, PHP, MySQL).
Content Downloader is a product specifically designed to download content from
websites [
          <xref ref-type="bibr" rid="ref28 ref29 ref30 ref31">28-31</xref>
          ]. On the one hand, it is his advantage, on the other – a drawback. The
advantage is a specified category of classes, with which this product works perfectly.
The disadvantage is the supplying only the raw data, so in order to provide certain
statistics or in the case of analytical comparison of data from different sources, the
user will have to do it manually, or to look for a different system [
          <xref ref-type="bibr" rid="ref32 ref33 ref34 ref35">32-35</xref>
          ].
2.4
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>Advantages and disadvantages of considered software products</title>
        <p>
          The software products considered above are not a novelty in the software market.
Each of them perfectly proved itself and became entrenched in its “realm”. Due to the
long time they have been in the market they have formed a clear range of services that
are needed for their users. After analyzing these services, as well as those which, due
to certain circumstances, are left without proper attention from the considered
systems, we were able to formulate requirements for automated monitoring system. In
the Table 1 the advantages and disadvantages of reviewed systems are described [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Systems analysis and the statement of the problem</title>
      <p>The aim of this work is to create intelligent automated monitoring system, so let’s
first state the definition of “intelligent system” and “automated monitoring” notions.
Intelligent system is a system of technical or programmatic nature that can
independently solve its tasks from a certain subject area, creating a new knowledge based
on the acquired earlier. The process of functioning of such a system usually results in
constant decision making taking into account the current state of external and internal
factors in order to achieve certain results. The functioning of such systems includes
certain stages:
1. Clarification of the initial state at the time of task assignment to the system.
2. The comparison of this state for all factors and tasks with all previous states and
tasks. As a result, there is a check on the possibility of finding a quick solution for
the given task.
3. In the absence of the possibility to finding the response immediately, the system
proceeds with decomposition of the task into a series of smaller ones, and repeats
the actions described in paragraph 2, for each of these tasks.
4. The collection of the results from step 3 into one unit and the work results
formation.
5. Saving the information about the task, the initial state of external and internal
factors, the results of its realization to the base of the previous tasks.</p>
      <p>The automated monitoring is a process of continuous collection of certain data
(indicators, results of calculations, etc.), their analysis and the formation of further
behavior depending on the results of the analysis. Also the key feature of this process is the
complete absence of human interference. So, the intelligent automated monitoring
system is a system that is created to further reject the need for a human participation
in the process of gathering information, processing it and shaping the proper behavior
in the particular subject area. The main use cases of automated monitoring system are
shown on fig. 2. There are actors such as the User and the System. The User has two
kinds of options:
 The receiving of notification as the message sent in a user-friendly format
including the report about the monitoring results.
 Formation of the query. This option is somewhat wider and includes the more
specific ways of interacting with the system.
The case “Request Formulation” can be divided into two sub-cases. The user can
either work with a user profile (email address, password, site name) or work with
monitored parameters (creating new patterns and resources for tracking, changing
existing validation rules, removing unnecessary functionality). The actor System has
the following interaction options:
 Sending the report on the results of monitoring of relevant resources for the
selected users.
 Monitoring case includes following sub-cases:
─ Parsing is the process of downloading the content from a web resource.
─ Comparison is the process of identifying differences with the content saved in
the database earlier.
─ Report formation is presentation of differences (if there are any) in a
userfriendly format.
 Work with the database case is recording, reading, editing the data stored there.</p>
      <p>Activity diagram (Fig. 3) is used to display the sequence of all user actions with the
system. The activity diagram is constructed in the form of an oriented graph. The
actions are indicated by rounded rectangles. Decisions are marked by a diamond. If
there is a set of actions that are executed in parallel, then the beginning and the end of
parallel actions are indicated by a straight horizontal line. The black circle means the
beginning of the process, and the circled black circle means the end. Activity
diagrams are very similar to the flowcharts, so they can be considered as such. In the
activity diagram it can be noted that the user of the system can perform a certain
sequence of operations – registration, or logging-in, correction of available data in the
system or the assignment of new ones.
While in working in his personal cabinet, the user can see a list of all available web
resources that he added to the monitoring list. It can also perform certain actions with
them (such as deleting, editing, checking, pausing, etc.) or adding more resources to
monitor. During the adding a new page, the user will be offered to select specific
patterns of what is needed to track. He may also create his own. Those patterns
represents static elements of the system (classes, their content and attributes). In the class
diagram the package designation may also be additionally displayed. Also it allows to
place some procedural elements, but this dynamics is better shown on other types of
diagrams. A class diagram is intended to display the static structure of the system in
terms used in object-oriented programming. It is best not to show anything on this
diagram, except classes, interfaces, objects and their relationships. The class depicted
in this diagram is determined by the attributes and methods of a particular set of
instances. All instances of class are characterized by a common behavior and the same
set of attributes (each instance of the class has its own set of values). Sometimes the
name “class” can be replaced by “type”, but it is worth to note that these two names,
in fact, characterize different things – the type is considered more general definition.
Classes are depicted by rectangles signed on the top.</p>
      <p>As a result of the process, the object can change its class or state. These two types
of changes do not have radical differences from each other: objects belonging to any
one class can firstly convert to a parent or branch class. In Fig. 4 the diagram of states
of the object of the automated monitoring system is shown.
Each state diagram has two distinct states of the object: the beginning and the end.
The peculiarity of these two states is that it does not have any event that could force
an object to change to its original state and does not have any such event that could
return the object from the state of the end after it has been reached. Looking at the
state diagram, it becomes clear that the monitoring system has two modes of
operation:
1. The mode of execution of user queries – when the user is logged in and through the
graphical interface interacts with the system.
2. Passive Query Mode – when the user does not specify directly what the monitoring
system should do, it only receives a notification of the results of its work,
according to the previously configured task.</p>
      <p>The deployment diagram is intended to display the computing nodes of the system
during its operation, as well as components of these nodes, which are also involved in
the process.</p>
      <p>The nodes of the deployment diagram are rectangular boxes with artifacts inside,
depicted by rectangles. To represent a hierarchy of nodes, it is allowed to insert boxes.
One node on such diagram can show a large number of physical nodes, as a cluster of
all servers with databases (Fig. 5). The nodes are of two types:
 The device node is the physical computing node. It has its own memory and other
means to run the software;
 The runtime environment node is a virtual resource that runs on an external basis
and is designed to execute other software elements.
The deployment diagram for the automated monitoring system contains four nodes:
 The user’s browser through which interaction occurs.
 The system itself (its hardware and software).
 The resource server which provides monitored data.
 Database server.</p>
      <p>Since the system is should preserve the results of monitoring and compare them with
previous results, the system requires a large amount of memory. On the early stages
of monitoring system usage it would be enough to use one server to execute software
queries, but with the load growing, the servers will be distributed. Also, the advantage
of this solution will be to spread the database at different nodes to ensure reliability
and stability of the work.
4</p>
    </sec>
    <sec id="sec-4">
      <title>The implementation of changes monitoring system</title>
      <p>The working of monitoring system is based on the server-side utility for UNIX-like
operating systems cron. It serves to execute scripts with a certain periodicity or for
one-time execution at some specified moment. Under its command, the script
cron_check.php is performed, located in the root file of the project, which in its turn
goes through all the resources added by the users and determines whether it is time to
re-verify them. If the time comes, the url adress of the resource and the regular
expression by which the data on the page should be found is taken. The obtained data is
then compared with those stored in the database, and in the case of detecting changes
the user who added the resource for verification is informed.</p>
      <p>To enable automated monitoring system to fulfill its purpose it needs to set several
initial parameters:</p>
      <sec id="sec-4-1">
        <title>1. Address of the resource to be monitored. 2. A regular expression pattern to specify what exactly needs to be monitored. The user can specify his own pattern or select from the list of available. 3. The time period for which the system should monitor the given site.</title>
        <p>All these items can be specified on the Add page. The main element of the user
interface of the monitoring system is a table with a list of the web resources added to it,
general information about them and a set of functions for the work (Fig. 6). Since
each page in the global network has its own domain there is an additional grouping of
custom links behind it to visually separate the various resources. On this page, the
user has the following set of functions:



</p>
        <p>(delete) removes links from the table if resources with such domains do not
exist, removes and deletes also all data from the database about it;</p>
        <p>(scan) performs an immediate check of a given resource based on the
specified regular expression (the result of this check is not stored in the database). If
changes were detected, the system will provide links by which these changes could
be reviewed (Fig. 7);</p>
        <p>(update) performs parsing by pattern in order to create the basis for future
comparisons. It will be especially useful in case of finding the differences that are
permissible for the user and he would like to put them into the system;
(change status) contains one of the two icons. The user switches them
depending on whether he wants the resource to automatically pop up or not.
If the user decides to activate the link, a page similar to that in Fig. 8 will open.
The differences between two texts are highlighted The page headline gives a brief
guide to the correct interpretation of what is shown below. Also in the top is the list of
hotkeys for quick navigation is shown.</p>
        <p>In case of acceptance of changes, the user updates the record by clicking on the
correspondent button on the resource page. In the case if the detected changes are not
caused by user actions or are not approved, the user proceeds to removing them.</p>
        <p>It is also possible that the changes occurred, the system found them and informed
the user, but due to certain circumstances, he failed to react to them. In this case it
would be helpful to view the history of all changes on the register page (Fig. 9).
Also, this page provides an additional functionality:

</p>
        <p>(compare with the standard) is the comparison to the state of the resource at
the moment of its adding to the system.</p>
        <p>(view recent changes) shows the changes that occurred on the site at the time
and those that were detected during the pre-check.</p>
        <p>The intelligent system of automated monitoring of changes in web resources is called
the intellectual exactly because of the ability to analyze user behavior and based on
the collected data to predict its future actions and partially perform them instead of
the user (of course, with his prior agreement). In this system the decision-making
mechanism is assigned to an artificial neural network. The Fast Artificial Neural
Network Library (FANN), a free neural network library with an open code that realize
multilayer artificial neural networks on C was taken to perform this operation. This
resource provides artificial neural networks more than on 20 programming languages.
Below is a list of features of this library, being the reason they were chosen for
development:
 the ability to develop a topological training that dynamically builds and trains an
artificial neural network;
 easiness in use – gives the ability to create, train and run a network using three
functional calls);
 high speed performance;
 possibility of setting on the fly with a lot of parameters;
 well documented;
 realized several different activation functions;
 open source, but can still be used in commercial applications (licensed by LGPL);
 language binding for a large number of different programming languages;
 widely used (approximately 100 downloads per day).</p>
        <p>The programming language which is used for the interaction with this library and for
the monitoring system is PHP. The neural network learns to recognize the following
types of differences:
 critical – in case of detection which the user must be immediately notified; data
about it is kept (required for tracking);
 interesting – the system notifies the user, but don’t add information about it in the
register of changes (their monitoring may be disabled at the request of the user);
 not interesting – is ignored</p>
      </sec>
      <sec id="sec-4-2">
        <title>On Fig. 10 the learning process of the neural network is shown</title>
        <p>It should be noted that any differences which the system will find for the first time
will be marked as critical. When viewed, the user assigns one of the proposed
statuses. Further, when neural network has learned to the satisfactory level, it will be able to
independently review the differences and determine whether or not to notify the
owner of this resource. In the early stages of the network, each distinction will necessarily
need to be approved for some status several times, to ensure correct weight
adjustment.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>An example of resource change monitoring system operation</title>
      <p>To ensure that all components of the system function properly, will tested it on variety
of web resources, making changes and verifying whether the system can detect them.
As an example we use the main page of the site sudentinfo.net, and a pattern for
monitoring its entire contents. The first step is to add this web resource into the system
(Fig. 11). Next, go to the My records page to confirm the success of creating the
reference resource for the resource added the previous step. In Fig. 12 it can be seen, that
the resource will be monitored by the system every hour.
Next, we checked the newly added page for data dynamics – whether there’s a plug-in
or extension that constantly changes its content, such as a clock or a visitor count. To
do this, we clicked on the “magnifying glass” in the line of this entry and saw the
result in Fig. 13.
Now let’s fire the index.php file, which is responsible for the main page of
studentinfo.net and add the text “sitechecker.sc.ua” to it. Put this text in the &lt;head&gt; tag – it
hides it in the user’s browser, but in the case of monitoring, the system should detect
these changes. Then again we will test in manual mode, so that we do not wait for an
hour. The system detected changes (Fig. 14) and organized a link for their viewing.
By clicking on the link the user can see that the system correctly recognized the
changes made and showed them as it was intended (Fig. 15). So the system worked
correctly at all stages of the test. It certainly can’t be considered a hundred percent
guarantee of its work, because in real conditions it will have to do dozens or even
hundreds of more complicated inspections per second, but according to the results of
testing we can say that the development of the system goes the right way.
After analyzing three different software products (different in structure and
specialization, but similar in the functions), which have long been on the service market and
are well known, we summed up their strengths and weaknesses and highlighted the
functionalities necessary for created system. So:
 Subvertion is a great means for finding differences in files and demonstrating them
to the end user. It is also worth noting the mechanism for storing and transmitting
these differences when not all file contents are transmitted. This saves resources;
 Content Downloader is a multifunctional parsing software that has a large set of
custom settings for downloading both entire pages and their small elements. These
patterns will be reused in developed monitoring system;
 SiteLock is an application with a large set of different scanning algorithms that
allows it to track even the smallest changes and make decisions independently
depending on the type of changes.</p>
      <p>As the result of this work the practical implementation of software system monitoring
the changes in web content was created. We used following software platforms for
system. The software was written in PHP; HTML and CSS; JavaScript. It was
executed using Apache HTTP Server; MySQL; Debian – the operating system on the server
under which the web server will be deployed; Webmin – a tool for managing the
operating system through a web interface. This paper contains detailed description of
initial analysis, system’s functions and created software product. An example of
changes monitoring system operation is also provided.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Iturrioz</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Azpeitia</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Díaz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Generalizing the like button: empowering websites with monitoring capabilities</article-title>
          .
          <source>In: Proceedings of the 29th Annual ACM Symposium on Applied Computing</source>
          ,
          <volume>743</volume>
          -
          <fpage>750</fpage>
          . (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Maggi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Robertson</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kruegel</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vigna</surname>
          </string-name>
          , G.:
          <article-title>Protecting a moving target: Addressing web application concept drift</article-title>
          .
          <source>In: International Workshop on Recent Advances in Intrusion Detection</source>
          , Springer, Berlin, Heidelberg,
          <fpage>21</fpage>
          -
          <lpage>40</lpage>
          . (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Christensen</surname>
            ,
            <given-names>J. H.</given-names>
          </string-name>
          :
          <article-title>Using RESTful web-services and cloud computing to create next generation mobile applications</article-title>
          .
          <source>In: the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications</source>
          ,
          <volume>627</volume>
          -
          <fpage>634</fpage>
          . (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Neugschwandtner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neugschwandtner</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kastner</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Web services in building automation: Mapping knx to obix</article-title>
          .
          <source>In: Int. Conf. on Industrial Informatics</source>
          ,
          <fpage>87</fpage>
          -
          <lpage>92</lpage>
          . (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hind</surname>
            ,
            <given-names>J. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xiao</surname>
          </string-name>
          , L.: U.S. Patent No.
          <volume>8</volume>
          ,
          <issue>613</issue>
          ,
          <fpage>039</fpage>
          . Washington, DC: U.S. Patent and
          <string-name>
            <given-names>Trademark</given-names>
            <surname>Office</surname>
          </string-name>
          . (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Breiter</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jall</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mueller</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neef</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reitz</surname>
          </string-name>
          , M.: U.S. Patent No.
          <volume>8</volume>
          ,
          <issue>812</issue>
          ,
          <fpage>424</fpage>
          . Washington, DC: U.S. Patent and
          <string-name>
            <given-names>Trademark</given-names>
            <surname>Office</surname>
          </string-name>
          . (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Quintero</surname>
            ,
            <given-names>A. H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedor</surname>
            ,
            <given-names>J. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Quan</surname>
            ,
            <given-names>A. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Richardson</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Scott</surname>
            ,
            <given-names>D. W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Piper</surname>
          </string-name>
          , K. A.: U.S. Patent No.
          <volume>6</volume>
          ,
          <issue>910</issue>
          ,
          <fpage>071</fpage>
          . Washington, DC: U.S. Patent and
          <string-name>
            <given-names>Trademark</given-names>
            <surname>Office</surname>
          </string-name>
          . (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Leshko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Firstenberg</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
          </string-name>
          , N.: U.S. Patent Application No.
          <volume>13</volume>
          /528,
          <fpage>873</fpage>
          . (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Dan</surname>
          </string-name>
          ,
          <string-name>
            <surname>Asit</surname>
          </string-name>
          , et al.:
          <article-title>Web services on demand: WSLA-driven automated management</article-title>
          .
          <source>In: IBM systems journal, 43.1</source>
          ,
          <fpage>136</fpage>
          -
          <lpage>158</lpage>
          . (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Shelby</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Embedded web services</article-title>
          .
          <source>In: Wireless Communications</source>
          ,
          <volume>17</volume>
          (
          <issue>6</issue>
          ),
          <fpage>52</fpage>
          -
          <lpage>57</lpage>
          . (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Garanina</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sidorova</surname>
          </string-name>
          , E., Kononenko, I.,
          <string-name>
            <surname>Gorlatch</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Using Multiple Semantic Measures for Coreference Resolution in Ontology Population</article-title>
          .
          <source>In: International Journal of Computing</source>
          ,
          <volume>16</volume>
          (
          <issue>3</issue>
          ),
          <fpage>166</fpage>
          -
          <lpage>176</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Colton</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sarid</surname>
          </string-name>
          , U.: U.S. Patent No.
          <volume>8</volume>
          ,
          <issue>880</issue>
          ,
          <fpage>678</fpage>
          . Washington, DC: U.S. Patent and
          <string-name>
            <given-names>Trademark</given-names>
            <surname>Office</surname>
          </string-name>
          . (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Colton</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sarid</surname>
          </string-name>
          , U.: U.S. Patent No.
          <volume>7</volume>
          ,
          <issue>596</issue>
          ,
          <fpage>620</fpage>
          . Washington, DC: U.S. Patent and
          <string-name>
            <given-names>Trademark</given-names>
            <surname>Office</surname>
          </string-name>
          . (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Colton</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sarid</surname>
          </string-name>
          , U.: U.S. Patent No.
          <volume>8</volume>
          ,
          <issue>291</issue>
          ,
          <fpage>079</fpage>
          . Washington, DC: U.S. Patent and
          <string-name>
            <given-names>Trademark</given-names>
            <surname>Office</surname>
          </string-name>
          . (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Colton</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sarid</surname>
          </string-name>
          , U.: U.S. Patent No.
          <volume>8</volume>
          ,
          <issue>954</issue>
          ,
          <fpage>553</fpage>
          . Washington, DC: U.S. Patent and
          <string-name>
            <given-names>Trademark</given-names>
            <surname>Office</surname>
          </string-name>
          . (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Alipanah</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parveen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thuraisingham</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Ontology-driven query expansion using map/reduce framework to facilitate federated queries</article-title>
          .
          <source>In: Proc. of the International Conference on Web Services (ICWS)</source>
          ,
          <fpage>712</fpage>
          -
          <lpage>713</lpage>
          . (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharonova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hamon</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grabar</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalska-Styczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Computational linguistics and intelligent systems</article-title>
          .
          <source>In: CEUR Workshop Proceedings, Vol2136</source>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Web content support method in electronic business systems</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2136</volume>
          ,
          <fpage>20</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Kanishcheva</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Method of Integration and Content Management of the Information Resources Network</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>689</volume>
          , Springer,
          <fpage>204</fpage>
          -
          <lpage>216</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Distance Learning Method for Modern Youth Promotion and Involvement in Independent Scientific Researches</article-title>
          .
          <source>In: Proc. of the IEEE First Int. Conf. on Data Stream Mining &amp; Processing (DSMP)</source>
          ,
          <fpage>269</fpage>
          -
          <lpage>274</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Korobchinsky</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Peculiarities of Content Forming and Analysis in Internet Newspaper Covering Music News</article-title>
          , In: Computer Science and Information Technologies,
          <source>Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>52</fpage>
          -
          <lpage>57</lpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuchkovskiy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markiv</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pabyrivskyy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Architecture of system for content integration and formation based on cryptographic consumer needs</article-title>
          .
          <source>In: International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018 - Proceedings 1</source>
          ,
          <fpage>391</fpage>
          -
          <lpage>395</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Euzenat</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shvaiko</surname>
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Ontology Matching</article-title>
          . In: Springer, Heidelberg, Germany, (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Maedche</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staab</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Measuring Similarity between Ontologies</article-title>
          .
          <source>In: Knowledge Engineering and Knowledge Management</source>
          ,
          <fpage>251</fpage>
          -
          <lpage>263</lpage>
          . (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Xue</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hao</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Optimizing Ontology Alignments by using NSGA-II</article-title>
          .
          <source>In: The International Arab Journal of Information Technology</source>
          ,
          <volume>12</volume>
          (
          <issue>2</issue>
          ),
          <fpage>176</fpage>
          -
          <lpage>182</lpage>
          . (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Martinez-Gil</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alba</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aldana-Montes</surname>
            ,
            <given-names>J.F.</given-names>
          </string-name>
          :
          <article-title>Optimizing ontology alignments by using genetic algorithms</article-title>
          .
          <source>In: The workshop on nature based reasoning for the semantic Web</source>
          , Karlsruhe, Germany. (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makara</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The consolidated information web-resource about pharmacy networks in city</article-title>
          .
          <source>In: CEUR Workshop Proceedings (Computational linguistics and intelligent systems)</source>
          ,
          <volume>2255</volume>
          ,
          <fpage>239</fpage>
          -
          <lpage>255</lpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veres</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>The Contextual Search Method Based on Domain Thesaurus</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>689</volume>
          ,
          <fpage>310</fpage>
          -
          <lpage>319</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Designing architecture of electronic content commerce system</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the X-th Int. Conf. CSIT'</source>
          <year>2015</year>
          ,
          <fpage>115</fpage>
          -
          <lpage>119</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uhryn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hrendus</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naum</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Analysis of statistical methods for stable combinations determination of keywords identification</article-title>
          .
          <source>In: EasternEuropean Journal of Enterprise Technologies</source>
          ,
          <volume>2</volume>
          /2(
          <issue>92</issue>
          ),
          <fpage>23</fpage>
          -
          <lpage>37</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Analysis features of information resources processing</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>124</fpage>
          -
          <lpage>128</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Vasyl</surname>
          </string-name>
          , Lytvyn, Victoria, Vysotska, Dmytro, Dosyn, Roman, Holoschuk, Zoriana, Rybchak:
          <article-title>Application of Sentence Parsing for Determining Keywords in Ukrainian Texts</article-title>
          . In: Computer Science and Information Technologies, CSIT,
          <fpage>326</fpage>
          -
          <lpage>331</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hasko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuchkovskiy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Process analysis in electronic content commerce system</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          ,
          <string-name>
            <surname>CSIT</surname>
          </string-name>
          <year>2015</year>
          ,
          <volume>120</volume>
          -
          <fpage>123</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pukach</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vovk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ugryn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Method of functioning of intelligent agents, designed to solve action planning problems based on ontological approach</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>3</volume>
          /2(
          <issue>87</issue>
          ),
          <fpage>11</fpage>
          -
          <lpage>17</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Model of Touristic Information Resources Integration According to User Needs</article-title>
          .
          <source>In: International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>113</fpage>
          -
          <lpage>116</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>