<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Service-Oriented Architecture Development as an Integrating Platform in the Tourist Area</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Chernivtsi Philosophical and Legal Lyceum</institution>
          ,
          <addr-line>Chernivtsi</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Drohobych Ivan Franko State Pedagogical University</institution>
          ,
          <addr-line>Drohobych</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>University of Opole</institution>
          ,
          <addr-line>Opole</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>The peculiarities of the methodology of service-oriented architecture are determined. The adequacy of the application of the SOA mechanism for information systems of travel agencies and firms is analyzed. Unified process of Rational Unified Process for the tourism sphere and the evolution of the information system based on SOA in the tourism sphere with the inclusion of legacy software is used to build schemes of an automated system creation.</p>
      </abstract>
      <kwd-group>
        <kwd>Service-Oriented Architecture</kwd>
        <kwd>Information System</kwd>
        <kwd>Business Process</kwd>
        <kwd>Data Integration</kwd>
        <kwd>Tourism</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Constant changes in the development of the tourist market and business processes make
it difficult for the information services of tourist organizations - by means of automation
to minimize the reaction time of the business of tourist organizations to any external or
internal changes [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ]. Reducing the time of development of new tourist services,
introduction of new processes of tourist destinations and other innovations, provides
tourist organizations, in particular travel agencies, support for competitiveness in the
domestic and foreign markets [
        <xref ref-type="bibr" rid="ref4 ref5 ref6 ref7 ref8 ref9">4-9</xref>
        ]. However, the typical computing infrastructure of
tourism organizations is characterized by the factual isolation of its application
components, which in terms of business leads to delays in the execution of business processes,
disruption of interaction between units and partners, impedes management and control,
resulting in reduced efficiency of the organization as a whole. In general, the lack of
integration calls into question the usefulness of information technology for the tourism.
In most cases, these problems arise from the lack of architectural standards in
information technology [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15">10-15</xref>
        ]. Moreover, not only standards but also a set of components
that are standardized are needed to overcome them. Just as necessary is the business
process for execution environment through which the components will linked [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20 ref21">16-21</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>General Problem Formulation</title>
      <p>
        Until the end of the last century, the approach is based on the management and analysis
of content flows dominated the construction of information systems. However, over
time, a process-oriented approach has emerged as more versatile and informative, in
which the choice and modification of the information system structure, the composition
of its components, and the main characteristics are made dependent on the process,
depending on its construction and end-user characteristics. Such a change in the
position of developers has caused a powerful trend in information systems in the theory,
methods and technologies of systems development - modeling and management of
business processes, based on which all known ERP-systems are created. Nowadays, the
analysis application center is moving even more critical - towards manipulating the
works, building the tools for generating workflows and managing them. Business
process management and workflow management are not the same thing. The electronic
business process determines what needs is done, including by establishing the
relationship between output data and input data. A business process may include
non-automated (or non-automated) components that are manually mastered, and it can use any
kind of resources. The workflow describes how a particular result can achieved
[2228]. However, the relationship between the business process and the workflow is quite
simple [
        <xref ref-type="bibr" rid="ref1 ref29 ref3 ref30 ref31 ref32 ref33 ref34 ref35 ref36">1, 3, 29-36</xref>
        ] and is illustrated by the scheme shown in Fig. 1 [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>As in the previous case, the change in the position of developers is explained by changes
in the concept of building information systems. The transition nowadays to
serviceoriented architecture (SOA) means, first, the need to distinguish functional services –
elements of SOA, from which business processes, are synthesized and modernized.</p>
    </sec>
    <sec id="sec-3">
      <title>Analysis of Recent Research and Publications</title>
      <p>
        OASIS (Organization for the Advancement of Structured Information Standards),
which focuses on the standardization of SOA components, defines service-oriented
architecture as the paradigm of distributed organizational and utilitarian capabilities that
operate under the ownership of domains belonging to different owners. [
        <xref ref-type="bibr" rid="ref1 ref37 ref38 ref39 ref40 ref41 ref42 ref43 ref5">1, 5, 37-43</xref>
        ].
According to IBM definition [
        <xref ref-type="bibr" rid="ref1 ref6">1, 6</xref>
        ], SOA is an architectural style for creating an
enterprise information architecture, based on a service orientation to achieve a closer
relationship between business and supporting business systems. SOA introduces service
orientation as an approach to business integration based on related services. Coupled
with the ability to make rapid changes to processes, the presence of such mechanisms
is considered the basis for the effectiveness of information systems based on SOA.
Business tools are used to solve the problems, which in the general case will provide
[
        <xref ref-type="bibr" rid="ref1 ref44 ref45 ref46 ref47 ref48 ref49 ref50 ref51 ref52">1, 44-52</xref>
        ]:



      </p>
      <sec id="sec-3-1">
        <title>Building new business functions;</title>
        <p>Establishing links between business functions from existing applications;
Generating workflows to execute business processes.</p>
        <p>
          In the most general form, SOA involves the presence of three main participants: the
service provider - travel agent, the consumer service - tourist, the register of services
(Fig. 2) [
          <xref ref-type="bibr" rid="ref53 ref54 ref55 ref56 ref57 ref58 ref59 ref60">53-60</xref>
          ].
Participant interaction looks simple enough: the service provider registers its services
in the registry, and the consumer requests the registry. The absence of any of these
elements is unacceptable, and the addition of other components is not only possible but
also necessary in practice. Such elements may include various middleware, monitoring
the order and context of interaction, monitoring and managing services, and managing
metadata and other supporting processes. SOA is an application architecture in which
components or services, with agreed common interfaces, use a single rule (contract) to
determine how to call services and how they will interact with each other. In this
system, the concepts of "client" and "server" are situational absolutely. In one case, the
application can act as a client and invoke an external service, and sometime after that,
it can become a service provider when accessing another application for performing
any tasks. If designed properly, SOA is capable of building and supporting
customerto-customer integration. When using SOA, travel organizations can generate flexibly
and dynamically new services, combining the logic of existing applications and
presenting them through reuse of services.
        </p>
        <p>For information systems of travel agencies and firms, we highlight the goals of SOA:




</p>
        <p>Reducing the cost of developing applications by streamlining the process of
developing tourism services;
Extension of code reuse;
Independence from the platforms, tools, programming languages used;
Increasing the scalability of the created systems in connection with the
development of tourist service;</p>
        <p>Improving the manageability of the created information systems.</p>
      </sec>
      <sec id="sec-3-2">
        <title>SOA principles:</title>
        <p>


</p>
      </sec>
      <sec id="sec-3-3">
        <title>Architecture, as such, is not tied to any specific technology; Independence of organization of the system from the used computing platform; Independence of the organization of the system from the used programming languages;</title>
        <p>Use of services, independent of specific applications, with uniform interfaces
for access to them.</p>
        <p>Service-oriented Architecture is based on the following basic principles that help
address the most pressing issues of application integration.</p>
        <p>Weak connection. In terms of implementation, services in SOA are independent of
each other: they perform certain actions from requests received from other services and
return results. All the details of this execution are completely hidden: in the concept of
SOA services are "black boxes". Therefore, changes in the implementation of the
service will not affect the application component that the service uses, and vice versa.</p>
        <p>Weak connectivity provides a simple and quick adaptation of the system to changes
in the structure and principles of service delivery.</p>
        <p>"Coarse-grained" structure of services. Services in SOA are high-level business
logic modules, whereby the interaction between them is reduced to a limited number of
messages in the content of business logic instead of many low-level calls that take into
account the details of the implementation of services. This approach reduces network
load and contributes to higher system performance. Also important is that in terms of
architecture, service, regardless of internal structure and language of implementation,
looks like a whole.</p>
        <p>Contracts. The concept of contract in SOA is interpreted somewhat more broadly
than usual. The contract defines the conditions for the provision and use of services,
including functional, technical (not only the protocol, but also, for example, the method
of authorization) and other (cost of the permit, guarantees, insurance of the tourist)
parameters and forms based on the agreement between the consumer and the service
provider at all stages of it the interaction process. One of the common definitions of a
provider and a consumer of services is based on who of them gives the contract (travel
provider) and who receives (tourist). The contract allows dividing components into two
parts - public, more stable, and hidden, one that is constantly changing. Because the
way organization of components in SOA corresponds to the way business or computing
is organized, the contract outlines not so much the software component as the business
or computing functionality, dividing the service into a business (computing) interface
and a business (computing) process.</p>
        <p>Contracts not only weaken the links between elements of architecture, but, equally
important, make them explicit, object-oriented objects of management.</p>
        <p>Composition. The main advantage of the composition is the ability to reuse
previously implemented functionality. However, the composition also contributes to
adaptability, because it allows you to make many changes faster by changing the connections
between services. Such changes are much easier than changing the whole service.</p>
        <p>Dynamic linking. Relying on the stability of the contract, the consumer can find the
necessary copies of services without interruption. This means that the system is
resistant to changes not only in addressing available services (moving to another server),
but also in their composition, which can change during operation. For example, new
partners may emerge - travel agents, or the responsibility for providing the necessary
business function may transferred to another provider, including an external one, but
this will not affect the work of the consumer. Dynamic linking is supported by a registry
that performs SOA accounting functions. Typically, it contains links to contracts,
specific instances of services, information about their service providers, and sometimes
their customers. All of this, in addition to other equally important functions, is also a
configuration of SOA, which determines the parameters of the execution time of the
services used for consumers of services (due to the composition of those who are often
their providers). SOA is a set of interoperable design principles, and dynamic linking
is often referred to as the most specific. Dynamic linking benefits are especially needed
when operating large or decentralized information services or when interacting with a
number of parties working on an identical or very similar contract. These can be
affiliates of a travel company (for example, retail outlets - restaurants, hotels, sanatoriums,
and so on), but more often they are partners - travel providers, travel agents, and more.</p>
        <p>Scalability of interfaces. It is a good practice to leave the possibility of adding
previously unforeseen data elements in the message transmission. Thus, a contract in
advance allows for some flexibility if it is possible and necessary in a particular situation.</p>
        <p>Reconstruction. Scalability is good but not good enough. The interface should
always reflect the functionality as fully as possible, and scalability does not solve major
change management issues. Therefore, eventually, the interface has to change, adapt to
changing business requirements. What procedures are being launched, each company
(in the person of the responsible information manager) determines for its organization,
depending on many factors, not the last of which - a balance of logic and intuition in
the style of decision making. More stable organizations are characterized by greater
regulation of the change process, and less flexible ones.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Formation of Goals</title>
      <p>The aim of the study is to increase the flexibility of information systems in the tourism
industry with data, reduce the cost of application development, increase the speed of
response to the constant changes in the requirements of the tourism business, as well as
provide the necessary level of integration between information systems with the help
of SOA - service-oriented architecture.
5</p>
    </sec>
    <sec id="sec-5">
      <title>The System Architecture Development</title>
      <p>A number of standards are used to successfully integrate systems based on Web
services, the main ones being:






</p>
      <sec id="sec-5-1">
        <title>BPEL is business process implementation language; WSDL is service description language; SOAP is messaging protocol; UDDI is universal directory format for searching and integrating Web services.</title>
        <p>
          The composition of Web services based on elementary works is performed using
Business Process Execution Language (BPEL) [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. It emerged because of the merger of the
Web Services Flow Language (WSFL) by IBM and the XLANG language by
Microsoft. The language is based on XML notation [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
        <p>The use of this language allows the formation and execution of workflows as a series
of logical actions, including:</p>
      </sec>
      <sec id="sec-5-2">
        <title>Accepting a request to include work in the process; Rejection of request; Check the description, and if the parameters match, prepare a positive response to the request.</title>
        <p>
          BPEL generates a workflow consisting of sequences of logical actions or active
operations, each of which corresponds to its own square in the workflow diagram or function
code [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. There are two possible uses of BPEL:
1. Performed BPEL is a process that is also considered a service and can be an
orchestration node [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Software products that implement executable BPEL
processes are BPEL engines. Here one running process can include another, which
gives the effect of including one orchestration (sequence of services) in another,
as shown in Fig. 4.
2. The abstract process is almost identical to the executable process except for the
data filling [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. In this capacity, it represents the logic of the business process
and is used for the following purpose:
o Defines the behavior of the elements of the organizational structure
that supports the process;
o A guide for programmers and developers who automate the process;
o Considered an entry for commercial software that forms the structure
of the system.
        </p>
        <p>WSDL (Web Services Description Language) is an XML-based Web
server-description language. Provides the right choice of services for transmission from provider to
consumer. WSDL information is used by service developers to integrate services into
the system.</p>
        <p>SOAP (Simple Object Access Protocol) is also an XML messaging protocol
designed to transmit data from Web services. Auto-generated SOAP files include WSDL
service description data.</p>
        <p>UDDI is a set of rules for registering and retrieving information about available
services. When developing programs, programmers can search the UDDI registry for the
services they need to include in the programs. This registry may be necessary in the
process of executing an application that needs data-providing services, such as the cost
of travel services or permits.</p>
        <p>Consider at the business processes that IBM has put in place that have introduced a
unified process description - Rational Unified Process (RUP). Fig. 5 shown an example
of creating an automated system using RUP and IBM software.
Fig.5 demonstrates interaction head of travel agency, project manager, risk assessment,
project cost and profitability, creation of an imitation model of business process
"existing system", creation of an imitation model of business process "future system", process
choreography, configuration of non-automated tasks, collection of applications,
forming and managing system requirements, testing, requirements tracking and
implementation of precedents, designing, development of portlets, architect, researcher, Java
developer, portal developer, monitoring, database administrator, business operations
analyst. Below describe is a systematic description of the unified process of creating an
information system.</p>
        <p>Step 1. The Rational Portfolio Manager application helps you achieve top-level
modeling alignment on metrics such as profitability (ROI), cost, and other business
conditions.</p>
        <p>Step 2. A business analyst develops a business process model using the WebSphere
Business Modeler application.</p>
        <p>Step 3. Rational Software Architect represents the business process in UML standard
notation.</p>
        <p>Step 4. Rational Software Architect converts the model in UML notation to Java
code.</p>
        <p>Step 5. IBM Rational Application Developer automates the process of creating new
Web services based on existing resources, such as JavaBeans or EJB components, by
automatically generating WSDL files describing Web services, SOAP descriptors, and
a client to test Web services. For example, in a portlet form. Portlet is a standard portal
component, which is designated for a user interface being build (Wikipedia). The
portlet selects the snippets that are embedded in the portal page. You can think of a portal
page as a collection of non-overlapping portlet windows, each displaying a portlet. A
portlet is as a web server application hosted on a portal. Examples of portlets: e-mail,
flight announcements, latest travel news and promotions. With existing portlet
standards, developers can create portlets that are built into any standards-compliant portal.</p>
        <p>Step 6. WebSphere Integration Developer implements a business process in BPEL
format. A developer who integrates web services into a business process can extract a
ready-made service from UDDI and incorporate it into the business process, or
incorporate functions performed by people. The result is expanded as an application
WebSphere Process Server.</p>
        <p>When implementing projects that use process management, the project manager and
team members use Rational Clearquest to support the development. This product
automates task assignment and tracks progress, and is used to test and detect defects in the
projected workflow. It is also used when editing, certifying, and verifying services.</p>
        <p>IBM Rational Clearcase integrated with Eclipse is used for configuration
management tasks.</p>
        <p>Often, the argument against the transition to SOA is the claim that it is associated
with a complete breakdown of the entire existing system, and therefore requires a much
cost. In fact, the transition to SOA does not require a complete change to the existing
information system. It uses technologies that ensure compliance with previously
introduced standards, as well as heredity with respect to previously installed able-bodied
software products and technical equipment. Fig 5 shows the generalized evolutionary
structure of SOA in tourism. Fig. 6 illustrates a typical situation where an SOA-based
information system is built on existing software. As an example, such popular
applications as SAP, SAS, office packages, as well as client software and applications inherited
from previous stages of system development are shown.
Many analysts trace the history of SOA since the end of the last century, referring to
the development of a functional approach, and later the concept of COBRA and tools
Java. However, it did not become widespread because the architecture used at that time
lacked a service level. Plural applications had different GUI, incompatible business
process logic, different storage systems of data. All of this made the system difficult.
The implementation of business processes is related directly the technological level and
depended on the content speed.</p>
        <p>Fig 6 demonstrates interaction of processes as monitoring of business processes,
business process (x6), level of business processes, organizational services, personnel
services, financial services, scheduled services, medical services, excursion services,
leisure services, platform of services, level of services, software, SAP, application
level, technological level</p>
        <p>The transition to a modern SOA and the inclusion of an additional service layer in it
forms a line of autonomous services, each of which is tied to the respective business
domain and platform of Web services, which allows carrying out their use largely,
regardless of the downstream applications and technological level platform.</p>
        <p>
          The introduction of the service level also creates convenient conditions for the
construction of higher-level business processes and their functioning, namely [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]:
        </p>
        <p>The business services line reproduces a rough set of features that are ready to
be incorporated into the business process;;
The description (contract) of each service in the service line uniquely defines it,
forming an interface. The presence of the latter allows you to create business
processes independently and without involving knowledge of the technology
platform;
The registry and search tool maintains the dynamism and ability to change
business processes by quickly accessing services when needed.;
The data model implemented at the service level relies on the structure of the
business domain and is independent of the data models of individual
applications. Because XML is used as a canonical data exchange format, the inclusion
of the service in the business process is also carried out regardless of the internal
data structure in the applications;
The service protection model operating within this layer provides universal
control of the role distribution and connection of the service, authorizing the use of
the service by some process. It also avoids the difficulty of interacting directly
with application security tools, with their differences in organization principles,
interfaces.</p>
        <p>The service level management model generates statistics on the use of services, which
is part of the monitoring of the top level business process (business processes).The lack
of this level in previous generations of information systems created many problems that
contributed to the rapid degradation of business processes, and this factor inhibited the
spread of SOA.</p>
        <p>Here is an example that recreates the possibility of transition to SOA in the tourism
sphere through the evolution and improvement of the system, which does not require
one-time high costs and complete destruction of the usual process of the system
functioning. In this example, the transition to SOA is carried out in stages (Fig.7).</p>
        <p>Fig. 7 shows the developing system, we give an example of two subsystems -
personnel, finance, and analyze their databases. In the first stage of evolution, new services
are being developed that are included in these subsystems. The following shows
services built on inherited applications. These services retain the design features of the old
system. To use them in a future system, they are combined into a common shell, which
is presented as an interface designed already under the new logic of process
implementation.</p>
        <p>Fig. 7. Evolution of SOA-based information system in tourism with the inclusion of inherited
software.</p>
        <p>Fig.7 is tourist diagram of data structure, component interfaces, descriptions of
inherited products, process reengineering, object models, data models, service models,
model processes,

</p>
        <p>Databases, services base, process bases, interface of interaction of models of
tourist sphere,
User database, security within the service level, service registry and search,
platform of services, level of service of information services, service level
management, database of roles and powers, database of frames, data of frames, data of
finance, inherited data, business rules, business requirements, business order,
the interface of the inherited software products, composite services, business
processes, firewall
With the tools included in the service level (registry, service level management
services, security, and business process building), a business process is built that integrates
both new services and outdated software. The development of such a scheme can serve
as the basis for organizing and planning the process of transition to SOA in the tourism
sphere through the gradual development of the information system.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>The article describes the methodology of service-oriented architecture to create
information architecture of the tourism industry, which is based on a service orientation to
build a closer relationship between business and supporting business systems. The
application of SOA service orientation is proposed as an approach to the tourism business
integration on the basis of interconnected services through the evolution and
improvement of the system, which does not require one-time large expenses and complete
destruction of the usual process of system functioning. The application of SOA service
orientation is proposed as the tourism business integration on the basis of
interconnected services through the evolution and improvement of the system, which does not
require one-time large expenses and complete destruction of the usual process of
system functioning.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Shendryk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boiko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Stages of Information System Development in the Process Approach"</article-title>
          , Procedia Computer Science (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Model of Touristic Information Resources Integration According to User Needs</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>113</fpage>
          -
          <lpage>116</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Mathias</given-names>
            <surname>Weske</surname>
          </string-name>
          .
          <source>Business Process Management</source>
          . Springer-Verlag, Berlin-Heidelberg, (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Varetskyy</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Molga</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ignatovych</surname>
            ,
            <given-names>A.:</given-names>
          </string-name>
          <article-title>A new method of fingerprint key protection of grid credential</article-title>
          .
          <source>In: Advances in Intelligent and Soft Computing</source>
          ,
          <volume>84</volume>
          ,
          <fpage>99</fpage>
          -
          <lpage>103</lpage>
          . (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Bobby</given-names>
            <surname>Woolf Exploring IBM SOA. Technology</surname>
          </string-name>
          &amp;Practice. Maximum press (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>IBM</given-names>
            <surname>Redbook</surname>
          </string-name>
          .
          <article-title>Patterns: Implementing an SOA Using an Enterprise Service Bus</article-title>
          , http://www.ibm.com/Index.cfm?ArticleID=22084, last accessed
          <year>2020</year>
          /05/01.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Game method for coalitions formation in multi-agent systems</article-title>
          .
          <source>In: International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>IBM</given-names>
            <surname>Redbook</surname>
          </string-name>
          <article-title>Patterns: Service-Oriented Architecture and</article-title>
          Web Services, http://www.redbooks.ibm.com/abstracts/sg246303.html,
          <source>last accessed</source>
          <year>2020</year>
          /05/01.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Berko</surname>
            ,
            <given-names>A.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aliekseyeva</surname>
            ,
            <given-names>K.A.</given-names>
          </string-name>
          :
          <article-title>Quality evaluation of information resources in web-projects</article-title>
          .
          <source>In: Actual Problems of Economics</source>
          <volume>136</volume>
          (
          <issue>10</issue>
          ),
          <fpage>226</fpage>
          -
          <lpage>234</lpage>
          . (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <article-title>SOA Development Using the IBM Rational Software Development Platform</article-title>
          , http://www07.ibm.com/sg/soa/downloads/SOA_Development_using_Rational_Software, ,
          <source>last accessed</source>
          <year>2020</year>
          /05/01.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Architectural ontology designed for intellectual analysis of e-tourism resources</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>335</fpage>
          -
          <lpage>338</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Antonyuk</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotsky</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lyudkevych</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , Bobyk, І.:
          <article-title>Consolidated Information Web Resource for Online Tourism Based on Data Integration and Geolocation</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>15</fpage>
          -
          <lpage>20</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Vysotsky</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lyudkevych</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antonyuk</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naum</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Slyusarchuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Online Tourism System for Proposals Formation to User Based on Data Integration from Various Sources</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>92</fpage>
          -
          <lpage>97</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedushko</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Some Aspects of the Method for Tourist Route Creation</article-title>
          .
          <source>In: Advances in Artificial Systems for Medicine and Education II</source>
          ,
          <volume>902</volume>
          ,
          <fpage>527</fpage>
          -
          <lpage>537</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Antonyuk</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Medykovskyy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dverii</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oborska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krylyshyn</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotsky</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsiura</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naum</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Online Tourism System Development for Searching and Planning Trips with User's Requirements</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing IV, Springer Nature Switzerland AG</source>
          <year>2020</year>
          ,
          <volume>1080</volume>
          ,
          <fpage>831</fpage>
          -
          <lpage>863</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savchuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasichnyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Individual Sign Translator Component of Tourist Information System</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing IV, Springer Nature Switzerland AG 2020</source>
          , Springer, Cham,
          <volume>1080</volume>
          ,
          <fpage>593</fpage>
          -
          <lpage>601</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Savchuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasichnyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Architecture of the Subsystem of the Tourist Profile Formation</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>871</volume>
          ,
          <fpage>561</fpage>
          -
          <lpage>570</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Zhezhnych</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markiv</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Recognition of tourism documentation fragments from webpage posts</article-title>
          .
          <source>In: 14th International Conference on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering, TCSET,
          <fpage>948</fpage>
          -
          <lpage>951</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Zhezhnych</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markiv</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Linguistic comparison quality evaluation of web-site content with tourism documentation objects</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          <volume>689</volume>
          ,
          <fpage>656</fpage>
          -
          <lpage>667</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Zhezhnych</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markiv</surname>
            ,
            <given-names>O.:</given-names>
          </string-name>
          <article-title>A linguistic method of web-site content comparison with tourism documentation objects</article-title>
          .
          <source>In: International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>340</fpage>
          -
          <lpage>343</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>An Evaluation of the Information Technology of Gene Expression Profiles Processing Stability for Different Levels of Noise Components</article-title>
          .
          <source>In: Data</source>
          ,
          <volume>3</volume>
          (
          <issue>4</issue>
          ), art. no.
          <issue>48</issue>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Durnyak</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pikh</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Senkivskyy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>An Evaluation of the Objective Clustering Inductive Technology Effectiveness Implemented Using Density-Based and Agglomerative Hierarchical Clustering Algorithms</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>532</fpage>
          -
          <lpage>553</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Designing architecture of electronic content commerce system</article-title>
          .
          <source>In: Computer Science and Information Technologies. In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>115</fpage>
          -
          <lpage>119</lpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Model and architecture for virtual library information system</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>37</fpage>
          -
          <lpage>41</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuchkovskiy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markiv</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pabyrivskyy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Architecture of system for content integration and formation based on cryptographic consumer needs</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>391</fpage>
          -
          <lpage>395</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demkiv</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ukhanska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hladun</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalchuk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petruchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dzyubyk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sokulska</surname>
          </string-name>
          , N.:
          <article-title>Design of the architecture of an intelligent system for distributing commercial content in the internet space based on SEO-technologies, neural networks, and Machine Learning</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>2</volume>
          (
          <issue>2</issue>
          -
          <fpage>98</fpage>
          ),
          <fpage>15</fpage>
          -
          <lpage>34</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutyuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>The Architecture of Distant Competencies Analyzing System for IT Recruitment</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>254</fpage>
          -
          <lpage>261</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Kazarian</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kunanets</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasichnyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veretennikova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leheza</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kunanets</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Complex Information E-Science</surname>
          </string-name>
          <article-title>System Architecture based on Cloud Computing Model</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          ,
          <fpage>366</fpage>
          -
          <lpage>377</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseyeva</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Content formation method in the web systems</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          ,
          <volume>2136</volume>
          ,
          <fpage>42</fpage>
          -
          <lpage>61</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rybchak</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Design of airport service automation system</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>195</fpage>
          -
          <lpage>197</lpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          :
          <article-title>An approach to intelligent agent construction for determining the group of bank risk basing on ontology</article-title>
          .
          <source>In: Actual Problems of Economics (7)</source>
          ,
          <fpage>314</fpage>
          -
          <lpage>320</lpage>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalevych</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oborska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Holoshchuk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Knowledge discovery as planning development in knowledgebase framework</article-title>
          . In: Modern Problems of Radio Engineering, Telecommunications and Computer Science, TCSET,
          <fpage>449</fpage>
          -
          <lpage>451</lpage>
          . (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Lypak</surname>
            ,
            <given-names>O.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <year>(</year>
          ...), Rzheuskyi,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Dosyn</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          :
          <article-title>Formation of Efficient Pipeline Operation Procedures Based on Ontological Approach</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>871</volume>
          ,
          <fpage>571</fpage>
          -
          <lpage>581</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olyvko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korniak</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Decision making model based on neural network with diagonalized synaptic connections</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>853</volume>
          ,
          <fpage>321</fpage>
          -
          <lpage>329</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Pasichnyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kunanets</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <year>(</year>
          ...), Bolyubash,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Rzheuskyi</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <article-title>Ontological approach in the formation of effective pipeline operation procedures</article-title>
          .
          <source>In: 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>80</fpage>
          -
          <lpage>83</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uhryn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fityo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Modeling of territorial community formation as a graph partitioning problem</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>1</volume>
          (
          <issue>4</issue>
          ),
          <fpage>47</fpage>
          -
          <lpage>52</lpage>
          . (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The similarity metric of scientific papers summaries on the basis of adaptive ontologies</article-title>
          .
          <source>In: Proceedings of 7th International Conference on Perspective Technologies and Methods in MEMS Design, MEMSTECH</source>
          ,
          <fpage>162</fpage>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsmots</surname>
            ,
            <given-names>O.I.:</given-names>
          </string-name>
          <article-title>The process of managerial decision making support within the early warning system</article-title>
          .
          <source>In: Actual Problems of Economics</source>
          ,
          <volume>149</volume>
          (
          <issue>11</issue>
          ),
          <fpage>222</fpage>
          -
          <lpage>229</lpage>
          . (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>The control agent with fuzzy logic</article-title>
          .
          <source>In: Perspective Technologies and Methods in MEMS Design, MEMSTECH</source>
          ,
          <fpage>40</fpage>
          -
          <lpage>41</lpage>
          . (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>The game method for orthonormal systems construction</article-title>
          .
          <source>In: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM</source>
          ,
          <fpage>296</fpage>
          -
          <lpage>298</lpage>
          . (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kyrkalo</surname>
          </string-name>
          , R.:
          <article-title>Fuzzy logic controller for embedded systems</article-title>
          .
          <source>In: International Conference on Perspective Technologies and Methods in MEMS Design, MEMSTECH</source>
          ,
          <fpage>58</fpage>
          -
          <lpage>59</lpage>
          . (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prodanyuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Game task of resource allocation</article-title>
          .
          <source>In: Experience of Designing and Application of CAD Systems in Microelectronics, CADSM</source>
          ,
          <fpage>437</fpage>
          -
          <lpage>438</lpage>
          . (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Game methods of the stochastic boundary problem solution</article-title>
          .
          <source>In: Perspective Technologies and Methods in MEMS Design, MEMSTECH</source>
          ,
          <fpage>71</fpage>
          -
          <lpage>74</lpage>
          . (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          44.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Adaptive method of pursuit game problem solution</article-title>
          . In: Modern Problems of Radio Engineering, Telecommunications and Computer Science Proceedings of International Conference, TCSET,
          <fpage>62</fpage>
          -
          <lpage>65</lpage>
          . (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          45.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Game methods of construction of adaptive grid areas</article-title>
          .
          <source>In: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM</source>
          ,
          <fpage>513</fpage>
          -
          <lpage>516</lpage>
          . (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          46.
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veres</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bolubash</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bychkovska-Lipinska</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Data space architecture for Big Data managering</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>184</fpage>
          -
          <lpage>187</lpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          47.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hasko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuchkovskiy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Process analysis in electronic content commerce system</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>120</fpage>
          -
          <lpage>123</lpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          48.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veres</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
          </string-name>
          , H.:
          <article-title>The Risk Management Modelling in Multi Project Environment.</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>32</fpage>
          -
          <lpage>35</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          49.
          <string-name>
            <surname>Kanishcheva</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Method of Integration and Content Management of the Information Resources Network</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>689</volume>
          , Springer,
          <fpage>204</fpage>
          -
          <lpage>216</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          50.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Web content support method in electronic business systems</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2136</volume>
          ,
          <fpage>20</fpage>
          -
          <lpage>41</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          51.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makara</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The consolidated information web-resource about pharmacy networks in city</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          ,
          <fpage>239</fpage>
          -
          <lpage>255</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          52.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The method of web-resources management under conditions of uncertainty based on fuzzy logic</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>343</fpage>
          -
          <lpage>346</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          53.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseyeva</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Web Resources Management Method Based on Intelligent Technologies</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>871</volume>
          ,
          <fpage>206</fpage>
          -
          <lpage>221</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          54.
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutyuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voloshyn</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalska-Styczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voloshyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>The Intellectual System Development of Distant Competencies Analyzing for IT Recruitment</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing IV</source>
          , Springer, Cham,
          <volume>1080</volume>
          ,
          <fpage>696</fpage>
          -
          <lpage>720</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          55.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kubik</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ryshkovets</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V. B.</given-names>
          </string-name>
          :
          <article-title>The Mobile Application Development Based on Online Music Library for Socializing in the World of Bard Songs and Scouts' Bonfires</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing IV</source>
          , Springer,
          <volume>1080</volume>
          ,
          <fpage>734</fpage>
          -
          <lpage>756</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          56.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , Chyrun L.:
          <article-title>Analysis and evaluation of risks in electronic commerce</article-title>
          .
          <source>In: CAD Systems in Microelectronics, 9th International Conference</source>
          ,
          <volume>332</volume>
          -
          <fpage>333</fpage>
          . (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          57.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Analysis features of information resources processing</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>124</fpage>
          -
          <lpage>128</lpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          58.
          <string-name>
            <surname>Andrunyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Electronic content commerce system development</article-title>
          .
          <source>In: Proceedings of 13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2015-February</source>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          59.
          <string-name>
            <surname>Alieksieieva</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
          </string-name>
          , V.:
          <article-title>Technology of commercial web-resource processing</article-title>
          .
          <source>In: Proceedings of 13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2015-February</source>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          60.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Methods of information resources processing in electronic content commerce systems</article-title>
          .
          <source>In: Proceedings of 13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2015-February</source>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>