<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Model of Adaptive Language Synthesis Based On Cosine Conversion Furies with the Use of Continuous Fractions</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>omyr Chyrun[</string-name>
          <email>Lyubomyr.Chyrun@lnu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ivan Franko National University of Lviv</institution>
          ,
          <addr-line>Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The proposed article describes an adaptive model for the synthesis of voice signals in a digital signal processor. The use of continuous fractions in a digital signal processor is suggested. The realization of continuous fractions with the help of multicellular structures is given. This procedure is used to implement the model of the human vocal tract. Analytical Review of Literary and Other Sources Linear predictive coding is most commonly used in speech analysis and synthesis, or in transmitting or storing speech signals. For this purpose, ideal cell structures are typically used to model the human vocal tract. For the first time, these structures with reflection coefficients were formulated by Markel, Gray [1], and Makhoul [2]. The model in the state space of a non-ideal cell structure with two and four factors per section for digital signal processors was analyzed in [3]. The general system of voice synthesis given in [4] is presented in Fig. 1.</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>Language Synthesis</kwd>
        <kwd>Adaptive Synthesis</kwd>
        <kwd>digital signal processor</kwd>
        <kwd>Cosine Conversion Furies</kwd>
        <kwd>Continuous Fractions</kwd>
        <kwd>Speech synthesis system</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Introduction
Modern voice signals recognition systems integrate technologies from such fields of
modern science as signal processing, pattern recognition, natural language, and
linguistics. Such systems that are widely used in signal processing have created a real
boom in digital signal processing (DSP). Previously, the field was dominated by
vector-oriented processors and algebraic mathematical apparatus, while the current
generation of DSP relies on sophisticated statistical models and uses complex software
for practical implementation. Modern voice signals recognition models are able to
understand the continuous input language for dictionaries, consisting of hundreds of
thousands of words in operating environments. Linear predictive analysis of voice
signals is historically the most important in voice analysis technologies. The basis of
this is the filter source model, which is an ideal linear filter.
Oscillations
Frequency
periodic
activation
white noise
obstacles</p>
      <p>Difference signal
amplitude</p>
      <p>Synthesized
language
model of the
voice tract</p>
      <p>
        Model coefficients
Voiced / not voiced
~sn   k sn  k 
voice signal sn, and let
In the general case, the problem of linear prediction is as follows [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref9">9-12</xref>
        ]. Let us have a
be predicted magnitude. Inaccuracy of prediction in this case is given as follows:
en  sn  ~sn  sn   k sn  k  .
      </p>
      <p>p
We usually want to minimize the error to find the best, or optimal, values  k .
Determine the short-term average error:</p>
      <p> p 2  p 
E   e2 n   sn   k sn  k    s2 n   2sn k sn  k  
n n  k 1  n n  k 1 
 p 2 p  p 2
   k sn  k   s2 n  2 k  snsn  k    k sn  k 
n k 1  n k 1 n n k 1 
We can minimize the error l for everyone1  l  p by differentiating E and
equating the result to zero
E
 l</p>
      <p> p 
 0  2 snsn  l   2  k sn  k sn  l</p>
      <p>n n k 1 
In the case of the covariance method, we will start by slightly redefining the terms
p   p
 snsn  l    k   sn  k sn  l  or cl,0   k ck ,l 

n k 1  n  k1
This equation is also known as linear prediction equation (Yule-Volcker equation).
 k  are called linear prediction coefficients, or predictor coefficients. When
calculating the equations for all values l , we can write them in a matrix form
c  C
c1,2 ...
c2,2 ...</p>
      <p>c  C 1
1 
 
   2 
  
 
 p 
 c1,1
 c2,1
C  
 ...</p>
      <p>... ... ... 
c p,1 c p,2 ... c p, p</p>
      <p>
c1, p  </p>
      <p>
c2, p
 c1,0 
 c2,0</p>
      <p>
c  
  
c p,0

To solve this equation, you need to find the inverted matrix:
This method is called the covariance method. Note that the covariance matrix is
symmetric. The fastest way to find the solution to this equation is the Holetsky
method (the covariance matrix is divided into lower and upper triangular matrices).
Using a slightly different approach to minimize the error, we can find a solution to the
linear prediction equation using the autocorrelation method
where
where
1 
 
   2 
  
 
 p 
  R 1 r
r1
r0
...
 r0
 r1
R  
 ...
r p  1 r p  2 ...</p>
      <p>... r p  1
... r p  2
... ... </p>
      <p>
r0 
 r1 
 r2</p>
      <p>
r  
  
r p 

The matrix of the system is symmetrical and all diagonal elements are equal, which
means that the inverted matrix always exists and the solutions of the system are in the
left half plane.</p>
      <p>Autoregressive modeling using least squares prediction, or linear prediction, forms
the basis of a wide range goals of signal processing and communication systems, that
include adaptive filtering and control, modeling of speech and coding systems,
adaptive channel alignment, parametric spectrum estimation, and identification systems.</p>
      <p>
        To implement linear prediction of data or model goals, it is necessary to determine
the values of linear prediction coefficients, as well as the order. Some commonly used
practice model selection methods include the Akayke information criterion method,
the Schwarz minimum description length method, and the Risenan prediction of least
squares principle. In the original form, the first two criteria include a clear balance
between the similarity of model input and the notion of fine for model complexity.
Intuitively in the information criterion method, the primary purpose is to minimize the
number of bits that will be required to describe the data [
        <xref ref-type="bibr" rid="ref13 ref14 ref15 ref16 ref17 ref18">13-18</xref>
        ]. When it is already
possible to model the data parametrically and then encode the blocks, use the
approach of allocating blocks of similar data, and then the model is fined with the
additional number of bits required to encode its parameters [
        <xref ref-type="bibr" rid="ref19 ref20 ref21 ref22 ref23 ref24">19-24</xref>
        ].
      </p>
      <p>
        However, the voice model based on cosine Fourier transform for language
synthesis has better properties and use, less sensitivity to quantization effects and, as a
result, produces more natural synthesized language [
        <xref ref-type="bibr" rid="ref25 ref26 ref27 ref28 ref29">25-29</xref>
        ]. The parameters of this
model are the coefficients of cosine Fourier transform. This model is based on the
cosine decomposition of the logarithmic short-term voice range, and the synthesis is
implemented by approximate inverse Fourier cosine transformations using continuous
chain fractions [
        <xref ref-type="bibr" rid="ref30 ref31 ref32">30-32</xref>
        ]. This approach is parametric and is not based on any
simplifying assumptions about the voice model, because the poles as well as the zeros of the
voice model are justified [
        <xref ref-type="bibr" rid="ref33 ref34 ref35 ref36 ref37 ref38 ref39 ref40 ref41 ref42 ref43 ref44">33-44</xref>
        ].
3
      </p>
      <p>The Voice Model Based on a Cosine Fourier Transform
Suppose that we have the logarithmic range ln S e jT  of the voice data segment
sn, where Т – is the sampling interval, fs  1 - the sampling frequency, and 
T
- the angular frequency. This function can be expressed using the true Fourier cosine
conversion coefficients Фур’є cn 
The complex coefficients of the cosine Fourier transform of a discrete system with
minimum phase stability are random and may be related to the following relations

ln S e jT   cne jnT .</p>
      <p>n 
gn  cn , n  0, N F 2 ,
gn  2cn , 0  n  N F 2 ,
gn  0,</p>
      <p>n  0
where N F - the dimension of the applied FFT. A digital filter whose logarithmic
correspondence approximates a function ln S e jT  is determined by the transfer
function system
(1)
(2)
~ N 0 1 N0 1
S z  ec0 exp  2cn z n  ec0  exp2cn z n 
n1
n0
where 0  N0  N F 2 . The coefficient ec0 is equal to the value of the RMS of the
cosine Fourier transform model for the multiple signal. In our experiments on the
voice model we used fs  8kHz , N F  512 , the voice segment length is 25 ms with
12 ms overlap and N 0  25 .
~</p>
      <p>It follows from (3) that the system of transfer functions S z  is the product of
transcendental transfer functions
(3)
(4)
(5)
(6)
The corresponding impulse feature is given</p>
      <p>H n z  e2cn z n , 0  n  N0  1
 2cn i ,

hn m   i!

 0,
m  ni, i  0,1, 2,
m  ni
~
This means that the system of transfer functions S z  has the following form (Fig. 2)
x(m)
ec0
e2c1z1
e2c2z2</p>
      <p>e2c3z3
e2cN0 1z N0 1</p>
      <p>
        y(m)
To implement a transfer function H n z using a digital filter, it is necessary to find an
approximation H n z , that can be practically implemented. One option for
approximating an exponential function in (4) is continuous chain fractions [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Another
possibility of implementing an exponential function approximation is to use a Pade
approximation. Then the system of transfer functions in a practical voice model based
on a cosine Fourier transform will look like
~~ N 0 1
S z  ec0  H~n z  .
      </p>
      <p>
        Decomposition Approximation Using Continuous Chain
Fractions
The exponential function expressed by a decomposition into a continuous fraction can
be represented as the following decomposition [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]:
(7)
(8)
(9)
(10)
where the parameter is x  2cn z n . The accuracy of the approximation of the voice
model depends not only on the number of cosine Fourier transform coefficients in (3),
but also on the number of members of a continuous fraction in (8), that is, on the
length of a continuous fraction to be determined with s . A finite chain fraction for a
function e x can also be expressed by a set of real functions that approximate an
exponential function with increasing accuracy
e x  1 , 1 , 2  x , 6  2x ,
1 1  x 2  x 6  4x  x2 12  6x  x2
12  6x  x2
,
These functions are known as Pade approximations of an exponential function. It is
recommended to use an odd number of elements of a continuous fraction in (8). This
leads to an approximation of an exponential function by a rational function with equal
degrees of polynomials in the numerator and denominator in (9). These are the
approximations chosen
      </p>
      <p>H~1z  2  x , H~2 z  
2  x
12  6x  x2
12  6x  x2
H~3 z 
H~4 z 
120  60x  12x2  x3
120  60x  12x2  x3
where z is the variable z-transformation and x  2cn z n . In the general case, to
achieve a better approximation, we can use decompositions of rational functions by
taking more suitable fractions.</p>
      <p>c
 2s1m   2s n 1 2s m  n,</p>
      <p>c
 2s m   2s n 1 2s1m  n  2s1m,</p>
      <p>
 5 m   cn  4 m  n  6 m,</p>
      <p>3
 4 m   cn  3m  n  5 m,</p>
      <p>3
 3 m  cn 2 m  n  4 m,
 2 m  2cn 1 m  n  3 m,
 1 m  xm  2 m,
ym  1 m.
(11)
5</p>
      <p>Structure of adaptive synthesis
As noted above, the approximation error for e x is determined by the number of
elements of a continuous fraction to decompose an exponential function into a
continuous fraction. This error further depends on the magnitudes of the modules of the true
Fourier cosine transform coefficients cn . On the basis of a statistical analysis of the
Fourier cosine coefficients for the description of the voice model of a male
loudspeaker, the following estimation was made in relation to the stability of the system
and the well-defined safety limit for transfer functions H n z in equation (5). From
the above it follows that the functions H n z can be approximated as follows:
It is more effective in relation to the total error of approximation and in relation to
saving the number of arithmetic operations required for the practical implementation
of voice modeling to use the adaptive structure of a continuous fraction. The number
of corresponding cells (Fig. 3) can be selected according to the magnitudes of the
cosine Fourier transform coefficients. The following adaptive empirical rule can be
used:
for cn  0.3 two cells - match H~1z  ,
for cn  0.5 four cells - match H~2 z ,
p(n)
c0
ec0
H~1 z
c5
п</p>
      <p>for cn  1 six cells - match H~3z  ,
for cn  1 eight cells - match H~4 z .</p>
      <p>For example, the voice model of the stationary part (24 ms) of the “е” vowel sound is
used
c0  0.491 - logarithm of the value of the difference signal
In the practical implementation of transcendental transfer functions H n z the
following numerical results were obtained:
0.00019841269841
0.00002480158730
We will also present our numerical results in the following diagram (Fig. 4).
1
2
3
4
5
Voice modeling based on cosine Fourier transform is in fact related to spectral
synthesis of voice signals, and is not based on any simplifying a priori considerations
about the language reproduction system. It also contains information about the range
of the activated voice path.</p>
      <p>The voice modeling procedure based on Fourier cosine transforms requires more
arithmetic operations than approaches based on linear predictive coding, but the
structure of the digital filter can be optimized.</p>
      <p>Continuous fractions offer an interesting tool not only in language synthesis. A
high-order approximation of algebraic transcendental functions can be used in
biological and industrial modeling systems. The direct implementation of continuous
fractions further enables the implementation of multi-chamber structures.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Markel</surname>
            ,
            <given-names>J.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gray</surname>
            ,
            <given-names>A.H.</given-names>
          </string-name>
          :
          <article-title>linear Prediction of Speech</article-title>
          . Berlin, Springer Verlag. (
          <year>1976</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Makhoul</surname>
          </string-name>
          , J.:
          <article-title>Stable and Efficient Lattice Methods for Linear Prediction</article-title>
          .
          <source>In: IEEE Trans. Acoustics, Speech and signal Processing</source>
          , ASSP-
          <volume>25</volume>
          (
          <issue>5</issue>
          ),
          <fpage>423</fpage>
          -
          <lpage>428</lpage>
          . (
          <year>1977</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Vich</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smekal</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Continued Fractions in Digital Filter Synthesis</article-title>
          .
          <source>In: Proc. of Inter</source>
          . Scient. Colloquium, Ilmenau, Germany,
          <fpage>353</fpage>
          -
          <lpage>356</lpage>
          . (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Vich</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smekal</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Digital Filter Realization of Nonrational Transfer Functions</article-title>
          .
          <source>In: Proc. of the First European Conference on Signal Analysis and Prediction, ECSAP-97</source>
          , Prague, Czech Republic,
          <fpage>179</fpage>
          -
          <lpage>182</lpage>
          . (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Shmoylov</surname>
            ,
            <given-names>V.I.</given-names>
          </string-name>
          :
          <article-title>Periodicheskiye tsepnyye drobi</article-title>
          .
          <source>Akademicheskiy Ekspress</source>
          , Lviv,
          <string-name>
            <surname>Ukraine.</surname>
          </string-name>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Shmoylov</surname>
            ,
            <given-names>V.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sloboda</surname>
            <given-names>M.Z.</given-names>
          </string-name>
          :
          <article-title>Raskhodyashchiyesya nepreryvnyye drobi</article-title>
          . Merkator, Lviv,
          <string-name>
            <surname>Ukraine.</surname>
          </string-name>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Shmoylov</surname>
            ,
            <given-names>V.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun L</surname>
          </string-name>
          .V.
          <article-title>Kompleksnyye chisla i nepreryvnyye drobi</article-title>
          . Merkator, Lviv,
          <string-name>
            <surname>Ukraine.</surname>
          </string-name>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Strum</surname>
          </string-name>
          , R.D.,
          <string-name>
            <surname>Kirk</surname>
            ,
            <given-names>D.E.</given-names>
          </string-name>
          :
          <source>First Principles of Discrete Systems and Digital Signal Processing</source>
          . Massachusetts; Addison-Wesley Publishing Company, (
          <year>1988</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Vavruk</surname>
            ,
            <given-names>Y.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rashkevych</surname>
            ,
            <given-names>Y.M.:</given-names>
          </string-name>
          <article-title>Osoblyvosti realizatsiyi prystroyiv obminu informatsiyeyu v systemakh tsyfrovoyi obrobky syhnaliv</article-title>
          .
          <source>In: Modelyuvannya ta informatsiyni tekhnolohiyi</source>
          ,
          <volume>4</volume>
          ,
          <fpage>119</fpage>
          -
          <lpage>123</lpage>
          . (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Vavruk</surname>
            ,
            <given-names>Y.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rashkevych</surname>
            ,
            <given-names>Y.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsmots</surname>
            <given-names>I.H.</given-names>
          </string-name>
          :
          <article-title>Otsinka osnovnykh kharakterystyk protsesoriv upravlinnya ta obrobky informatsiyi na NVIS</article-title>
          .
          <article-title>In: Komp'yuterna inzheneriya ta informatsiyni tekhnolohiyi</article-title>
          ,
          <volume>386</volume>
          ,
          <fpage>5</fpage>
          -
          <lpage>11</lpage>
          . (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Rashkevych</surname>
            ,
            <given-names>Y.M.:</given-names>
          </string-name>
          <article-title>Peretvorennya chasovoho masshtabu movnykh syhnaliv</article-title>
          .
          <source>Akad</source>
          . Ekspres, Lviv,
          <string-name>
            <surname>Ukraine.</surname>
          </string-name>
          (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Vavruk</surname>
            ,
            <given-names>Y.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rashkevych</surname>
            ,
            <given-names>Y.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsmots</surname>
            <given-names>I.H.</given-names>
          </string-name>
          :
          <article-title>Pidkhody do pobudovy ta vyboru elementnoyi bazy protsesoriv upravlinnya ta obrobky syhnaliv</article-title>
          .
          <source>In: Modelyuvannya ta informatsiyni tekhnolohiyi</source>
          ,
          <volume>3</volume>
          ,
          <fpage>160</fpage>
          -
          <lpage>168</lpage>
          . (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stefanchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oborska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mykich</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basyuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Development of Mobile Application for Choreographic Productions Creation and Visualization</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          ,
          <fpage>340</fpage>
          -
          <lpage>358</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Berko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alieksieiev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Knowledge-based Big Data Cleanup Method</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          ,
          <fpage>96</fpage>
          -
          <lpage>106</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Bisikalo</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ivanov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sholota</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Modeling the Phenomenological Concepts for Figurative Processing of Natural-Language Constructions</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Adaptive method of pursuit game problem solution</article-title>
          . In: Modern Problems of Radio Engineering, Telecommunications and Computer Science Proceedings of International Conference, TCSET,
          <fpage>62</fpage>
          -
          <lpage>65</lpage>
          . (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Game methods of construction of adaptive grid areas</article-title>
          .
          <source>In: The Experience of Designing and Application of CAD Systems in Microelectronics, Proceedings of the 7th International Conference, CADSM</source>
          ,
          <fpage>513</fpage>
          -
          <lpage>516</lpage>
          . (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Malachivskyy</surname>
            ,
            <given-names>P.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pizyur</surname>
            ,
            <given-names>Y.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Andrunyk</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          :
          <article-title>Chebyshev Approximation by the Sum of the Polynomial and Logarithmic Expression with Hermite Interpolation</article-title>
          .
          <source>In: Cybernetics and Systems Analysis</source>
          <volume>54</volume>
          (
          <issue>5</issue>
          ),
          <fpage>765</fpage>
          -
          <lpage>770</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Pasichnyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shestakevych</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kunanets</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Andrunyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Analysis of completeness, diversity and ergonomics of information online resources of diagnostic and correction facilities in Ukraine</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          ,
          <volume>2105</volume>
          ,
          <fpage>193</fpage>
          -
          <lpage>208</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taif</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvynenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Osypenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Criterial analysis of gene expression sequences to create the objective clustering inductive technology</article-title>
          .
          <source>In: 37th International Conference on Electronics and Nanotechnology</source>
          , ELNANO,
          <fpage>244</fpage>
          -
          <lpage>248</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korobchynskyi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lahodynskyi</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korchomnyi</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basanets</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borynskyi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Development of a technique for the reconstruction and validation of gene network models based on gene expression profiles</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>1</volume>
          (
          <issue>4</issue>
          -
          <fpage>91</fpage>
          ),
          <fpage>19</fpage>
          -
          <lpage>32</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvynenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Osypenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Implementation of the objective clustering inductive technology based on DBSCAN clustering algorithm</article-title>
          .
          <source>In: Proceedings of the 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>479</fpage>
          -
          <lpage>484</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Time Dependence of the Output Signal Morphology for Nonlinear Oscillator Neuron Based on Van der Pol Model</article-title>
          .
          <source>In: International Journal of Intelligent Systems and Applications</source>
          ,
          <volume>10</volume>
          ,
          <fpage>8</fpage>
          -
          <lpage>17</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The method of web-resources management under conditions of uncertainty based on fuzzy logic</article-title>
          ,
          <source>2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018 - Proceedings 1</source>
          ,
          <fpage>343</fpage>
          -
          <lpage>346</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseyeva</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <source>Web Resources Management Method Based on Intelligent Technologies, Advances in Intelligent Systems and Computing</source>
          ,
          <volume>871</volume>
          ,
          <fpage>206</fpage>
          -
          <lpage>221</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Information resources processing using linguistic analysis of textual content</article-title>
          .
          <source>In: Intelligent Data Acquisition and Advanced Computing Systems Technology and Applications</source>
          , Romania,
          <fpage>573</fpage>
          -
          <lpage>578</lpage>
          , (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Vysotska</surname>
          </string-name>
          , V.:
          <article-title>Linguistic Analysis of Textual Commercial Content for Information Resources Processing</article-title>
          . In: Modern Problems of Radio Engineering, Telecommunications and Computer Science, TCSET'
          <year>2016</year>
          ,
          <fpage>709</fpage>
          -
          <lpage>713</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharonova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hamon</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grabar</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalska-Styczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Computational linguistics and intelligent systems</article-title>
          .
          <source>In: CEUR Workshop Proceedings, Vol2136</source>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Analysis features of information resources processing</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>124</fpage>
          -
          <lpage>128</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Information Technology of Processing Information Resources in Electronic Content Commerce Systems</article-title>
          . In: Computer Science and Information Technologies, CSIT'
          <year>2016</year>
          ,
          <fpage>212</fpage>
          -
          <lpage>222</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , Chyrun L.:
          <article-title>Analysis and evaluation of risks in electronic commerce</article-title>
          ,
          <source>CAD Systems in Microelectronics, 9th International Conference</source>
          ,
          <volume>332</volume>
          -
          <fpage>333</fpage>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pukach</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bobyk</surname>
          </string-name>
          , І.,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The method of formation of the status of personality understanding based on the content analysis</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>5</volume>
          /2(
          <issue>83</issue>
          ),
          <fpage>4</fpage>
          -
          <lpage>12</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mykhailyshyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semianchuk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>System Development for Video Stream Data Analyzing</article-title>
          .
          <source>In: In Advances in Intelligent Systems and Computing</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>315</fpage>
          -
          <lpage>331</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Methods of information resources processing in electronic content commerce systems</article-title>
          .
          <source>In: Proceedings of 13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2015- February</source>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Andrunyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Electronic content commerce system development</article-title>
          .
          <source>In: Proceedings of 13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2015-February</source>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Alieksieieva</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
          </string-name>
          , V.:
          <article-title>Technology of commercial web-resource processing</article-title>
          .
          <source>In: Proceedings of 13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2015-February</source>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
          </string-name>
          , R.:
          <article-title>Satellite spectral information recognition based on the synthesis of modified dynamic neural networks and holographic data processing techniques</article-title>
          ,
          <source>2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018 - Proceedings 1</source>
          ,
          <fpage>330</fpage>
          -
          <lpage>334</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseyeva</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Preface: Modern Machine Learning Technologies and Data Science (MoMLeT&amp;DS2019)</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mykhailyshyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kohut</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Intelligent system of a smart house</article-title>
          .
          <source>In: 3rd International Conference on Advanced Information and Communications Technologies, AICT</source>
          ,
          <fpage>282</fpage>
          -
          <lpage>287</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Gaming method of ontology clusterization</article-title>
          .
          <source>In: Webology</source>
          ,
          <volume>16</volume>
          (
          <issue>1</issue>
          ),
          <fpage>55</fpage>
          -
          <lpage>76</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Web service interaction modeling with colored petri nets</article-title>
          .
          <source>In: Proceedings of the 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          ,
          <string-name>
            <surname>IDAACS</surname>
          </string-name>
          <year>2019</year>
          ,
          <volume>1</volume>
          ,
          <issue>8924400</issue>
          , pp.
          <fpage>319</fpage>
          -
          <lpage>323</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Information Encryption Based on the Synthesis of a Neural Network and AES Algorithm</article-title>
          .
          <source>In: 3rd International Conference on Advanced Information and Communications Technologies, AICT</source>
          ,
          <fpage>447</fpage>
          -
          <lpage>450</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Shu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Building of the Predicate Recognition System for the NLP Ontology Learning Module</article-title>
          .
          <source>In: Proceedings of the 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          ,
          <string-name>
            <surname>IDAACS</surname>
          </string-name>
          <year>2019</year>
          ,
          <volume>2</volume>
          ,
          <issue>8924410</issue>
          , pp.
          <fpage>802</fpage>
          -
          <lpage>808</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          44.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mykhailyshyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Medykovskyy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shcherbak</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>A Smart Home System Development</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing IV</source>
          ,
          <volume>1080</volume>
          ,
          <fpage>804</fpage>
          -
          <lpage>830</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>