<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Intelligent System for Socialization by Personal Interests on the Basis of SEO Technologies and Methods of Machine Learning</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Creating of an information system that would allow efficient analysis and selection of users is an important task as there are currently no such systems. Socialization system will optimize the process of finding and dating people on the Internet. To implement this system, we need to use a convolutional neural network to find a human face in the photo. Fuzzy search algorithms and the Noisy Channel model are also required to analyze user information and list relevant users.</p>
      </abstract>
      <kwd-group>
        <kwd>Levenshtein distance</kwd>
        <kwd>Convolutional neural network</kwd>
        <kwd>Fuzzy search</kwd>
        <kwd>Noisy Channel</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The main purpose of this study is to create an information system for the socialization
of individuals using fuzzy word search algorithms using the Noisy Channel model with
algorithms for efficient textual information distribution, and using a convolutional
neural network to identify system users, since there is no such system at present, that would
analyze the user-specified information and form a list of the most relevant users.</p>
      <p>Creating an information system for the socialization of personalities is an urgent
task, since in the modern world, people try to optimize all life processes to save time
and, accordingly, for a more expedient realization of time saved. When looking for
programs, users first of all choose the ones that save time, are optimized and automated
enough to do most of the work instead of the system user. This information system
combines at once two important tasks: socialization of users and optimizes and
automates the process of socialization as much as possible.</p>
      <p>
        There are quite a number of articles on this topic, for example, in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] the
authors propose a new ranking system among social network users and an adaptive
network model for easy interaction between users, and the authors propose to improve
the system of aggregation and sorting of information on social networks, according to
the set parameters.
      </p>
    </sec>
    <sec id="sec-2">
      <title>Analysis of Literary Sources and Subject Field</title>
      <p>
        In articles [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], the authors propose to improve social networking capabilities in
terms of analyzing user data and developing user performance, and to improve social
networking capabilities in terms of finding commonalities between users and,
subsequently, identifying the main interests of the user and giving the user the most relevant
matches in your subsequent search for information on the social network.
      </p>
      <p>
        Also in article [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], the authors propose that the authors propose a new approach for
sorting and storing data in the cloud and issuing it when searching using a new flexible
data delivery model on social networks [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref6 ref7 ref8 ref9">6-13</xref>
        ].
      </p>
      <p>
        First of all, when it comes to the advantages of the information system over analogs,
it is worth noting that there are almost no analogues with a similar system of work,
among which there are Tinder and Badoo programs [
        <xref ref-type="bibr" rid="ref14 ref15 ref16 ref17 ref18 ref19">14-19</xref>
        ]. The similarity of my
system to them in the use of a convolutional neural network, which checks for the presence
of similar users and is used to identify users of the system [
        <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23 ref24 ref25 ref26 ref27 ref28">20-28</xref>
        ].
      </p>
      <p>
        The main advantage is that Tinder and Badoo provide the most limited socialization
mechanism, allowing users to filter by gender, age and location, which is not optimized
and does not save much time on socialization, so we need to spend too much time for
talking with users and we are not sure, that user has the same interests with us and
because of it we can just waste our time [
        <xref ref-type="bibr" rid="ref29 ref30 ref31 ref32 ref33 ref34 ref35 ref36 ref37 ref38 ref39 ref40 ref41 ref42">29-42</xref>
        ]. Our system analyzes the user
information and on that basis creates a list of users sorted by the calculated percentage of
similarity between the users of the system, which is the main advantage of the system
compared to its main analogues.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Specifying the Functioning of the System</title>
      <p>The information system should consist of the following steps: registration or
authorization of the user, familiarization of the user with the rules of using the system.
Uploading a photo that will be checked using a convolutional neural network for the
presence of a human face and for the presence of that person in an existing database, adding
a user avatar and filling the album with photos.</p>
      <p>The next step is to provide the user with information about himself, to analyze the
information and to compare it with the information about the already existing ones in
the system using the Levenstein algorithm, fuzzy search algorithms and the Noisy
Channel model, after which a list of users will be sorted by the calculated percentage
of similarity between users.</p>
      <p>It is possible to further filter the generated list, change the personal information
resulting in the newly created list, or go to the main menu of the system. Also, any
changes made by the user and correspondence will be stored in the database, and all
photos will be stored in the cloud media storage service.</p>
      <sec id="sec-3-1">
        <title>Fig.1 Use Case digram</title>
      </sec>
      <sec id="sec-3-2">
        <title>Fig.2 Activity digram</title>
        <p>Separate storage in the database can be made using ORM, which avoids direct work
with the database. Which could lead to some inaccuracies at the base level, in this case
I'm working with objects, which allows retrieve by accessing a list of objects.</p>
        <p>The last step is to research the profile and interests of the selected from the selected
user sample and start communicating with the selected user, all correspondence in the
form of a separate message flow will be stored in the database. The general algorithm
of operation of the information system is shown in figure 1 in the form of use case
diagram and in figure 2 in the form of activity diagram.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Software to Solve the Problem</title>
      <p>The following are basic screenshots of the information system, figure 3 shows the
process of adding information about the user, namely the description, interests and general
information about what and what the user is looking for.
changes. Reactive forms are built around observable streams, where form inputs and
values are provided as streams of input values, which can be accessed synchronously.</p>
      <p>Reactive forms also provide a straightforward path to testing because you are assured
that your data is consistent and predictable when requested. Any consumers of the
streams have access to manipulate that data safely.</p>
      <p>Reactive forms differ from template-driven forms in distinct ways. Reactive forms
provide more predictability with synchronous access to the data model, immutability
with observable operators, and change tracking through observable streams.</p>
      <p>If you prefer direct access to modify data in your template, template-driven forms
are less explicit because they rely on directives embedded in the template, along with
mutable data to track changes asynchronously.</p>
      <p>Figure 4 depicts the process of adding user photos manually or through a guide, 1 or
more photos, as well as stopping and deleting unnecessary photos while adding them.
Figure 5 shows the currently added photos and the use of the convolutional neural
network. A convolutional neural network consists of layers of two types: convolution
layers and subsampling layers or sublayer layers. In it, each layer has a topographic
structure, that is, each neuron is connected to a fixed point of the original image, as well as
to the region of the input image that is processed by the given neuron.</p>
      <p>Obviously, the first thing to do would be to pass in an image to the program. In this
model, we want to create an image pyramid, in order to detect faces of all different
sizes. In other words, we want to create different copies of the same image in different
sizes to search for different sized faces within the image.</p>
      <p>Having a stride of 2 helps reduce computation complexity without significantly
sacrificing accuracy. Since faces in most images are significantly larger than two pixels,
it’s highly improbable that the kernel will miss a face merely because it shifted 2 pixels.
At the same time, your computer (or whatever machine is running this code) will have
a quarter of the amount of operations to compute, making the program run faster and
with less memory. There are a number of different neurons in each location of each
layer, each with its own set of input weights associated with the neurons in the
rectangular fragment of the previous layer. A convolutional neural network allows you to
determine whether such a user is already in the database, and whether the face is
depicted in the photo, as seen in the selected fragment of the screenshot - 2 pictures the
system does not allow to put on the avatar, because they do not have a face on figure 5.</p>
      <sec id="sec-4-1">
        <title>Fig.6 A list of users has been generated</title>
        <p>To calculate the optimal distance between words in the text, you need to modify the
algorithm for finding the ordinary Levenshtein distance as follows: store not the last
two but three rows of the matrix, and add the appropriate additional condition - in the
case of detecting transposition in the calculation of the distance also take into account
its cost. Thus, by modifying the algorithm, the Noisy Channel model was used, which
made it possible to optimize the information analysis process, first by creating a user
parameter matrix, then asynchronously using linear search to compare the current
parameters and form a percentage of similarity for each parameter. The last step will be
to find the average percentage of user similarities.</p>
        <p>Figure 7 depicts a user's choice of which coincided by 92.5 percent, clicking on the
image brings a photo of the user we choose and gives the opportunity to choose one of
3 options: view the user's profile to see his interests and find out all the necessary
information about him, put Like to save the link to this user and not further lose it in the
user list, or write a private message and start a conversation with the user. All buttons
are dynamically loaded into the tree using a special directive that optimizes the system.
Also, each user image is a separate component, which is loaded into the main window
of the program by means of decorators.
method level - or simply log method arguments and return values in a non-obstructive
way.Decorators follow the decorator design pattern, and are often referred to as a type
of meta programming. In the realm of Javascript, Angular have heavily adopted
decorators into the framework. We have also seen packages such as lodash adopt decorators
to easily apply its functions to your code using the feature.</p>
        <p>Figures 8 and 9 show the likes of us and the likes of us. This is very handy and even
if we have not written anything in private messages, we still have a link to the system
user and will not lose it among a large number of other users.</p>
        <p>Also, the user to whom we put a Like learns about it and can write to us in private
messages. Also, if someone has liked us, we will be able to see it, see the profile of the
user, his main interests, view the photos and write to the user who has chosen us, so
that the opportunity to communicate effectively.</p>
        <p>Each user is a separate component of the system, so we use the functionality of the
same components, optimizing the system and not reloading the page.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Fig.9 The users we chose</title>
        <p>Figures 10 and 11 show basic information about the selected user as tabs for maximum
usability. Tabs organize content into separate views where only one view can be visible
at a time. Each tab's label is shown in the tab header and the active tab's label is labeled
with the animated ink bar. When the list of tab labels exceeds the width of the header,
pagination controls appear to let the user scroll left and right across the labels.By
default, the tab contents are eagerly loaded. Eagerly loaded tabs will activate the child
components but will not inject them into the DOM until the tab is activated. If the tab
contains several complex child components or the contents of the tab rely on DOM
calculations during initialization, it is advised to lazy load the tab's content.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Fig.11 User interests</title>
        <p>Figures 12 and 13 show an album view of the selected user and private correspondence
with the user. As can be seen from Figure 13, the user's avatar, the time of sending a
private message and information about the read or unread message are displayed in the
correspondence with the user, which allows effective and convenient correspondence
with different users of the system.</p>
      </sec>
      <sec id="sec-4-4">
        <title>Fig.13 Chatting with selected user</title>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>In today's world, users are first and foremost looking for a user-friendly and intuitive
system that can perform certain actions for them, thereby saving users time. The system
for socialization of personal interests of the common interests overtakes the programs
of analogues, because in the first place it guarantees the identification and authenticity
of a photo of a user and also it automates and optimizes the process of finding users by
analyzing all users on a common interest and forming a percentage ratio that allows
you to quickly determine your degree of similarity with other users and have an
approximate idea of how much your interests are in line with those of others.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Parry</surname>
            ,
            <given-names>M. E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kawakami</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kishiya</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>The effect of personal and virtual word-ofmouth on technology acceptance</article-title>
          .
          <source>In: Journal of Product Innovation Management</source>
          ,
          <volume>29</volume>
          (
          <issue>6</issue>
          ),
          <fpage>952</fpage>
          -
          <lpage>966</lpage>
          (
          <year>2012</year>
          ). https://onlinelibrary.wiley.com/toc/15405885/2012/29/6.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Schivinski</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Dąbrowski</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>The effect of social-media communication on consumer perceptions of brands</article-title>
          .
          <source>In: Journal of Marketing Communications</source>
          ,
          <volume>22</volume>
          (
          <issue>2</issue>
          ),
          <fpage>189</fpage>
          -
          <lpage>214</lpage>
          . (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Ranjbaran</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jamshidian</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Dehghan</surname>
            ,
            <given-names>Z</given-names>
          </string-name>
          :.
          <article-title>A survey of identification of major factors influencing customers attitude toward machine made carpet brands</article-title>
          .
          <source>In: Journal of Business Strategies</source>
          ,
          <volume>5</volume>
          (
          <issue>23</issue>
          ),
          <fpage>109</fpage>
          -
          <lpage>118</lpage>
          . (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Schmäh</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wilke</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Rossmann</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Electronic word of mouth: In: A systematic literature analysis</article-title>
          .
          <source>Digital Enterprise Computing</source>
          ,
          <fpage>147</fpage>
          -
          <lpage>158</lpage>
          . (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Wei</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Social media peer communication and impacts on purchase intentions: A consumer socialization framework</article-title>
          .
          <source>In: Journal of Interactive Marketing</source>
          ,
          <volume>26</volume>
          (
          <issue>4</issue>
          ),
          <fpage>198</fpage>
          -
          <lpage>208</lpage>
          . (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Technology for the Psychological Portraits Formation of Social Networks Users for the IT Specialists Recruitment Based on Big Five, NLP and Big Data Analysis</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2392</volume>
          ,
          <fpage>147</fpage>
          -
          <lpage>171</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mykhailyshyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semianchuk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>System Development for Video Stream Data Analyzing</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>315</fpage>
          -
          <lpage>331</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
            mailto:Victoria.A.Vysotska@lpnu.ua, Mykhailyshyn, V.
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kohut</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Intelligent system of a smart house</article-title>
          .
          <source>In: 3rd International Conference on Advanced Information and Communications Technologies, AICT</source>
          ,
          <fpage>282</fpage>
          -
          <lpage>287</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Gaming method of ontology clusterization</article-title>
          .
          <source>In: Webology</source>
          ,
          <volume>16</volume>
          (
          <issue>1</issue>
          ),
          <fpage>55</fpage>
          -
          <lpage>76</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shatskykh</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borzov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>An intelligent system of the content relevance at the example of films according to user needs</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2516</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>23</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Web service interaction modeling with colored petri nets</article-title>
          .
          <source>In: International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          , IDAACS,
          <volume>1</volume>
          ,
          <fpage>319</fpage>
          -
          <lpage>323</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>An Evaluation of the Information Technology of Gene Expression Profiles Processing Stability for Different Levels of Noise Components</article-title>
          .
          <source>In: Data</source>
          ,
          <volume>3</volume>
          (
          <issue>4</issue>
          ), art. no.
          <issue>48</issue>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Durnyak</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pikh</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Senkivskyy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>An Evaluation of the Objective Clustering Inductive Technology Effectiveness Implemented Using Density-Based and Agglomerative Hierarchical Clustering Algorithms</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>532</fpage>
          -
          <lpage>553</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Boreiko</surname>
            ,
            <given-names>O. Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teslyuk</surname>
            ,
            <given-names>V. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zelinskyy</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berezsky</surname>
          </string-name>
          , О.:
          <article-title>Development of models and means of the server part of the system for passenger traffic registration of public transport in the "smart" city</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>1</volume>
          (
          <issue>2</issue>
          -
          <fpage>85</fpage>
          ),
          <fpage>40</fpage>
          -
          <lpage>47</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Kazarian</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teslyuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsmots</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tykhan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Implementation of the Face Recognition Module for the “Smart” Home Using Remote Server</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing III, AISC 871</source>
          , Springer,
          <fpage>17</fpage>
          -
          <lpage>27</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>I. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Valko</surname>
            ,
            <given-names>B. T.</given-names>
          </string-name>
          :
          <article-title>Container landscaping with Festuca arundinaceae as а mini bioelectrical systems in a modern buildings</article-title>
          .
          <source>In: International Journal of Energy for a Clean Environment</source>
          ,
          <volume>20</volume>
          (
          <issue>3</issue>
          ),
          <fpage>211</fpage>
          -
          <lpage>219</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>I. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hamkalo</surname>
          </string-name>
          , Кh. R.:
          <article-title>Bioelectricity production in an indoor plant-microbial biotechnological system with Alisma plantago-aquatica</article-title>
          .
          <source>In: Acta Biologica Szegediensis</source>
          ,
          <volume>62</volume>
          (
          <issue>2</issue>
          ),
          <fpage>170</fpage>
          -
          <lpage>179</lpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Anisimova</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasylenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedushko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Social Networks as a Tool for a Higher Education Institution Image Creation</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2392</volume>
          ,
          <fpage>54</fpage>
          -
          <lpage>65</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Kanishcheva</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cherednichenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharonova</surname>
          </string-name>
          , N.:
          <article-title>Image Tag Core Generation</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2533</volume>
          ,
          <fpage>35</fpage>
          -
          <lpage>44</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Korzh</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedushko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleschyshyn</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Methods for forming an informational image of a higher education institution</article-title>
          .
          <source>In: Webology</source>
          ,
          <volume>12</volume>
          (
          <issue>2</issue>
          ), Article 140. (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Korzh</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleschyshyn</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Syerov</surname>
            ,
            <given-names>Yu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedushko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Principles of University's Information Image Protection from Aggression</article-title>
          .
          <source>In: Proceedings of the XIth International Scientific and Technical Conference (CSIT)</source>
          ,
          <fpage>77</fpage>
          -
          <lpage>79</lpage>
          . (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Korzh</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchyshyn</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedushko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Syerov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Protection of University Information Image from Focused Aggressive Actions</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          , Springer International Publishing,
          <volume>543</volume>
          ,
          <fpage>104</fpage>
          -
          <lpage>110</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Korzh</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchyshyn</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Syerov</surname>
            ,
            <given-names>Yu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedushko</surname>
          </string-name>
          , S.:
          <article-title>University's Information Image as a Result of University Web Communities' Activities</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          , Springer International Publishing,
          <volume>512</volume>
          ,
          <fpage>115</fpage>
          -
          <lpage>127</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Veres</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Choosing the method of finding similar images in the resverse seach system</article-title>
          .
          <source>In: CEUR WorkshopProceedings</source>
          ,
          <volume>2136</volume>
          ,
          <fpage>99</fpage>
          -
          <lpage>107</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Varetskyy</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Molga</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ignatovych</surname>
            ,
            <given-names>A.:</given-names>
          </string-name>
          <article-title>A new method of fingerprint key protection of grid credential</article-title>
          .
          <source>In: Advances in Intelligent and Soft Computing</source>
          ,
          <volume>84</volume>
          ,
          <fpage>99</fpage>
          -
          <lpage>103</lpage>
          . (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Basyuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasyliuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Mathematical Model of Semantic Search and Search Optimization</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          ,
          <fpage>96</fpage>
          -
          <lpage>105</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kosarevych</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lutsyk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korniy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Segmentation of atmospheric clouds images obtained by remote sensing</article-title>
          .
          <source>In: 14th International Conference on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering, TCSET,
          <fpage>213</fpage>
          -
          <lpage>216</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Kapustiy</surname>
            ,
            <given-names>B.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tayanov</surname>
            ,
            <given-names>V.A.:</given-names>
          </string-name>
          <article-title>A new approach to determination of correct recognition probability of set objects</article-title>
          .
          <source>In: Upravlyaushchie Sistemy i Mashiny</source>
          ,
          <volume>2</volume>
          ,
          <fpage>8</fpage>
          -
          <lpage>12</lpage>
          . (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prudyus</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ostap</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Fingerprint image enhancement algorithm</article-title>
          .
          <source>In: The Experience of Designing and Application of CAD Systems in Microelectronics, Proceedings of the 6th International Conference ,CADSM</source>
          ,
          <fpage>193</fpage>
          -
          <lpage>194</lpage>
          . (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torska</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kobasyar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Application of the cellular automata for obtaining pitting images during simulation process of thei growth</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>242</volume>
          ,
          <fpage>299</fpage>
          -
          <lpage>306</lpage>
          . (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Oksanych</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shevchenko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shcherbak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shcherbak</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Development of specialized services for predicting the business activity indicators based on microservice architecture</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>2</volume>
          (
          <issue>2</issue>
          -
          <fpage>86</fpage>
          ),
          <fpage>50</fpage>
          -
          <lpage>55</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Galushka</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shcherbak</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Devising a mathematical model for pattern-based enterprise data integration</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>2</volume>
          (
          <issue>9</issue>
          ),
          <fpage>59</fpage>
          -
          <lpage>64</lpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Shcherbak</surname>
            ,
            <given-names>S.S.:</given-names>
          </string-name>
          <article-title>Interoperability web application models based on microformats</article-title>
          .
          <source>In: CriMiCo, 21st International Crimean Conference: Microwave and Telecommunication Technology</source>
          ,
          <fpage>57</fpage>
          -
          <lpage>58</lpage>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klyujnyk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maslanych</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Havrysh</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
          </string-name>
          , H.:
          <article-title>Image filtration using the Ateb-Gabor filter in the biometric security systems</article-title>
          .
          <source>In: International Conference on Perspective Technologies and Methods in MEMS Design (MEMSTECH)</source>
          ,
          <fpage>276</fpage>
          -
          <lpage>279</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buriachok</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lotoshynska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dmytryk</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Research of AtebGabor Filter in Biometric Protection Systems</article-title>
          .
          <source>In: International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)</source>
          ,
          <volume>1</volume>
          ,
          <fpage>310</fpage>
          -
          <lpage>313</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliarnyk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dmytruk</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>An images filtration using the AtebGabor method</article-title>
          .
          <source>In: International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)</source>
          ,
          <volume>1</volume>
          ,
          <fpage>208</fpage>
          -
          <lpage>211</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>The compression of the input images in neural network that using method diagonalization the matrices of synaptic weight connections</article-title>
          .
          <source>In: 2nd International Conference on Advanced Information and Communication Technologies, AICT</source>
          ,
          <fpage>66</fpage>
          -
          <lpage>70</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Holoshchuk</surname>
          </string-name>
          , R.:
          <article-title>Detection of multispectral input images using nonlinear artificial neural networks</article-title>
          .
          <source>In: 14th International Conference on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering, TCSET,
          <fpage>119</fpage>
          -
          <lpage>122</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nych</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaminskyj</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>The identification of the operator's systems images using the method of the phase portrait</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          <volume>512</volume>
          ,
          <fpage>241</fpage>
          -
          <lpage>253</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>The control agent with fuzzy logic</article-title>
          .
          <source>In: Perspective Technologies and Methods in MEMS Design, MEMSTECH</source>
          ,
          <fpage>40</fpage>
          -
          <lpage>41</lpage>
          . (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>The game method for orthonormal systems construction</article-title>
          .
          <source>In: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM</source>
          ,
          <fpage>296</fpage>
          -
          <lpage>298</lpage>
          . (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kyrkalo</surname>
          </string-name>
          , R.:
          <article-title>Fuzzy logic controller for embedded systems</article-title>
          .
          <source>In: International Conference on Perspective Technologies and Methods in MEMS Design, MEMSTECH</source>
          ,
          <fpage>58</fpage>
          -
          <lpage>59</lpage>
          . (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>