<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Intellectual Analysis of Making Decisions Tree in Information Systems of Screening Observation for Immunological Patients</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Ivan Franko National University of Lviv</institution>
          ,
          <addr-line>Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv State University of Life Safety</institution>
          ,
          <addr-line>Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>LvivSoft</institution>
          ,
          <addr-line>Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The aspects of the design of an immunological patient screening observation information system related to the required system functionality are discussed. Practical solutions for individual operational challenges are suggested. Functional requirements for the designed information system are defined. Based on the outlined functional needs, the appearance of the kernel of the information system is determined, namely, in what form the entered data will be stored. Some functions of rules set formation for Machine learning and Neural Network building based on Making Decisions Tree, which have to be resolved by system, are defined. Practical solutions are proposed for specific tasks that are entrusted to the information system.</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>Information system</kwd>
        <kwd>Intellectual Analysis</kwd>
        <kwd>Data mining</kwd>
        <kwd>Immunological Patients</kwd>
        <kwd>Making Decisions Tree</kwd>
        <kwd>Machine learning</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Data mining is an integral part of the knowledge discovery in data bases process [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
It allows us to uncover the essence of hidden dependencies in the data, to identify
interactions between the properties of objects, information about which is stored in
databases, to highlight the patterns inherent in a particular set of data [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The urgency
of the problem of data exploration and processing is confirmed by the widespread
practical and commercial use of intellectual analysis systems [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Most often they are
used in the scientific field and business [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Hierarchically organized data and work
with them is an important place in human life [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The structure of such data is
characterized by the specific relations of its elements, namely, features of imitation and
subordination between elements of the hierarchy [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Therefore, when creating an
information system for the subject area, characterized by these features, an important
issue to be paid attention to is the storage of not only data but also their structure [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Analysis of current research</title>
      <p>
        The relatively new methodology of rough sets is naturally adapted to work with
imperfect data [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The theory of rough sets was developed by Z. Pawlak [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] as a
mathematical tool for overcoming data contradictions and revealing hidden patterns or
patterns in them. A fundamental principle of the example learning algorithm using
rough sets is to identify redundancy among the available features that describe the
example [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. This is how strong signs that influence the classification of an example
are revealed. Next, remove the columns whose attributes do not affect the
classification [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Only the attributes on which the classification of the table examples is
depend on the analysis [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The remaining attributes are called redundant [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. In other
words, a reducer is a subset of all table attributes that provide the same classification
result for all table instances as the entire set of examples [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Finding a reducer is an
NP challenge [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. However, there are enough effective methods to solve this task
within an acceptable time [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Such methods include, in particular, Boolean
reasoning [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19">16-19</xref>
        ], Johnson's algorithm [
        <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23">20-23</xref>
        ].
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Statement of the problem</title>
      <p>
        The life cycle of information begins with its creation [
        <xref ref-type="bibr" rid="ref24 ref25 ref26 ref27 ref28 ref29">24-29</xref>
        ]. Therefore, as noted in
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], information about the patient can be obtained and pre-systematized to fill in the
questionnaire of the established sample. A survey of the real questionnaire was also
conducted and the shortcomings encountered in filling it out were identified [
        <xref ref-type="bibr" rid="ref30 ref31 ref32 ref33">30-33</xref>
        ].
It was also noted that the information submitted to the questionnaire has a clearly
defined hierarchical structure [
        <xref ref-type="bibr" rid="ref34 ref35 ref36 ref37 ref38">34-38</xref>
        ]. To automate and simplify the process of filling
out the questionnaire, the following provisions were defined [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ]:
1. Determine the ratio of subordination of one item of the questionnaire to
another (to actually determine the appearance of the hierarchy) [
        <xref ref-type="bibr" rid="ref40">40</xref>
        ];
2. To determine the domains of possible values to limit the “free” entry of data
for the relevant items of the questionnaire [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ].
      </p>
      <p>
        A variant of practical solution to the problem of collecting and entering information
by filling and saving the corresponding “electronic” analogue of the questionnaire
was also proposed [
        <xref ref-type="bibr" rid="ref42">42</xref>
        ]. This avoided many inconveniences and uncertainties and, in
general, automated the process of "converting" data to electronic form [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ]. It should
be noted that the following [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] had several "structural" disadvantages, namely:
1. The structure of the stored data had a linear appearance and did not in any way
reflect the existing hierarchical dependencies between the corresponding items
of the questionnaire [
        <xref ref-type="bibr" rid="ref44">44</xref>
        ];
2. Regardless of the number of questionnaire items filled in per patient, the values
of all items were stored (even if these were blank). Obviously, this approach,
despite the meager amount of "unnecessary" data, does not set a good tone
when designing an information system [
        <xref ref-type="bibr" rid="ref45">45</xref>
        ].
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref46">46</xref>
        ], a variant of hierarchical information using frames was proposed. In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], as a
practical extension of the idea outlined in [
        <xref ref-type="bibr" rid="ref47">47</xref>
        ], the mechanism of processing and
storing data of a completed questionnaire based on the use of frames was considered.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Functional requirements definition</title>
      <p>Entering information. As noted above, the life cycle of information begins with its
creation. It should be noted that in item # 6 of the questionnaire (Fig. 1) it is
envisaged to enter information about the stage of treatment (“primary”, “repeated”). So,
let's distinguish the following tasks:
1. Entering the data of the patient being examined for the first time (“primary”);
2. Entering the data of the patient who has come for re-examination
("reexamination"). By the way, there can be several such calls.
In the first case it is necessary to fill in the questionnaire of the established sample.
The second is the same, but it can be assumed that the "repeated" questionnaire does
not undergo significant changes, so it would be convenient to re-enter the
questionnaire only to correct the data entered in the primary card. Therefore, when making a
"repeat" patient, it would be convenient to find the appropriate primary questionnaire,
make a copy of it and edit the last one.</p>
      <p>
        Therefore, the data entered should be stored in a convenient way:
1. Search for the required primary (or last completed) questionnaire;
2. Display of the entered data in the form of the second questionnaire.
Development environment. The prototype of the information system was
implemented using the Web interface [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Recall that in this case, after filling in the
questionnaire, pressing the "Save" button initiates the process of registration of the entered
data in a special object REQUEST and transfer it for processing to the system server.
The REQUEST object looks like a hash table [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Therefore, the look of the stored data should be easy to generate by simply
processing the data in the corresponding hash table.</p>
      <p>Accounting information. With the advent of data entry and storage tools, the
system begins to perform database functions. There is a need for accounting that is
natural for databases, for example:
1. Search of patients' cards according to a number of specified parameters
(possibility to make a sample);
2. Removal and editing of completed questionnaires;
3. Backup and backup of the questionnaire;
4. Playback of stored data in a user-friendly way;
5. Obtaining a “hard” copy of the patient's card;
6. Archiving of data.</p>
      <p>Analysis and statistics. Because the system is designed as a screening system, the
look of the data should make it easy to find the information you need. This can be
used both to sample according to specified criteria (for research) and to prepare
reports of the required form.</p>
      <p>
        Transformation. To date, the classification of diseases is defined in the document
on the international classification of diseases MKH-10 [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Obviously, there is an
opportunity to review and modify existing provisions in this classification. This will
change the form in which the data is to be obtained (although the content of the
information may not change). It is logical to assume that the stored data should also be
brought in a new form as required. We substantiate the importance of this point in the
example.
      </p>
      <sec id="sec-4-1">
        <title>Antiallergic drugs</title>
      </sec>
      <sec id="sec-4-2">
        <title>Anti-allergic drugs B-adrenomimetics Atrovent Berotech</title>
        <p>Budesonide</p>
        <p>Ventolin
Salbutamol</p>
        <p>Lecrolin
Baconage
Becotide
Cromoglin
Kromosol
Fig. 2 illustrates the need for various transformations in the structure of the
questionnaire. The second column on the left contains is a list of some drugs, and suppose you
need to enter an additional classification for these drugs, which leads to the
appearance of an additional column on the right. If certain drugs were prescribed to the
patient and the relevant data were entered into the questionnaire prior to structural
transformation, then obviously, after transformation of the questionnaire, the stored data
should be modified and brought to the appropriate appearance.</p>
        <p>We illustrate the previous case with the help of a tree (Fig. 3).
So, with the questionnaires already filled in, you need to review them and modify the
hierarchical dependencies between the data. Obviously, the data form should allow it
to be done quickly and conveniently.</p>
        <p>In summary, it can be said that the form of presentation in the designed system
should allow the following operations to be performed efficiently and conveniently:
1. Formation (creation) of data by processing the hash table;
2. Search for analysis and statistics;
3. Implementation of transformations;
4. Interpretation of the data entered in order to:
5. Obtaining a “hard” copy of the data in a convenient form;</p>
      </sec>
      <sec id="sec-4-3">
        <title>6. Displaying data for editing purposes; 7. Displaying data for the purpose of introducing a 'repeat' patient.</title>
        <p>5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Method of storing hierarchical data using N-tree</title>
      <p>Let's take a closer look at the data storage process that has been implemented so far.
Let, in Fig. 4 provides a form in which to obtain information about the availability of
a patient referral for examination.</p>
      <sec id="sec-5-1">
        <title>Pointing yes no</title>
      </sec>
      <sec id="sec-5-2">
        <title>Institution</title>
      </sec>
      <sec id="sec-5-3">
        <title>Doctor</title>
        <p>data
data
yes
no
We construct an interface (questionnaire form) that corresponds to this form (Fig. 5).
In Fig. 5 also lists the names of the corresponding visual form controls.
APPOINTMENT_7</p>
        <p>INSTITUTION</p>
        <p>DOCTOR</p>
        <p>DIAGNOSIS
Following the principles of object-oriented programming, the PATIENT class was
created, whose properties were all the data provided in the questionnaire (Fig. 6).
As stated above, the structure of the class PATIENT is linear and in no way reflects
the hierarchical dependence that exists between the individual items of the
questionnaire.</p>
        <p>REQUEST={APPOINTMENT_7 : ’yes’, REQUEST={APPOINTMENT_7 : ’no’,
INSTITUTION : ’NAME’, INSTITUTION : ’’,
DOCTOR : ’therapist’, DOCTOR : ’therapist’,</p>
        <p>DIAGNOSYS : ’no’} DIAGNOSYS : ’no’}
PATIENT 1</p>
        <p>PATIENT 2
APPOINTMENT_7 : ‘yes’
INSTITUTION : ‘NAME’</p>
        <p>DOCTOR ; ‘therapist’
DIAGNOSIS ; ‘no’</p>
        <p>APPOINTMENT_7 : ‘no’</p>
        <p>INSTITUTION : ‘’
DOCTOR ; ‘therapist’</p>
        <p>
          DIAGNOSIS ; ‘no’
In Fig. 7 depicts a data retention process for two different patients. In both cases,
when trying to save the completed questionnaire data, they are formed into a
REQUEST object and passed to the server for processing, then PATIENT physical
objects are created and, since the class structure is static, in PATIENT 1 and
PATIENT 2 objects Stores the values of all properties available in REQUEST. For
the first patient, the value of "Point" (APPOINTMENT_7) is marked as "yes", so it is
advisable to keep hierarchically subordinate to him the INSTITUTION, DOCTOR
and DIAGNOSYS items. For the second patient, the value of "Pointing" is marked as
"no", so saving the remaining points is not appropriate, but due to the static structure
of the class "PATIENT", their values are stored (even when they are empty). In [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], a
mechanism for storing questionnaire data using a frame was proposed, but the
disadvantage of this was the need to view all frame slots, regardless of whether or not the
slot data was required. Consider the mechanism of storing the input data using the
Nary tree. For example, consider the fragment of the questionnaire shown in Fig. 8.
        </p>
        <p>Date of examination data</p>
        <p>Patient data
yes</p>
        <p>data
allergist
therapist
other
yes
no
data
Let us now depict this fragment as an N-ary tree (Fig. 9).
yes
From Fig. 9 it can be seen that certain values of the individual items of the
questionnaire make it possible to descend to the next level of the hierarchy. For "Pointing" this
value is "Yes" and for "Doctor" the value is "Other". Now suppose some data were
collected in the questionnaire and the corresponding REQUEST objects were sent to
the server for processing.</p>
        <sec id="sec-5-3-1">
          <title>Patient №1</title>
        </sec>
      </sec>
      <sec id="sec-5-4">
        <title>Patient №2</title>
        <p>REQUEST={‘Date of examination’ : ’10.06.19’,
‘Patient’ : ‘Petrenko P.P.’,
‘Pointing’ : ’yes’,
‘Institution’ : ’NAME’,
‘Doctor’ : ’other’,
‘Other Doctor‘: ‘surgeon‘,
‘Directional diagnosis’ : ’no’}</p>
        <p>REQUEST={‘Date of examination’ : ’10.06.19’,
‘Patient’ : ‘Ivanenko I.I.’,
‘Pointing’ : ’no’,
‘Institution’ : ’’,
‘Doctor’ : ’’,
‘Other Doctor’ : ‘’,
‘Directional diagnosis’ : ’no’}
1) Questionnaire
5) Institution
Make a tree traversal down, given the importance of the individual items of the questionnaire, which give access to
the next level of the hierarchy.</p>
        <p>The procedure for traversing tree nodes:
2) Date of examination 3) Patient 4) Pointing
6) Doctor 7) Other doctor 8) Directional diagnosis</p>
        <sec id="sec-5-4-1">
          <title>Patient card 1</title>
          <p>Анкета : А1
Date of examination : 10.06.19
Patient : Petrenko P.P.</p>
          <p>Pointing : yes
Institution : NAME
Doctor: Other
Other doctor: surgeon
Directional diagnosis: no</p>
          <p>Fig. 10. The process of processing a REQUEST object using a tree</p>
        </sec>
        <sec id="sec-5-4-2">
          <title>Patient card 2</title>
          <p>Анкета : А2
Date of examination : 10.06.19
Patient : Ivanenko I.I.</p>
          <p>Pointing : no
As can be seen from Fig. 10, a top-down tree is traversed corresponding to the
hierarchical structure of the questionnaire. However, for individual nodes, the next level of
the hierarchy can be accessed only with a certain parent node value defined. Thus, for
the first patient, the value of "Pointing" is defined as "yes", therefore, the transition to
a lower level takes place and the units "Institution", "Doctor" and "Diagnosis at
referral" are taken for consideration. Since the value "Other" is set for the Doctor node, the
value of "Other Doctor" is considered at the subordinate level. For the second patient,
the value "no" for "Direction" does not allow access to the next tree level, so
subordinate nodes are not considered at all. Thus, for the second patient, only the data with
the contents will be stored on the card. Note that this approach not only saves space,
but also eliminates the need to consider "unnecessary" data. So, the general idea is
that when processing each typed questionnaire, you need to crawl from top to bottom
of a given tree, taking into account the "bypass" values for the corresponding nodes of
the tree. The question is: how to build such a tree? We use a frame for this purpose.
For the example above, the frame will look like this (Figure 11):</p>
        </sec>
        <sec id="sec-5-4-3">
          <title>Patient_id: Exam Date, Patient, Referral / Is Directing: Institution, Doctor / Other, Diagnosis of referral Doctor: Another doctor</title>
          <p>As can be seen from the picture, the frame is actually a two-dimensional list, which
specifies the tree structure and the "bypass" values for the corresponding items of the
questionnaire. In each frame of the frame, the first element denotes the parent node,
and all subsequent elements in the row represent child nodes. In Fig. 12 illustrates the
process of constructing a tree from a given frame.</p>
          <p>Fig. 12. The mechanism of construction of N-pillar tree from a frame
As can be seen from the figure, the tree of the desired structure is constructed by
sequentially viewing the corresponding frame. The first element (Direction, Doctor) of
each frame of the frame (except for the first line where all elements must be created)
is searched for a node already built that corresponds to this element, after which the
found node descendants are built. Note that in the process of construction, it is
necessary to store the "bypass" values for the elements in which it is defined. Thus, the
scheme of storing only the necessary data becomes quite convenient and transparent.
The sequence of this process is shown in Fig.13.</p>
        </sec>
      </sec>
      <sec id="sec-5-5">
        <title>Set the frame to the desired structure</title>
      </sec>
      <sec id="sec-5-6">
        <title>Build a tree based on a frame</title>
        <p>T
S
E
U
Q
E
R
As to the appearance in which the data will be stored for the moment, let's say:
bypassing the tree, we will write each considered pair "element - value of element" in a
separate line (like the one shown in Fig. 9). Until now, we have considered the case
where the questionnaire item had only one value, which allowed to move to the next
level of the hierarchy (the value "yes" for "Pointing" and "other" for "Doctor").
However, there may be situations where multiple values (or even each) lead to a lower
level. For example, consider the fragment of the questionnaire depicted in Fig. 14.
congenittaall)(antena- HIV / AIDS
acquired (postnatal)
infectious
herpes viruses I, II
(HerSVI,II)
Note that the values "congenital" and "acquired" are mutually exclusive, and the
choice of each leads to the next level of hierarchy ("infectious"). In this situation, the
infectious and other subordinate levels are the same for the two values, but they may
be different. Consider how the previously described storage mechanism works in this
case. But we are modifying the frame somewhat, as some of the questionnaires now
have more than one "bypass" value. The questionnaire interface, corresponding frame
and tree are shown in Fig. 15.</p>
        <p>Frame</p>
        <p>Interface
Patient_id: ID_ETIOLG / known
ID_ETIOLG / known: ETIOLG_KNOW / antenatal; ETIOLG_KNOW / Postnatal
ETIOLG_KNOW / antenatal: INF / is
ETIOLG_KNOW / Postnatal: INF / is
INF / is: INF_VIL; INF_HSV</p>
        <p>ID_ETIOLG</p>
        <p>INF
As you can see in the picture, the idea of defining a tree structure with a frame
remained, but now the tree node is further identified by a "bypass" value. Now let's
consider the process of data storage directly (see Fig. 16).</p>
        <p>Patient 1
REQUEST={ ID_ETIOLG : ’known’,</p>
        <p>ETIOLG_KNOW : ‘antenatal’,
INF : ’yes’,
INF_VIL : ’yes’}</p>
        <p>REQUEST={ ID_ETIOLG : ’known’,</p>
        <p>ETIOLG_KNOW : ‘postnatal’,
INF : ’yes’,</p>
        <p>INF_VIL : ’yes’}</p>
        <p>Patient 2</p>
        <p>WALKING
AROUND THE</p>
        <p>TREES
Patient_id: A1
ID_ETIOLG: Known
ETIOLG_KNOW: antenatal
INF: yes
INF_VIL: yes
ETIOLG_KNOW: antenatal</p>
        <p>The procedure for traversing a tree:
1) Patient_id
2) ID_ETIOLG
3) ETIOLG_KNOW (antenatal)
4) INF
5) INF_VIL
6) INF_HSV
7) ETIOLG_KNOW (Postnatal)
4) INF
5) INF_VIL
6) INF_HSV</p>
        <p>SAVING THE PATIENT</p>
        <p>CARD</p>
        <p>WALKING
AROUND THE</p>
        <p>TREES
Patient_id: A2
ID_ETIOLG: Known
ETIOLG_KNOW: Postnatal
ETIOLG_KNOW: Postnatal
INF: yes
INF_VIL: yes</p>
        <p>Fig. 16. Scheme of the process of data storage for the case of several "bypass" values
The process of data storage takes place according to the scheme already considered
(Fig. 13), but it can be noticed that the value of the element ETIOLG_KNOW is
stored in the card twice (exactly two mutually exclusive values are provided for this
item of the questionnaire). This happens for the following reason: when bypassing the
tree for the first patient while in the node ETIOLG_KNOW / antenatal, REQUEST
looks for the key ETIOLG_KNOW, takes its value (antenatal), comparing the latter
with the bypass value of the node (antenatal) gives a positive result and moves to the
next level of the hierarchy; however, in the further crawl, being at the node
ETIOLG_KNOW / postnatal, again in REQUEST the key ETIOLG_KNOW is
searched, its value (again "antenatal") is taken, comparing the latter with the bypass
value of the node (postnatal) gives a negative result, there is no transition to the next
level, but since the call to the ETIOLG_KNOW / postnatal node has been completed,
this is recorded in the patient card as another line ETIOLG_KNOW: antenatal. A
similar situation occurs with the second patient, however, the order in which the lines
in the card are followed differs slightly from the first patient (due to tree crawling).
The identified deficiency can be corrected by removing unnecessary (unnecessary)
branches with a root in the corresponding "multivalued" node before processing the
questionnaire data. This process is illustrated in Fig. 17.</p>
        <p>Patient 1
REQUEST={ ID_ETIOLG : ’known’,</p>
        <p>ETIOLG_KNOW : ‘antenatal’,
INF : ’yes’,</p>
        <p>INF_VIL : ’yes’}
Patient_id</p>
        <p>Patient 2
REQUEST={ ID_ETIOLG : ’known’,</p>
        <p>ETIOLG_KNOW : ‘postnatal’,
INF : ’yes’,</p>
        <p>INF_VIL : ’yes’}
REMOVAL OF
“NONREQUIRED” TREES OF</p>
        <p>TREES</p>
        <p>Patient_id
ID_ETIOLG/known</p>
        <p>ID_ETIOLG/known
ETIOLG_KNOW/antenatal</p>
        <p>ETIOLG_KNOW/postnatal</p>
        <p>ETIOLG_KNOW/antenatal</p>
        <p>ETIOLG_KNOW/postnatal
INF/yes</p>
        <p>INF/yes</p>
        <p>INF/yes</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Interpretation of stored data</title>
      <p>It has been determined that the input of the input data is required for several purposes.
Consider the process of interpreting data to obtain a "hard" copy of a patient's card. It
is clear that such a copy can be obtained by printing the corresponding text file on
paper. At present, patient data is stored as a sequence of rows of element-value
element pairs, and it is obvious that this form of data does not reflect the hierarchical
dependencies defined between the items of the questionnaire. An acceptable print
layout might be, for example, the shape shown in Fig. 18. It is easy to see that the
written sequence of rows corresponds to the sequence of traversing the corresponding
tree from top to bottom. A general diagram of the process of obtaining a card for
printing is shown in Fig. 19.</p>
      <sec id="sec-6-1">
        <title>Acceptable printable card for patient</title>
        <p>Patient 1
Immunodeficiencies by etiology: known
type of immunodeficiency: antenatal
infectious immunodeficiencies:</p>
        <p>HIV / AIDS</p>
      </sec>
      <sec id="sec-6-2">
        <title>Card obtained by crawling a tree</title>
      </sec>
      <sec id="sec-6-3">
        <title>Patient_id: A1 ID_ETIOLG: Known ETIOLG_KNOW: antenatal INF: yes</title>
        <p>INF_VIL: yes</p>
      </sec>
      <sec id="sec-6-4">
        <title>The order of the items following the lines is the same Fig. 18. Matching the tree-to-bottom crawl sequence of the data display sequence</title>
        <p>Therefore, you can retrieve the print card from the saved card by adding indentations
on the left. The amount of indentation is determined by the specified hierarchical
element level.
7</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Conclusions</title>
      <p>For the projected information system, a number of necessary executable functions
were defined, based on which the functional requirements to the kernel of the system
were formed and the question was asked: in what form the data should be stored in
order to allow the system to efficiently solve the tasks assigned to it. The main
unresolved issues up to this point were: how to store only the required data and how to
save information about the hierarchical structure of this data? To solve the first
problem, an approach based on the use of n-tree arrays and frames was proposed, as well
as some specific situations that were encountered. With regard to the second problem,
it was solved in part by the example of obtaining a "hard copy" of the patient's card.
At the practical level, the problems of hierarchical data editing and transformation
implementation remain unresolved. Thus, we can conclude that the approaches
described in the article are general and can be applied to any subject areas with
hierarchical organization of information.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Pawlak</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Rough sets: Theoretical aspects of reasoning about data</article-title>
          .
          <source>In: Springer Science &amp; Business Media</source>
          ,
          <volume>9</volume>
          . (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Iturrioz</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Azpeitia</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Díaz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Generalizing the like button: empowering websites with monitoring capabilities</article-title>
          .
          <source>In: Proceedings of the 29th Annual ACM Symposium on Applied Computing</source>
          ,
          <volume>743</volume>
          -
          <fpage>750</fpage>
          . (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Maggi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Robertson</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kruegel</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vigna</surname>
          </string-name>
          , G.:
          <article-title>Protecting a moving target: Addressing web application concept drift</article-title>
          .
          <source>In: International Workshop on Recent Advances in Intrusion Detection</source>
          , Springer, Berlin, Heidelberg,
          <fpage>21</fpage>
          -
          <lpage>40</lpage>
          . (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Christensen</surname>
            ,
            <given-names>J. H.</given-names>
          </string-name>
          :
          <article-title>Using RESTful web-services and cloud computing to create next generation mobile applications</article-title>
          .
          <source>In: the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications</source>
          ,
          <volume>627</volume>
          -
          <fpage>634</fpage>
          . (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Neugschwandtner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neugschwandtner</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kastner</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Web services in building automation: Mapping knx to obix</article-title>
          .
          <source>In: Int. Conf. on Industrial Informatics</source>
          ,
          <fpage>87</fpage>
          -
          <lpage>92</lpage>
          . (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Tkachenko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Izonin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kryvinska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chopyak</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lotoshynska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Danylyuk</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Piecewise-linear Approach for Medical Insurance Costs Prediction using SGTM NeuralLike Structure</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          ,
          <fpage>170</fpage>
          -
          <lpage>179</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Tepla</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Izonin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Duriagina</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tkachenko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Trostianchyn, А.,
          <string-name>
            <surname>Lemishka</surname>
          </string-name>
          , І.,
          <string-name>
            <surname>Kulyk</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovbasyuk</surname>
          </string-name>
          , Т.:
          <article-title>Alloys selection based on the supervised learning technique for design of biocompatible medical materials</article-title>
          .
          <source>In: Archives of Materials Science and Engineering</source>
          ,
          <volume>93</volume>
          /1,
          <fpage>32</fpage>
          -
          <lpage>40</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makara</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The consolidated information web-resource about pharmacy networks in city</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          ,
          <fpage>239</fpage>
          -
          <lpage>255</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>The control agent with fuzzy logic</article-title>
          .
          <source>In: Perspective Technologies and Methods in MEMS Design</source>
          , MEMSTECH'
          <year>2010</year>
          ,
          <fpage>40</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Bisikalo</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ivanov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sholota</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Modeling the Phenomenological Concepts for Figurative Processing of Natural-Language Constructions</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taif</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvynenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Osypenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Criterial analysis of gene expression sequences to create the objective clustering inductive technology</article-title>
          .
          <source>In: 2017 IEEE 37th International Conference on Electronics and Nanotechnology</source>
          ,
          <volume>244</volume>
          -
          <fpage>248</fpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kornelyuk</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Litvinenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Objective clustering inductive technology of gene expression profiles based on SOTA clustering algorithm</article-title>
          .
          <source>In: Biopolymers and Cell</source>
          ,
          <volume>33</volume>
          (
          <issue>5</issue>
          ),
          <fpage>379</fpage>
          -
          <lpage>392</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          :
          <article-title>An evaluation of the information technology of gene expression profiles processing stability for different levels of noise components</article-title>
          .
          <source>In: Data</source>
          ,
          <volume>3</volume>
          (
          <issue>4</issue>
          ), art.
          <volume>48</volume>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>N. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Noha</surname>
          </string-name>
          , R. Y.:
          <article-title>Methods and tools for text analysis of publications to study the functioning of scientific schools</article-title>
          .
          <source>In: Journal of Automation and Information Sciences</source>
          ,
          <volume>47</volume>
          (
          <issue>12</issue>
          ). (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Bobalo</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stakhiv</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mandziy</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Holoschuk</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>The concept of electronic textbook "Fundamentals of theory of electronic circuits</article-title>
          .
          <source>In: Przegląd Elektrotechniczny</source>
          ,
          <volume>88</volume>
          NR 3a/
          <year>2012</year>
          ,
          <fpage>16</fpage>
          -
          <lpage>18</lpage>
          . (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shvorob</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>The method for detecting plagiarism in a collection of documents</article-title>
          ,”
          <source>Computer Sciences and Information Technologies (CSIT)</source>
          ,
          <fpage>142</fpage>
          -
          <lpage>145</lpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Arzubov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lipinski</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Analyzing ways of building user profile based on web surf history</article-title>
          .
          <source>In: Computer Sciences and Information Technologies (CSIT)</source>
          ,
          <volume>1</volume>
          ,
          <fpage>377</fpage>
          -
          <lpage>380</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Mukalov</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zelinskyi</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levkovych</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tarnavskyi</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pylyp</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shakhovska</surname>
          </string-name>
          , N.:
          <article-title>Development of System for Auto-Tagging Articles, Based on Neural Network</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          ,
          <fpage>106</fpage>
          -
          <lpage>115</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basystiuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Development of the Speech-to-Text Chatbot Interface Based on Google API</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          ,
          <fpage>212</fpage>
          -
          <lpage>221</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klyujnyk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
          </string-name>
          , H.:
          <article-title>Investigation the Ateb-Gabor Filter in Biometric Security Systems</article-title>
          .
          <source>In: Data Stream Mining &amp; Processing</source>
          ,
          <fpage>580</fpage>
          -
          <lpage>583</lpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Lytvynenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wojcik</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fefelov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lurie</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savina</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voronenko</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          et al.:
          <article-title>Hybrid Methods of GMDH-Neural Networks Synthesis and Training for Solving Problems of Time Series Forecasting</article-title>
          .
          <source>In: Lecture Notes in Computational Intelligence and Decision Making</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>513</fpage>
          -
          <lpage>531</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>The Virtual Library System Design and Development</article-title>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          ,
          <volume>871</volume>
          ,
          <fpage>328</fpage>
          -
          <lpage>349</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutsyk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lysak</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukeniuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Lossless Image Compression in the Remote Sensing Applications</article-title>
          .
          <source>In: Int. Conf. on Data Stream Mining &amp; Processing (DSMP)</source>
          ,
          <fpage>195</fpage>
          -
          <lpage>198</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseyeva</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Preface: Modern Machine Learning Technologies and Data Science (MoMLeT&amp;DS2019)</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Model and architecture for virtual library information system</article-title>
          .
          <source>In: Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>37</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharonova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hamon</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cherednichenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grabar</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>KowalskaStyczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Preface: Computational Linguistics and Intelligent Systems (COLINS-</article-title>
          <year>2019</year>
          ).
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Ontological Approach to Plot Analysis and Modeling</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          ,
          <fpage>22</fpage>
          -
          <lpage>31</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berezin</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basto</surname>
          </string-name>
          Fernandes V.:
          <article-title>Development of Information System for Textual Content Categorizing Based on Ontology</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          ,
          <fpage>53</fpage>
          -
          <lpage>70</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Veres</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishniak</surname>
          </string-name>
          , H.:
          <article-title>Application of Methods of Machine Learning for the Recognition of Mathematical Expressions</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          ,
          <fpage>378</fpage>
          -
          <lpage>389</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Furgala</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Peculiarities of melin transform application to symbol recognition</article-title>
          .
          <source>In: International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering</source>
          ,
          <fpage>251</fpage>
          -
          <lpage>254</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Kapustiy</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tayanov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Peculiarities of application of statistical detection criteria for problems of pattern recognition</article-title>
          .
          <source>In: Journal of Automatioin and Inrormation Science</source>
          ,
          <volume>37</volume>
          (
          <issue>2</issue>
          ),
          <fpage>30</fpage>
          -
          <lpage>36</lpage>
          . (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kosarevych</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutsyk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korniy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Segmentation of atmospheric clouds images obtained by remote sensing</article-title>
          .
          <source>In: International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering</source>
          ,
          <fpage>213</fpage>
          -
          <lpage>216</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Kapustiy</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tayanov</surname>
          </string-name>
          , V.:
          <article-title>A new approach to determination of correct recognition probability of set objects</article-title>
          .
          <source>In: Upravlyaushchie Sistemy i Mashiny</source>
          ,
          <volume>2</volume>
          ,
          <fpage>8</fpage>
          -
          <lpage>12</lpage>
          . (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prudyus</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ostap</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Fingerprint image enhancement algorithm</article-title>
          .
          <source>In: The Experience of Designing and Application of CADSM</source>
          ,
          <fpage>193</fpage>
          -
          <lpage>194</lpage>
          . (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torska</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kobasyar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Application of the cellular automata for obtaining pitting images during simulation process of thei growth</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>242</volume>
          ,
          <fpage>299</fpage>
          -
          <lpage>306</lpage>
          . (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Varetskyy</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Molga</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ignatovych</surname>
            ,
            <given-names>A.:</given-names>
          </string-name>
          <article-title>A new method of fingerprint key protection of grid credential</article-title>
          .
          <source>In: Advances in Intelligent and Soft Computing</source>
          ,
          <volume>84</volume>
          ,
          <fpage>99</fpage>
          -
          <lpage>103</lpage>
          . (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Pukach</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , Il'kiv, V.,
          <string-name>
            <surname>Nytrebych</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vovk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pukach</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>On the Asymptotic Methods of the Mathematical Models of Strongly Nonlinear Physical Systems</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>689</volume>
          ,
          <fpage>421</fpage>
          -
          <lpage>433</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Pukach</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Investigation of bending vibrations in Voigt-Kelvin bars with regard for nonlinear resistance forces</article-title>
          .
          <source>In: Journal of Mathematical Sciences</source>
          ,
          <volume>215</volume>
          (
          <issue>1</issue>
          ),
          <fpage>71</fpage>
          -
          <lpage>78</lpage>
          . (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Lavrenyuk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pukach</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Mixed problem for a nonlinear hyperbolic equation in a domain unbounded with respect to space variables</article-title>
          .
          <source>In: Ukrainian Mathematical Journal</source>
          ,
          <volume>59</volume>
          (
          <issue>11</issue>
          ),
          <fpage>1708</fpage>
          -
          <lpage>1718</lpage>
          . (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Pukach</surname>
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Qualitative Methods for the Investigation of a Mathematical Model of Nonlinear Vibrations of a Conveyer Belt</article-title>
          .
          <source>In: J. of Mathematical Sciences</source>
          ,
          <volume>198</volume>
          ,
          <fpage>31</fpage>
          -
          <lpage>38</lpage>
          . (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Nytrebych</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malanchuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Il</surname>
          </string-name>
          'kiv, V.,
          <string-name>
            <surname>Pukach</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Homogeneous problem with twopoint conditions in time for some equations of mathematical physics</article-title>
          .
          <source>In: Azerbaijan Journal of Mathematics</source>
          ,
          <volume>7</volume>
          (
          <issue>2</issue>
          ),
          <fpage>180</fpage>
          -
          <lpage>196</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Nytrebych</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          , Il'kiv, V.,
          <string-name>
            <surname>Pukach</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malanchuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>On nontrivial solutions of homogeneous Dirichlet problem for partial differential equations in a layer</article-title>
          .
          <source>In: Kragujevac Journal of Mathematics</source>
          ,
          <volume>42</volume>
          (
          <issue>2</issue>
          ),
          <fpage>193</fpage>
          -
          <lpage>207</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berezin</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naum</surname>
            <given-names>O.</given-names>
          </string-name>
          :
          <source>Textual Content Categorizing Technology Development Based on Ontology. In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          ,
          <fpage>234</fpage>
          -
          <lpage>254</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          44.
          <string-name>
            <surname>Basyuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>The main reasons of attendance falling of internet resource</article-title>
          .
          <source>In: Proc. of the Xth Int. Conf. Computer Science and Information Technologies</source>
          , CSIT'
          <year>2015</year>
          ,
          <fpage>91</fpage>
          -
          <lpage>93</lpage>
          . (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          45.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Technology for the Psychological Portraits Formation of Social Networks Users for the IT Specialists Recruitment Based on Big Five, NLP and Big Data Analysis</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          ,
          <volume>2392</volume>
          ,
          <fpage>147</fpage>
          -
          <lpage>171</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          46.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oleshek</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <source>Automated Monitoring of Changes in Web Resources. In: Lecture Notes in Computational Intelligence and Decision Making</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>348</fpage>
          -
          <lpage>363</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          47.
          <string-name>
            <surname>Demchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dilai</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Methods and Means of Web Content Personalization for Commercial Information Products Distribution</article-title>
          .
          <source>In: Lecture Notes in Computational Intelligence and Decision Making</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>332</fpage>
          -
          <lpage>347</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>