<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Modern Ontology and Deep Analysis of Global Social Networks Exploitation</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Iqra National University</institution>
          ,
          <addr-line>Peshawar</addr-line>
          ,
          <country country="PK">Pakistan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Shaheed Benazir Bhutto Women University</institution>
          ,
          <addr-line>Peshawar</addr-line>
          ,
          <country country="PK">Pakistan</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>When a computer network connects to a person or organization, it is a social network. However, the study of such computer-aided social networks has not attracted people's attention to human-computer interaction, online interpersonal interaction and computer-aided communication research or small group. In the paper the application of secure social networking methods in computer-mediated communication research was discussed. Also some of the basic concepts of social network analysis were received, these described how to collect and analyze social network data, and show where social network data used to study computer-mediated communications can and has been used. And the what are the basic issues and challenges during these all process. The usefulness of social media methods for computer-mediated communication research was showed, whether in computer-assisted collaborative work, in virtual communities, or with more dispersed interactions with people.</p>
      </abstract>
      <kwd-group>
        <kwd>Social Media</kwd>
        <kwd>Computer Networks</kwd>
        <kwd>Social Networks</kwd>
        <kwd>Internet Media</kwd>
        <kwd>Digital Marketing Trend</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        This paper introduces the social network and the overall structure of the Social Media.
Social networks have become very popular during last 10-15 years because of the
increasing and affordable nature of innovative Internet devices like PC, laptops,
mobile gadgets [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], and other new popular hardware tools. This is evidenced by the
growing popularity of many online social networks such as Facebook, Twitter and
LinkedIn (networks are different in different states). Such a social network should
lead to a huge network-centric data explosion in various scenarios. Social networks
can be defined in the context of systems (for example, Facebook is designed for social
interaction), or defined for other websites (for example, Flickr) created for different
services such as content sharing, but also allows for extension levels social interaction [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>The Latest Social Media Statistics of Consumer Adoption and</title>
    </sec>
    <sec id="sec-3">
      <title>Usage</title>
      <p>
        Social networks are now very mature, with the core of a “big five” network that
doesn’t change much every year. However, as we will see in this paper, the most
popular social media sites depend to a large extent on the level of use of different
countries and demographic data. Understanding these differences in the popularity of
different social networks is important for a specific audience. When we compare the
most popular and actual social networks, it's best to look at them based on the usage
of your active account, but not the quantity of user accounts [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In this summary we
also can see that some social networks are growing faster than other social networks,
while other social networks are declining.
      </p>
    </sec>
    <sec id="sec-4">
      <title>A. Social Media Stats Update of 2019</title>
      <p>
        Based on the top ten sources of recommended digital marketing statistics, we will
post this news in 2019 based on the latest statistics. We will reveal new data
infiltrated by US social media channels in the Pew Internet and Global Network Index [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
Since it is still in its early stages, many charts will use the latest data from 2018 until
the new study is published in 2019.
3
      </p>
    </sec>
    <sec id="sec-5">
      <title>Overall Popularity of Social Media Globally</title>
      <p>
        Every year, at the beginning of this year, We Are Social will update its vast collection
of global statistics to provide very good information about the social media world.
This is a good download demo [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. It is particularly interesting to see how different
countries are using social media, and it is surprising that Western countries are
significantly behind adoption rates.
      </p>
      <p>
        Highlights of the 2019 Global Digital Report [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] include:
 In 2019, the number of Internet users worldwide was 4.388 billion euros,
an increase of 9.1% year-on-year.
 In 2019, the total number of global social media users was $3.444 billion,
an increase of 9% over the previous year.
 In 2019, the number of mobile phone users was 5.112 billion, an increase
of 2% over the previous year.
 Annual growth continues to grow steadily, especially among active users
of mobile social networks: 42% penetration rate is 3% higher than 2018.
The web traffic share of each device strongly supports 52% of mobile devices (stable
year-on-year), while Desktop is still ranked second, with only 43% of devices sharing
on all web pages, as shown in Figure 1 [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>North America, West and South America, and North America have the highest
Internet penetration rates, with Internet users accounting for between 88% and 95% of the
total population. Among them, Southern Europe's Internet penetration rate increased
the most, up 11% year-on-year, as shown in Figure 2.</p>
      <p>Since January 2018, the overall growth rate of social media usage has been 9%. Saudi
Arabia’s social media penetration rate was the highest in 2019, at 99%, well above the
world average of 45%. Taiwan, South Korea and Singapore are among the most
important countries for social media penetration today. But Kenya, Nigeria and Ghana
have the lowest penetration rates for social media.</p>
    </sec>
    <sec id="sec-6">
      <title>Benchmarks for Social Networks (Facebook)</title>
      <p>On social networks, there are active users every day. But we're only going to look at
Facebook's most active daily users compared to other social networks, and it's
important to understand how your content works and what features are used to optimize
the content. Compared with the page, the average diffusion rate after diffusion is 8%
(a decrease of 2.7% in one year) and 27.1% after the diffusion. Although recent
algorithm updates have seen a reduction in organic opportunities, Facebook today is an
influent social platform for organic and paid opportunities with huge potential impact.
More important than ever is to target Facebook content to corporate characters to get
high quality leads.</p>
      <p>Full analyzed report is a large amount of data that socializes with more than 200
slides. It provides country-specific data for most countries in the world. As a result,
you can view national slides in key markets to better understand the company's
current situation in the region where you operate.</p>
    </sec>
    <sec id="sec-7">
      <title>Most Popular and Actual Social Networks</title>
      <p>The latest comScore panel analysis in the 2018 edition of "Global Digital Future
Focus" compares the popularity of social networks over time. These data are based on
their original panels in the US, Canada and France, Spain, Italy, Germany, the U.K.
and Argentina, India, Brazil, Indonesia, Mexico, Malaysia. We have more details
about the UK and also the US – it will be presented later in this paper.
We can see it is Facebook's blue ocean. This shows that despite Facebook's negative
hype, Facebook will still be the main audience channel for a period of time.
In the UK, we can see that Instagram accounts for about 10% of social media minutes.
If you are not using the latest technology and Instagram, we recommend that you
consult them. For more details, check out our list of digital media.</p>
      <p>
        Active users prepared by Statista (October 2018) through the Global Network Index
panel data, this compilation of the world's most popular social networks provides
active users (millions) with the number of clear images of Facebook. This will not be
shocking to anyone! It has more than 2 billion active users and accounts for most of
the market. Google’s YouTube ranks second, followed by Facebook, Messenger and
WhatsApp. Facebook's Instagram platform accounts for less than half of Facebook's
traffic [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>Subsequently, we focused on the APAC, WeChat, QQ and Qzone platforms, with
more than 600 million active users, highlighting APAC's extensive social networking
products. Then, we can see a group of mainly Western social media networks in
Tumblr, Instagram and Twitter.</p>
      <p>
        Besides, Social Networks and Services can be used as channel for destructive
manipulation information and psychological influence and this issue was detail researched by
groups of scientists [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref9">9-12</xref>
        ].
      </p>
    </sec>
    <sec id="sec-8">
      <title>Different ages Interests of Social Networks</title>
      <p>
        The new 2019 report on children and parents: the use and attitude of the media
published by Ofcom (UK), if your company is involved in the marketing of the children's
or teen market or you want to understand its purpose; this is very interesting for the
future of adult social media. It highlights the continued decline in Facebook usage
among young people aged 12-15. His Facebook profile has grown from 40% in 2017
to 31% in 2018. During the same period, Instagram's growth rate increased from 14%
to 23%, and the deadline for Snapchat was set 31% [
        <xref ref-type="bibr" rid="ref13 ref14 ref15 ref16">13-16</xref>
        ].
      </p>
      <p>The following is an overview of two of the four age groups shown in Figure 8.</p>
    </sec>
    <sec id="sec-9">
      <title>Different Interaction Rates in Social Media</title>
      <p>
        Track Maven analyzes 51 million publications from 40,000 different companies in
more than 130 industries to determine which social networks have the highest
participation for each fan. The results show that Instagram absolutely dominates the
interaction of 1,000 subscribers. In fact, it is much higher than the other channels we have to
include in the second image to show the difference between social networks LinkedIn,
Facebook and Twitter [
        <xref ref-type="bibr" rid="ref17 ref18 ref19">17-19</xref>
        ].
      </p>
      <p>
        As we can see, Instagram is dominant but for other networks, Facebook has a
significant lead in comparison with Twitter and LinkedIn. This is mainly because Internet
users tend to post more on Twitter because it does not have an algorithm that only
provides publications to a small audience. This turns Twitter into a piece of content
that encourages companies to increasingly share what they hear through noise. This
has the effect of reducing the shift commitment, as shown in Figures 9 and 10 [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
    </sec>
    <sec id="sec-10">
      <title>A. Popularity of Social Network in Different Countries</title>
      <p>This is an excellent visualization of the social networks popularity based on
interviews in the GWI report. If you choose your own country, you may be far behind the
most popular countries in the four major social networks. Indonesia, the Philippines,
Mexico, India and Brazil rank among the top 10, and their utilization rate is much
higher than that of the U.S., the U.K. and EU.</p>
      <p>Fig. 11. Visitors to The Top Social Platforms Per Country.</p>
    </sec>
    <sec id="sec-11">
      <title>Conclusions</title>
      <p>
        In this paper deep analysis of social networks and services exploitation was carried
out. The Internet is a global public network where different intruders can access for
example cloud services without any permission. In practice cloud computing users
rely on third parties, which another major security issue (it’s one of biggest today’s
security challenge) [
        <xref ref-type="bibr" rid="ref12 ref7">7,12</xref>
        ] in the cloud is computing [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. This issue and generalized
ontology show that social networks are now mature and can cover all ages and gender
groups. The exceptions to this rule are Instagram and Tumblr, which are clearly
popular among young people. Also it was highlighted about possibility of using social
networks for destructive manipulative influence realization directed on person or
social groups in cyberspace.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Garton</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Caroline</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <article-title>and</article-title>
          <string-name>
            <surname>Barry</surname>
          </string-name>
          , W.:
          <article-title>Studying online social networks</article-title>
          .
          <source>In Journal of computer-mediated communication 3</source>
          , no.
          <issue>1</issue>
          :
          <issue>JCMC313</issue>
          (
          <year>1997</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Aggarwal</surname>
          </string-name>
          , Charu C.
          <article-title>: An introduction to social network data analytics</article-title>
          .
          <source>In Social network data analytics</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          . Springer, Boston, MA (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Zaliskyi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Odarchenko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gnatyuk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petrova</surname>
          </string-name>
          , Yu..
          <string-name>
            <surname>Chaplits</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Method of traffic monitoring for DDoS attacks detection in e-health systems and networks</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>2255</volume>
          , pp.
          <fpage>193</fpage>
          -
          <lpage>204</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Chaffey</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>Global social media research summary 2016</article-title>
          .
          <article-title>Smart Insights: Social Media Marketing (</article-title>
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Zywica</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Danowski</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>The faces of Facebookers: Investigating social enhancement and social compensation hypotheses; predicting Facebook™ and offline popularity from sociability and self-esteem, and mapping the meanings of popularity with semantic networks</article-title>
          .
          <source>Journal of Computer-Mediated Communication</source>
          <volume>14</volume>
          , no.
          <issue>1</issue>
          : pp.
          <fpage>1</fpage>
          -
          <lpage>34</lpage>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Vértes</surname>
            ,
            <given-names>P.E.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Bullmore</surname>
          </string-name>
          , E.T.:
          <article-title>Annual research review: growth connectomics-the organization and reorganization of brain networks during normal and abnormal development</article-title>
          .
          <source>Journal of Child Psychology and Psychiatry</source>
          <volume>56</volume>
          , no.
          <issue>3</issue>
          : pp.
          <fpage>299</fpage>
          -
          <lpage>320</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Gnatyuk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sydorenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aleksander</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Unified data model for defining state critical information infrastructure in civil aviation</article-title>
          ,
          <source>In Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies</source>
          , Kyiv, Ukraine, May
          <volume>24</volume>
          -
          <issue>27</issue>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>42</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Peleschyshyn</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Holub</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Holub</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>The preliminary stage of the algorithm for detecting information and psychological manipulation in online communities</article-title>
          .
          <source>In 2018 IEEE Proceedings of 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          , pp.
          <fpage>24</fpage>
          -
          <lpage>32</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Gnatyuk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kinzeryavyy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sapozhnik</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sopilko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seilova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hrytsak</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Modern Method and Software Tool for Guaranteed Data Deletion in Advanced Big Data Systems</article-title>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          , Vol.
          <volume>902</volume>
          , pp.
          <fpage>581</fpage>
          -
          <lpage>590</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Tikhomirov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kinash</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gnatyuk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trufanov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          et al: Network Society: Aggregate Topological Models, Communications in Computer and Information Science. Verlag: Springer International Publ, vol.
          <volume>487</volume>
          , рр.
          <fpage>415</fpage>
          -
          <lpage>421</lpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Trach</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchyshyn</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Development of directions tasks indicators of virtual community life cycle organization</article-title>
          .
          <source>In Proceedings of 2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Gnatyuk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akhmetova</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sydorenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polishchuk</surname>
            ,
            <given-names>Yu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petryk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Quantitative Evaluation Method for Mass Media Manipulative Influence on Public Opinion</article-title>
          ,
          <source>Proceedings of International Conference Computational Linguistics and Intelligent Systems (COLINS</source>
          <year>2019</year>
          ), pp.
          <fpage>71</fpage>
          -
          <lpage>83</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Holoshchuk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedushko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kosar</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Danel</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Repka</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The sequential associative rules analysis of patient's physical characteristics</article-title>
          .
          <source>In: CEUR Workshop Proceedings of the 1st International workshop on informatics &amp; Datadriven medicine, IDDM</source>
          <year>2018</year>
          , vol.
          <volume>2255</volume>
          , pp.
          <fpage>82</fpage>
          -
          <lpage>92</lpage>
          . Lviv,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Trach</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vus</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tymovchak-Maksymets</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Typical algorithm of stage completion when creating a virtual community of a HEI</article-title>
          . In: 13th International Conference “Modern Problems of Radio Engineering, Telecommunications and Computer Science”,
          <source>TCSET</source>
          <year>2016</year>
          , pp.
          <fpage>849</fpage>
          -
          <lpage>851</lpage>
          . Lviv-Slavske,
          <source>Ukraine</source>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Trach</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchyshyn</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Development of directions tasks indicators of virtual community life cycle organization</article-title>
          .
          <source>In: 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          ,
          <string-name>
            <surname>CSIT</surname>
          </string-name>
          <year>2017</year>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>130</lpage>
          .
          <string-name>
            <surname>Lviv</surname>
          </string-name>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Fedushko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ustyianovych</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Predicting Pupil's Successfulness Factors Using Machine Learning Algorithms</article-title>
          and Mathematical Modelling Methods. In: Hu,
          <string-name>
            <given-names>Z.</given-names>
            ,
            <surname>Petoukhov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>He</surname>
          </string-name>
          , M. (eds.)
          <source>Advances in Intelligent Systems and Computing series, ICCSEEA</source>
          <year>2019</year>
          , vol.
          <volume>938</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          (
          <year>2020</year>
          ). Springer, Cham (
          <year>2020</year>
          ). DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -16621-2_
          <fpage>58</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Holoshchuk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedushko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kosar</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Danel</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Repka</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The sequential associative rules analysis of patient's physical characteristics</article-title>
          <source>In: CEUR Workshop Proceedings of the 1st International Workshop on Informatics &amp; DataDriven Medicine</source>
          ,
          <string-name>
            <surname>IDDM</surname>
          </string-name>
          <year>2018</year>
          , pp.
          <fpage>82</fpage>
          -
          <lpage>92</lpage>
          . Lviv,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Fedushko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Syerov</surname>
            ,
            <given-names>Yu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korzh</surname>
          </string-name>
          , R.:
          <article-title>Validation of the user accounts personal data of online academic community</article-title>
          . In: 13th International Conference “Modern Problems of Radio Engineering, Telecommunications and Computer Science”,
          <source>TCSET</source>
          <year>2016</year>
          , pp.
          <fpage>863</fpage>
          -
          <lpage>866</lpage>
          . Lviv-Slavske (
          <year>2016</year>
          ). DOI:
          <volume>10</volume>
          .1109/TCSET.
          <year>2016</year>
          .
          <volume>7452207</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Mastykash</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchyshyn</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedushko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trach</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Syerov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Internet social environmental platforms data representation</article-title>
          .
          <source>In: 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          ,
          <string-name>
            <surname>CSIT</surname>
          </string-name>
          <year>2018</year>
          , pp.
          <fpage>199</fpage>
          -
          <lpage>202</lpage>
          . Lviv,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Fedushko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Syerov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Verifying the Medical Specialty from User Profile of Online Community for Health-Related Advices</article-title>
          .
          <source>In: CEUR Workshop Proceedings of the 1st International Workshop</source>
          on Informatics &amp;
          <string-name>
            <surname>Data-Driven</surname>
            <given-names>Medicine</given-names>
          </string-name>
          ,
          <string-name>
            <surname>IDDM</surname>
          </string-name>
          <year>2018</year>
          , pp.
          <fpage>301</fpage>
          -
          <lpage>310</lpage>
          . Lviv,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          (
          <year>2018</year>
          ). DOI:
          <volume>10</volume>
          .1109/STCCSIT.
          <year>2018</year>
          .
          <volume>8526586</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>